IOC Report
http://wsj.pm

loading gif

Files

File Path
Type
Category
Malicious
C:\ProgramData\netsupport\client\AudioCapture.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\HTCTL32.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\PCICHEK.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\PCICL32.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\TCCTL32.DLL
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\client32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\pcicapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\remcmdstub.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\netsupport\client\NSM.LIC
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\netsupport\client\client32.ini
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\netsupport\client\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\netsupport\client\nskbfltr.inf
Windows setup INFormation
dropped
C:\ProgramData\netsupport\client\nsm_vpro.ini
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\netsupport\netsupport.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.a7eg2nv0h_5ll4mprtt9uojee.tmp
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.f8j4vx3e8n8wro9sxg8skwvnf.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (454), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.h150xbbh9hh9t9qrahcglr31d.tmp
XML 1.0 document, ASCII text, with very long lines (4464), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\AC\Temp\APPX.u5y27yz6k3vi25fmvsudde2mb.tmp
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalCache\WSJ_4.12.77.0_x64__v3spfewvfazpe{10030ca7-2d34-4b5d-ab65-42a8a50302a9}_temp.pri
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\TempState\AILog.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2titzhsh.ebb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zlartyx.40b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eqal40cl.edj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m31idy4h.1ht.psm1
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ms0ixla1.se3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgypohhb.dpt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_seo2ul3m.o2p.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sftmmkzi.o3i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvbunhku.xav.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uucymg4t.spa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vllnbf0w.dix.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vnws2chb.ict.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4zihq54.op0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5nayqjc.ruq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 13:58:17 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\9ca62580-b258-4627-882b-7b61e4af3c6e.tmp
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\Unconfirmed 423205.crdownload
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\Unconfirmed 427628.crdownload (copy)
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\WSJ (1).msix (copy)
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\e741087a-defc-4dd8-a5ef-58ca00c61c80.tmp
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
Chrome Cache Entry: 134
MS Windows icon resource - 4 icons, 64x64, 8 bits/pixel, 48x48, 8 bits/pixel
dropped
Chrome Cache Entry: 135
JPEG image data, baseline, precision 8, 287x191, components 3
downloaded
Chrome Cache Entry: 136
MS Windows icon resource - 4 icons, 64x64, 8 bits/pixel, 48x48, 8 bits/pixel
downloaded
Chrome Cache Entry: 137
JPEG image data, baseline, precision 8, 110x62, components 3
downloaded
Chrome Cache Entry: 138
PNG image data, 110 x 62, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 139
JPEG image data, baseline, precision 8, 220x220, components 3
dropped
Chrome Cache Entry: 140
JSON data
downloaded
Chrome Cache Entry: 141
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 142
JPEG image data, baseline, precision 8, 220x220, components 3
downloaded
Chrome Cache Entry: 143
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 144
PNG image data, 220 x 220, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 145
Web Open Font Format (Version 2), TrueType, length 47552, version 1.0
downloaded
Chrome Cache Entry: 146
HTML document, Unicode text, UTF-8 text, with very long lines (486)
downloaded
Chrome Cache Entry: 147
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 148
JPEG image data, baseline, precision 8, 110x62, components 3
dropped
Chrome Cache Entry: 149
Web Open Font Format (Version 2), TrueType, length 48832, version 1.0
downloaded
Chrome Cache Entry: 150
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 151
PNG image data, 287 x 192, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 152
Web Open Font Format (Version 2), TrueType, length 66893, version 1.0
downloaded
Chrome Cache Entry: 153
Web Open Font Format (Version 2), TrueType, length 47072, version 1.0
downloaded
Chrome Cache Entry: 154
JPEG image data, baseline, precision 8, 110x62, components 3
dropped
Chrome Cache Entry: 155
Web Open Font Format (Version 2), TrueType, length 47236, version 1.0
downloaded
Chrome Cache Entry: 156
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 157
PNG image data, 110 x 62, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 158
JPEG image data, baseline, precision 8, 607x341, components 3
downloaded
Chrome Cache Entry: 159
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 160
ASCII text, with very long lines (10136)
dropped
Chrome Cache Entry: 161
Web Open Font Format (Version 2), TrueType, length 26844, version 0.0
downloaded
Chrome Cache Entry: 162
JPEG image data, baseline, precision 8, 607x341, components 3
dropped
Chrome Cache Entry: 163
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 164
Web Open Font Format (Version 2), TrueType, length 25736, version 0.0
downloaded
Chrome Cache Entry: 165
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 166
Web Open Font Format (Version 2), TrueType, length 65365, version 1.0
downloaded
Chrome Cache Entry: 167
Web Open Font Format (Version 2), TrueType, length 25824, version 0.0
downloaded
Chrome Cache Entry: 168
PNG image data, 1200 x 630, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 169
Unicode text, UTF-8 text, with very long lines (1425), with CRLF line terminators
downloaded
Chrome Cache Entry: 170
GIF image data, version 89a, 76 x 76
dropped
Chrome Cache Entry: 171
JPEG image data, baseline, precision 8, 287x191, components 3
dropped
Chrome Cache Entry: 172
Web Open Font Format (Version 2), TrueType, length 46896, version 1.0
downloaded
Chrome Cache Entry: 173
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 174
Zip archive data, at least v4.5 to extract, compression method=deflate
downloaded
Chrome Cache Entry: 175
JPEG image data, baseline, precision 8, 110x62, components 3
downloaded
Chrome Cache Entry: 176
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 177
Web Open Font Format (Version 2), TrueType, length 63957, version 1.0
downloaded
Chrome Cache Entry: 178
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 179
PNG image data, 220 x 220, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 180
JSON data
dropped
Chrome Cache Entry: 181
Web Open Font Format (Version 2), TrueType, length 47636, version 1.0
downloaded
Chrome Cache Entry: 182
PNG image data, 287 x 192, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 183
GIF image data, version 89a, 76 x 76
downloaded
Chrome Cache Entry: 184
PNG image data, 1200 x 630, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 185
Web Open Font Format (Version 2), TrueType, length 47100, version 1.0
downloaded
Chrome Cache Entry: 186
ASCII text, with very long lines (10136)
downloaded
Chrome Cache Entry: 187
SVG Scalable Vector Graphics image
downloaded
There are 92 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://wsj.pm/
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2012,i,2892533121597599651,11552435548397906284,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe
"C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe"
malicious
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\VFS\ProgramFilesX64\PsfRunDll64.exe
"PsfRunDll64.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Powershell.exe -ExecutionPolicy RemoteSigned -file "C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\StartingScriptWrapper.ps1" "Powershell.exe -ExecutionPolicy RemoteSigned -file '.\tOUKLPvSz.ps1'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -file .\tOUKLPvSz.ps1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.wsj.com/
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=404 --field-trial-handle=1996,i,16757572502617297566,4553058767684910018,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\ProgramData\netsupport\client\client32.exe
"C:\ProgramData\netsupport\client\client32.exe"
malicious
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe
"C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\PsfLauncher64.exe"
malicious
C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\VFS\ProgramFilesX64\PsfRunDll64.exe
"PsfRunDll64.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Powershell.exe -ExecutionPolicy RemoteSigned -file "C:\Program Files\WindowsApps\WSJ_4.12.77.0_x64__v3spfewvfazpe\StartingScriptWrapper.ps1" "Powershell.exe -ExecutionPolicy RemoteSigned -file '.\tOUKLPvSz.ps1'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -file .\tOUKLPvSz.ps1
malicious
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe" -ServerName:App.AppX9rwyqtrq9gw3wnmrap9a412nsc7145qh.mca
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe" /InvokerPRAID: App GroupPolicy
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstaller.exe" -ServerName:App.AppX9rwyqtrq9gw3wnmrap9a412nsc7145qh.mca
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe
"C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.21.2771.0_x64__8wekyb3d8bbwe\AppInstallerFullTrustAppServiceClient.exe" /InvokerPRAID: App GroupPolicy
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://wsj.pm
malicious
https://cdn37.space/974afa0a-d334-48ec-a0d4-4cc14efa730c-1d3d044a-e654-41e3-ad32-38a2934393e4?aklshdjahsjdh=25&ajhsdjhasjhd=nsd&iud=90dab6f9-11b1-408a-af36-86b217e34b87
86.104.72.157
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://%s/testpage.htmwininet.dll
unknown
http://www.certplus.com/CRL/class3.crl0
unknown
http://geo.netsupportsoftware.com/location/loca.asp
104.26.0.231
http://ocsp.suscerte.gob.ve0
unknown
https://cdn40.click/9e4e27b7-bcfb-4298-bf8f-2cf4a6bdb3bf-9b6b40d6-3f8e-4755-9063-562658ebdb95
23.133.88.190
https://cdn40.click/files/WSJ.msix
23.133.88.190
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
https://www.wsj.com/
unknown
http://%s/testpage.htm
unknown
http://geo.netsupportsoftware.com/location/loca.aspuest-Out-NoScope
unknown
http://repository.swisssign.com/0
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
https://android.notify.windows.com/iOS80
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
https://wsj.pm/fonts/woffs/exchange/Exchange-BookItalic.woff2
103.113.70.37
https://nuget.org/nuget.exe
unknown
https://wsj.pm/fonts/woffs/retina/RetinaNarr-Medium.woff2
103.113.70.37
https://wsj.pm/img/wsj-logo-big-black.e653dfca.svg
103.113.70.37
https://wsj.pm/img/google-play.4699f3c2.svg
103.113.70.37
https://wns.windows.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
http://policy.camerfirma.com0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
https://cdn40.click/974afa0a-d334-48ec-a0d4-4cc14efa730c-1d3d044a-e654-41e3-ad32-38a2934393e4?aklshdjahsjdh=25&ajhsdjhasjhd=nsp&ahsdjkasjkdh=ab012ac2-5a34-4ac8-897c-4e2ce3936e3c
23.133.88.190
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://contoso.com/Icon
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
http://127.0.0.1
unknown
http://www.globaltrust.info0
unknown
http://www.symauth.com/cps0(
unknown
https://github.com/Pester/Pester
unknown
https://wsj.pm/fonts/woffs/escrow/Escrow+Display+Condensed+Italic.woff2
103.113.70.37
http://ac.economia.gob.mx/last.crl0G
unknown
https://wsj.pm/img/im-948848.jpeg
103.113.70.37
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.symauth.com/rpa00
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
https://wsj.pm/fonts/woffs/retina/Retina-Light.woff2
103.113.70.37
http://crl2.postsignum.cz/crl/psrootqca4.crl01
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
https://wsj.pm/fonts/woffs/retina/RetinaNarr-Bold.woff2
103.113.70.37
http://www.acabogacia.org0
unknown
https://cdn40.click/73689d8a-25b4-41cf-b693-05591ed804a7-7433f7b1-9997-477b-aadc-5a6e8d233c61?fmtKxAm=Windows%20Defender&ancOgcW=GPedA&BjxYYHPLrzLmCYuBVxOLtmKj=Microsoft+Windows+10+Pro&aEoLMFrJkYQED=25&sbhadkcjUpbj=d99844e1-4599-410e-aa0d-b504c5ca3ddf&File=wsj&jAWWnA=w&zbzPFbbhcIkxLubqNgOzVPy=90dab6f9-11b1-408a-af36-86b217e34b87
23.133.88.190
http://www.firmaprofesional.com/cps0
unknown
https://aka.ms/pscore6
unknown
https://cdn40.click/bb9c1a14-4e3d-40ab-bcc8-0b84e78255b0-4bed9ff2-0f4e-48fb-92ed-1065fcd85e01
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://www.agesic.gub.uy/acrn/acrn.crl0)
unknown
http://pesterbdd.com/images/Pester.png8
unknown
https://wsj.pm/fonts/woffs/retina/Retina-Book.woff2
103.113.70.37
http://www.rcsc.lt/repository0
unknown
https://wsj.pm/style.css
103.113.70.37
https://web.certicamara.com/marco-legal0Z
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.correo.com.uy/correocert/cps.pdf0
unknown
http://www.netsupportschool.com/tutor-assistant.asp11(
unknown
https://wsj.pm/fonts/woffs/escrow/Escrow+Display+Condensed+Roman.woff2
103.113.70.37
http://certs.oaticerts.com/repository/OATICA2.crt08
unknown
http://cps.chambersign.org/cps/chambersignroot.html0
unknown
http://www.anf.es/AC/RC/ocsp0c
unknown
http://www.pci.co.uk/support
unknown
http://www.oaticerts.com/repository.
unknown
http://www.ancert.com/cps0
unknown
http://ocsp.accv.es0
unknown
https://www.wsj.com/x
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
unknown
http://www.echoworx.com/ca/root2/cps.pdf0
unknown
https://wsj.pm/img/im-949675.png
103.113.70.37
http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
unknown
http://www.datev.de/zertifikat-policy-std0
unknown
https://www.wsj.com/vice
unknown
https://wsj.pm/fonts/woffs/retina/RetinaNarr-Light.woff2
103.113.70.37
http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
unknown
https://aka.ms/winsvr-2022-pshelp(
unknown
http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
unknown
http://crl.defence.gov.au/pki0
unknown
http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
unknown
http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdn37.space
86.104.72.157
malicious
geo.netsupportsoftware.com
104.26.0.231
cdn40.click
23.133.88.190
api.ipify.org
104.26.12.205
www.google.com
108.177.122.106
wsj.pm
103.113.70.37

IPs

IP
Domain
Country
Malicious
86.104.72.157
cdn37.space
Romania
malicious
192.168.2.17
unknown
unknown
malicious
5.8.63.140
unknown
Russian Federation
104.26.12.205
api.ipify.org
United States
185.174.102.62
unknown
Ukraine
108.177.122.106
www.google.com
United States
239.255.255.250
unknown
Reserved
103.113.70.37
wsj.pm
India
104.26.13.205
unknown
United States
23.133.88.190
cdn40.click
Reserved
104.26.0.231
geo.netsupportsoftware.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\WC\Siloedbdbb71-2b33-bfb5-9570-d8542522e897user_sid\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
196D5A39000
heap
page read and write
23162DD7000
trusted library allocation
page read and write
2A99FB9E000
heap
page read and write
2A99FC59000
heap
page read and write
8AF000
heap
page read and write
31BE000
stack
page read and write
2B2F34AC000
heap
page read and write
2A99FD95000
heap
page read and write
2B5AB23C000
heap
page read and write
7FF9BB670000
trusted library allocation
page read and write
7FF9BB690000
trusted library allocation
page execute and read and write
2A99FC7D000
heap
page read and write
1D2C5F02000
heap
page read and write
196D5F5E000
heap
page read and write
231619C3000
trusted library allocation
page read and write
7FF9BB270000
trusted library allocation
page read and write
1E1353B0000
heap
page execute and read and write
7FF9BB3E0000
trusted library allocation
page read and write
2A99FDC9000
heap
page read and write
196D5B61000
heap
page read and write
196D5B82000
heap
page read and write
3CA6937000
stack
page read and write
196D5F77000
heap
page read and write
196D59DA000
heap
page read and write
196D5A3D000
heap
page read and write
2A997D48000
heap
page read and write
401000
unkown
page execute read
E27857A000
stack
page read and write
5A9C000
heap
page read and write
186BAE02000
heap
page read and write
7FF9BB5F0000
trusted library allocation
page read and write
2A99FCD1000
heap
page read and write
196D5BC9000
heap
page read and write
196D5AB2000
heap
page read and write
2B5AB200000
heap
page read and write
7FF9BB8D0000
trusted library allocation
page read and write
3CA657E000
stack
page read and write
2A997C33000
heap
page read and write
196D59B5000
heap
page read and write
23162F77000
trusted library allocation
page read and write
2B28091B000
trusted library allocation
page read and write
2316355E000
trusted library allocation
page read and write
2A99FD26000
heap
page read and write
196D593E000
heap
page read and write
7FF9BAFC0000
trusted library allocation
page read and write
2A99FC75000
heap
page read and write
FD62FF3000
stack
page read and write
7FF9BB550000
trusted library allocation
page read and write
8D4000
heap
page read and write
196D5BAA000
heap
page read and write
196D5834000
heap
page read and write
2B280877000
trusted library allocation
page read and write
2678AA2E000
heap
page read and write
196D5CA1000
heap
page read and write
196D5AD4000
heap
page read and write
2A99FD97000
heap
page read and write
2315F23D000
heap
page read and write
2B2F5D02000
heap
page read and write
196D5373000
heap
page read and write
7FF9BB160000
trusted library allocation
page read and write
7FF9BB0B5000
trusted library allocation
page read and write
5A96000
heap
page read and write
7FF9BB390000
trusted library allocation
page read and write
196D5D04000
heap
page read and write
196D5AF1000
heap
page read and write
FD61CFA000
stack
page read and write
1E11DC32000
trusted library allocation
page read and write
2A99FE6F000
heap
page read and write
196D5BD1000
heap
page read and write
231711D0000
trusted library allocation
page read and write
2A99FBC0000
heap
page read and write
1E11CDE0000
heap
page execute and read and write
5A23000
heap
page read and write
196D5B3B000
heap
page read and write
7FF9BB751000
trusted library allocation
page read and write
5AA9000
heap
page read and write
2B2809C3000
trusted library allocation
page read and write
1E11E1A5000
trusted library allocation
page read and write
196D6294000
heap
page read and write
1E11B498000
heap
page read and write
2A99FF16000
heap
page read and write
196D51EE000
heap
page read and write
186BAE13000
heap
page read and write
2B280A9F000
trusted library allocation
page read and write
904000
heap
page read and write
7FF9BB520000
trusted library allocation
page read and write
177F3C13000
heap
page read and write
7FF9BB620000
trusted library allocation
page read and write
2A99FF3E000
heap
page read and write
196D5A27000
heap
page read and write
7FF9BB0C0000
trusted library allocation
page read and write
2A99FE2C000
heap
page read and write
5AA0000
heap
page read and write
7FF9BAE23000
trusted library allocation
page execute and read and write
196D5983000
heap
page read and write
1E11B413000
heap
page read and write
196CDB62000
heap
page read and write
196D5A04000
heap
page read and write
7FF9BB730000
trusted library allocation
page read and write
196D513D000
heap
page read and write
2A997CD9000
heap
page read and write
B9700FA000
stack
page read and write
8BF000
heap
page read and write
196D5ABA000
heap
page read and write
196D5D34000
heap
page read and write
196D5B9C000
heap
page read and write
23179160000
trusted library allocation
page read and write
23162F35000
trusted library allocation
page read and write
3CA64FE000
stack
page read and write
196D5A59000
heap
page read and write
2A9A0010000
heap
page read and write
7FF9BAFEB000
trusted library allocation
page read and write
75186FF000
stack
page read and write
196D53F5000
heap
page read and write
1C75FA2C000
heap
page read and write
177F3BE0000
heap
page read and write
FD62DFC000
stack
page read and write
2A9A0010000
heap
page read and write
8FB000
heap
page read and write
196CD800000
heap
page read and write
196D59C8000
heap
page read and write
23171460000
trusted library allocation
page read and write
2727000
heap
page read and write
7FF9BB4C0000
trusted library allocation
page read and write
196D5B88000
heap
page read and write
2A99A36E000
heap
page read and write
2A99FB3A000
heap
page read and write
2A997CC2000
heap
page read and write
196D5D7F000
heap
page read and write
2316306B000
trusted library allocation
page read and write
196D531E000
heap
page read and write
2A99FB50000
heap
page read and write
196D5A0D000
heap
page read and write
196CDA13000
heap
page read and write
186BAE28000
heap
page read and write
196D59E9000
heap
page read and write
196D5CFD000
heap
page read and write
196D5A76000
heap
page read and write
231616DB000
trusted library allocation
page read and write
2B2F5E8E000
heap
page read and write
196D5F9B000
heap
page read and write
2A99FF83000
heap
page read and write
2A997DFA000
heap
page read and write
2A99FD06000
heap
page read and write
196D5A34000
heap
page read and write
196D5FCD000
heap
page read and write
196D5B95000
heap
page read and write
196D5349000
heap
page read and write
FD625FE000
stack
page read and write
196D5BA3000
heap
page read and write
7FF9BBA53000
trusted library allocation
page read and write
2A99FBC8000
heap
page read and write
2A99FE1B000
heap
page read and write
1E1355F5000
heap
page read and write
2A997DCA000
heap
page read and write
7FF9BB8F0000
trusted library allocation
page read and write
196D5CA7000
heap
page read and write
196D5F70000
heap
page read and write
196D5942000
heap
page read and write
7FF9BB090000
trusted library allocation
page read and write
196D0002000
heap
page read and write
74675000
unkown
page readonly
1E0000
heap
page read and write
2A99FD82000
heap
page read and write
2A99A3DC000
heap
page read and write
196D5B2C000
heap
page read and write
2A99A1B0000
heap
page read and write
2316352D000
trusted library allocation
page read and write
7FF9BBA90000
trusted library allocation
page read and write
2560000
heap
page read and write
7FF9BB680000
trusted library allocation
page read and write
2A99FF34000
heap
page read and write
32FC000
stack
page read and write
7FF9BB380000
trusted library allocation
page read and write
6C1B2000
unkown
page readonly
2A99FED2000
heap
page read and write
2B2F32C0000
heap
page read and write
177F3C8C000
heap
page read and write
7FF9BB150000
trusted library allocation
page read and write
2A99FCB6000
heap
page read and write
196D5B8C000
heap
page read and write
1C75FB02000
heap
page read and write
7FF9BAEDC000
trusted library allocation
page execute and read and write
2A99FDFC000
heap
page read and write
E2789FF000
stack
page read and write
3CA65FA000
stack
page read and write
2678A9A0000
trusted library allocation
page read and write
196D5BD5000
heap
page read and write
5ACB000
heap
page read and write
FDFFDFD000
stack
page read and write
5A4F000
heap
page read and write
196D5D3E000
heap
page read and write
196D5AA6000
heap
page read and write
196D01B6000
heap
page read and write
196D580D000
heap
page read and write
2678CA83000
trusted library allocation
page read and write
196D5A7B000
heap
page read and write
7FF6C3696000
unkown
page read and write
B9703FE000
stack
page read and write
196D5A88000
heap
page read and write
2B281BC6000
trusted library allocation
page read and write
81E000
heap
page read and write
7FF9BB370000
trusted library allocation
page read and write
196D5967000
heap
page read and write
E27813E000
stack
page read and write
1E11B43B000
heap
page read and write
1E135561000
heap
page read and write
2A99FF52000
heap
page read and write
2B2F343A000
heap
page read and write
8D4000
heap
page read and write
196D5B7C000
heap
page read and write
1E135503000
heap
page read and write
2A99FF5B000
heap
page read and write
2B281B39000
trusted library allocation
page read and write
23163088000
trusted library allocation
page read and write
196D5CD8000
heap
page read and write
2B280420000
trusted library allocation
page read and write
2A99FB4C000
heap
page read and write
5A9C000
heap
page read and write
196D5FBD000
heap
page read and write
196D5B88000
heap
page read and write
231793ED000
heap
page read and write
2A99FDB9000
heap
page read and write
2A99FD64000
heap
page read and write
FD62EFC000
stack
page read and write
5A62000
heap
page read and write
2A9A0023000
heap
page read and write
2A99FBEE000
heap
page read and write
112AD000
unkown
page readonly
196D5B77000
heap
page read and write
7FF9BB0D3000
trusted library allocation
page read and write
177E6DC0000
heap
page read and write
5AA7000
heap
page read and write
7FF9BB640000
trusted library allocation
page read and write
196D51F1000
heap
page read and write
196D5AC5000
heap
page read and write
23162FB2000
trusted library allocation
page read and write
2B2F4E02000
heap
page read and write
196D5318000
heap
page read and write
3CA6E7D000
stack
page read and write
196D5803000
heap
page read and write
196D5D19000
heap
page read and write
7FF695D5E000
unkown
page readonly
196D5A68000
heap
page read and write
196D5C5D000
heap
page read and write
2A99FB9B000
heap
page read and write
196D5CB3000
heap
page read and write
196D5802000
heap
page read and write
2A99FD6C000
heap
page read and write
5AC1000
heap
page read and write
196D5AB6000
heap
page read and write
196D5B54000
heap
page read and write
196D5CD0000
heap
page read and write
7FF9BB8F0000
trusted library allocation
page read and write
2B2F5524000
heap
page read and write
196D5A70000
heap
page read and write
7FF9BAE2D000
trusted library allocation
page execute and read and write
7FF9BB810000
trusted library allocation
page read and write
2A99FC36000
heap
page read and write
2316307C000
trusted library allocation
page read and write
7FF9BAF50000
trusted library allocation
page execute and read and write
2A99FBC6000
heap
page read and write
231791F0000
trusted library allocation
page read and write
2B280523000
trusted library allocation
page read and write
2A99FB39000
heap
page read and write
1E135A44000
heap
page read and write
6C1B3000
unkown
page read and write
901000
heap
page read and write
537F000
stack
page read and write
7FFA1C52D000
unkown
page read and write
8D0000
heap
page read and write
196D5B71000
heap
page read and write
7FF9BB91C000
trusted library allocation
page read and write
23163382000
trusted library allocation
page read and write
196D45A0000
heap
page readonly
2A99FBB2000
heap
page read and write
177F5680000
heap
page read and write
231633B9000
trusted library allocation
page read and write
23163119000
trusted library allocation
page read and write
D65B76D000
stack
page read and write
3CA6CFE000
stack
page read and write
23163405000
trusted library allocation
page read and write
196D620A000
heap
page read and write
37EF3FC000
stack
page read and write
7FF9BB470000
trusted library allocation
page read and write
196D5364000
heap
page read and write
7FF9BBB70000
trusted library allocation
page read and write
196D5A49000
heap
page read and write
5A89000
heap
page read and write
23162EE7000
trusted library allocation
page read and write
2A99FCD7000
heap
page read and write
FD630FF000
stack
page read and write
196D5C97000
heap
page read and write
196D59C4000
heap
page read and write
2A99F358000
heap
page read and write
2B280A74000
trusted library allocation
page read and write
2B5AB244000
heap
page read and write
196D5A9C000
heap
page read and write
23162F04000
trusted library allocation
page read and write
196D5800000
heap
page read and write
2A99FE13000
heap
page read and write
196D5CAE000
heap
page read and write
196D5E0B000
heap
page read and write
7FF9BB2F0000
trusted library allocation
page read and write
2A99FA0D000
heap
page read and write
7FF9BAFC0000
trusted library allocation
page read and write
8B0000
heap
page read and write
7FF9BBAB0000
trusted library allocation
page read and write
2B2F32F0000
heap
page read and write
7FF9BAEC6000
trusted library allocation
page read and write
271A000
heap
page read and write
196D5822000
heap
page read and write
196D5A6C000
heap
page read and write
196D51EF000
heap
page read and write
196D5A90000
heap
page read and write
196D5AAA000
heap
page read and write
7FF9BBB80000
trusted library allocation
page execute and read and write
2B28093C000
trusted library allocation
page read and write
196D5F57000
heap
page read and write
196D5AD7000
heap
page read and write
196D5346000
heap
page read and write
7FF9BB4D0000
trusted library allocation
page read and write
2A99FB0F000
heap
page read and write
196D501D000
heap
page read and write
23163530000
trusted library allocation
page read and write
7FF9BAEF6000
trusted library allocation
page execute and read and write
196D5B7E000
heap
page read and write
2A99FBC2000
heap
page read and write
7FF9BBB10000
trusted library allocation
page read and write
196D620A000
heap
page read and write
7FF9BBAB0000
trusted library allocation
page execute and read and write
751837F000
stack
page read and write
196D5B2A000
heap
page read and write
196D5AF6000
heap
page read and write
196D5B84000
heap
page read and write
2A99FC02000
heap
page read and write
196D5A79000
heap
page read and write
FD62BFC000
stack
page read and write
7FF9BB170000
trusted library allocation
page read and write
7FF9BB540000
trusted library allocation
page read and write
196D5A61000
heap
page read and write
2A99FB03000
heap
page read and write
196D5C41000
heap
page read and write
7FF9BB050000
trusted library allocation
page read and write
7FF9BB754000
trusted library allocation
page read and write
7FF9BB130000
trusted library allocation
page read and write
196D5A0C000
heap
page read and write
2678C402000
heap
page read and write
7FF9BB380000
trusted library allocation
page read and write
2A99FF86000
heap
page read and write
7FF9BB5F0000
trusted library allocation
page read and write
196D5C5F000
heap
page read and write
2A99FBE9000
heap
page read and write
7FF9BB360000
trusted library allocation
page read and write
7FF6C367E000
unkown
page readonly
1E11B442000
heap
page read and write
7FF9BAE20000
trusted library allocation
page read and write
2A99F402000
heap
page read and write
196CDAB4000
heap
page read and write
2A997D7B000
heap
page read and write
231634AB000
trusted library allocation
page read and write
7FF9BB160000
trusted library allocation
page read and write
2A99FCF6000
heap
page read and write
196D5DAA000
heap
page read and write
43970FE000
stack
page read and write
2316333B000
trusted library allocation
page read and write
2A99FB9E000
heap
page read and write
1C75F9B0000
heap
page read and write
196D597C000
heap
page read and write
E2784FE000
stack
page read and write
2A99FF1C000
heap
page read and write
196D5AA6000
heap
page read and write
2A99FE89000
heap
page read and write
7FF9BB0F0000
trusted library allocation
page read and write
74670000
unkown
page readonly
2A99FBD5000
heap
page read and write
2A99FB7C000
heap
page read and write
196D5C44000
heap
page read and write
7FF9BB760000
trusted library allocation
page read and write
196D5953000
heap
page read and write
1E11B502000
heap
page read and write
2A99FCF1000
heap
page read and write
196D59EA000
heap
page read and write
7FF9BB140000
trusted library allocation
page read and write
2A99FC5D000
heap
page read and write
FD620FB000
stack
page read and write
196D5B78000
heap
page read and write
196CDA00000
heap
page read and write
25AE000
stack
page read and write
5A3F000
heap
page read and write
2A99FF8D000
heap
page read and write
196D5D73000
heap
page read and write
2678A9B0000
heap
page read and write
43979FC000
stack
page read and write
4397BFC000
stack
page read and write
7FF9BB991000
trusted library allocation
page read and write
2A99F5EF000
heap
page read and write
2A99FC70000
heap
page read and write
7FF9BB4A0000
trusted library allocation
page read and write
196D5ADF000
heap
page read and write
196D5C73000
heap
page read and write
196D5987000
heap
page read and write
231799E3000
heap
page read and write
2A99FFD9000
heap
page read and write
2A997DC6000
heap
page read and write
196D5D7D000
heap
page read and write
7FF9BB990000
trusted library allocation
page read and write
196D5D57000
heap
page read and write
2A99FEFB000
heap
page read and write
2601000
heap
page read and write
196D5AB6000
heap
page read and write
59E000
stack
page read and write
196D5C83000
heap
page read and write
2A99FF06000
heap
page read and write
7FF9BBD20000
trusted library allocation
page read and write
196D62A5000
heap
page read and write
2A99FB78000
heap
page read and write
2B281B15000
trusted library allocation
page read and write
1D2C5DC0000
remote allocation
page read and write
2797D21A000
heap
page read and write
23179800000
heap
page read and write
7FF9BB7E0000
trusted library allocation
page read and write
2A997CE6000
heap
page read and write
23161D6B000
trusted library allocation
page read and write
2B280514000
trusted library allocation
page read and write
5A12000
heap
page read and write
2678AAFA000
heap
page read and write
7FF9BB120000
trusted library allocation
page read and write
2A99FF11000
heap
page read and write
2317985F000
heap
page read and write
196D5B41000
heap
page read and write
2A99FB49000
heap
page read and write
2316310E000
trusted library allocation
page read and write
1E135B02000
heap
page read and write
7FF9BB070000
trusted library allocation
page read and write
2A99FCE5000
heap
page read and write
196D5BB2000
heap
page read and write
7FF9BB6E0000
trusted library allocation
page read and write
FDFFCFE000
stack
page read and write
196D5D3C000
heap
page read and write
1C75FAB4000
heap
page read and write
196D5D3C000
heap
page read and write
196D5B74000
heap
page read and write
1E11CDA0000
trusted library allocation
page read and write
2797D302000
heap
page read and write
2678C601000
trusted library allocation
page read and write
196D5AE8000
heap
page read and write
2A99F234000
heap
page read and write
23160D13000
heap
page read and write
2A9A000D000
heap
page read and write
2A99FD10000
heap
page read and write
196D5A75000
heap
page read and write
E2786FC000
stack
page read and write
196D5A8A000
heap
page read and write
3CA6173000
stack
page read and write
196D5B00000
heap
page read and write
7FF695D40000
unkown
page readonly
2A99FF87000
heap
page read and write
2985FF000
stack
page read and write
196D5A02000
heap
page read and write
23163307000
trusted library allocation
page read and write
196D59D8000
heap
page read and write
2678AA13000
heap
page read and write
23162D69000
trusted library allocation
page read and write
231630FC000
trusted library allocation
page read and write
196D5AD1000
heap
page read and write
7FFA1B10B000
unkown
page read and write
2A997DF6000
heap
page read and write
2A99FC37000
heap
page read and write
1E1355D0000
heap
page read and write
196D5D2C000
heap
page read and write
23162447000
trusted library allocation
page read and write
2A99FD8D000
heap
page read and write
196D5D2C000
heap
page read and write
751877E000
stack
page read and write
1E11E8B1000
trusted library allocation
page read and write
2A99FB3E000
heap
page read and write
2A99FF02000
heap
page read and write
7FF9BB91D000
trusted library allocation
page read and write
8AD000
heap
page read and write
856000
heap
page read and write
2B5AB213000
heap
page read and write
196D5A7F000
heap
page read and write
196D5DE5000
heap
page read and write
196D5C3F000
heap
page read and write
196D5971000
heap
page read and write
196D5BF9000
heap
page read and write
2A99FBB3000
heap
page read and write
7FF9BB110000
trusted library allocation
page read and write
7FF9BB080000
trusted library allocation
page read and write
196CDAA8000
heap
page read and write
7FF9BB630000
trusted library allocation
page read and write
7FF9BB760000
trusted library allocation
page read and write
1C75FA43000
heap
page read and write
1E12D001000
trusted library allocation
page read and write
2678A850000
heap
page read and write
2A997D5F000
heap
page read and write
196D5AE5000
heap
page read and write
196CDA99000
heap
page read and write
E278776000
stack
page read and write
231633D6000
trusted library allocation
page read and write
2A99FBCA000
heap
page read and write
2A99FFC0000
heap
page read and write
196D5330000
heap
page read and write
6C1A4000
unkown
page read and write
196D5B82000
heap
page read and write
196D5D8C000
heap
page read and write
2B2F5500000
heap
page read and write
7FF9BAED0000
trusted library allocation
page read and write
231611AB000
trusted library allocation
page read and write
3CA6BFE000
stack
page read and write
196D5CD5000
heap
page read and write
2678A960000
trusted library section
page read and write
196D5D05000
heap
page read and write
7DF4223D1000
trusted library allocation
page execute read
196D59B7000
heap
page read and write
196D59D2000
heap
page read and write
7FF9BB120000
trusted library allocation
page read and write
1E135590000
heap
page read and write
2315F0D0000
heap
page read and write
2A99FE16000
heap
page read and write
8DC000
heap
page read and write
23163423000
trusted library allocation
page read and write
2A99FDC5000
heap
page read and write
196D5824000
heap
page read and write
5A17000
heap
page read and write
196D5DE0000
heap
page read and write
196D5D24000
heap
page read and write
196D5989000
heap
page read and write
2A99FD45000
heap
page read and write
7FF9BB340000
trusted library allocation
page read and write
527E000
stack
page read and write
23160BB0000
trusted library section
page read and write
196D59AE000
heap
page read and write
2315F0F0000
heap
page read and write
196CDBEC000
heap
page read and write
2A99FB52000
heap
page read and write
196D5B8E000
heap
page read and write
2A99FEF6000
heap
page read and write
E2788F6000
stack
page read and write
5A00000
heap
page read and write
2A99FB8A000
heap
page read and write
23179E0E000
heap
page read and write
2B280565000
trusted library allocation
page read and write
7FF9BB970000
trusted library allocation
page read and write
D65C13E000
stack
page read and write
7FF9BB450000
trusted library allocation
page read and write
7FF9BB730000
trusted library allocation
page read and write
2A99FCF9000
heap
page read and write
7FF9BB342000
trusted library allocation
page read and write
2A99FF28000
heap
page read and write
7FF683640000
direct allocation
page execute read
196D5961000
heap
page read and write
7FF9BB250000
trusted library allocation
page read and write
2316317A000
trusted library allocation
page read and write
2A99FC6D000
heap
page read and write
23163235000
trusted library allocation
page read and write
5A6F000
heap
page read and write
7FF9BB6F0000
trusted library allocation
page read and write
196D5C25000
heap
page read and write
23179202000
heap
page execute and read and write
37EF0FE000
stack
page read and write
2678AB02000
heap
page read and write
2A99FD60000
heap
page read and write
23179300000
heap
page read and write
2A99FFE5000
heap
page read and write
7FF9BAF06000
trusted library allocation
page execute and read and write
196D59F3000
heap
page read and write
7FF9BAF30000
trusted library allocation
page execute and read and write
196D5AEF000
heap
page read and write
6BEF9000
unkown
page write copy
7FF9BB743000
trusted library allocation
page read and write
2678AA41000
heap
page read and write
196D5957000
heap
page read and write
51B0000
unclassified section
page read and write
7FF9BB980000
trusted library allocation
page read and write
7FF9BB0C5000
trusted library allocation
page read and write
2A99FCDB000
heap
page read and write
196D5B82000
heap
page read and write
2A99FB96000
heap
page read and write
196D5C11000
heap
page read and write
196D5BB4000
heap
page read and write
7FF9BBAC0000
trusted library allocation
page read and write
196D5BFC000
heap
page read and write
2B280854000
trusted library allocation
page read and write
196D5B63000
heap
page read and write
2B2F3420000
heap
page read and write
7FF6C3696000
unkown
page read and write
196CDAA6000
heap
page read and write
2A99FEF2000
heap
page read and write
196D5F68000
heap
page read and write
196D582D000
heap
page read and write
5AA0000
heap
page read and write
196D5D51000
heap
page read and write
196D5AC3000
heap
page read and write
2A99FCF4000
heap
page read and write
2A99FCC9000
heap
page read and write
7FF9BB960000
trusted library allocation
page read and write
196D5AFB000
heap
page read and write
2A99FB4A000
heap
page read and write
5ABB000
heap
page read and write
196D5F2A000
heap
page read and write
7FF9BB347000
trusted library allocation
page read and write
2B290078000
trusted library allocation
page read and write
7FF9BB93A000
trusted library allocation
page read and write
2A99FE0F000
heap
page read and write
1E135A49000
heap
page read and write
196CDAB7000
heap
page read and write
196D5C51000
heap
page read and write
1E135A02000
heap
page read and write
196D596B000
heap
page read and write
196D507D000
heap
page read and write
196D5939000
heap
page read and write
2B2F5C63000
heap
page read and write
196D5D9F000
heap
page read and write
7FF9BB950000
trusted library allocation
page read and write
196D5B7C000
heap
page read and write
196D5C30000
heap
page read and write
8FD000
heap
page read and write
23179E4C000
heap
page read and write
23163240000
trusted library allocation
page read and write
196D01E3000
heap
page read and write
2B2F3424000
heap
page read and write
196D5986000
heap
page read and write
2797D202000
heap
page read and write
7FF9BBA50000
trusted library allocation
page read and write
2678C502000
heap
page read and write
D65B7EE000
stack
page read and write
2A99FD04000
heap
page read and write
196D5D2F000
heap
page read and write
196D593D000
heap
page read and write
1E11EC87000
trusted library allocation
page read and write
2316339C000
trusted library allocation
page read and write
2A997D35000
heap
page read and write
2A99FBA0000
heap
page read and write
2B2F4DF0000
heap
page read and write
196D5E02000
heap
page read and write
196D5B06000
heap
page read and write
2A99FB89000
heap
page read and write
2A99FD6C000
heap
page read and write
7FFA1C518000
unkown
page readonly
B9704FB000
stack
page read and write
307E000
stack
page read and write
1E135A36000
heap
page read and write
196D5B16000
heap
page read and write
E278A7F000
stack
page read and write
2A99FFD0000
heap
page read and write
2317984F000
heap
page read and write
2A99FF00000
heap
page read and write
2B2F5CD2000
heap
page read and write
2A99FC76000
heap
page read and write
23160C02000
heap
page read and write
2A997DDA000
heap
page read and write
2B280A83000
trusted library allocation
page read and write
196D59C2000
heap
page read and write
7FF9BB500000
trusted library allocation
page read and write
196D5B7C000
heap
page read and write
196D51DE000
heap
page read and write
196D595B000
heap
page read and write
2A99FBD3000
heap
page read and write
111EB000
unkown
page read and write
196D5967000
heap
page read and write
196D5B8A000
heap
page read and write
196D5C1B000
heap
page read and write
2A99FE56000
heap
page read and write
196D5B97000
heap
page read and write
7FF9BB2D0000
trusted library allocation
page read and write
7FF9BB940000
trusted library allocation
page read and write
23161AFA000
trusted library allocation
page read and write
4396FF8000
stack
page read and write
5A9D000
heap
page read and write
2B2F342F000
heap
page read and write
2B280560000
trusted library allocation
page read and write
7DF4223C1000
trusted library allocation
page execute read
7FF9BB600000
trusted library allocation
page read and write
2A997C6F000
heap
page read and write
2A99FD82000
heap
page read and write
7FF9BB2B0000
trusted library allocation
page read and write
2A99FBEB000
heap
page read and write
874000
heap
page read and write
2B2805CC000
trusted library allocation
page read and write
3CA647E000
stack
page read and write
7FF9BB310000
trusted library allocation
page read and write
4397DFF000
stack
page read and write
7FF9BB8D0000
trusted library allocation
page read and write
2315F200000
heap
page read and write
7FF9BB740000
trusted library allocation
page read and write
2A99FDDF000
heap
page read and write
4397AFC000
stack
page read and write
2A99FF62000
heap
page read and write
24B0000
heap
page read and write
7FF9BB0F0000
trusted library allocation
page read and write
2315F2EE000
heap
page read and write
196D5A9F000
heap
page read and write
7FFA1C51E000
unkown
page readonly
196D5F3B000
heap
page read and write
2A99FDDA000
heap
page read and write
231791E0000
trusted library allocation
page read and write
8BD000
heap
page read and write
7FF9BAE30000
trusted library allocation
page read and write
196D5352000
heap
page read and write
2A997D62000
heap
page read and write
2A99FC3E000
heap
page read and write
400000
unkown
page readonly
2B2F5CA0000
heap
page read and write
2B2F3502000
heap
page read and write
6C1A9000
unkown
page readonly
2B28067B000
trusted library allocation
page read and write
196D5AD3000
heap
page read and write
2A99FE51000
heap
page read and write
196D5AFD000
heap
page read and write
7FF9BB130000
trusted library allocation
page read and write
196D5E10000
heap
page read and write
8BD000
heap
page read and write
196D5A7D000
heap
page read and write
2A99FCDF000
heap
page read and write
196D5AE9000
heap
page read and write
7FF9BB5C0000
trusted library allocation
page read and write
4397CF3000
stack
page read and write
2A99FCB3000
heap
page read and write
5A48000
heap
page read and write
196D5B7B000
heap
page read and write
196D5D59000
heap
page read and write
23163533000
trusted library allocation
page read and write
7FF9BB4A0000
trusted library allocation
page read and write
2A99FE06000
heap
page read and write
177F3C00000
heap
page read and write
2678A830000
heap
page read and write
2A99FB9C000
heap
page read and write
2A99FCCF000
heap
page read and write
23179354000
heap
page read and write
196D598C000
heap
page read and write
2A99FCA8000
heap
page read and write
1D2C7880000
heap
page read and write
7FF9BAE20000
trusted library allocation
page read and write
23163353000
trusted library allocation
page read and write
7FF9BB510000
trusted library allocation
page read and write
75183FF000
stack
page read and write
196D592D000
heap
page read and write
23161BC6000
trusted library allocation
page read and write
2A99FB30000
heap
page read and write
2A99FCB5000
heap
page read and write
5A9E000
heap
page read and write
7FF9BB692000
trusted library allocation
page read and write
7FF9BBB50000
trusted library allocation
page read and write
196D5DE5000
heap
page read and write
196D5BFE000
heap
page read and write
7FF9BB240000
trusted library allocation
page read and write
196D5FEC000
heap
page read and write
7FF9BAF40000
trusted library allocation
page execute and read and write
317F000
stack
page read and write
2316318C000
trusted library allocation
page read and write
23163433000
trusted library allocation
page read and write
2A99FB92000
heap
page read and write
196D597E000
heap
page read and write
231613CA000
trusted library allocation
page read and write
196D5CE8000
heap
page read and write
196D5B58000
heap
page read and write
196D5D30000
heap
page read and write
196D57C0000
heap
page read and write
5A4C000
heap
page read and write
196D5AC5000
heap
page read and write
231798DC000
heap
page read and write
177F3C07000
heap
page read and write
2A99FA0D000
heap
page read and write
196D5E0A000
heap
page read and write
2B290021000
trusted library allocation
page read and write
D65C03E000
stack
page read and write
7FF9BBDC0000
trusted library allocation
page read and write
2B2F53D0000
heap
page execute and read and write
196D59B0000
heap
page read and write
196D5990000
heap
page read and write
2A997DCE000
heap
page read and write
23171175000
trusted library allocation
page read and write
5AAD000
heap
page read and write
23162518000
trusted library allocation
page read and write
2B280A39000
trusted library allocation
page read and write
7FF9BB220000
trusted library allocation
page read and write
2316355A000
trusted library allocation
page read and write
1E11B447000
heap
page read and write
7FF9BAE40000
trusted library allocation
page read and write
1E11E8DD000
trusted library allocation
page read and write
2A99FBFD000
heap
page read and write
2678A9E0000
heap
page execute and read and write
196D594A000
heap
page read and write
2B01000
heap
page read and write
7FF9BB100000
trusted library allocation
page execute and read and write
2A99FED0000
heap
page read and write
2A99FCAA000
heap
page read and write
2A99FC59000
heap
page read and write
901000
heap
page read and write
196D5ADC000
heap
page read and write
196D5D4D000
heap
page read and write
2B2F5E74000
heap
page read and write
196D5D38000
heap
page read and write
2A99FBC0000
heap
page read and write
196D5930000
heap
page read and write
251D000
stack
page read and write
7FF9BB4F0000
trusted library allocation
page read and write
901000
heap
page read and write
196D5B32000
heap
page read and write
23163273000
trusted library allocation
page read and write
196D5AAA000
heap
page read and write
7FFA1C515000
unkown
page readonly
2B2805AE000
trusted library allocation
page read and write
7FF9BB6C0000
trusted library allocation
page execute and read and write
196D5D39000
heap
page read and write
7FF9BB530000
trusted library allocation
page read and write
7FF9BB8BD000
trusted library allocation
page read and write
2A99FB83000
heap
page read and write
196D5D13000
heap
page read and write
7FF9BB344000
trusted library allocation
page read and write
196D5E00000
heap
page read and write
23162CBB000
trusted library allocation
page read and write
2A99FCBA000
heap
page read and write
2A99FCE9000
heap
page read and write
E27958F000
stack
page read and write
23179E00000
heap
page read and write
2A99F211000
heap
page read and write
2A99FDB9000
heap
page read and write
3CA6D7E000
stack
page read and write
2A99F543000
heap
page read and write
2B2F343C000
heap
page read and write
7FF9BB490000
trusted library allocation
page read and write
196D5C32000
heap
page read and write
2A9A0004000
heap
page read and write
196D5B7C000
heap
page read and write
196D51BF000
heap
page read and write
2A99FBD0000
heap
page read and write
3CA683E000
stack
page read and write
2A99FB30000
heap
page read and write
7FF9BB110000
trusted library allocation
page execute and read and write
196D5D68000
heap
page read and write
2A99FBA1000
heap
page read and write
2316309F000
trusted library allocation
page read and write
2A99FE39000
heap
page read and write
60DA0FA000
stack
page read and write
2A99F970000
heap
page read and write
5A81000
heap
page read and write
177F3C5D000
heap
page read and write
196D59DD000
heap
page read and write
231798B6000
heap
page read and write
7FF9BBDA0000
trusted library allocation
page execute and read and write
74684000
unkown
page readonly
2A99FC35000
heap
page read and write
2A99FEAF000
heap
page read and write
2678CAF6000
trusted library allocation
page read and write
2B2806A8000
trusted library allocation
page read and write
231793F9000
heap
page read and write
29857E000
stack
page read and write
196D5B10000
heap
page read and write
196D597B000
heap
page read and write
7FF9BBD80000
trusted library allocation
page read and write
196D5D38000
heap
page read and write
2B2F5413000
heap
page execute and read and write
2A997CD7000
heap
page read and write
2678C75D000
trusted library allocation
page read and write
5B0A000
heap
page read and write
231799A2000
heap
page read and write
2A99FF79000
heap
page read and write
6BEFA000
unkown
page read and write
7FF9BAE14000
trusted library allocation
page read and write
196D5D85000
heap
page read and write
23162C98000
trusted library allocation
page read and write
60DA4FA000
stack
page read and write
2A997DBD000
heap
page read and write
231624FB000
trusted library allocation
page read and write
196D5F3A000
heap
page read and write
196D5DA3000
heap
page read and write
11000000
unkown
page readonly
2A99FED8000
heap
page read and write
5AFB000
heap
page read and write
196D5C14000
heap
page read and write
7FF9BB510000
trusted library allocation
page read and write
2B2F3441000
heap
page read and write
2797D1A0000
heap
page read and write
23179313000
heap
page read and write
196CDB5B000
heap
page read and write
403000
unkown
page write copy
2797D200000
heap
page read and write
196D5949000
heap
page read and write
196D51EC000
heap
page read and write
196D5BAF000
heap
page read and write
196D50BF000
heap
page read and write
2A99A363000
heap
page read and write
270C000
heap
page read and write
2B280472000
trusted library allocation
page read and write
2A99FD7C000
heap
page read and write
2A997BF0000
trusted library allocation
page read and write
D65BE34000
stack
page read and write
196CDA9D000
heap
page read and write
23179863000
heap
page read and write
196D59DC000
heap
page read and write
196D5351000
heap
page read and write
196D5BE1000
heap
page read and write
196D580A000
heap
page read and write
196D596D000
heap
page read and write
7FF9BBA20000
trusted library allocation
page read and write
43971FE000
stack
page read and write
7FF9BB820000
trusted library allocation
page read and write
196D5F6E000
heap
page read and write
196D5A78000
heap
page read and write
2316356B000
trusted library allocation
page read and write
2A99FED2000
heap
page read and write
2B2F3413000
heap
page read and write
23161B02000
trusted library allocation
page read and write
23162CA3000
trusted library allocation
page read and write
2316286C000
trusted library allocation
page read and write
7FF9BB5E0000
trusted library allocation
page read and write
7FF9BB070000
trusted library allocation
page read and write
196D5955000
heap
page read and write
2A997A40000
heap
page read and write
231799F0000
heap
page read and write
196D5E3C000
heap
page read and write
196D5FE2000
heap
page read and write
FDFF597000
stack
page read and write
1D2C5E02000
heap
page read and write
7FF9BAE30000
trusted library allocation
page read and write
2B5AD202000
heap
page read and write
196D5B04000
heap
page read and write
196D5B5B000
heap
page read and write
7FF695D50000
unkown
page readonly
7FF9BAF16000
trusted library allocation
page execute and read and write
3CA6A3F000
stack
page read and write
2A99FDE7000
heap
page read and write
4EEF000
stack
page read and write
196D51A2000
heap
page read and write
177F3E00000
heap
page read and write
1E135405000
heap
page execute and read and write
111DC000
unkown
page read and write
2A99FC25000
heap
page read and write
196D0132000
heap
page read and write
7FF9BAE1D000
trusted library allocation
page execute and read and write
75191CE000
stack
page read and write
7FF9BB0B0000
trusted library allocation
page read and write
7FF9BB2A0000
trusted library allocation
page read and write
196D5952000
heap
page read and write
2A99FC07000
heap
page read and write
E27847E000
stack
page read and write
196D5B15000
heap
page read and write
2B2F551F000
heap
page read and write
196D5B9B000
heap
page read and write
196D5C57000
heap
page read and write
231798C9000
heap
page read and write
1C75F9F0000
heap
page read and write
6C1B0000
unkown
page readonly
196D5D82000
heap
page read and write
2A99FB4E000
heap
page read and write
196D594E000
heap
page read and write
196D5B39000
heap
page read and write
196D5C45000
heap
page read and write
2678AA48000
heap
page read and write
196D5A13000
heap
page read and write
2678AA9B000
heap
page read and write
7FF9BB8C0000
trusted library allocation
page read and write
231713AD000
trusted library allocation
page read and write
2A99FE0B000
heap
page read and write
4396CFE000
stack
page read and write
196D5CA4000
heap
page read and write
196D5A0F000
heap
page read and write
2A99FBDA000
heap
page read and write
23162DF4000
trusted library allocation
page read and write
23162E7A000
trusted library allocation
page read and write
196D5903000
heap
page read and write
7FF9BBAF0000
trusted library allocation
page read and write
5A9A000
heap
page read and write
231634DF000
trusted library allocation
page read and write
7FF9BB750000
trusted library allocation
page read and write
2678C714000
trusted library allocation
page read and write
2A99FC68000
heap
page read and write
2A99FC3C000
heap
page read and write
7FF9BB340000
trusted library allocation
page read and write
7FF9BB790000
trusted library allocation
page execute and read and write
196CDBA4000
heap
page read and write
7FF9BBA90000
trusted library allocation
page read and write
2A997CA2000
heap
page read and write
2A99FB40000
heap
page read and write
196D5A32000
heap
page read and write
2A99F562000
heap
page read and write
196D51E0000
heap
page read and write
7FF9BB650000
trusted library allocation
page read and write
7FF9BB732000
trusted library allocation
page read and write
6C1B4000
unkown
page readonly
196D59A3000
heap
page read and write
2678A980000
trusted library allocation
page read and write
D65BFBE000
stack
page read and write
2A99FE1D000
heap
page read and write
2A99FF0A000
heap
page read and write
7FF9BB780000
trusted library allocation
page read and write
2B5AB313000
heap
page read and write
196D5BDA000
heap
page read and write
8EF000
heap
page read and write
2B05000
heap
page read and write
7FF9BB280000
trusted library allocation
page read and write
2A99FDC7000
heap
page read and write
2A99FE3E000
heap
page read and write
2A99F35A000
heap
page read and write
2A99FD5C000
heap
page read and write
2316246A000
trusted library allocation
page read and write
196D5BE7000
heap
page read and write
6C1A6000
unkown
page write copy
2A99FB4C000
heap
page read and write
196D5B88000
heap
page read and write
196D5CAB000
heap
page read and write
2B2805BE000
trusted library allocation
page read and write
7FF9BB03A000
trusted library allocation
page read and write
196CDAD3000
heap
page read and write
2A99F3F2000
heap
page read and write
2A99FB47000
heap
page read and write
196D5979000
heap
page read and write
2A99FDD1000
heap
page read and write
2A99F225000
heap
page read and write
196D5770000
unkown
page readonly
2A99FB31000
heap
page read and write
5A96000
heap
page read and write
7FF9BB130000
trusted library allocation
page execute and read and write
7FF9BB0E0000
trusted library allocation
page read and write
186BADE0000
heap
page read and write
196D5B4F000
heap
page read and write
7FF9BB790000
trusted library allocation
page execute and read and write
1E11B3D0000
heap
page read and write
23163287000
trusted library allocation
page read and write
196D5200000
heap
page read and write
901000
heap
page read and write
196D5C33000
heap
page read and write
7FF9BB74A000
trusted library allocation
page read and write
2B2F5620000
heap
page read and write
60DA1FE000
stack
page read and write
2678AA53000
heap
page read and write
196D5364000
heap
page read and write
196D5790000
trusted library section
page read and write
2B280A92000
trusted library allocation
page read and write
196D5B3F000
heap
page read and write
1C75F9D0000
heap
page read and write
196CDB7F000
heap
page read and write
5AA9000
heap
page read and write
43968FE000
stack
page read and write
196CDB89000
heap
page read and write
2A99FE92000
heap
page read and write
196D5900000
heap
page read and write
7FF9BAE2B000
trusted library allocation
page read and write
2678C711000
trusted library allocation
page read and write
7FF9BB250000
trusted library allocation
page execute and read and write
E27897E000
stack
page read and write
505E000
stack
page read and write
196D6225000
heap
page read and write
1D2C5DF0000
heap
page read and write
1E11B2D0000
heap
page read and write
196D5B45000
heap
page read and write
2A997DC2000
heap
page read and write
2B5AB1D0000
heap
page read and write
2A99F56F000
heap
page read and write
196D5992000
heap
page read and write
2A997D7E000
heap
page read and write
2A997DCE000
heap
page read and write
196CDAD5000
heap
page read and write
2B28040C000
trusted library allocation
page read and write
196D5BE3000
heap
page read and write
196D51FB000
heap
page read and write
2A99FB5F000
heap
page read and write
23163330000
trusted library allocation
page read and write
196D5A10000
heap
page read and write
2A99FD4F000
heap
page read and write
2A99FF84000
heap
page read and write
196D5D38000
heap
page read and write
196D5982000
heap
page read and write
196D5D17000
heap
page read and write
7FF9BB7B0000
trusted library allocation
page read and write
7FF9BB530000
trusted library allocation
page read and write
196CDAF3000
heap
page read and write
7DF42A750000
trusted library allocation
page execute and read and write
2A99FCCD000
heap
page read and write
7FF9BAEC0000
trusted library allocation
page read and write
43972FC000
stack
page read and write
2B5AB140000
heap
page read and write
11257000
unkown
page readonly
1E135A17000
heap
page read and write
196D5F52000
heap
page read and write
2A99FB57000
heap
page read and write
231713BD000
trusted library allocation
page read and write
2B2808E3000
trusted library allocation
page read and write
196D5A87000
heap
page read and write
2A99FC03000
heap
page read and write
2A99FB13000
heap
page read and write
231613AB000
trusted library allocation
page read and write
7FF9BB9D4000
trusted library allocation
page read and write
1E11CE13000
heap
page read and write
2A99FF44000
heap
page read and write
23160BF0000
heap
page read and write
196CDB9E000
heap
page read and write
7FF9BB390000
trusted library allocation
page read and write
5AAB000
heap
page read and write
7FF9BBD60000
trusted library allocation
page read and write
75182FE000
stack
page read and write
2A99A3BD000
heap
page read and write
2A99F35C000
heap
page read and write
7FF9BB100000
trusted library allocation
page read and write
196D5CF2000
heap
page read and write
196D5975000
heap
page read and write
7FF9BB27A000
trusted library allocation
page read and write
2A99F35F000
heap
page read and write
196CDB46000
heap
page read and write
2A99FC90000
heap
page read and write
7FF9BB330000
trusted library allocation
page read and write
196D5A08000
heap
page read and write
7FF9BB600000
trusted library allocation
page read and write
2A99FEA1000
heap
page read and write
196D5331000
heap
page read and write
2B2F3446000
heap
page read and write
7FF9BB0E0000
trusted library allocation
page read and write
7FF9BB0E3000
trusted library allocation
page read and write
196D5D3E000
heap
page read and write
1E11B2B0000
heap
page read and write
196D5A53000
heap
page read and write
2A99FDC1000
heap
page read and write
7FF9BB480000
trusted library allocation
page read and write
7FF9BB880000
trusted library allocation
page read and write
7FF9BB0B5000
trusted library allocation
page read and write
231624E0000
trusted library allocation
page read and write
2A99FE39000
heap
page read and write
196D5DC0000
heap
page read and write
4DEE000
stack
page read and write
177E6DA0000
heap
page read and write
2B2F5C9C000
heap
page read and write
2A997DC0000
heap
page read and write
D65B6E2000
stack
page read and write
196D5F6A000
heap
page read and write
196D5D22000
heap
page read and write
7FF9BB330000
trusted library allocation
page read and write
1128A000
unkown
page readonly
2A997DF6000
heap
page read and write
7FF9BB900000
trusted library allocation
page read and write
196D5C53000
heap
page read and write
2B28083D000
trusted library allocation
page read and write
196D5C00000
heap
page read and write
5AA0000
heap
page read and write
23171458000
trusted library allocation
page read and write
2B2F3451000
heap
page read and write
196D5DE1000
heap
page read and write
1E12D078000
trusted library allocation
page read and write
2A99FB3D000
heap
page read and write
87A000
heap
page read and write
410000
heap
page read and write
11297000
unkown
page readonly
7FF9BB056000
trusted library allocation
page read and write
9AB74FF000
stack
page read and write
231624B4000
trusted library allocation
page read and write
23161B04000
trusted library allocation
page read and write
2A99FB8C000
heap
page read and write
7FF9BB9B3000
trusted library allocation
page read and write
23179943000
heap
page read and write
177F3C48000
heap
page read and write
2678CAEE000
trusted library allocation
page read and write
2A99FD2A000
heap
page read and write
5A3F000
heap
page read and write
7FF9BB912000
trusted library allocation
page read and write
1E1355B4000
heap
page read and write
196D5A37000
heap
page read and write
2B2F4F02000
heap
page read and write
2A99FBAE000
heap
page read and write
2B280A0F000
trusted library allocation
page read and write
196D5B46000
heap
page read and write
28FE000
stack
page read and write
196D5A48000
heap
page read and write
2A99F54B000
heap
page read and write
23161CBA000
trusted library allocation
page read and write
2A99FF7A000
heap
page read and write
23162D59000
trusted library allocation
page read and write
2A99FD5C000
heap
page read and write
5A43000
heap
page read and write
2A99FC55000
heap
page read and write
2A99FBAB000
heap
page read and write
7FF9BB5D0000
trusted library allocation
page read and write
23179190000
trusted library allocation
page read and write
37EF4FF000
stack
page read and write
7FF6C3696000
unkown
page write copy
2B2805D6000
trusted library allocation
page read and write
196D5945000
heap
page read and write
1E11B43D000
heap
page read and write
2A99FB82000
heap
page read and write
2B281BD1000
trusted library allocation
page read and write
2A99FD22000
heap
page read and write
196D5DF9000
heap
page read and write
2A99FC78000
heap
page read and write
196D5B50000
heap
page read and write
7FF9BB2B0000
trusted library allocation
page read and write
196D5BD3000
heap
page read and write
353D000
stack
page read and write
196D5951000
heap
page read and write
7FF9BB690000
trusted library allocation
page read and write
196D5BE8000
heap
page read and write
2A99FE90000
heap
page read and write
7FF9BB705000
trusted library allocation
page read and write
2B290001000
trusted library allocation
page read and write
6C0F1000
unkown
page execute read
7FF9BB460000
trusted library allocation
page read and write
2678C413000
heap
page read and write
196D59A5000
heap
page read and write
1E11B4CD000
heap
page read and write
196D5DB8000
heap
page read and write
196D5BCF000
heap
page read and write
7FFA1C52B000
unkown
page read and write
177F3C7D000
heap
page read and write
2B280621000
trusted library allocation
page read and write
196D5C1C000
heap
page read and write
2B2F5000000
heap
page execute and read and write
2315F34C000
heap
page read and write
196D5DF1000
heap
page read and write
5A75000
heap
page read and write
2B280890000
trusted library allocation
page read and write
196CDA26000
heap
page read and write
7FF9BB4D0000
trusted library allocation
page read and write
23162E68000
trusted library allocation
page read and write
196D5926000
heap
page read and write
196D5AA4000
heap
page read and write
2A99FF4A000
heap
page read and write
196D5D93000
heap
page read and write
2A99FD91000
heap
page read and write
7FF695D70000
remote allocation
page read and write
2A99FBAC000
heap
page read and write
9AB71DB000
stack
page read and write
2A99FBA5000
heap
page read and write
43983FE000
stack
page read and write
7FF9BBD70000
trusted library allocation
page read and write
2678A950000
heap
page read and write
2A997DD2000
heap
page read and write
2A99FCAE000
heap
page read and write
196D5928000
heap
page read and write
2A99FCD1000
heap
page read and write
7FF9BB610000
trusted library allocation
page read and write
5AF4000
heap
page read and write
231631AF000
trusted library allocation
page read and write
2B2F5575000
heap
page read and write
2A99FED2000
heap
page read and write
C22A3FE000
stack
page read and write
196D5941000
heap
page read and write
196D59B1000
heap
page read and write
2A99FC61000
heap
page read and write
25E0000
heap
page read and write
2B280A2A000
trusted library allocation
page read and write
23163562000
trusted library allocation
page read and write
1E12D1B8000
trusted library allocation
page read and write
2A99FC47000
heap
page read and write
196D5C81000
heap
page read and write
196D5D0A000
heap
page read and write
2A99FC32000
heap
page read and write
7FF6C3640000
unkown
page readonly
23160BC0000
trusted library allocation
page read and write
196D5F42000
heap
page read and write
196D57D0000
heap
page read and write
2A99FBE1000
heap
page read and write
2316164C000
trusted library allocation
page read and write
196D5B6C000
heap
page read and write
196D5959000
heap
page read and write
196D5ADB000
heap
page read and write
37EF6FC000
stack
page read and write
196CDB13000
heap
page read and write
2A99FB9C000
heap
page read and write
7FF9BB190000
trusted library allocation
page read and write
7FF9BB4E0000
trusted library allocation
page read and write
7FF9BB3A0000
trusted library allocation
page read and write
51AF000
stack
page read and write
2B2F5CD8000
heap
page read and write
2A99FF19000
heap
page read and write
2A99A322000
heap
page read and write
2A9A0010000
heap
page read and write
2A99FB61000
heap
page read and write
8F7000
heap
page read and write
2B2F53E0000
trusted library allocation
page read and write
1E11B4F6000
heap
page read and write
7FF9BB830000
trusted library allocation
page read and write
2A99FEB0000
heap
page read and write
2A997CF4000
heap
page read and write
196CDB0A000
heap
page read and write
23162A0C000
trusted library allocation
page read and write
196D5B20000
heap
page read and write
177E6EA0000
heap
page read and write
7FF9BB970000
trusted library allocation
page read and write
2B280A57000
trusted library allocation
page read and write
2984FC000
stack
page read and write
2B5AB27A000
heap
page read and write
196D5A44000
heap
page read and write
2678A820000
heap
page read and write
2B2F5E82000
heap
page read and write
2A99FC83000
heap
page read and write
7FF9BAE7C000
trusted library allocation
page execute and read and write
2A99FB24000
heap
page read and write
23160BE0000
trusted library allocation
page read and write
196D59BE000
heap
page read and write
2A99FB47000
heap
page read and write
2A99FCC5000
heap
page read and write
2A99FC8C000
heap
page read and write
23179213000
heap
page execute and read and write
196D59DB000
heap
page read and write
196D536E000
heap
page read and write
7FF9BBDB0000
trusted library allocation
page read and write
7FF9BBD10000
trusted library allocation
page read and write
196D59BC000
heap
page read and write
7FF9BBAEC000
trusted library allocation
page read and write
2317118D000
trusted library allocation
page read and write
7FF9BB070000
trusted library allocation
page read and write
7FF9BB4E0000
trusted library allocation
page read and write
2A99FB99000
heap
page read and write
177E6EA8000
heap
page read and write
2A99FF2A000
heap
page read and write
23160D02000
heap
page read and write
23162D74000
trusted library allocation
page read and write
8FA000
heap
page read and write
196D53A5000
heap
page read and write
7FF9BBD00000
trusted library allocation
page read and write
2A99FDC3000
heap
page read and write
2A99FDB3000
heap
page read and write
2A997A60000
heap
page read and write
2A99FBBE000
heap
page read and write
196D5937000
heap
page read and write
7FF9BB280000
trusted library allocation
page read and write
2A99FB3B000
heap
page read and write
2A99FB50000
heap
page read and write
196D5D89000
heap
page read and write
23179820000
heap
page read and write
196D5947000
heap
page read and write
196D5BA5000
heap
page read and write
7FF9BB2D0000
trusted library allocation
page read and write
7FF9BB7F0000
trusted library allocation
page read and write
5B0F000
heap
page read and write
7FF9BAE27000
trusted library allocation
page read and write
196CDBA3000
heap
page read and write
231634C7000
trusted library allocation
page read and write
7FF9BB0D0000
trusted library allocation
page read and write
7FF9BAE4D000
trusted library allocation
page execute and read and write
196D5BCB000
heap
page read and write
7FF9BB150000
trusted library allocation
page execute and read and write
5AC5000
heap
page read and write
196CDA7E000
heap
page read and write
196D62B3000
heap
page read and write
196D5BD5000
heap
page read and write
2A99FDBF000
heap
page read and write
231713A5000
trusted library allocation
page read and write
1E11CDF0000
heap
page readonly
1E11CDC0000
trusted library allocation
page read and write
196D5D11000
heap
page read and write
196D5A59000
heap
page read and write
7FF9BB0A0000
trusted library allocation
page read and write
2B29006A000
trusted library allocation
page read and write
196D5029000
heap
page read and write
196D5CEF000
heap
page read and write
7FF9BBAEE000
trusted library allocation
page read and write
2A99FCB3000
heap
page read and write
2B2F5E9C000
heap
page read and write
2A99FE70000
heap
page read and write
7FF9BB680000
trusted library allocation
page read and write
4F5E000
stack
page read and write
7FF9BB140000
trusted library allocation
page read and write
196D5D0D000
heap
page read and write
196D5C4D000
heap
page read and write
23162E6A000
trusted library allocation
page read and write
11325000
unkown
page readonly
5A1B000
heap
page read and write
2A99FF8E000
heap
page read and write
2A99FB41000
heap
page read and write
196D5CF7000
heap
page read and write
2678AB34000
heap
page read and write
196D5CA1000
heap
page read and write
7FF9BB480000
trusted library allocation
page read and write
2A99FDDA000
heap
page read and write
1C75FA00000
heap
page read and write
7FF9BB014000
trusted library allocation
page read and write
196D5000000
heap
page read and write
23161B22000
trusted library allocation
page read and write
7FF9BB380000
trusted library allocation
page read and write
196D5D2C000
heap
page read and write
196D5A1C000
heap
page read and write
196D5965000
heap
page read and write
11001000
unkown
page execute read
196D5D15000
heap
page read and write
7FF9BB030000
trusted library allocation
page read and write
2A99F5AB000
heap
page read and write
2316227F000
trusted library allocation
page read and write
2678C620000
trusted library allocation
page read and write
7FF695D5A000
unkown
page write copy
7FF9BB0BA000
trusted library allocation
page read and write
196D5F54000
heap
page read and write
196D5B25000
heap
page read and write
196D5C38000
heap
page read and write
2A99FD1E000
heap
page read and write
2A99FB5B000
heap
page read and write
7FFA1C50F000
unkown
page readonly
E27978E000
stack
page read and write
2A99FBB6000
heap
page read and write
196D5F52000
heap
page read and write
1D2C5E13000
heap
page read and write
2A99FE0D000
heap
page read and write
2B2F5C1E000
heap
page read and write
1C75FA13000
heap
page read and write
2A99FB8F000
heap
page read and write
196D5A86000
heap
page read and write
196D5B08000
heap
page read and write
196D5D75000
heap
page read and write
7FF9BB923000
trusted library allocation
page read and write
2B2F34F0000
heap
page read and write
AFE000
stack
page read and write
FDFFAFE000
stack
page read and write
FD621FF000
stack
page read and write
196D53AB000
heap
page read and write
E2780B1000
stack
page read and write
7FF9BB440000
trusted library allocation
page read and write
1E11D089000
trusted library allocation
page read and write
1E135A07000
heap
page read and write
7FF9BB2C0000
trusted library allocation
page read and write
7FF9BBD6C000
trusted library allocation
page read and write
196D5A8E000
heap
page read and write
2B280A07000
trusted library allocation
page read and write
7FF9BAFC2000
trusted library allocation
page read and write
7FF9BB800000
trusted library allocation
page read and write
7FF9BB2A0000
trusted library allocation
page read and write
196D5C0F000
heap
page read and write
196D5977000
heap
page read and write
1C75FA43000
heap
page read and write
196D5B35000
heap
page read and write
2678C726000
trusted library allocation
page read and write
196D6302000
heap
page read and write
5A41000
heap
page read and write
2A99FF22000
heap
page read and write
7FF9BB770000
trusted library allocation
page read and write
2B280423000
trusted library allocation
page read and write
5A39000
heap
page read and write
D65BF39000
stack
page read and write
196D5B8D000
heap
page read and write
BFE000
stack
page read and write
2A99FB36000
heap
page read and write
7FF9BAE47000
trusted library allocation
page read and write
2A99FB23000
heap
page read and write
196D5AE1000
heap
page read and write
2A99A347000
heap
page read and write
196D5D43000
heap
page read and write
FD633FA000
stack
page read and write
177F3D02000
heap
page read and write
196CDADE000
heap
page read and write
196CF7B0000
trusted library allocation
page read and write
2A99FD30000
heap
page read and write
231793D4000
heap
page read and write
3CA69B6000
stack
page read and write
231632A2000
trusted library allocation
page read and write
2A997DE2000
heap
page read and write
2A99FFAB000
heap
page read and write
196D5AAA000
heap
page read and write
2315F22E000
heap
page read and write
3CA67EC000
stack
page read and write
196D5B3D000
heap
page read and write
2A997C07000
heap
page read and write
177F3C2B000
heap
page read and write
1E135572000
heap
page read and write
2B2F55A2000
heap
page read and write
2A99FD87000
heap
page read and write
196D5BFB000
heap
page read and write
196D59EB000
heap
page read and write
7FF9BBA30000
trusted library allocation
page read and write
2A99FF4F000
heap
page read and write
7FFA1B0A1000
unkown
page execute read
2316343E000
trusted library allocation
page read and write
7FF9BB5E0000
trusted library allocation
page read and write
2A99FD00000
heap
page read and write
2A997D13000
heap
page read and write
2A99F200000
heap
page read and write
196D5C5B000
heap
page read and write
7FF9BB0C0000
trusted library allocation
page read and write
7FF9BB370000
trusted library allocation
page read and write
2A99FE23000
heap
page read and write
196D59E3000
heap
page read and write
7FF9BB840000
trusted library allocation
page read and write
7FF9BB460000
trusted library allocation
page read and write
7FF9BB520000
trusted library allocation
page read and write
196D598C000
heap
page read and write
196D5D53000
heap
page read and write
7FF9BB6C5000
trusted library allocation
page read and write
7FF9BB0D0000
trusted library allocation
page read and write
7FF9BB530000
trusted library allocation
page execute and read and write
2A99FFA2000
heap
page read and write
7FF9BB640000
trusted library allocation
page read and write
1C75FA29000
heap
page read and write
7FF9BB076000
trusted library allocation
page read and write
1E135033000
trusted library allocation
page read and write
23161659000
trusted library allocation
page read and write
2A99FCBD000
heap
page read and write
196D5B88000
heap
page read and write
196D5A45000
heap
page read and write
231799AB000
heap
page read and write
2A99FB6F000
heap
page read and write
2B281617000
trusted library allocation
page read and write
FD622F9000
stack
page read and write
2B2F5402000
heap
page execute and read and write
196D5D60000
heap
page read and write
196D5F7C000
heap
page read and write
23179650000
trusted library allocation
page read and write
23163258000
trusted library allocation
page read and write
196D5A63000
heap
page read and write
2A99FBC4000
heap
page read and write
54FE000
stack
page read and write
7FF9BB8A0000
trusted library allocation
page read and write
2A99FC63000
heap
page read and write
23179868000
heap
page read and write
2A99FE6B000
heap
page read and write
196D5A2C000
heap
page read and write
2A99FBB5000
heap
page read and write
196D5D5C000
heap
page read and write
196D51B7000
heap
page read and write
2A99FB80000
heap
page read and write
2A99FF8B000
heap
page read and write
7FF9BB6B0000
trusted library allocation
page read and write
2A99FB3C000
heap
page read and write
196D5D5A000
heap
page read and write
2A99FBA3000
heap
page read and write
7FF9BBAD4000
trusted library allocation
page read and write
196D0100000
heap
page read and write
7FF695D5A000
unkown
page read and write
2B2F5C92000
heap
page read and write
2A99FC95000
heap
page read and write
196CDA3F000
heap
page read and write
2797D20E000
heap
page read and write
2A99FD6A000
heap
page read and write
196D5AAC000
heap
page read and write
196D516C000
heap
page read and write
2A99FFF1000
heap
page read and write
23163223000
trusted library allocation
page read and write
196D5A51000
heap
page read and write
196D5BB9000
heap
page read and write
196D5ADF000
heap
page read and write
2A99FD8F000
heap
page read and write
5A3D000
heap
page read and write
2A99FC00000
heap
page read and write
2A99FC15000
heap
page read and write
5A9B000
heap
page read and write
2A99FDD5000
heap
page read and write
7FF9BB7C0000
trusted library allocation
page read and write
23162E85000
trusted library allocation
page read and write
196D5B1C000
heap
page read and write
2A9A0012000
heap
page read and write
2A9999B0000
trusted library allocation
page read and write
231611A4000
trusted library allocation
page read and write
196D5D32000
heap
page read and write
2A99FBF0000
heap
page read and write
1E11E93D000
trusted library allocation
page read and write
196D5936000
heap
page read and write
7FF695D5A000
unkown
page read and write
196D5C20000
heap
page read and write
7FF9BB6EC000
trusted library allocation
page read and write
29FE000
stack
page read and write
2A99FC2E000
heap
page read and write
231793C4000
heap
page read and write
2315F334000
heap
page read and write
196D599A000
heap
page read and write
7FF9BAEE0000
trusted library allocation
page read and write
7FF9BB3B0000
trusted library allocation
page read and write
7FF9BB8B0000
trusted library allocation
page read and write
7FF9BB320000
trusted library allocation
page read and write
7FF9BBAA0000
trusted library allocation
page read and write
7FF6C367E000
unkown
page readonly
196D5B6A000
heap
page read and write
196CDAC7000
heap
page read and write
2B2801BA000
trusted library allocation
page read and write
2A99F140000
trusted library allocation
page read and write
7FF9BB0B0000
trusted library allocation
page read and write
196D5B52000
heap
page read and write
196D592E000
heap
page read and write
7FF9BB9E0000
trusted library allocation
page read and write
FD636FB000
unkown
page read and write
2A99FA0F000
heap
page read and write
1118F000
unkown
page readonly
2A99FBF0000
heap
page read and write
7FF9BB2CF000
trusted library allocation
page read and write
3CA61FE000
unkown
page read and write
196D5BC4000
heap
page read and write
2A99FE53000
heap
page read and write
2678AA3E000
heap
page read and write
2A99FBB7000
heap
page read and write
2A99FF2D000
heap
page read and write
196D59A9000
heap
page read and write
7FF9BB9B0000
trusted library allocation
page read and write
7FF9BBD90000
trusted library allocation
page read and write
7FF695D70000
remote allocation
page read and write
196CDAD1000
heap
page read and write
2A99FE1B000
heap
page read and write
2A99FDEE000
heap
page read and write
7FFA1B10F000
unkown
page readonly
231625A2000
trusted library allocation
page read and write
196D5A70000
heap
page read and write
196D5BDF000
heap
page read and write
196D5D15000
heap
page read and write
7FF9BB4B0000
trusted library allocation
page read and write
751827B000
stack
page read and write
196CDB11000
heap
page read and write
186BAE74000
heap
page read and write
5A8D000
heap
page read and write
196D59FD000
heap
page read and write
2A99FEA1000
heap
page read and write
196CD830000
heap
page read and write
2A997D89000
heap
page read and write
7FF9BB7D0000
trusted library allocation
page read and write
23162258000
trusted library allocation
page read and write
2A99FB7B000
heap
page read and write
5AF1000
heap
page read and write
7FF9BB3F0000
trusted library allocation
page execute and read and write
2A99FD7E000
heap
page read and write
186BAF02000
heap
page read and write
23162861000
trusted library allocation
page read and write
2316339E000
trusted library allocation
page read and write
23179E2B000
heap
page read and write
2315F254000
heap
page read and write
7FFA1B10D000
unkown
page read and write
2A99FB4C000
heap
page read and write
7FF9BB630000
trusted library allocation
page read and write
2A99FE5B000
heap
page read and write
2317933D000
heap
page read and write
2A99FD59000
heap
page read and write
7FF9BBA00000
trusted library allocation
page execute and read and write
2A99FE26000
heap
page read and write
7FF9BAE34000
trusted library allocation
page read and write
2797D1E0000
heap
page read and write
2A99FF45000
heap
page read and write
196D598C000
heap
page read and write
2A99FBDF000
heap
page read and write
2700000
heap
page read and write
FDFFBFC000
stack
page read and write
7FF9BB300000
trusted library allocation
page read and write
7FF9BB230000
trusted library allocation
page execute and read and write
7FF9BB8B2000
trusted library allocation
page read and write
196D59ED000
heap
page read and write
904000
heap
page read and write
7FF9BAE3D000
trusted library allocation
page execute and read and write
7FF9BBA80000
trusted library allocation
page read and write
23179851000
heap
page read and write
2A99FBBE000
heap
page read and write
196D598F000
heap
page read and write
2316179B000
trusted library allocation
page read and write
7FF9BB6D6000
trusted library allocation
page read and write
23160BA0000
trusted library section
page read and write
2A99FC68000
heap
page read and write
2A99FCC7000
heap
page read and write
2A99FE61000
heap
page read and write
8F4000
heap
page read and write
196D5D20000
heap
page read and write
196D5D3B000
heap
page read and write
23161B0F000
trusted library allocation
page read and write
2A997CB9000
heap
page read and write
55E000
stack
page read and write
196D5C48000
heap
page read and write
2B2F5C65000
heap
page read and write
11205000
unkown
page readonly
7FF9BB9D0000
trusted library allocation
page read and write
5A52000
heap
page read and write
32BB000
stack
page read and write
196D5961000
heap
page read and write
FDFF8FD000
stack
page read and write
1E135030000
trusted library allocation
page read and write
2B280978000
trusted library allocation
page read and write
2A99FDAA000
heap
page read and write
7FF9BB4F0000
trusted library allocation
page read and write
196D5344000
heap
page read and write
196D5349000
heap
page read and write
196D5D3E000
heap
page read and write
2A99FC51000
heap
page read and write
2678CAD0000
trusted library allocation
page read and write
FD61FFE000
stack
page read and write
196D5A21000
heap
page read and write
2B28099F000
trusted library allocation
page read and write
7FF9BB1A0000
trusted library allocation
page execute and read and write
2A99FB7E000
heap
page read and write
2A99FEDA000
heap
page read and write
196D51A6000
heap
page read and write
196D5A55000
heap
page read and write
7FF9BB260000
trusted library allocation
page read and write
2317A010000
heap
page read and write
2B280A66000
trusted library allocation
page read and write
7FF9BAE10000
trusted library allocation
page read and write
60DA2FE000
stack
page read and write
8D4000
heap
page read and write
D65BBFE000
stack
page read and write
2B2809B4000
trusted library allocation
page read and write
196D5D6C000
heap
page read and write
196D581E000
heap
page read and write
2B280541000
trusted library allocation
page read and write
5ABF000
heap
page read and write
4396BFC000
stack
page read and write
196D5B87000
heap
page read and write
1E11B538000
heap
page read and write
196D5F6C000
heap
page read and write
177E7180000
heap
page read and write
196D5CF1000
heap
page read and write
2A99FBE3000
heap
page read and write
2A99A315000
heap
page read and write
FD627FC000
stack
page read and write
196D5DDC000
heap
page read and write
3CA6C7E000
stack
page read and write
7FFA1D9A0000
direct allocation
page execute and read and write
196D6291000
heap
page read and write
7FF9BB140000
trusted library allocation
page execute and read and write
7FF9BB6A0000
trusted library allocation
page read and write
7FF9BAE37000
trusted library allocation
page read and write
2678AA43000
heap
page read and write
7FF9BB92A000
trusted library allocation
page read and write
403000
unkown
page read and write
2A99FBED000
heap
page read and write
2A99FBCE000
heap
page read and write
8F5000
heap
page read and write
196D5B7E000
heap
page read and write
196D59AC000
heap
page read and write
2B2F5C0E000
heap
page read and write
196D5B13000
heap
page read and write
196D5C8B000
heap
page read and write
6BEB0000
unkown
page readonly
D65BA7E000
stack
page read and write
7FF6C3641000
unkown
page execute read
2B2F34F4000
heap
page read and write
2A99F5DB000
heap
page read and write
196D59F8000
heap
page read and write
2A99FF6C000
heap
page read and write
23161CFD000
trusted library allocation
page read and write
2A99FF68000
heap
page read and write
7DF42A740000
trusted library allocation
page execute and read and write
2B280A0B000
trusted library allocation
page read and write
177E7185000
heap
page read and write
7FF9BAEEC000
trusted library allocation
page execute and read and write
196D5BC0000
heap
page read and write
563E000
stack
page read and write
2A99F413000
heap
page read and write
196D5D7A000
heap
page read and write
C22A0FB000
stack
page read and write
2A997C28000
heap
page read and write
2B2F4E13000
heap
page read and write
1E1355C0000
heap
page read and write
5A3D000
heap
page read and write
2A99FC43000
heap
page read and write
50AE000
stack
page read and write
2A99FEF9000
heap
page read and write
2B280575000
trusted library allocation
page read and write
FD628FC000
stack
page read and write
196D5D9E000
heap
page read and write
440000
heap
page read and write
2A99FBBE000
heap
page read and write
7FF9BBB30000
trusted library allocation
page read and write
7FF9BB350000
trusted library allocation
page read and write
196D5E23000
heap
page read and write
2678AA7C000
heap
page read and write
196D011E000
heap
page read and write
196D0121000
heap
page read and write
2A997CCC000
heap
page read and write
5A6C000
heap
page read and write
D65BD76000
stack
page read and write
7FF9BB250000
trusted library allocation
page read and write
196D594F000
heap
page read and write
23161650000
trusted library allocation
page read and write
23161150000
heap
page readonly
1E12D066000
trusted library allocation
page read and write
196D6294000
heap
page read and write
7FF9BB060000
trusted library allocation
page read and write
2678C729000
trusted library allocation
page read and write
2A99A202000
heap
page read and write
196D5AAC000
heap
page read and write
196D5A00000
heap
page read and write
196D620A000
heap
page read and write
8F9000
heap
page read and write
7FF9BB4B0000
trusted library allocation
page read and write
2A99FF53000
heap
page read and write
1E135A00000
heap
page read and write
196D596F000
heap
page read and write
196D581B000
heap
page read and write
800000
heap
page read and write
E2781BD000
stack
page read and write
2A99FCA9000
heap
page read and write
7FF9BB170000
trusted library allocation
page read and write
2A997CB5000
heap
page read and write
7FF9BB7C0000
trusted library allocation
page read and write
196D5F49000
heap
page read and write
196D5B0E000
heap
page read and write
2A99FC34000
heap
page read and write
196D5362000
heap
page read and write
7FF9BB290000
trusted library allocation
page read and write
1E135500000
heap
page read and write
FD634FF000
stack
page read and write
2B2F5C22000
heap
page read and write
231632D6000
trusted library allocation
page read and write
1E135593000
heap
page read and write
2A99FF71000
heap
page read and write
7FFA1C52B000
unkown
page read and write
2A99FCFD000
heap
page read and write
196D59AB000
heap
page read and write
1E11EA2C000
trusted library allocation
page read and write
2A99FD75000
heap
page read and write
196D621B000
heap
page read and write
231791F3000
trusted library allocation
page read and write
196D5B91000
heap
page read and write
7FF9BB373000
trusted library allocation
page read and write
23162449000
trusted library allocation
page read and write
196D5ADB000
heap
page read and write
7FF9BB0B0000
trusted library allocation
page read and write
196D5B82000
heap
page read and write
74676000
unkown
page read and write
2678A9C0000
heap
page execute and read and write
2A99FC76000
heap
page read and write
1E1355DF000
heap
page read and write
196D0151000
heap
page read and write
2A997C97000
heap
page read and write
FD632F7000
stack
page read and write
196D4FA0000
heap
page read and write
196D0128000
heap
page read and write
2797D228000
heap
page read and write
2B5AB110000
heap
page read and write
231632B4000
trusted library allocation
page read and write
2315F29B000
heap
page read and write
2B280A03000
trusted library allocation
page read and write
5AF6000
heap
page read and write
196D5C4B000
heap
page read and write
5CFF000
stack
page read and write
196D5ABB000
heap
page read and write
2A99FB59000
heap
page read and write
7FF9BB940000
trusted library allocation
page read and write
2A997CD2000
heap
page read and write
23162884000
trusted library allocation
page read and write
2A99A3B7000
heap
page read and write
196D6622000
trusted library allocation
page read and write
B9702FE000
stack
page read and write
7FF9BB75A000
trusted library allocation
page read and write
196D5C19000
heap
page read and write
7FF9BB300000
trusted library allocation
page read and write
7FF9BB060000
trusted library allocation
page read and write
23161140000
heap
page execute and read and write
2B2F3400000
heap
page read and write
196D5343000
heap
page read and write
3CA6B3F000
stack
page read and write
2316354B000
trusted library allocation
page read and write
2B2F6010000
heap
page read and write
2A99FE69000
heap
page read and write
7FF9BB09E000
trusted library allocation
page read and write
5A4A000
heap
page read and write
196D5D40000
heap
page read and write
23162F99000
trusted library allocation
page read and write
7FF9BB900000
trusted library allocation
page read and write
2B2901D9000
trusted library allocation
page read and write
2A99FDDC000
heap
page read and write
196D583A000
heap
page read and write
2A99FE00000
heap
page read and write
196D5D38000
heap
page read and write
2A99FDBD000
heap
page read and write
23162FB9000
trusted library allocation
page read and write
196D5D3E000
heap
page read and write
23179892000
heap
page read and write
196D5A9E000
heap
page read and write
2A99FD57000
heap
page read and write
7FF9BB2E0000
trusted library allocation
page read and write
196D5B24000
heap
page read and write
1E135513000
heap
page read and write
2A99FBE9000
heap
page read and write
231632F0000
trusted library allocation
page read and write
2A99FD13000
heap
page read and write
2B280848000
trusted library allocation
page read and write
23162D57000
trusted library allocation
page read and write
2B2F5E2B000
heap
page read and write
2A99FF3C000
heap
page read and write
37EED57000
stack
page read and write
2A99FDEC000
heap
page read and write
593E000
stack
page read and write
2612000
heap
page read and write
7FF9BB04B000
trusted library allocation
page read and write
196CD810000
heap
page read and write
2A13000
heap
page read and write
2A99FA13000
heap
page read and write
343E000
stack
page read and write
6BEF0000
unkown
page readonly
2A99FEF4000
heap
page read and write
FD62AFC000
stack
page read and write
196D5C2B000
heap
page read and write
7FF9BB440000
trusted library allocation
page read and write
196D51D5000
heap
page read and write
2A99F57B000
heap
page read and write
2A99FF74000
heap
page read and write
196D5BC6000
heap
page read and write
2A99FF12000
heap
page read and write
2A99FBA5000
heap
page read and write
2B281921000
trusted library allocation
page read and write
196D5FEE000
heap
page read and write
8B0000
heap
page read and write
2A99F31F000
heap
page read and write
2A99FC2D000
heap
page read and write
23171450000
trusted library allocation
page read and write
196D5C90000
heap
page read and write
196D5A9A000
heap
page read and write
2A01000
heap
page read and write
196CDB0F000
heap
page read and write
2A99FBB1000
heap
page read and write
196D53FD000
heap
page read and write
196D51FD000
heap
page read and write
8AF000
heap
page read and write
196D5B60000
heap
page read and write
196D5ACD000
heap
page read and write
2A99FC41000
heap
page read and write
196D5A1F000
heap
page read and write
196D5B30000
heap
page read and write
23161161000
trusted library allocation
page read and write
231711C7000
trusted library allocation
page read and write
2A99FB5D000
heap
page read and write
196D5D4F000
heap
page read and write
1E11E621000
trusted library allocation
page read and write
7FF9BBAD0000
trusted library allocation
page read and write
23160C13000
heap
page read and write
7FF9BBD80000
trusted library allocation
page read and write
23162E87000
trusted library allocation
page read and write
196D599B000
heap
page read and write
196D5346000
heap
page read and write
7FF9BB073000
trusted library allocation
page read and write
196D5D11000
heap
page read and write
2A99FD20000
heap
page read and write
7FF9BB120000
trusted library allocation
page read and write
196D5A2B000
heap
page read and write
2A99FA00000
heap
page read and write
196D62BB000
heap
page read and write
196D5FA9000
heap
page read and write
7FF9BB066000
trusted library allocation
page read and write
2678C3A0000
trusted library allocation
page read and write
2A99FE83000
heap
page read and write
5AEA000
heap
page read and write
1E11B47A000
heap
page read and write
196D5213000
heap
page read and write
196D5D71000
heap
page read and write
2A997C85000
heap
page read and write
196D5B6F000
heap
page read and write
196D5C99000
heap
page read and write
812000
heap
page read and write
7DF42A760000
trusted library allocation
page execute and read and write
7FF9BB540000
trusted library allocation
page execute and read and write
2A99FE35000
heap
page read and write
2A99FC7B000
heap
page read and write
2A99FC0D000
heap
page read and write
196D5D46000
heap
page read and write
2678CAAD000
trusted library allocation
page read and write
5A45000
heap
page read and write
196D5337000
heap
page read and write
2B28094E000
trusted library allocation
page read and write
196CDB5F000
heap
page read and write
7FF9BB4F0000
trusted library allocation
page read and write
2797D213000
heap
page read and write
5F0000
heap
page read and write
196D5AAE000
heap
page read and write
7FF9BB734000
trusted library allocation
page read and write
FD635FE000
stack
page read and write
196D5908000
heap
page read and write
2A99FB6D000
heap
page read and write
7FF9BB222000
trusted library allocation
page read and write
7FF9BB560000
trusted library allocation
page execute and read and write
2A99FC3D000
heap
page read and write
1D2C5DD0000
heap
page read and write
196D5A24000
heap
page read and write
196D5BFF000
heap
page read and write
2B2F5020000
trusted library allocation
page read and write
D65BC7F000
stack
page read and write
7FF9BB490000
trusted library allocation
page read and write
196D59EE000
heap
page read and write
2678C960000
trusted library allocation
page read and write
2678A9F0000
trusted library allocation
page read and write
2A99A32C000
heap
page read and write
2B2805BB000
trusted library allocation
page read and write
7FF9BB71C000
trusted library allocation
page read and write
2A99FBCA000
heap
page read and write
7FF9BB0F0000
trusted library allocation
page read and write
7FF9BB330000
trusted library allocation
page read and write
196D5AAE000
heap
page read and write
196D5A8A000
heap
page read and write
196D5C6F000
heap
page read and write
196D5F9B000
heap
page read and write
196D5C59000
heap
page read and write
23162ECC000
trusted library allocation
page read and write
7FF9BB7A0000
trusted library allocation
page read and write
2B2F5E7C000
heap
page read and write
7FF655D30000
direct allocation
page execute read
196D5CFF000
heap
page read and write
8F4000
heap
page read and write
2A99FDFF000
heap
page read and write
7FF9BB040000
trusted library allocation
page read and write
43975FC000
stack
page read and write
FD629FC000
stack
page read and write
7FF9BB8E0000
trusted library allocation
page execute and read and write
196D5D3B000
heap
page read and write
2A99FDF9000
heap
page read and write
7FF9BB2FD000
trusted library allocation
page read and write
196D538F000
heap
page read and write
7FF9BB480000
trusted library allocation
page read and write
196D5968000
heap
page read and write
2A99FCDB000
heap
page read and write
2678CC32000
trusted library allocation
page read and write
7FF9BB1A0000
trusted library allocation
page execute and read and write
196D5D40000
heap
page read and write
2B28090C000
trusted library allocation
page read and write
8C8000
heap
page read and write
904000
heap
page read and write
7FF6C369A000
unkown
page readonly
2A99F538000
heap
page read and write
2A99FE4A000
heap
page read and write
196D5C7C000
heap
page read and write
196D5D73000
heap
page read and write
7FF9BB430000
trusted library allocation
page read and write
2A99FB82000
heap
page read and write
231793A5000
heap
page read and write
2B2F3498000
heap
page read and write
23161654000
trusted library allocation
page read and write
2B2900A2000
trusted library allocation
page read and write
2A99FEAC000
heap
page read and write
196D5F7A000
heap
page read and write
2A99FCB1000
heap
page read and write
196D5BDA000
heap
page read and write
7FF9BB670000
trusted library allocation
page read and write
196D5D46000
heap
page read and write
7FF9BB600000
trusted library allocation
page read and write
7FF9BBAD0000
trusted library allocation
page read and write
2A99F5E0000
heap
page read and write
196D5A70000
heap
page read and write
196D5DDD000
heap
page read and write
23162FC9000
trusted library allocation
page read and write
196D6200000
heap
page read and write
7FF9BB6B0000
trusted library allocation
page read and write
7FF9BB2B0000
trusted library allocation
page read and write
23163150000
trusted library allocation
page read and write
2B280651000
trusted library allocation
page read and write
2A997D24000
heap
page read and write
186BAE43000
heap
page read and write
2A99FF16000
heap
page read and write
2A99FF25000
heap
page read and write
7FF9BB090000
trusted library allocation
page read and write
196D5BB9000
heap
page read and write
2B290067000
trusted library allocation
page read and write
2B2F5E9A000
heap
page read and write
196D5325000
heap
page read and write
2315F2D5000
heap
page read and write
2B28086E000
trusted library allocation
page read and write
2A99FCEF000
heap
page read and write
7FF9BB5C0000
trusted library allocation
page read and write
2B28064A000
trusted library allocation
page read and write
E27968B000
stack
page read and write
196D5BB9000
heap
page read and write
75181FE000
stack
page read and write
196D5D20000
heap
page read and write
7FF9BB740000
trusted library allocation
page read and write
7FF9BB350000
trusted library allocation
page read and write
1E11E902000
trusted library allocation
page read and write
5AA6000
heap
page read and write
2A99FE7C000
heap
page read and write
7FF9BB930000
trusted library allocation
page read and write
2A997D0A000
heap
page read and write
196D5A72000
heap
page read and write
4396EF5000
stack
page read and write
FD626FE000
stack
page read and write
CFF000
stack
page read and write
7FF9BB9E0000
trusted library allocation
page read and write
196D0114000
heap
page read and write
196D5F55000
heap
page read and write
196D5A8C000
heap
page read and write
7FF9BB4D0000
trusted library allocation
page read and write
196D5CD0000
heap
page read and write
2B281B85000
trusted library allocation
page read and write
9A000
stack
page read and write
2A99FF12000
heap
page read and write
196D5C39000
heap
page read and write
2A99FCC5000
heap
page read and write
5A4A000
heap
page read and write
196D5B64000
heap
page read and write
196D5D4A000
heap
page read and write
196D5BF0000
heap
page read and write
2A99FF59000
heap
page read and write
196D5F80000
heap
page read and write
23162F82000
trusted library allocation
page read and write
2316331E000
trusted library allocation
page read and write
2A9A000A000
heap
page read and write
196D5B6E000
heap
page read and write
2A99FF24000
heap
page read and write
196D4F50000
heap
page read and write
2A99FDA8000
heap
page read and write
196D5CEE000
heap
page read and write
196D620A000
heap
page read and write
E27867E000
stack
page read and write
196D5AE7000
heap
page read and write
196D62AB000
heap
page read and write
2A99FCFE000
heap
page read and write
196D59CF000
heap
page read and write
2A99FC66000
heap
page read and write
E2785FF000
stack
page read and write
196D5DBB000
heap
page read and write
2739000
heap
page read and write
23163320000
trusted library allocation
page read and write
2A99FBD4000
heap
page read and write
2A99FE5F000
heap
page read and write
23163421000
trusted library allocation
page read and write
2B2805AA000
trusted library allocation
page read and write
2A99FE30000
heap
page read and write
7FF9BBB40000
trusted library allocation
page read and write
7FF9BBAC0000
trusted library allocation
page read and write
7FF9BB810000
trusted library allocation
page read and write
196D5F93000
heap
page read and write
7FF9BB9D0000
trusted library allocation
page read and write
7FF9BB050000
trusted library allocation
page read and write
23162C86000
trusted library allocation
page read and write
196D5992000
heap
page read and write
2A99FBA2000
heap
page read and write
2A99FB42000
heap
page read and write
23179E23000
heap
page read and write
7FF9BB4B0000
trusted library allocation
page read and write
7517DFE000
stack
page read and write
2A997DFF000
heap
page read and write
3CA66FD000
stack
page read and write
196CDB48000
heap
page read and write
2A99FF05000
heap
page read and write
196D534A000
heap
page read and write
2A99FDD3000
heap
page read and write
8D4000
heap
page read and write
2A99FF18000
heap
page read and write
196D5940000
heap
page read and write
2B280924000
trusted library allocation
page read and write
196D539C000
heap
page read and write
2A99FF6E000
heap
page read and write
177E6CC0000
heap
page read and write
196D5140000
heap
page read and write
7FFA1B0EF000
unkown
page readonly
196D59B2000
heap
page read and write
196D5D1A000
heap
page read and write
C22A2FF000
stack
page read and write
2B2F4DE0000
trusted library allocation
page read and write
7FF9BB370000
trusted library allocation
page read and write
7FF9BB8CA000
trusted library allocation
page read and write
2A99FD21000
heap
page read and write
1E11EBC2000
trusted library allocation
page read and write
1E136010000
heap
page read and write
7FF9BBB60000
trusted library allocation
page read and write
1E11B423000
heap
page read and write
2A99FBCE000
heap
page read and write
2B2F5CD6000
heap
page read and write
196D599E000
heap
page read and write
196D5D41000
heap
page read and write
889000
heap
page read and write
2A99F500000
heap
page read and write
196D5CE1000
heap
page read and write
E278AF9000
stack
page read and write
196D622B000
heap
page read and write
2A99FBDD000
heap
page read and write
2A99FF7E000
heap
page read and write
7FF9BBB00000
trusted library allocation
page read and write
2A99FC5D000
heap
page read and write
196D5B33000
heap
page read and write
196D5DCC000
heap
page read and write
2A99FD0A000
heap
page read and write
2A99A38B000
heap
page read and write
7FF9BB650000
trusted library allocation
page read and write
196D59B6000
heap
page read and write
2A99FB10000
heap
page read and write
2A99FF55000
heap
page read and write
2B2806DA000
trusted library allocation
page read and write
2A99FDE4000
heap
page read and write
8BD000
heap
page read and write
2A99FD8C000
heap
page read and write
196D59BE000
heap
page read and write
23161791000
trusted library allocation
page read and write
196D5C26000
heap
page read and write
2A99FD7C000
heap
page read and write
196D59A1000
heap
page read and write
23171169000
trusted library allocation
page read and write
8FD000
heap
page read and write
196D5342000
heap
page read and write
2A99FD8E000
heap
page read and write
196D5400000
trusted library allocation
page read and write
7FF9BBA70000
trusted library allocation
page read and write
2A99FF44000
heap
page read and write
2A99FCB6000
heap
page read and write
5A5A000
heap
page read and write
196D59CA000
heap
page read and write
2B2F5E00000
heap
page read and write
7FF9BB670000
trusted library allocation
page read and write
43982FB000
unkown
page read and write
2B280AAE000
trusted library allocation
page read and write
7FF9BB0E0000
trusted library allocation
page read and write
196D59E2000
heap
page read and write
2A997DBD000
heap
page read and write
7FF9BB500000
trusted library allocation
page read and write
5AA6000
heap
page read and write
196D5D36000
heap
page read and write
2B5AB22B000
heap
page read and write
196D59A3000
heap
page read and write
196D5343000
heap
page read and write
2678C66C000
trusted library allocation
page read and write
2B2F5505000
heap
page read and write
2CFF000
stack
page read and write
196D5995000
heap
page read and write
196D5BA7000
heap
page read and write
7FF9BAECC000
trusted library allocation
page execute and read and write
1E11B400000
heap
page read and write
196D5BEA000
heap
page read and write
2B2F5CD0000
heap
page read and write
2B290019000
trusted library allocation
page read and write
2A99FCAC000
heap
page read and write
23163557000
trusted library allocation
page read and write
196D5E35000
heap
page read and write
7FF6C3698000
unkown
page read and write
2A99FEEE000
heap
page read and write
598E000
stack
page read and write
2A99FC53000
heap
page read and write
196D51E2000
heap
page read and write
2A99FF45000
heap
page read and write
7FF9BAFB0000
trusted library allocation
page read and write
23162EB8000
trusted library allocation
page read and write
1E11CF02000
heap
page read and write
196D5ACD000
heap
page read and write
2A99FC05000
heap
page read and write
2A99FDFE000
heap
page read and write
196D4F10000
trusted library allocation
page read and write
7FF9BB735000
trusted library allocation
page read and write
D65BAFF000
stack
page read and write
196D5D6A000
heap
page read and write
7FF9BAE33000
trusted library allocation
page execute and read and write
2712000
heap
page read and write
7FF9BAE24000
trusted library allocation
page read and write
196D5C06000
heap
page read and write
196D594D000
heap
page read and write
D65BB7D000
stack
page read and write
196D5B19000
heap
page read and write
196D536D000
heap
page read and write
2A997C9A000
heap
page read and write
7FF9BB520000
trusted library allocation
page read and write
196D59D7000
heap
page read and write
2A99FBB0000
heap
page read and write
231798C7000
heap
page read and write
2678C70E000
trusted library allocation
page read and write
196D5D6E000
heap
page read and write
1E11D001000
trusted library allocation
page read and write
5ADB000
heap
page read and write
196D5F84000
heap
page read and write
7FF9BB728000
trusted library allocation
page read and write
2A99FD7C000
heap
page read and write
74671000
unkown
page execute read
2315F0C0000
heap
page read and write
7FF9BB828000
trusted library allocation
page read and write
7FF9BBA80000
trusted library allocation
page read and write
D65BEB8000
stack
page read and write
2A99FF57000
heap
page read and write
2B2808A1000
trusted library allocation
page read and write
196D5AF3000
heap
page read and write
196D5B84000
heap
page read and write
196D5913000
heap
page read and write
196D5A26000
heap
page read and write
E27970E000
stack
page read and write
231633AE000
trusted library allocation
page read and write
2B2F5C00000
heap
page read and write
7FF9BB02B000
trusted library allocation
page read and write
7FF9BB9A0000
trusted library allocation
page read and write
196D593C000
heap
page read and write
196D5BE6000
heap
page read and write
8C8000
heap
page read and write
43977FC000
stack
page read and write
196CDB7B000
heap
page read and write
7FF9BAFB2000
trusted library allocation
page read and write
7FF9BB710000
trusted library allocation
page read and write
8C4000
heap
page read and write
7FF9BBD50000
trusted library allocation
page read and write
E279547000
stack
page read and write
7FF9BB1A0000
trusted library allocation
page read and write
196D5D38000
heap
page read and write
2A99FB87000
heap
page read and write
196D5CF9000
heap
page read and write
196D5B4D000
heap
page read and write
2A99FDE1000
heap
page read and write
196D5D1E000
heap
page read and write
3CA667E000
stack
page read and write
D65C1B9000
stack
page read and write
7FF9BB7A0000
trusted library allocation
page read and write
2A99FE2E000
heap
page read and write
196D5B69000
heap
page read and write
2A99FC61000
heap
page read and write
177F3D13000
heap
page read and write
2A99FBA7000
heap
page read and write
177F3C62000
heap
page read and write
FD800FB000
stack
page read and write
2A99FB8C000
heap
page read and write
2A99FE2A000
heap
page read and write
2678AA45000
heap
page read and write
7FF9BB5B0000
trusted library allocation
page read and write
2A99FD9F000
heap
page read and write
2A99FF88000
heap
page read and write
404000
unkown
page readonly
196D5B28000
heap
page read and write
196CDBBE000
heap
page read and write
196D59D6000
heap
page read and write
2A99FB9A000
heap
page read and write
3CA6DFC000
stack
page read and write
2A99FA02000
heap
page read and write
2A99FBBC000
heap
page read and write
196D5B00000
heap
page read and write
2317117D000
trusted library allocation
page read and write
186BAE2C000
heap
page read and write
7FF9BB770000
trusted library allocation
page read and write
7FF9BB4E0000
trusted library allocation
page read and write
196D594E000
heap
page read and write
2A99E7A0000
heap
page readonly
196D5D7D000
heap
page read and write
7FF9BB29A000
trusted library allocation
page read and write
196D59C0000
heap
page read and write
196D59E9000
heap
page read and write
B9701FD000
stack
page read and write
196D5D77000
heap
page read and write
5A71000
heap
page read and write
196D5D1A000
heap
page read and write
7FF9BB03B000
trusted library allocation
page read and write
2B280532000
trusted library allocation
page read and write
8B0000
heap
page read and write
2B280A48000
trusted library allocation
page read and write
196D5A83000
heap
page read and write
2A99FDCB000
heap
page read and write
2A99FEB6000
heap
page read and write
196D5BAE000
heap
page read and write
196D5780000
heap
page read and write
196D5F53000
heap
page read and write
196D5AD1000
heap
page read and write
2316286E000
trusted library allocation
page read and write
7FF9BB270000
trusted library allocation
page read and write
2B28061D000
trusted library allocation
page read and write
E2781FE000
stack
page read and write
23162D08000
trusted library allocation
page read and write
851000
heap
page read and write
7FF655D30000
direct allocation
page execute read
2A99FCD1000
heap
page read and write
231799E7000
heap
page read and write
2A99FE99000
heap
page read and write
7FF9BBB20000
trusted library allocation
page read and write
196D51CA000
heap
page read and write
2B2808BB000
trusted library allocation
page read and write
8F5000
heap
page read and write
196D5B72000
heap
page read and write
7FF9BB9F0000
trusted library allocation
page read and write
2A99FB28000
heap
page read and write
3CA6777000
stack
page read and write
7FF9BB870000
trusted library allocation
page read and write
5A68000
heap
page read and write
196D5B84000
heap
page read and write
86F000
heap
page read and write
196D5F3D000
heap
page read and write
2A99A300000
heap
page read and write
196D5DA2000
heap
page read and write
2A99FBF3000
heap
page read and write
2A99FEE7000
heap
page read and write
7FF9BB310000
trusted library allocation
page read and write
2A99FD9C000
heap
page read and write
2B280933000
trusted library allocation
page read and write
2B280419000
trusted library allocation
page read and write
1E11B4AF000
heap
page read and write
23179376000
heap
page read and write
8E5000
heap
page read and write
2A997DFF000
heap
page read and write
2A99FDE3000
heap
page read and write
196D5BE4000
heap
page read and write
7FF9BB0C0000
trusted library allocation
page read and write
196D4590000
trusted library allocation
page read and write
196D5C29000
heap
page read and write
2A99FEF1000
heap
page read and write
196D5B14000
heap
page read and write
2A99FED2000
heap
page read and write
2315F2F7000
heap
page read and write
7FF9BB910000
trusted library allocation
page read and write
1E11B534000
heap
page read and write
2A99FCA6000
heap
page read and write
5A48000
heap
page read and write
1E1355F3000
heap
page read and write
196D5DDA000
heap
page read and write
2A99F5E5000
heap
page read and write
2A99F399000
heap
page read and write
2A997DDE000
heap
page read and write
2A99E790000
trusted library allocation
page read and write
196D5361000
heap
page read and write
7FF9BB980000
trusted library allocation
page read and write
7FF9BB5E0000
trusted library allocation
page read and write
1E11D232000
trusted library allocation
page read and write
196D5A76000
heap
page read and write
196D5D83000
heap
page read and write
23161646000
trusted library allocation
page read and write
196D592B000
heap
page read and write
7FF9BB7D0000
trusted library allocation
page read and write
2A997DDE000
heap
page read and write
5B1F000
heap
page read and write
196D5300000
heap
page read and write
196D5D12000
heap
page read and write
2A99FD8A000
heap
page read and write
196D5AA2000
heap
page read and write
7FF9BBD40000
trusted library allocation
page read and write
5A34000
heap
page read and write
196D5D66000
heap
page read and write
196D5950000
heap
page read and write
7FF9BB1C0000
trusted library allocation
page execute and read and write
196D5C15000
heap
page read and write
2A99FC70000
heap
page read and write
196D597B000
heap
page read and write
2B2809D7000
trusted library allocation
page read and write
196D5CB0000
heap
page read and write
7FF9BB245000
trusted library allocation
page read and write
2A99FEF7000
heap
page read and write
7FF9BAE40000
trusted library allocation
page read and write
2B2F5CF2000
heap
page read and write
2B290009000
trusted library allocation
page read and write
2B2F4DC0000
trusted library allocation
page read and write
2B5AB25C000
heap
page read and write
196D5A89000
heap
page read and write
7FF9BB260000
trusted library allocation
page read and write
1E12D011000
trusted library allocation
page read and write
2A99FBB6000
heap
page read and write
2A99FE59000
heap
page read and write
2A99F31B000
heap
page read and write
196D5C35000
heap
page read and write
7FF9BBD30000
trusted library allocation
page read and write
196D5B76000
heap
page read and write
2A99FA04000
heap
page read and write
196D5AB5000
heap
page read and write
5AE5000
heap
page read and write
5A1F000
heap
page read and write
23163542000
trusted library allocation
page read and write
2B2F5C54000
heap
page read and write
6BF00000
unkown
page readonly
196D5A4F000
heap
page read and write
2A99FE25000
heap
page read and write
7FF9BB800000
trusted library allocation
page read and write
2A99FC0A000
heap
page read and write
196D59F5000
heap
page read and write
5A9A000
heap
page read and write
2A99FD9B000
heap
page read and write
196D5D3E000
heap
page read and write
196D5B36000
heap
page read and write
2B281BDF000
trusted library allocation
page read and write
2315F244000
heap
page read and write
23162EB6000
trusted library allocation
page read and write
196D5CD0000
heap
page read and write
7FF9BB080000
trusted library allocation
page read and write
7FF683640000
direct allocation
page execute read
23163197000
trusted library allocation
page read and write
7FF695D5C000
unkown
page readonly
7FFA1B0A0000
unkown
page readonly
196D5B5C000
heap
page read and write
2797D1C0000
heap
page read and write
7FF9BB5D0000
trusted library allocation
page read and write
7FF9BB2C0000
trusted library allocation
page read and write
7FF9BB610000
trusted library allocation
page read and write
196D5BE8000
heap
page read and write
196D5806000
heap
page read and write
19B000
stack
page read and write
2A99FBC6000
heap
page read and write
2A99FD93000
heap
page read and write
196D5C50000
heap
page read and write
2A99FB9E000
heap
page read and write
7FF9BAFE0000
trusted library allocation
page read and write
23163131000
trusted library allocation
page read and write
196D592C000
heap
page read and write
196D5A48000
heap
page read and write
196D5D73000
heap
page read and write
2A99FCCD000
heap
page read and write
196D5CFB000
heap
page read and write
23161B2E000
trusted library allocation
page read and write
23179670000
trusted library allocation
page read and write
196D5E1B000
heap
page read and write
FDFF9FE000
stack
page read and write
2316284F000
trusted library allocation
page read and write
2A99A320000
heap
page read and write
23179E46000
heap
page read and write
2315F1F0000
heap
page read and write
2A99FF37000
heap
page read and write
6C1B1000
unkown
page execute read
7FF9BB1B0000
trusted library allocation
page read and write
196D595D000
heap
page read and write
2B280483000
trusted library allocation
page read and write
7FF9BB170000
trusted library allocation
page read and write
2A99FE42000
heap
page read and write
7FF9BB3C0000
trusted library allocation
page execute and read and write
196D5C8B000
heap
page read and write
196D5B48000
heap
page read and write
2A99FBFE000
heap
page read and write
2A99FD38000
heap
page read and write
231798F3000
heap
page read and write
2A99FA0A000
heap
page read and write
2A99FC79000
heap
page read and write
196D5F91000
heap
page read and write
196D59B3000
heap
page read and write
186BC890000
heap
page read and write
2B2F5C43000
heap
page read and write
7FF9BB500000
trusted library allocation
page read and write
196CDA32000
heap
page read and write
6C0F0000
unkown
page readonly
5AF9000
heap
page read and write
751817E000
stack
page read and write
D65BCFF000
stack
page read and write
2B2F55BA000
heap
page read and write
43976FC000
stack
page read and write
2A99FED0000
heap
page read and write
2B2808CF000
trusted library allocation
page read and write
7FF9BB290000
trusted library allocation
page read and write
2B281BCE000
trusted library allocation
page read and write
7FF9BB470000
trusted library allocation
page read and write
196D5A66000
heap
page read and write
23163161000
trusted library allocation
page read and write
23179E0A000
heap
page read and write
2A99FEAD000
heap
page read and write
2A99FF32000
heap
page read and write
871000
heap
page read and write
2B2F32D0000
heap
page read and write
196D5F3F000
heap
page read and write
2A99FA02000
heap
page read and write
2B2F3534000
heap
page read and write
2A99FE8F000
heap
page read and write
23179382000
heap
page read and write
2A99F9D0000
heap
page read and write
196D59DF000
heap
page read and write
8B0000
heap
page read and write
23162F1C000
trusted library allocation
page read and write
7FF9BB680000
trusted library allocation
page read and write
196D011B000
heap
page read and write
2A997D5B000
heap
page read and write
6BEB1000
unkown
page execute read
2A99FB94000
heap
page read and write
7FF9BB930000
trusted library allocation
page read and write
2B2808C4000
trusted library allocation
page read and write
7FF9BB360000
trusted library allocation
page read and write
2A99FBDD000
heap
page read and write
43974FD000
stack
page read and write
2A99F5E9000
heap
page read and write
196D5E19000
heap
page read and write
7FF9BB6BC000
trusted library allocation
page read and write
7FF9BB760000
trusted library allocation
page read and write
7FFA1B10B000
unkown
page read and write
7FF695D41000
unkown
page execute read
196D5A59000
heap
page read and write
58FF000
stack
page read and write
7FF9BB910000
trusted library allocation
page read and write
2B280A09000
trusted library allocation
page read and write
8B0000
heap
page read and write
E2787F5000
stack
page read and write
7FF9BB390000
trusted library allocation
page read and write
7FF9BBB6A000
trusted library allocation
page read and write
43980FE000
stack
page read and write
2B2F5E33000
heap
page read and write
43978FC000
stack
page read and write
7FF9BB160000
trusted library allocation
page read and write
196D5BC2000
heap
page read and write
196D530B000
heap
page read and write
196D5BDA000
heap
page read and write
23162E9D000
trusted library allocation
page read and write
2A99FCEE000
heap
page read and write
8D8000
heap
page read and write
7FF9BBB00000
trusted library allocation
page execute and read and write
23163440000
trusted library allocation
page read and write
7FF9BB73D000
trusted library allocation
page read and write
1E13555A000
heap
page read and write
196D5F95000
heap
page read and write
2317998C000
heap
page read and write
2A99FF76000
heap
page read and write
196CDBE0000
heap
page read and write
2A99FF6B000
heap
page read and write
196D5ABD000
heap
page read and write
2A997D0F000
heap
page read and write
2A99FB2D000
heap
page read and write
7FF9BB820000
trusted library allocation
page execute and read and write
23162D1E000
trusted library allocation
page read and write
177E6EAE000
heap
page read and write
2A99FD2C000
heap
page read and write
196D5D3A000
heap
page read and write
196D59C6000
heap
page read and write
2A99FDE8000
heap
page read and write
196D5A8B000
heap
page read and write
85A000
heap
page read and write
196D5AF5000
heap
page read and write
7FF9BB860000
trusted library allocation
page read and write
7FF9BB640000
trusted library allocation
page read and write
2A99FB90000
heap
page read and write
23162D8C000
trusted library allocation
page read and write
7FF9BB242000
trusted library allocation
page read and write
177E88A0000
heap
page read and write
5A99000
heap
page read and write
5AF2000
heap
page read and write
196D5F00000
heap
page read and write
7FF9BB920000
trusted library allocation
page read and write
2A99FBA5000
heap
page read and write
196D5F5B000
heap
page read and write
2A99FB4A000
heap
page read and write
2678AA3C000
heap
page read and write
196D5BBD000
heap
page read and write
7FF9BAE4B000
trusted library allocation
page read and write
2678CAE6000
trusted library allocation
page read and write
196D5F3A000
heap
page read and write
2B28097E000
trusted library allocation
page read and write
2A99F271000
heap
page read and write
2A997CF7000
heap
page read and write
2A99FB30000
heap
page read and write
2A99FEA1000
heap
page read and write
196D5BA8000
heap
page read and write
75180FE000
stack
page read and write
2A99FE2B000
heap
page read and write
196D5202000
heap
page read and write
196D5A89000
heap
page read and write
7FF6C369E000
unkown
page readonly
2A99FB8C000
heap
page read and write
196CDBAC000
heap
page read and write
7FF9BB914000
trusted library allocation
page read and write
2678AA00000
heap
page read and write
2A99FF7C000
heap
page read and write
9AB75FF000
stack
page read and write
196D5DD8000
heap
page read and write
2A99FB73000
heap
page read and write
5A2B000
heap
page read and write
7FF9BBAA0000
trusted library allocation
page read and write
7FF9BB7E0000
trusted library allocation
page read and write
196D5CDE000
heap
page read and write
196D5CE8000
heap
page read and write
196D59D9000
heap
page read and write
7FF9BB6C3000
trusted library allocation
page read and write
196D599C000
heap
page read and write
2A99FBF3000
heap
page read and write
2A997D72000
heap
page read and write
2B2F5589000
heap
page read and write
196D5D0B000
heap
page read and write
4396DFF000
stack
page read and write
7DF4CF450000
trusted library allocation
page execute and read and write
196D5B88000
heap
page read and write
2B281B51000
trusted library allocation
page read and write
196D598C000
heap
page read and write
2A99FD28000
heap
page read and write
2A99FB79000
heap
page read and write
196D5FDE000
heap
page read and write
7FF9BB4C0000
trusted library allocation
page read and write
7FF9BB8E0000
trusted library allocation
page read and write
2A99FC4F000
heap
page read and write
2B5AB302000
heap
page read and write
196CDA70000
heap
page read and write
231798F9000
heap
page read and write
7FF9BB2F0000
trusted library allocation
page read and write
196D5E34000
heap
page read and write
37EF1FE000
stack
page read and write
196D590B000
heap
page read and write
177F5E02000
heap
page read and write
7FF9BB4A0000
trusted library allocation
page read and write
196D5A3C000
heap
page read and write
2A99FC0E000
heap
page read and write
2B2F5010000
heap
page readonly
55FD000
stack
page read and write
912000
heap
page read and write
23162DD9000
trusted library allocation
page read and write
196D5314000
heap
page read and write
5A08000
heap
page read and write
C22A1FE000
stack
page read and write
2A99FB2B000
heap
page read and write
196D62A1000
heap
page read and write
196D59F6000
heap
page read and write
2A99FC92000
heap
page read and write
2A99FD04000
heap
page read and write
7FFA1C4C0000
unkown
page readonly
7FF9BB960000
trusted library allocation
page read and write
8AF000
heap
page read and write
7FF9BB280000
trusted library allocation
page read and write
2A99FF36000
heap
page read and write
196D59CE000
heap
page read and write
196CDBA7000
heap
page read and write
7FF9BB850000
trusted library allocation
page read and write
196D5CD2000
heap
page read and write
2A99FCA2000
heap
page read and write
2A99FE4D000
heap
page read and write
196D5D79000
heap
page read and write
196D0186000
heap
page read and write
2B28065E000
trusted library allocation
page read and write
5A43000
heap
page read and write
196D5DAB000
heap
page read and write
5A73000
heap
page read and write
196D5B26000
heap
page read and write
7FF9BB2C0000
trusted library allocation
page read and write
2A99FD4D000
heap
page read and write
3CA68B4000
stack
page read and write
196D5904000
heap
page read and write
7FFA1C535000
unkown
page readonly
7FF9BBA40000
trusted library allocation
page read and write
196D5AA5000
heap
page read and write
196D5996000
heap
page read and write
7FF9BB2E0000
trusted library allocation
page read and write
2A99FE14000
heap
page read and write
2A99FC9A000
heap
page read and write
2A99FD46000
heap
page read and write
2A99FC65000
heap
page read and write
196D5A40000
heap
page read and write
231799F4000
heap
page read and write
2A99FFBC000
heap
page read and write
7FF9BB320000
trusted library allocation
page read and write
196D5997000
heap
page read and write
196D5AB2000
heap
page read and write
2A99F592000
heap
page read and write
FD61DFD000
stack
page read and write
2678AAB0000
heap
page read and write
60DA3FE000
stack
page read and write
8B0000
heap
page read and write
7FF9BB180000
trusted library allocation
page read and write
2A99FD90000
heap
page read and write
2678C70B000
trusted library allocation
page read and write
2A99FE20000
heap
page read and write
7FF9BAE13000
trusted library allocation
page execute and read and write
231799B0000
heap
page read and write
23179205000
heap
page execute and read and write
7FF9BB9E8000
trusted library allocation
page read and write
5A38000
heap
page read and write
7FF9BB0D0000
trusted library allocation
page read and write
1E11E8FC000
trusted library allocation
page read and write
2B280632000
trusted library allocation
page read and write
1127C000
unkown
page readonly
7FF9BB720000
trusted library allocation
page read and write
7FF6C367E000
unkown
page readonly
7FF9BBAE0000
trusted library allocation
page read and write
7FF9BB660000
trusted library allocation
page read and write
7FF9BAFD0000
trusted library allocation
page read and write
196CDAF9000
heap
page read and write
2B2814AE000
trusted library allocation
page read and write
2A99A32F000
heap
page read and write
196D5F90000
heap
page read and write
2678A9D0000
heap
page readonly
23162512000
trusted library allocation
page read and write
2A99FBA9000
heap
page read and write
2A997A30000
heap
page read and write
84D000
heap
page read and write
2B2F5050000
trusted library allocation
page read and write
7FF695D50000
unkown
page readonly
5A47000
heap
page read and write
23162F65000
trusted library allocation
page read and write
7FF9BB8DA000
trusted library allocation
page read and write
7FF9BB3B0000
trusted library allocation
page read and write
196D5ACB000
heap
page read and write
7FF9BB950000
trusted library allocation
page read and write
2315F23F000
heap
page read and write
7FF9BBA10000
trusted library allocation
page read and write
43973FC000
stack
page read and write
7FF9BB2F0000
trusted library allocation
page read and write
2A997CE0000
heap
page read and write
196D4F30000
heap
page read and write
2A99FB00000
heap
page read and write
23162F4B000
trusted library allocation
page read and write
196D01FF000
heap
page read and write
196D5B22000
heap
page read and write
6BEFE000
unkown
page read and write
196D5371000
heap
page read and write
2B2F5528000
heap
page read and write
2A99FF3A000
heap
page read and write
7FF9BB190000
trusted library allocation
page read and write
196D5973000
heap
page read and write
196D5BDC000
heap
page read and write
2A997CC4000
heap
page read and write
7517DB1000
stack
page read and write
196D5B82000
heap
page read and write
2A99FF51000
heap
page read and write
196D59B9000
heap
page read and write
23179305000
heap
page read and write
196D5813000
heap
page read and write
7FF9BB080000
trusted library allocation
page read and write
1E1353C0000
trusted library allocation
page read and write
196D5B18000
heap
page read and write
2A99FB33000
heap
page read and write
196D5A15000
heap
page read and write
2A99F1B0000
heap
page read and write
7FF9BB8A0000
trusted library allocation
page read and write
196D640B000
trusted library allocation
page read and write
5AA3000
heap
page read and write
5DFF000
stack
page read and write
7FF9BBA73000
trusted library allocation
page read and write
1E11B2A0000
heap
page read and write
2A99FF81000
heap
page read and write
196D5C47000
heap
page read and write
FD62CFC000
stack
page read and write
196CD9C0000
trusted library allocation
page read and write
2A99FC7F000
heap
page read and write
2A99FBA5000
heap
page read and write
231711D9000
trusted library allocation
page read and write
7FF9BB770000
trusted library allocation
page execute and read and write
196D5AC9000
heap
page read and write
7FF9BB690000
trusted library allocation
page read and write
7FF9BAFD0000
trusted library allocation
page read and write
196D598A000
heap
page read and write
2A99FD24000
heap
page read and write
2B28066D000
trusted library allocation
page read and write
2A99FF66000
heap
page read and write
2A99FB4A000
heap
page read and write
FD61EFE000
stack
page read and write
2A9A000B000
heap
page read and write
7FF9BB3D0000
trusted library allocation
page read and write
2A99FC72000
heap
page read and write
2A99FE62000
heap
page read and write
23171161000
trusted library allocation
page read and write
7FF9BB9C0000
trusted library allocation
page read and write
7FF9BB2D0000
trusted library allocation
page read and write
196D53A5000
heap
page read and write
24C0000
heap
page read and write
1E135413000
heap
page execute and read and write
2B2F5E18000
heap
page read and write
196D5F73000
heap
page read and write
7FF9BB2A0000
trusted library allocation
page read and write
231791D0000
heap
page execute and read and write
D65CB42000
stack
page read and write
1E11EC8B000
trusted library allocation
page read and write
196CDAD7000
heap
page read and write
7FF9BB610000
trusted library allocation
page read and write
196CDACF000
heap
page read and write
2315F2D7000
heap
page read and write
8B0000
heap
page read and write
196D5327000
heap
page read and write
11283000
unkown
page readonly
2B2F5513000
heap
page read and write
7FF9BB660000
trusted library allocation
page read and write
7FF9BB660000
trusted library allocation
page read and write
7FF9BB110000
trusted library allocation
page read and write
7FF9BB3B0000
trusted library allocation
page execute and read and write
196D5620000
unkown
page readonly
2A99F190000
heap
page read and write
7FF9BB470000
trusted library allocation
page read and write
2A99FF42000
heap
page read and write
7FF9BB450000
trusted library allocation
page read and write
7FF9BB510000
trusted library allocation
page read and write
2B2805F4000
trusted library allocation
page read and write
196D536F000
heap
page read and write
2A99FC39000
heap
page read and write
1E12D009000
trusted library allocation
page read and write
2A99FEE8000
heap
page read and write
196D5C2C000
heap
page read and write
D65CB8F000
stack
page read and write
57FE000
stack
page read and write
196CDBA9000
heap
page read and write
2A99F2A6000
heap
page read and write
2A99FC44000
heap
page read and write
196D5A0A000
heap
page read and write
2B280001000
trusted library allocation
page read and write
7FF9BB780000
trusted library allocation
page read and write
2B280086000
trusted library allocation
page read and write
2A99FB8F000
heap
page read and write
5AA9000
heap
page read and write
7FF9BB650000
trusted library allocation
page read and write
2A99FCE2000
heap
page read and write
FD623F5000
stack
page read and write
196CDAF6000
heap
page read and write
196D5361000
heap
page read and write
196D5C42000
heap
page read and write
2315F213000
heap
page read and write
196D5DD0000
heap
page read and write
23162DE9000
trusted library allocation
page read and write
196D5B4A000
heap
page read and write
2A99FC6C000
heap
page read and write
2A99FE1B000
heap
page read and write
196D5C0D000
heap
page read and write
2A99FF83000
heap
page read and write
7FF9BB230000
trusted library allocation
page read and write
7FF9BB242000
trusted library allocation
page read and write
7FF9BB3A0000
trusted library allocation
page read and write
37EF5FD000
stack
page read and write
904000
heap
page read and write
FDFFEFB000
stack
page read and write
7FF9BB095000
trusted library allocation
page read and write
2B2805C4000
trusted library allocation
page read and write
196CDAE4000
heap
page read and write
37EF2FD000
stack
page read and write
5A2B000
heap
page read and write
7FF9BB3C0000
trusted library allocation
page read and write
196D5A85000
heap
page read and write
2A99FB86000
heap
page read and write
2A9A0019000
heap
page read and write
23163456000
trusted library allocation
page read and write
23161D24000
trusted library allocation
page read and write
2A99FF3A000
heap
page read and write
23179E02000
heap
page read and write
7FF9BB2F3000
trusted library allocation
page read and write
196CDACC000
heap
page read and write
186BB000000
heap
page read and write
196D5B9E000
heap
page read and write
196D59C0000
heap
page read and write
7FF9BB310000
trusted library allocation
page read and write
2B2F347A000
heap
page read and write
8B0000
heap
page read and write
196D5F42000
heap
page read and write
196D5B72000
heap
page read and write
E2794CE000
stack
page read and write
2A99F5F7000
heap
page read and write
2A99FE8B000
heap
page read and write
7FF9BB890000
trusted library allocation
page read and write
23161F4D000
trusted library allocation
page read and write
2A997C13000
heap
page read and write
196D5AA7000
heap
page read and write
7FF9BBAE0000
trusted library allocation
page read and write
2A99FBE3000
heap
page read and write
1D2C5E2D000
heap
page read and write
196D5C71000
heap
page read and write
2B280A1C000
trusted library allocation
page read and write
7FF9BB090000
trusted library allocation
page read and write
2678C3A3000
trusted library allocation
page read and write
7FF9BB699000
trusted library allocation
page read and write
2A99FB9C000
heap
page read and write
1E11B451000
heap
page read and write
7FF9BB0BE000
trusted library allocation
page read and write
5AB2000
heap
page read and write
196D59D5000
heap
page read and write
196D5FCD000
heap
page read and write
2A99FD82000
heap
page read and write
2B281B53000
trusted library allocation
page read and write
196D5C0B000
heap
page read and write
7FF9BB9A0000
trusted library allocation
page read and write
23161C94000
trusted library allocation
page read and write
2A99FE96000
heap
page read and write
196D5980000
heap
page read and write
196D5A75000
heap
page read and write
7FF9BB300000
trusted library allocation
page read and write
7FF9BB360000
trusted library allocation
page read and write
196D5CA1000
heap
page read and write
7FF9BB0A0000
trusted library allocation
page read and write
2315F27D000
heap
page read and write
196D5BBE000
heap
page read and write
196D5D1C000
heap
page read and write
2B2F33F0000
heap
page read and write
1E12D07C000
trusted library allocation
page read and write
196D5FB4000
heap
page read and write
7FF9BB190000
trusted library allocation
page read and write
2A99FC98000
heap
page read and write
196D5907000
heap
page read and write
5AEE000
heap
page read and write
2A997DC6000
heap
page read and write
2A997D11000
heap
page read and write
5A97000
heap
page read and write
196D5D8D000
heap
page read and write
7FF9BB260000
trusted library allocation
page read and write
196D5A29000
heap
page read and write
602000
heap
page read and write
7FF9BB6A0000
trusted library allocation
page read and write
196D5D47000
heap
page read and write
231634BC000
trusted library allocation
page read and write
2A99FD14000
heap
page read and write
2A99FC2B000
heap
page read and write
196D5D46000
heap
page read and write
196D5C30000
heap
page read and write
2A99FCD9000
heap
page read and write
2A99FDFB000
heap
page read and write
196D5C17000
heap
page read and write
2A99FDAF000
heap
page read and write
2A99FBF3000
heap
page read and write
E278878000
stack
page read and write
231632BF000
trusted library allocation
page read and write
7FF6C365A000
unkown
page execute read
2B2F5E78000
heap
page read and write
196D5D34000
heap
page read and write
196D5A36000
heap
page read and write
2A997CA6000
heap
page read and write
196CD9D0000
heap
page read and write
7FF9BB270000
trusted library allocation
page read and write
196D5DBC000
heap
page read and write
2A99FBD1000
heap
page read and write
112D9000
unkown
page readonly
2315F248000
heap
page read and write
2A99FF1A000
heap
page read and write
8B3000
heap
page read and write
2A99FE48000
heap
page read and write
7FF695D41000
unkown
page execute read
7FF9BB180000
trusted library allocation
page read and write
8B0000
heap
page read and write
23162851000
trusted library allocation
page read and write
231624DE000
trusted library allocation
page read and write
2A99FF30000
heap
page read and write
2A9A010A000
heap
page read and write
1E11B42E000
heap
page read and write
1E11CE02000
heap
page read and write
196D593B000
heap
page read and write
7FF9BB9F0000
trusted library allocation
page read and write
7FF9BB247000
trusted library allocation
page read and write
196CDB35000
heap
page read and write
23162D0A000
trusted library allocation
page read and write
23179E59000
heap
page read and write
5AD3000
heap
page read and write
7FF9BB490000
trusted library allocation
page read and write
7FFA1B115000
unkown
page readonly
1E11B4F2000
heap
page read and write
196D5B0C000
heap
page read and write
196D5AB8000
heap
page read and write
196D5C8D000
heap
page read and write
7FF9BB320000
trusted library allocation
page read and write
196D5FA6000
heap
page read and write
7FF9BB7F0000
trusted library allocation
page read and write
7FF9BB2E0000
trusted library allocation
page read and write
7FF9BB0A0000
trusted library allocation
page read and write
196D5933000
heap
page read and write
2B5AB130000
heap
page read and write
2A99FF2E000
heap
page read and write
439658B000
stack
page read and write
2B281B6B000
trusted library allocation
page read and write
2678AB37000
heap
page read and write
5A05000
heap
page read and write
177F5C10000
heap
page read and write
196D5C3E000
heap
page read and write
196D5C23000
heap
page read and write
23161B12000
trusted library allocation
page read and write
75187F9000
stack
page read and write
7FF9BB350000
trusted library allocation
page execute and read and write
7FF9BB290000
trusted library allocation
page read and write
5A9E000
heap
page read and write
37EF8FB000
stack
page read and write
751807E000
stack
page read and write
196D5D87000
heap
page read and write
231624F0000
trusted library allocation
page read and write
5AC3000
heap
page read and write
196D5978000
heap
page read and write
7FF9BB7B0000
trusted library allocation
page read and write
196D59D1000
heap
page read and write
7FF9BB8C3000
trusted library allocation
page read and write
196D5C3C000
heap
page read and write
196D5802000
heap
page read and write
5AE4000
heap
page read and write
196D5AFA000
heap
page read and write
7FF9BB630000
trusted library allocation
page read and write
2A99FE3C000
heap
page read and write
196D5ACF000
heap
page read and write
85E000
heap
page read and write
2678C697000
trusted library allocation
page read and write
7FF9BB620000
trusted library allocation
page read and write
196D5C61000
heap
page read and write
2A99FBA9000
heap
page read and write
196D5A06000
heap
page read and write
196CDA84000
heap
page read and write
FD631FC000
stack
page read and write
196D625B000
heap
page read and write
2A997C00000
heap
page read and write
23179E05000
heap
page read and write
7FF9BB4C0000
trusted library allocation
page read and write
5AA4000
heap
page read and write
186BAE00000
heap
page read and write
2A99FB37000
heap
page read and write
2A99FCF4000
heap
page read and write
2A997CFA000
heap
page read and write
7FF9BB8B0000
trusted library allocation
page read and write
2B5AB2A0000
heap
page read and write
196D6298000
heap
page read and write
3CA6BBA000
stack
page read and write
196D6291000
heap
page read and write
196D5D23000
heap
page read and write
196CDB24000
heap
page read and write
7FF9BB9EC000
trusted library allocation
page read and write
2B2F5CC5000
heap
page read and write
5A91000
heap
page read and write
7FF9BB240000
trusted library allocation
page read and write
2A99FD72000
heap
page read and write
1D2C5E00000
heap
page read and write
7FF9BB150000
trusted library allocation
page read and write
7FF9BB3A0000
trusted library allocation
page read and write
E27960E000
stack
page read and write
196D5D36000
heap
page read and write
23161231000
trusted library allocation
page read and write
2A99FDA5000
heap
page read and write
23162E0E000
trusted library allocation
page read and write
7FF9BAE3B000
trusted library allocation
page read and write
2B2F5543000
heap
page read and write
7FF9BB180000
trusted library allocation
page read and write
255C000
stack
page read and write
2B2F3443000
heap
page read and write
2A99FB45000
heap
page read and write
23163271000
trusted library allocation
page read and write
1E11CDD0000
heap
page read and write
2A99F363000
heap
page read and write
827000
heap
page read and write
2A997C40000
heap
page read and write
573F000
stack
page read and write
1E135630000
heap
page read and write
2A99FF5C000
heap
page read and write
5DE000
stack
page read and write
2A99FE29000
heap
page read and write
196D5D30000
heap
page read and write
196D5C4D000
heap
page read and write
23162EF9000
trusted library allocation
page read and write
196D598F000
heap
page read and write
2B5AB261000
heap
page read and write
196D598F000
heap
page read and write
33FA000
stack
page read and write
2A99FB9A000
heap
page read and write
3CA6ABF000
stack
page read and write
7FF9BB9B0000
trusted library allocation
page read and write
196D5905000
heap
page read and write
2B2F5CB5000
heap
page read and write
112A7000
unkown
page readonly
7FF9BB620000
trusted library allocation
page read and write
196D62D4000
heap
page read and write
2A99FC3F000
heap
page read and write
7FFA1B119000
unkown
page readonly
7FF9BB5F0000
trusted library allocation
page read and write
2A99F1C0000
trusted library allocation
page read and write
111F1000
unkown
page readonly
196D5AA1000
heap
page read and write
2A99FBD9000
heap
page read and write
2A99FDCF000
heap
page read and write
2B2809FD000
trusted library allocation
page read and write
196D595F000
heap
page read and write
1E135402000
heap
page execute and read and write
There are 3078 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://wsj.pm/