IOC Report
SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x4a9d9835, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6AE3.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BDE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C1C.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D45.tmp.txt
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61476 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Temp\Adventure_19.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Sites.UDP
data
dropped
C:\Users\user\AppData\Local\Temp\emoji-body-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\iso_639-3.xml
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\lgpllibs.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\microphone-disabled-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsd7AB8.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\printer-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\svejtsers.for
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Logs\waasmedic\waasmedic.20220526_155057_892.etl
data
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\03A7312A-3D2B-4807-84DA-352D7F06B3B6MPTelemetrySubmit\client_manifest.txt
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\03A7312A-3D2B-4807-84DA-352D7F06B3B6MPTelemetrySubmit\watson_manifest.txt
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\MpSigStub.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpasbase.vdm
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpasdlta.vdm
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpavbase.vdm
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpavdlta.vdm
PE32+ executable (DLL) (console) x86-64, for MS Windows
modified
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\mpengine.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ConfigSecurityPolicy.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\DefenderCSP.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdBoot.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdDevFlt.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdFilter.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Drivers\WdNisDrv.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-AMFilter.man
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-NIS.man
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-Protection.man
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-RTP.man
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Antimalware-Service.man
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Microsoft-Windows-Windows Defender.man
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpAsDesc.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpAzSubmit.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpClient.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpCmdRun.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpCommu.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpCopyAccelerator.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpDetours.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpDetoursCopyAccelerator.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpDlpCmd.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpEvMsg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpOAV.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpRtp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSenseComm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSigStub.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSvc.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpUpdate.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpUxAgent.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MsMpEng.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MsMpLics.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\NisSrv.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\Defender.psd1
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\DefenderPerformance.psd1
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpComputerStatus.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPerformanceRecording.psm1
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPerformanceRecording.wprp
XML 1.0 document, UTF-8 Unicode (with BOM) text
modified
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPerformanceReport.Format.ps1xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpPreference.cdxml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpRollback.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpScan.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpSignature.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpThreat.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpThreatCatalog.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpThreatDetection.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\Powershell\MSFT_MpWDOScan.cdxml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ProtectionManagement.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ProtectionManagement.mof
C source, Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ProtectionManagement_uninstall.mof
C source, Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ThirdPartyNotices.txt
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\af-ZA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\am-ET\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ar-SA\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ar-SA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\as-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\az-Latn-AZ\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bg-BG\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bg-BG\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bn-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\bs-Latn-BA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ca-ES-valencia\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ca-ES\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ca-ES\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\com.microsoft.defender.be.chrome.json
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cs-CZ\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cs-CZ\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cs-CZ\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\cy-GB\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\da-DK\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\da-DK\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\da-DK\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\de-DE\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\el-GR\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\el-GR\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\el-GR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-GB\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-GB\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\en-US\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\endpointdlp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-ES\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-MX\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\es-MX\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\et-EE\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\et-EE\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\eu-ES\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fa-IR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fi-FI\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fi-FI\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fi-FI\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fil-PH\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-CA\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-CA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\fr-FR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ga-IE\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\gd-GB\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\gl-ES\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\gu-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\he-IL\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\he-IL\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hi-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hr-HR\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hr-HR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hu-HU\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hu-HU\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\hu-HU\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\id-ID\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\id-ID\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\is-IS\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\it-IT\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ja-JP\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ka-GE\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\kk-KZ\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\km-KH\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\kn-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ko-KR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\kok-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lb-LU\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lo-LA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lt-LT\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lt-LT\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lv-LV\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\lv-LV\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mi-NZ\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mk-MK\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ml-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mpextms.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mr-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ms-MY\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\mt-MT\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nb-NO\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nb-NO\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nb-NO\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ne-NP\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nl-NL\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nl-NL\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nl-NL\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\nn-NO\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\or-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pa-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pl-PL\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pl-PL\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pl-PL\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-BR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-PT\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-PT\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\pt-PT\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\quz-PE\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ro-RO\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ro-RO\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ru-RU\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sk-SK\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sk-SK\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sl-SI\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sl-SI\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sq-AL\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Cyrl-BA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Cyrl-RS\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Latn-RS\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sr-Latn-RS\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sv-SE\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sv-SE\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\sv-SE\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ta-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\te-IN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\th-TH\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\th-TH\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tr-TR\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tr-TR\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tr-TR\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\tt-RU\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ug-CN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\uk-UA\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\uk-UA\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\ur-PK\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\vi-VN\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\vi-VN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpAsDesc.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpClient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpCmdRun.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpCopyAccelerator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpDetours.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpDetoursCopyAccelerator.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MpOAV.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\MsMpLics.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\en-US\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\x86\endpointdlp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-CN\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\MpAsDesc.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\MpEvMsg.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\ProtectionManagement.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\zh-TW\mpuxagent.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\MpSigStub.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 244 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
malicious
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-60574f34.exe
C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-60574f34.exe
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\Drivers\WdNisDrv.sys
malicious
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\mpam-e428c3f6.exe
"C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-e428c3f6.exe" /q WD
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\MpSigStub.exe
C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\2C39E2B2-9640-4516-B068-8044B49E3F95\MpSigStub.exe /stub 1.1.18500.10 /payload 1.367.502.0 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-e428c3f6.exe /q WD
C:\Windows\System32\wevtutil.exe
C:\Windows\system32\wevtutil.exe uninstall-manifest C:\Windows\TEMP\3FCB5F68-CD33-FF2F-34AE-798C9A7026D4.man
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wevtutil.exe
C:\Windows\system32\wevtutil.exe install-manifest C:\Windows\TEMP\3FCB5F68-CD33-FF2F-34AE-798C9A7026D4.man "/resourceFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll" "/messageFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll" "/parameterFilePath:C:\ProgramData\Microsoft\Windows Defender\Definition Updates\StableEngineEtwLocation\mpengine_etw.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\ProgramData\Microsoft\Windows Defender\Scans\MpPayloadData\mpengine.exe
C:\ProgramData\Microsoft\Windows Defender\Scans\\MpPayloadData\mpengine.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{EBBB10C2-099A-4A41-A364-F566D3127AB4}\MpKslDrv.sys
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSigStub.exe
C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\724B5320-FE6C-430F-AB77-13F2FD7207BA\MpSigStub.exe /stub 1.1.18500.10 /payload 4.18.2203.5 /program C:\Windows\SERVIC~1\NETWOR~1\AppData\Local\Temp\mpam-60574f34.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\NisSrv.exe
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\NisSrv.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://www.certplus.com/CRL/class3.crl0
unknown
http://www.vmware.com/0
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
https://github.com/Azure/azure-storage-cpp)
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
http://policy.camerfirma.com0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
https://owWZDyjXwQrXMrJH.org
unknown
http://cps.letsencrypt.org0
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://microsoft.co
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
http://crl.pki.wellsfargo.com/wsprca.crl0
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
unknown
https://account.live.com/msangcwam
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
https://owWZDyjXwQrXMrJH.or
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
http://passport.net/tb
unknown
http://www.globaltrust.info0
unknown
http://www.symauth.com/cps0(
unknown
https://owWZDyjXwQrXMrJH.orgt-
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
https://doc-0g-34-docs.googleusercontent.com/
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.symauth.com/rpa00
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
https://eca.hinet.net/repository0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
https://drive.google.com/V%-
unknown
http://mail.asfaltolargo.pt(
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
http://OGHYwH.com
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
https://github.com/open-source-parsers/jsoncpp.git)
unknown
http://www.acabogacia.org0
unknown
http://www.firmaprofesional.com/cps0
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://www.agesic.gub.uy/acrn/acrn.crl0)
unknown
http://www.rcsc.lt/repository0
unknown
https://web.certicamara.com/marco-legal0Z
unknown
http://www.quovadisglobal.com/cps0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.correo.com.uy/correocert/cps.pdf0
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
http://certs.oaticerts.com/repository/OATICA2.crt08
unknown
https://signup.live.com/signup.aspx
unknown
http://cps.chambersign.org/cps/chambersignroot.html0
unknown
https://unitedstates4.ss.wd.microsoft.us
unknown
https://clients2.google.com/service/check2?crx3=true&appid=%7B430FD4D0-B729-4F61-AA34-91526481799D%7
unknown
https://unitedstates1.ss.wd.microsoft.us
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
unknown
http://www.anf.es/AC/RC/ocsp0c
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://www.oaticerts.com/repository.
unknown
http://www.ancert.com/cps0
unknown
http://ocsp.accv.es0
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
unknown
http://crl.mV
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
unknown
http://www.echoworx.com/ca/root2/cps.pdf0
unknown
https://rca.e-szigno.hu/ocsp0-
unknown
http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
unknown
http://eca.hinet.net/repository/CRL2/CA.crl0
unknown
http://www.datev.de/zertifikat-policy-std0
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
unknown
http://mail.asfaltolargo.pt
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
unknown
http://crl.defence.gov.au/pki0
unknown
http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
unknown
http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
unknown
https://www.catcert.net/verarrel05
unknown
http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
unknown
http://www.pki.gva.es/cps0%
unknown
http://www.cert.fnmt.es/dpcs/0
unknown
http://www.datev.de/zertifikat-policy-bt0
unknown
http://www.comsign.co.il/cps0
unknown
http://127.0.0.1:HTTP/1.1
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.23.110
unknown
United States
94.46.30.74
unknown
Portugal
142.251.37.97
unknown
United States
192.168.11.1
unknown
unknown
127.0.0.1
unknown
unknown
209.197.3.8
unknown
United States
20.189.173.22
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\centrumpartiers\sindstilstand
Tiebold
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SENGEKANTERNE\stubben
Roundabout87
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\dado
Foresprgselens98
HKEY_CURRENT_USER\SOFTWARE\metaled\Filformatets
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
ResourceFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
MessageFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{0a002690-3839-4e3a-b3b6-96d8df868d99}
ParameterFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
ResourceFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
MessageFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{68621c25-df8d-4a6b-aabc-19a22e296a7c}
ParameterFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MpKsl1c70f6d2\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MpKsl1c70f6d2\Parameters\Wdf
WdfMinorVersion
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00184005D4FD7B30
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
Blob
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D881000
trusted library allocation
page read and write
malicious
2A10000
direct allocation
page execute and read and write
malicious
F30000
remote allocation
page execute and read and write
malicious
1FEB0000
trusted library allocation
page read and write
26336AD3000
heap
page read and write
1602FB20000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
1F8CDE4F000
heap
page read and write
20753000
trusted library allocation
page read and write
1F963000
trusted library allocation
page read and write
1F6DDDD4000
heap
page read and write
13AF000
heap
page read and write
1C451000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
1F8CDD40000
heap
page read and write
16033E37000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F8CDE2E000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C790000
heap
page read and write
16C07991000
heap
page read and write
1F6DDE04000
heap
page read and write
1602DE13000
heap
page read and write
A9F000
stack
page read and write
16C07999000
heap
page read and write
16C07996000
heap
page read and write
56B000
heap
page read and write
1F8CDE18000
heap
page read and write
1F8CDE44000
heap
page read and write
1DE0F544000
heap
page read and write
16C0798C000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1D0E1410000
heap
page read and write
1C451000
heap
page read and write
1F8CDBA0000
heap
page read and write
1D443000
trusted library allocation
page execute and read and write
13087E000
stack
page read and write
1602DED1000
heap
page read and write
1F6DDDA9000
heap
page read and write
1F8CDE44000
heap
page read and write
1DE0F52D000
heap
page read and write
7FF7D3A69000
unkown
page read and write
16C07A50000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
56B000
heap
page read and write
BC0000
trusted library allocation
page read and write
1F8CDE46000
heap
page read and write
56B000
heap
page read and write
2C168D3B000
heap
page read and write
2075B000
trusted library allocation
page read and write
1C451000
heap
page read and write
26336480000
heap
page read and write
16C0799C000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDEA5000
heap
page read and write
21170000
trusted library allocation
page read and write
1DE0F52D000
heap
page read and write
2C1682A0000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
2C168160000
heap
page read and write
1C451000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1F8CEA95000
heap
page read and write
1C451000
heap
page read and write
16C07B40000
trusted library allocation
page read and write
16C0796D000
heap
page read and write
2C168D2F000
heap
page read and write
1F8CEA95000
heap
page read and write
1F8CDE5E000
heap
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
2C168D2E000
heap
page read and write
1D7FE000
trusted library allocation
page read and write
1D472000
trusted library allocation
page read and write
1F6DDD9C000
heap
page read and write
1D0E121A000
heap
page read and write
1F8CDE69000
heap
page read and write
1DE0F547000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1DE0F4E0000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DDDC9000
heap
page read and write
1F880000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1F909000
trusted library allocation
page read and write
1836E702000
heap
page read and write
1C451000
heap
page read and write
1FA10000
trusted library allocation
page read and write
16C07997000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1836E4B0000
heap
page read and write
1F6DD900000
heap
page read and write
1602FC86000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
46D9000
trusted library allocation
page read and write
1F89E000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1D806000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
C2849FF000
stack
page read and write
274F000
stack
page read and write
1FEC3000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
16C07999000
heap
page read and write
1836E66D000
heap
page read and write
1F8CDE4F000
heap
page read and write
1FF20000
trusted library allocation
page read and write
21040000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
16033E27000
trusted library allocation
page read and write
431000
unkown
page read and write
1C451000
heap
page read and write
7FF6F452C000
unkown
page readonly
2078C000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE18000
heap
page read and write
13E2000
heap
page read and write
19595300000
heap
page read and write
EC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1836E5C0000
unclassified section
page readonly
20731000
trusted library allocation
page read and write
16C0796E000
heap
page read and write
13A3000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16C07983000
heap
page read and write
56B000
heap
page read and write
16033E77000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEB1000
trusted library allocation
page read and write
20764000
trusted library allocation
page read and write
1C451000
heap
page read and write
1D863000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1FA20000
trusted library allocation
page read and write
AD0E56B000
stack
page read and write
1FA00000
trusted library allocation
page read and write
2633649D000
heap
page read and write
56B000
heap
page read and write
26336ADA000
heap
page read and write
1FA00000
trusted library allocation
page read and write
56B000
heap
page read and write
13A0000
heap
page read and write
1F8CDE1D000
heap
page read and write
36EB07E000
stack
page read and write
1C451000
heap
page read and write
16C0799C000
heap
page read and write
2C168D7C000
heap
page read and write
16C07999000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
205E0000
trusted library allocation
page read and write
1F93B000
trusted library allocation
page read and write
7FA80000
trusted library allocation
page execute and read and write
7FF754151000
unkown
page readonly
1F8CDE3F000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
47691FC000
stack
page read and write
26336AD7000
heap
page read and write
2079C000
trusted library allocation
page read and write
1396000
heap
page read and write
1C451000
heap
page read and write
20CC0000
trusted library allocation
page read and write
1FF05000
trusted library allocation
page read and write
26336CE1000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
16C07997000
heap
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
1602DE99000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
36EB1FF000
stack
page read and write
1F8CEAA8000
heap
page read and write
1F8CDEE0000
trusted library allocation
page read and write
26336CF9000
heap
page read and write
16C0799E000
heap
page read and write
1DE0F547000
heap
page read and write
1D850000
trusted library allocation
page read and write
205E0000
trusted library allocation
page read and write
195951D0000
heap
page read and write
1F82E613000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1F8CDE44000
heap
page read and write
26336CB1000
heap
page read and write
1C451000
heap
page read and write
1602FC50000
heap
page read and write
1C451000
heap
page read and write
2C168D6D000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C0798F000
heap
page read and write
1DE0F51C000
heap
page read and write
16C07996000
heap
page read and write
26336AD5000
heap
page read and write
1C451000
heap
page read and write
1602DEE0000
heap
page read and write
1602DEE2000
heap
page read and write
16C07992000
heap
page read and write
1C451000
heap
page read and write
1FF01000
trusted library allocation
page read and write
56B000
heap
page read and write
16C0799F000
heap
page read and write
1D0E1188000
heap
page read and write
16033E02000
trusted library allocation
page read and write
7FF6F4470000
unkown
page readonly
1C451000
heap
page read and write
16C07991000
heap
page read and write
1D7EB000
trusted library allocation
page read and write
1DE0F52A000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
6F3D6000
unkown
page readonly
1FF00000
trusted library allocation
page read and write
16C0799C000
heap
page read and write
20831000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C07980000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
1C451000
heap
page read and write
2C1680A0000
heap
page read and write
1FF00000
trusted library allocation
page read and write
16C07997000
heap
page read and write
26336CFC000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16033EB0000
remote allocation
page read and write
1F8CDE44000
heap
page read and write
1F957000
trusted library allocation
page read and write
1602E713000
heap
page read and write
1602FC6E000
heap
page read and write
2C168313000
heap
page read and write
1C451000
heap
page read and write
1F8CDE42000
heap
page read and write
205E0000
trusted library allocation
page read and write
1F8CDE3A000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C07986000
heap
page read and write
16C07991000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
2C168D76000
heap
page read and write
20792000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
20600000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FD9D000
stack
page read and write
1FED0000
trusted library allocation
page read and write
16C07991000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
7FF74E710000
unkown
page readonly
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1F8CDE56000
heap
page read and write
1C451000
heap
page read and write
1D9D4000
trusted library allocation
page read and write
16C0799F000
heap
page read and write
20738000
trusted library allocation
page read and write
C75000
heap
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
E40000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE99000
heap
page read and write
11D0000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F971000
trusted library allocation
page read and write
1D47B000
trusted library allocation
page execute and read and write
1F6DDDEE000
heap
page read and write
1C451000
heap
page read and write
2C168D76000
heap
page read and write
26336CED000
heap
page read and write
1FED0000
trusted library allocation
page read and write
16C07991000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1F97A000
trusted library allocation
page read and write
1D830000
trusted library allocation
page read and write
1F8CDE43000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F82E160000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FA90000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1D0E0F90000
heap
page read and write
1602FB30000
trusted library allocation
page read and write
1F6DDDA4000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
7FF750F51000
unkown
page readonly
1FEC0000
trusted library allocation
page read and write
1D850000
trusted library allocation
page read and write
1C451000
heap
page read and write
1D850000
trusted library allocation
page execute and read and write
1FEB0000
trusted library allocation
page read and write
1602E700000
heap
page read and write
1C451000
heap
page read and write
20798000
trusted library allocation
page read and write
1F971000
trusted library allocation
page read and write
F20000
remote allocation
page read and write
6BCC07E000
stack
page read and write
16C07994000
heap
page read and write
1FED0000
trusted library allocation
page read and write
20798000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
26336ADE000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1D5BE000
stack
page read and write
2C168D76000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F8CDE17000
heap
page read and write
130A7C000
stack
page read and write
1F8CE4B0000
heap
page read and write
56B000
heap
page read and write
1602FCAC000
heap
page read and write
1C451000
heap
page read and write
1602DECC000
heap
page read and write
16C0799C000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
4768EF8000
stack
page read and write
1F82E340000
heap
page read and write
1602F5C0000
trusted library allocation
page read and write
1F8CDE3D000
heap
page read and write
2C168260000
heap
page read and write
1F963000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1C451000
heap
page read and write
1602DF06000
heap
page read and write
518000
heap
page read and write
26336AD7000
heap
page read and write
1C451000
heap
page read and write
1F6DDD9D000
heap
page read and write
20734000
trusted library allocation
page read and write
1FAB0000
heap
page execute and read and write
131E000
stack
page read and write
16C07999000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
56B000
heap
page read and write
1F8CDE44000
heap
page read and write
1F8CDE91000
heap
page read and write
1FEE5000
trusted library allocation
page read and write
1C451000
heap
page read and write
16033E30000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
7FF7D3A6C000
unkown
page readonly
1DE0F513000
heap
page read and write
1C451000
heap
page read and write
26336C90000
heap
page read and write
20798000
trusted library allocation
page read and write
1D46A000
trusted library allocation
page execute and read and write
1FEE0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
20811000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
2C168D7C000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1F8CDEA4000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
510000
heap
page read and write
1F8CDE4F000
heap
page read and write
1308FF000
stack
page read and write
16C07992000
heap
page read and write
7FF7D3A6C000
unkown
page readonly
56B000
heap
page read and write
1F82E200000
unkown
page read and write
1C451000
heap
page read and write
1FEAC000
trusted library allocation
page read and write
1F6DDDB0000
heap
page read and write
16033E8A000
trusted library allocation
page read and write
1836E640000
heap
page read and write
7FF700EB1000
unkown
page execute read
1C451000
heap
page read and write
16C0799C000
heap
page read and write
140B000
heap
page read and write
2C168D4B000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
21040000
trusted library allocation
page read and write
2C1682A0000
heap
page read and write
1DE0F512000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F6DDDD4000
heap
page read and write
16C079A1000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1D935000
trusted library allocation
page read and write
1FEC0000
trusted library allocation
page read and write
1D0E1204000
heap
page read and write
1836EDC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEB5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1602DEFB000
heap
page read and write
1FF00000
trusted library allocation
page read and write
20600000
trusted library allocation
page read and write
7FF6F4470000
unkown
page readonly
20A7E000
stack
page read and write
56B000
heap
page read and write
1F6DDDAA000
heap
page read and write
1602DE8F000
heap
page read and write
1F8CEA48000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1F6DDE16000
heap
page read and write
1602FAF0000
trusted library allocation
page read and write
13A1000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
26336489000
heap
page read and write
16C07992000
heap
page read and write
7FF74E751000
unkown
page readonly
205E0000
trusted library allocation
page read and write
47690FC000
stack
page read and write
16C07994000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
19595380000
heap
page read and write
1DE0F547000
heap
page read and write
26336AD2000
heap
page read and write
56B000
heap
page read and write
26336CD1000
heap
page read and write
16C07997000
heap
page read and write
1F93F000
trusted library allocation
page read and write
56B000
heap
page read and write
2C168C02000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1DE0F525000
heap
page read and write
1C451000
heap
page read and write
16033F10000
trusted library allocation
page read and write
1836E67E000
heap
page read and write
1D444000
trusted library allocation
page read and write
1F8CDE44000
heap
page read and write
26336CD5000
heap
page read and write
20600000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1F980000
trusted library allocation
page read and write
1C451000
heap
page read and write
140E000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
13E1000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE0C000
heap
page read and write
1C451000
heap
page read and write
20757000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
20D3E000
stack
page read and write
1F9C0000
trusted library allocation
page read and write
1F8CDEBE000
heap
page read and write
16C0799C000
heap
page read and write
1D9D2000
trusted library allocation
page read and write
1F8CE8F0000
heap
page read and write
56B000
heap
page read and write
16C0798F000
heap
page read and write
55F3B7F000
trusted library allocation
page read and write
1DE0F4D0000
trusted library allocation
page read and write
26336CFC000
heap
page read and write
1F82E713000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
205F0000
trusted library allocation
page read and write
55F3C7F000
trusted library allocation
page read and write
1F6DD7FE000
heap
page read and write
16C07996000
heap
page read and write
16C0799F000
heap
page read and write
1C451000
heap
page read and write
1F8CEA93000
heap
page read and write
56B000
heap
page read and write
1D0E1270000
heap
page read and write
1F6DD5CC000
heap
page read and write
2078F000
trusted library allocation
page read and write
26336735000
heap
page read and write
7FF700EF1000
unkown
page readonly
20670000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
210A0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1602DF13000
heap
page read and write
2C168D70000
heap
page read and write
16C07994000
heap
page read and write
1F8CDE4C000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F6DDDFA000
heap
page read and write
1F82E702000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C450000
heap
page read and write
16C0799C000
heap
page read and write
1836E62A000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
20789000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16C07975000
heap
page read and write
2073F000
trusted library allocation
page read and write
20700000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
7FF71C581000
unkown
page execute read
56B000
heap
page read and write
1FA00000
trusted library allocation
page read and write
7FF74FB51000
unkown
page readonly
1FA00000
trusted library allocation
page read and write
1F8CDE32000
heap
page read and write
205E0000
trusted library allocation
page read and write
1F82E602000
heap
page read and write
9BD118D000
stack
page read and write
1C451000
heap
page read and write
1FEE5000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
1F8CDE52000
heap
page read and write
16C079A1000
heap
page read and write
2C168D29000
heap
page read and write
56B000
heap
page read and write
16C0798F000
heap
page read and write
1F9E0000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
16C0799E000
heap
page read and write
1D9C7000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
207B2000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1DE0F720000
trusted library allocation
page read and write
1602DE96000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
1F6DDDB3000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1D7E0000
trusted library allocation
page read and write
1030000
unclassified section
page readonly
1D180000
remote allocation
page read and write
1C451000
heap
page read and write
139D000
heap
page read and write
1F8CDE54000
heap
page read and write
1F9F0000
trusted library allocation
page execute and read and write
1F8CDE3D000
heap
page read and write
1C797000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1F8CDE3D000
heap
page read and write
1F6DDDED000
heap
page read and write
1560000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DD7FA000
heap
page read and write
2075C000
trusted library allocation
page read and write
1DE0F533000
heap
page read and write
1FA10000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1E8A9000
trusted library allocation
page read and write
26336CB3000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE6A000
heap
page read and write
16033E1C000
trusted library allocation
page read and write
16033E7A000
trusted library allocation
page read and write
1F6DDDEE000
heap
page read and write
1F8CDE69000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1F8CDE3B000
heap
page read and write
1F6DD5A7000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1F8CDE2E000
heap
page read and write
205E0000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
21160000
trusted library allocation
page read and write
1602FBD0000
trusted library allocation
page read and write
2C168213000
heap
page read and write
7FF71C591000
unkown
page readonly
F20000
remote allocation
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
401000
unkown
page execute read
1F8CDE1F000
heap
page read and write
56B000
heap
page read and write
16C079A3000
heap
page read and write
1C451000
heap
page read and write
20739000
trusted library allocation
page read and write
1F82E315000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1DE0F4F4000
heap
page read and write
1F8CDE41000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
16C07994000
heap
page read and write
130CFE000
stack
page read and write
1FEB0000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
26336CB3000
heap
page read and write
1F8CDE42000
heap
page read and write
2C168D74000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
205E0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
16C07997000
heap
page read and write
2C16827A000
heap
page read and write
1DE0F52B000
heap
page read and write
1FF20000
trusted library allocation
page read and write
20799000
trusted library allocation
page read and write
56B000
heap
page read and write
1602FBF0000
trusted library allocation
page read and write
20731000
trusted library allocation
page read and write
408000
unkown
page readonly
1FF00000
trusted library allocation
page read and write
205EE000
trusted library allocation
page read and write
7FF700EEE000
unkown
page write copy
1C451000
heap
page read and write
2C168D02000
heap
page read and write
1836E68A000
heap
page read and write
1FEF0000
trusted library allocation
page execute and read and write
1F6DDDE3000
heap
page read and write
56B000
heap
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
1F938000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16033E61000
trusted library allocation
page read and write
1D850000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1D850000
trusted library allocation
page read and write
130AFB000
stack
page read and write
1602DF02000
heap
page read and write
1C451000
heap
page read and write
1836E690000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
20680000
trusted library allocation
page read and write
1D0E12F0000
heap
page read and write
32FC000
stack
page read and write
205E0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1DE0F547000
heap
page read and write
1389000
heap
page read and write
1C451000
heap
page read and write
1F82E243000
heap
page read and write
1C451000
heap
page read and write
16033E5E000
trusted library allocation
page read and write
1D986000
trusted library allocation
page read and write
1DE0F52D000
heap
page read and write
1D470000
trusted library allocation
page read and write
1C451000
heap
page read and write
561000
heap
page read and write
2C168D6B000
heap
page read and write
26336CB3000
heap
page read and write
1C451000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16C07984000
heap
page read and write
1F97A000
trusted library allocation
page read and write
26336ADA000
heap
page read and write
1F8CDE6D000
heap
page read and write
1F8CDE6E000
heap
page read and write
1DE0F547000
heap
page read and write
20BBE000
stack
page read and write
1FA20000
trusted library allocation
page read and write
263366C0000
heap
page read and write
30000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1D80D000
trusted library allocation
page read and write
2086A000
trusted library allocation
page read and write
1F8CDE7D000
heap
page read and write
1F8CDE7D000
heap
page read and write
1836E633000
heap
page read and write
1F8CDE3B000
heap
page read and write
1F8CDE3D000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF14000
trusted library allocation
page read and write
1602DE93000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1FED0000
trusted library allocation
page read and write
4768C7C000
stack
page read and write
E80000
trusted library allocation
page read and write
13FD000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
21040000
trusted library allocation
page read and write
26336AD4000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1F8CDE3B000
heap
page read and write
1C451000
heap
page read and write
2C168D5B000
heap
page read and write
1C451000
heap
page read and write
1602E716000
heap
page read and write
1F8CDEBE000
heap
page read and write
7FF700EB1000
unkown
page execute read
1C451000
heap
page read and write
1C451000
heap
page read and write
1D850000
trusted library allocation
page read and write
6F3D4000
unkown
page readonly
1FF00000
trusted library allocation
page read and write
16C07B40000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
36EACDA000
stack
page read and write
1F8CDE44000
heap
page read and write
16C0799C000
heap
page read and write
1FED0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1FF10000
trusted library allocation
page read and write
26336CEE000
heap
page read and write
1C451000
heap
page read and write
1DE0F517000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F8CEA40000
heap
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
440000
unkown
page read and write
1FEB0000
trusted library allocation
page read and write
1D855000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1FF22000
trusted library allocation
page read and write
1F8CDE5D000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1D180000
remote allocation
page read and write
33FD000
stack
page read and write
1C451000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
56B000
heap
page read and write
1DE0F52C000
heap
page read and write
20866000
trusted library allocation
page read and write
1C451000
heap
page read and write
7FF6F452C000
unkown
page readonly
26336C20000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
7FF71C581000
unkown
page execute read
1836E620000
heap
page read and write
26336CBE000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1F6DDDCF000
heap
page read and write
1F8CE580000
remote allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE7D000
heap
page read and write
1D855000
trusted library allocation
page read and write
56B000
heap
page read and write
1309FE000
stack
page read and write
1FA00000
trusted library allocation
page read and write
1F8CDE19000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
81E000
stack
page read and write
21030000
trusted library allocation
page read and write
F20000
remote allocation
page read and write
1C451000
heap
page read and write
1DE0F513000
heap
page read and write
1C451000
heap
page read and write
1F8CDED0000
unclassified section
page readonly
1C451000
heap
page read and write
210A0000
trusted library allocation
page read and write
1F9C0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1D801000
trusted library allocation
page read and write
1602FC7F000
heap
page read and write
1F6DDDFD000
heap
page read and write
1D7C0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
9BD15FE000
stack
page read and write
312B16D000
stack
page read and write
1F6DDDB3000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DDDBE000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDEE0000
trusted library allocation
page read and write
20728000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F941000
trusted library allocation
page read and write
26336730000
heap
page read and write
16C07999000
heap
page read and write
400000
unkown
page readonly
1F8CDE3D000
heap
page read and write
1C451000
heap
page read and write
263364A2000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1FF15000
trusted library allocation
page read and write
56B000
heap
page read and write
1DE0F52F000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1320000
heap
page read and write
1C451000
heap
page read and write
1F8CDE99000
heap
page read and write
46B000
unkown
page readonly
E50000
trusted library allocation
page read and write
2C1682B0000
heap
page read and write
1F8CDE43000
heap
page read and write
13EA000
heap
page read and write
7FF74E74E000
unkown
page write copy
16034080000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FA10000
trusted library allocation
page read and write
1602DE44000
heap
page read and write
26336CD4000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
195951D8000
heap
page read and write
2C168241000
heap
page read and write
1F6DD7F4000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1F9C0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1602FA41000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1F6DDE04000
heap
page read and write
1D7BE000
stack
page read and write
1FEF2000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
2C168D7C000
heap
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
1F8CDE41000
heap
page read and write
1FA01000
trusted library allocation
page read and write
1F9C0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
2086A000
trusted library allocation
page read and write
16C07975000
heap
page read and write
1C451000
heap
page read and write
1F8CDEC4000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F8CDE46000
heap
page read and write
1C451000
heap
page read and write
2C168D2D000
heap
page read and write
16C07991000
heap
page read and write
2C168D7C000
heap
page read and write
2083F000
trusted library allocation
page read and write
16033F27000
trusted library allocation
page read and write
7FF71C590000
unkown
page write copy
16C079A1000
heap
page read and write
16C07981000
heap
page read and write
1FED0000
trusted library allocation
page read and write
21020000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
2C168D40000
heap
page read and write
1F6DD7FB000
heap
page read and write
1C451000
heap
page read and write
1F6DDDE4000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
210A0000
trusted library allocation
page read and write
16033E67000
trusted library allocation
page read and write
20CBE000
stack
page read and write
1D855000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
21030000
trusted library allocation
page read and write
1DE0F513000
heap
page read and write
16C07992000
heap
page read and write
2C168D2B000
heap
page read and write
55F3FFE000
stack
page read and write
205E0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1602FBC0000
trusted library allocation
page read and write
264E000
stack
page read and write
210A0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1602FC00000
heap
page read and write
1C451000
heap
page read and write
26336CB8000
heap
page read and write
2BA1000
heap
page read and write
1F8CDE41000
heap
page read and write
1C451000
heap
page read and write
26336ADA000
heap
page read and write
16C07800000
heap
page read and write
1C451000
heap
page read and write
1F8CDECA000
heap
page read and write
1C451000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
21050000
trusted library allocation
page read and write
1E881000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FF24000
trusted library allocation
page read and write
1602FC79000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
2C168D7C000
heap
page read and write
1FA00000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE35000
heap
page read and write
16C07997000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C0798B000
heap
page read and write
1C451000
heap
page read and write
16C07BA1000
heap
page read and write
16C079A1000
heap
page read and write
1F82E0F0000
heap
page read and write
1C451000
heap
page read and write
B90000
heap
page read and write
476997F000
stack
page read and write
1C451000
heap
page read and write
549000
heap
page read and write
16C0795B000
heap
page read and write
1C451000
heap
page read and write
26336CF2000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1602DE6B000
heap
page read and write
1D850000
trusted library allocation
page read and write
56A000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1D0E124F000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE7D000
heap
page read and write
16C0799C000
heap
page read and write
1F82E202000
unkown
page read and write
1F6DD7F5000
heap
page read and write
1FA10000
trusted library allocation
page read and write
1F8CDE11000
heap
page read and write
1C451000
heap
page read and write
20761000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
56B000
heap
page read and write
2C168D2C000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
20E7E000
stack
page read and write
2D40000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1F9C0000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
20822000
trusted library allocation
page read and write
16033ECF000
trusted library allocation
page read and write
EBE000
stack
page read and write
16C07992000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
20789000
trusted library allocation
page read and write
1D7D0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
205DE000
stack
page read and write
1F6DDD9F000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1F6DD5A0000
heap
page read and write
1C451000
heap
page read and write
1D0E1179000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1D30A000
stack
page read and write
1C451000
heap
page read and write
36EAD5F000
stack
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEE5000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1F6DD905000
heap
page read and write
1FF08000
trusted library allocation
page read and write
1FEC6000
trusted library allocation
page read and write
1F8C2000
trusted library allocation
page read and write
1D9BA000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE54000
heap
page read and write
1D5C8000
trusted library allocation
page read and write
16C07999000
heap
page read and write
1C451000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1836E680000
heap
page read and write
1DE0F547000
heap
page read and write
1D855000
trusted library allocation
page read and write
1F8CDE91000
heap
page read and write
1C451000
heap
page read and write
1F8CE580000
remote allocation
page read and write
1FEE5000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
21040000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
26336CCF000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F8CDE56000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
16033E00000
trusted library allocation
page read and write
1836E685000
heap
page read and write
1836E600000
heap
page read and write
16034090000
trusted library allocation
page read and write
56B000
heap
page read and write
1FEB5000
trusted library allocation
page read and write
16C07991000
heap
page read and write
16033E43000
trusted library allocation
page read and write
1F8CDE44000
heap
page read and write
1DE0F52A000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
AD0E8FF000
stack
page read and write
16C0798F000
heap
page read and write
1FF00000
trusted library allocation
page read and write
EFE000
stack
page read and write
1FEE0000
trusted library allocation
page read and write
56B000
heap
page read and write
1F8CDDF8000
heap
page read and write
1F8CDDF9000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
4DE000
stack
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1F8CDE43000
heap
page read and write
1DE0F4EC000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE4F000
heap
page read and write
1602DE2A000
heap
page read and write
16C0799C000
heap
page read and write
1D820000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
207B2000
trusted library allocation
page read and write
4F4000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C07986000
heap
page read and write
1DE0F52D000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
205E0000
trusted library allocation
page read and write
20811000
trusted library allocation
page read and write
1836E5D0000
heap
page read and write
205E0000
trusted library allocation
page read and write
1D430000
trusted library allocation
page read and write
7FF7D39B1000
unkown
page execute read
1FF00000
trusted library allocation
page read and write
1602E715000
heap
page read and write
16033E5B000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
7FF7D3A47000
unkown
page readonly
21040000
trusted library allocation
page read and write
2C1682A0000
heap
page read and write
16C0799C000
heap
page read and write
13E1000
heap
page read and write
1C451000
heap
page read and write
1FEE5000
trusted library allocation
page read and write
1F8CDECA000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
16C0796C000
heap
page read and write
1DE0F7B0000
heap
page read and write
207B2000
trusted library allocation
page read and write
7FF700EB0000
unkown
page readonly
56B000
heap
page read and write
1DE0F50B000
heap
page read and write
55F35DC000
stack
page read and write
16C07980000
heap
page read and write
16C07981000
heap
page read and write
16033E6A000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1F8CDE37000
heap
page read and write
1602DEA0000
heap
page read and write
2C168278000
heap
page read and write
20757000
trusted library allocation
page read and write
20798000
trusted library allocation
page read and write
207AC000
trusted library allocation
page read and write
21180000
trusted library allocation
page read and write
1F8CDE4C000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
205F0000
trusted library allocation
page execute and read and write
12DE000
stack
page read and write
26336CE4000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
E3E000
unkown
page read and write
1C451000
heap
page read and write
1F6DDE15000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8E8000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
26336CC8000
heap
page read and write
1D460000
trusted library allocation
page read and write
1C451000
heap
page read and write
408000
unkown
page readonly
1C451000
heap
page read and write
26336C9C000
heap
page read and write
56B000
heap
page read and write
7FF6F4529000
unkown
page write copy
1F9C0000
trusted library allocation
page read and write
16C07997000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1F8CDE07000
heap
page read and write
205E0000
trusted library allocation
page read and write
1F8CDE44000
heap
page read and write
AD0E5EE000
stack
page read and write
207B2000
trusted library allocation
page read and write
1D0E120C000
heap
page read and write
2C1682D7000
heap
page read and write
16C07983000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
20798000
trusted library allocation
page read and write
1836E657000
heap
page read and write
7FF6F4471000
unkown
page execute read
1DE0F4FD000
heap
page read and write
1C451000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1FEC0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
56B000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1F82E702000
heap
page read and write
16033E8D000
trusted library allocation
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
1DE0F547000
heap
page read and write
16C07B30000
unclassified section
page readonly
1C451000
heap
page read and write
1F8CDE3D000
heap
page read and write
6BCC27A000
stack
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
26336CE3000
heap
page read and write
1F971000
trusted library allocation
page read and write
16C07994000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F82E702000
heap
page read and write
1C451000
heap
page read and write
1F8CDE44000
heap
page read and write
1F8CDCD0000
heap
page read and write
55F39FF000
stack
page read and write
1836E450000
heap
page read and write
1D0E10C0000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
2C168D2F000
heap
page read and write
1C451000
heap
page read and write
20792000
trusted library allocation
page read and write
1FEBA000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
16C07994000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
7FF750551000
unkown
page readonly
16C0799C000
heap
page read and write
16C079A1000
heap
page read and write
7FF74E73F000
unkown
page readonly
1FF00000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
16C0798B000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE2E000
heap
page read and write
16C07980000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
205E0000
trusted library allocation
page read and write
E97000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C07994000
heap
page read and write
1F8CEA81000
heap
page read and write
16C07997000
heap
page read and write
42C000
unkown
page read and write
139D000
heap
page read and write
1305F7000
stack
page read and write
16C0798F000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1120000
heap
page read and write
1D850000
trusted library allocation
page read and write
1FEF0000
trusted library allocation
page read and write
1F92C000
trusted library allocation
page read and write
1602FB00000
trusted library allocation
page read and write
1C451000
heap
page read and write
36EB0FF000
stack
page read and write
1FEB0000
trusted library allocation
page read and write
40A000
unkown
page write copy
195951E0000
heap
page read and write
16C07996000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1F6DD440000
heap
page read and write
278E000
stack
page read and write
1C451000
heap
page read and write
16C0799F000
heap
page read and write
1CE10000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
56B000
heap
page read and write
1CE5E000
stack
page read and write
1FEA0000
trusted library allocation
page read and write
2079C000
trusted library allocation
page read and write
16C07991000
heap
page read and write
16C07992000
heap
page read and write
1F967000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE53000
heap
page read and write
205E0000
trusted library allocation
page read and write
16C07989000
heap
page read and write
1FA00000
trusted library allocation
page read and write
1F95A000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
20813000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEB5000
trusted library allocation
page read and write
1DE0F4C0000
unclassified section
page readonly
1C451000
heap
page read and write
7FF6F4507000
unkown
page readonly
EA0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FEF0000
trusted library allocation
page read and write
1602FAF0000
trusted library allocation
page read and write
56B000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1602DDC0000
unclassified section
page readonly
1C451000
heap
page read and write
1F8CDEC0000
heap
page read and write
7FF7D39B1000
unkown
page execute read
7FF700EDF000
unkown
page readonly
16C0799C000
heap
page read and write
16C0799C000
heap
page read and write
2C168D31000
heap
page read and write
1F8CDE4F000
heap
page read and write
20819000
trusted library allocation
page read and write
16C07994000
heap
page read and write
1F8CDE91000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1602FB20000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F82E300000
trusted library allocation
page read and write
26336CBE000
heap
page read and write
1C451000
heap
page read and write
312B47F000
stack
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
13F5000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1C451000
heap
page read and write
F30000
remote allocation
page execute and read and write
16033E3A000
trusted library allocation
page read and write
1C451000
heap
page read and write
1DE0F6B0000
heap
page read and write
476957B000
stack
page read and write
16C07981000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
210A0000
trusted library allocation
page read and write
1C451000
heap
page read and write
2C168D29000
heap
page read and write
1C451000
heap
page read and write
2D89000
trusted library allocation
page read and write
1F8CDE3B000
heap
page read and write
26336CC0000
heap
page read and write
1F6DDDDE000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
7FF7D3A47000
unkown
page readonly
1602DED5000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
2C168150000
unclassified section
page readonly
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
2C168289000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
2078C000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DD710000
heap
page read and write
26336AD0000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
3240000
trusted library allocation
page read and write
16C07986000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F82E600000
heap
page read and write
1DE0F50A000
heap
page read and write
7FF753751000
unkown
page readonly
1DE0F515000
heap
page read and write
1C451000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
20600000
trusted library allocation
page read and write
16033F2A000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
6F3D0000
unkown
page readonly
1F8CDE7D000
heap
page read and write
56B000
heap
page read and write
55F3A7D000
stack
page read and write
6BCC17E000
stack
page read and write
1FF20000
trusted library allocation
page read and write
1C451000
heap
page read and write
2C168D2C000
heap
page read and write
1F8CDECA000
heap
page read and write
1D855000
trusted library allocation
page read and write
1D180000
remote allocation
page read and write
55F3D7F000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CE580000
remote allocation
page read and write
1F8CEA5A000
heap
page read and write
21040000
trusted library allocation
page read and write
16C07981000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
16C07997000
heap
page read and write
1D477000
trusted library allocation
page execute and read and write
7FF700EF1000
unkown
page readonly
11D4000
heap
page read and write
1F6DDDC0000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
7FF71C58B000
unkown
page readonly
1F8CDE44000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1F6DDDCE000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1DE0F547000
heap
page read and write
16C0798F000
heap
page read and write
1DE0F526000
heap
page read and write
1DE0F50F000
heap
page read and write
1F82E700000
heap
page read and write
56B000
heap
page read and write
1FF10000
trusted library allocation
page read and write
98000
stack
page read and write
7FF6F4507000
unkown
page readonly
1FEB0000
trusted library allocation
page read and write
1DE0F3D0000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
21170000
trusted library allocation
page read and write
401000
unkown
page execute read
1C451000
heap
page read and write
16C07988000
heap
page read and write
16C07982000
heap
page read and write
1602DEC5000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16C07989000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CE5A0000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1D9BE000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE91000
heap
page read and write
1C451000
heap
page read and write
1602FC43000
heap
page read and write
1F82E213000
unkown
page read and write
1C451000
heap
page read and write
1F97B000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1F8CDE3D000
heap
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
6F3D1000
unkown
page execute read
20744000
trusted library allocation
page read and write
1D450000
trusted library allocation
page read and write
1F8CDE41000
heap
page read and write
16C0798B000
heap
page read and write
26336CB7000
heap
page read and write
16C07997000
heap
page read and write
1C451000
heap
page read and write
7FF7D3A69000
unkown
page write copy
20798000
trusted library allocation
page read and write
1FA10000
trusted library allocation
page read and write
1F9C0000
trusted library allocation
page read and write
1602FC9D000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1DE0F521000
heap
page read and write
1C451000
heap
page read and write
2C168D58000
heap
page read and write
16C079A1000
heap
page read and write
1FF20000
trusted library allocation
page read and write
16033E46000
trusted library allocation
page read and write
1602FBE0000
trusted library allocation
page read and write
2C168300000
heap
page read and write
1F82E713000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1602FBE0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1F8CDE1D000
heap
page read and write
1DE0F440000
heap
page read and write
16C07AC0000
heap
page read and write
16033E1F000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
C284BFE000
stack
page read and write
7FF751951000
unkown
page readonly
1C451000
heap
page read and write
7FF71C580000
unkown
page readonly
210B0000
trusted library allocation
page execute and read and write
16C07996000
heap
page read and write
1F82E190000
trusted library allocation
page read and write
56B000
heap
page read and write
56B000
heap
page read and write
1F6DDDF9000
heap
page read and write
1D855000
trusted library allocation
page read and write
26336CA5000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1CF5E000
stack
page read and write
1C451000
heap
page read and write
1602DE00000
heap
page read and write
39DB67F000
stack
page read and write
26336CBA000
heap
page read and write
56B000
heap
page read and write
1E8E4000
trusted library allocation
page read and write
C60000
heap
page read and write
1C451000
heap
page read and write
16C07988000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
26336CC9000
heap
page read and write
1F8CDE44000
heap
page read and write
2BA1000
heap
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
1FED0000
trusted library allocation
page read and write
56B000
heap
page read and write
263363B0000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
19595310000
heap
page read and write
1602FCA3000
heap
page read and write
1836E642000
heap
page read and write
1F8CDE7F000
heap
page read and write
1C451000
heap
page read and write
1F6DDD99000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1DE0F526000
heap
page read and write
1C451000
heap
page read and write
1F967000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F910000
trusted library allocation
page read and write
C2848FB000
stack
page read and write
56B000
heap
page read and write
56B000
heap
page read and write
56B000
heap
page read and write
7FF752D51000
unkown
page readonly
39DB31B000
stack
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1602FC43000
heap
page read and write
210A0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
4768FFF000
stack
page read and write
1FEA0000
trusted library allocation
page read and write
1F9D0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
C2847FD000
stack
page read and write
1F9C0000
trusted library allocation
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16033E19000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
26336CA4000
heap
page read and write
1602DC40000
heap
page read and write
1F8CDE7D000
heap
page read and write
1C67E000
unkown
page read and write
1C451000
heap
page read and write
16C07983000
heap
page read and write
1602DDD0000
heap
page read and write
1FEAA000
trusted library allocation
page read and write
16033E64000
trusted library allocation
page read and write
1D466000
trusted library allocation
page execute and read and write
20837000
trusted library allocation
page read and write
1F8CDE33000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
16C0798D000
heap
page read and write
1C451000
heap
page read and write
26336C97000
heap
page read and write
1C451000
heap
page read and write
207A4000
trusted library allocation
page read and write
1367000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
16C07994000
heap
page read and write
1F8CDE44000
heap
page read and write
1FF20000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1F8CDE58000
heap
page read and write
1F8CDE41000
heap
page read and write
7FF700EEE000
unkown
page read and write
1F6DD7F2000
heap
page read and write
1C451000
heap
page read and write
1602E702000
heap
page read and write
2093E000
stack
page read and write
1127000
heap
page read and write
1FED0000
trusted library allocation
page read and write
16C0799F000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1F6DD7F7000
heap
page read and write
1D409000
stack
page read and write
26336CD7000
heap
page read and write
2C1682DA000
heap
page read and write
21040000
trusted library allocation
page read and write
26336CF9000
heap
page read and write
1C451000
heap
page read and write
1F8CEA93000
heap
page read and write
1C451000
heap
page read and write
1FED0000
trusted library allocation
page read and write
56B000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FA10000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
26336CA6000
heap
page read and write
288F000
stack
page read and write
1FEC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FA10000
trusted library allocation
page read and write
1FEC0000
trusted library allocation
page read and write
1602DECA000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
1D992000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1602E5C0000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C07997000
heap
page read and write
20607000
trusted library allocation
page read and write
1D4BE000
stack
page read and write
16C0799C000
heap
page read and write
56B000
heap
page read and write
1602DEC4000
heap
page read and write
1C451000
heap
page read and write
132B000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
36EADDF000
stack
page read and write
145B000
stack
page read and write
C2846FF000
stack
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FF10000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
1FF00000
trusted library allocation
page read and write
7FF71C580000
unkown
page readonly
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1DE0F547000
heap
page read and write
1C451000
heap
page read and write
207B2000
trusted library allocation
page read and write
1FA10000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDBA5000
heap
page read and write
1C451000
heap
page read and write
16C07982000
heap
page read and write
1602DEB8000
heap
page read and write
21030000
trusted library allocation
page read and write
46B000
unkown
page readonly
1F6DDDC8000
heap
page read and write
1F8CDE5D000
heap
page read and write
1D7FA000
trusted library allocation
page read and write
1F8CDE99000
heap
page read and write
1C451000
heap
page read and write
4F4000
heap
page read and write
1F8CDE9F000
heap
page read and write
1D660000
trusted library allocation
page execute and read and write
1F9C0000
trusted library allocation
page read and write
16033EF8000
trusted library allocation
page read and write
2C168D0F000
heap
page read and write
1C451000
heap
page read and write
108B1AF000
stack
page read and write
1FF26000
trusted library allocation
page read and write
1836E64B000
heap
page read and write
1F8CDE42000
heap
page read and write
1602DEC9000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
56B000
heap
page read and write
20700000
trusted library allocation
page read and write
16C07997000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
16C0799F000
heap
page read and write
1C451000
heap
page read and write
2C168D29000
heap
page read and write
1C451000
heap
page read and write
C284679000
stack
page read and write
553000
heap
page read and write
1FF00000
trusted library allocation
page read and write
13FF000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1602FC50000
heap
page read and write
16033E2A000
trusted library allocation
page read and write
1D9D0000
trusted library allocation
page read and write
1F6DDDC4000
heap
page read and write
1602FE00000
trusted library allocation
page read and write
13F0000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
16C0799C000
heap
page read and write
1F8CDE41000
heap
page read and write
1D9D6000
trusted library allocation
page read and write
16C07983000
heap
page read and write
1F6DDDB1000
heap
page read and write
1C451000
heap
page read and write
1D92F000
trusted library allocation
page read and write
1F6DDDD5000
heap
page read and write
205E0000
trusted library allocation
page read and write
312B1EE000
stack
page read and write
13F0000
heap
page read and write
2C168D29000
heap
page read and write
1FEF0000
trusted library allocation
page read and write
1F82E713000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1F8CDE5E000
heap
page read and write
56B000
heap
page read and write
1F8CDE43000
heap
page read and write
1F8CDE44000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1F6DD7FE000
heap
page read and write
1F8CDE41000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
2C16827F000
heap
page read and write
1C451000
heap
page read and write
26336CA0000
heap
page read and write
1F6DDDB7000
heap
page read and write
469000
unkown
page read and write
1D0E1201000
heap
page read and write
1602E602000
heap
page read and write
1F8CDE2E000
heap
page read and write
1F8CDE0B000
heap
page read and write
26336CB0000
heap
page read and write
21050000
trusted library allocation
page read and write
1F6DDDC8000
heap
page read and write
2C168C00000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
BC1000
trusted library allocation
page read and write
13097E000
stack
page read and write
47697FF000
stack
page read and write
1FF10000
trusted library allocation
page read and write
1F6DDDD1000
heap
page read and write
2C168D74000
heap
page read and write
2C168281000
heap
page read and write
1F8CDE44000
heap
page read and write
2C168D00000
heap
page read and write
13AF000
heap
page read and write
1F91D000
trusted library allocation
page read and write
16C07992000
heap
page read and write
16C079A1000
heap
page read and write
2C168D2C000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE3D000
heap
page read and write
1400000
heap
page read and write
1FEE0000
trusted library allocation
page read and write
1DE0F7B5000
heap
page read and write
56B000
heap
page read and write
16033E87000
trusted library allocation
page read and write
1FF16000
trusted library allocation
page read and write
1D850000
trusted library allocation
page read and write
20837000
trusted library allocation
page read and write
16C07968000
heap
page read and write
1C451000
heap
page read and write
1F8CDE99000
heap
page read and write
1602FCC3000
heap
page read and write
1F8CDE18000
heap
page read and write
1C451000
heap
page read and write
1F8CDE5D000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
16C07997000
heap
page read and write
1C451000
heap
page read and write
1F8F3000
trusted library allocation
page read and write
130B7E000
stack
page read and write
21050000
trusted library allocation
page read and write
2070B000
trusted library allocation
page read and write
1F6DDDB3000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
2075C000
trusted library allocation
page read and write
1D475000
trusted library allocation
page execute and read and write
1F8CDE46000
heap
page read and write
16033EB0000
remote allocation
page read and write
1C451000
heap
page read and write
108B0AC000
stack
page read and write
20792000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1602DEBA000
heap
page read and write
1DE0F51E000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE52000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1F8CDE42000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FED0000
trusted library allocation
page read and write
20792000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
1F8CDE54000
heap
page read and write
207B0000
trusted library allocation
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C451000
heap
page read and write
1602FBC0000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
16C07999000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
26336CDE000
heap
page read and write
1C451000
heap
page read and write
1F8CDEA4000
heap
page read and write
1C451000
heap
page read and write
1F8CDE54000
heap
page read and write
1DE0F51B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1D850000
trusted library allocation
page read and write
1C451000
heap
page read and write
1602DEEC000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
E70000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE05000
heap
page read and write
55F3EFF000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1F8CDE08000
heap
page read and write
1602FC69000
heap
page read and write
1F8CDE41000
heap
page read and write
1C451000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FA00000
trusted library allocation
page read and write
1DE0F532000
heap
page read and write
16C07991000
heap
page read and write
E40000
trusted library allocation
page read and write
1F8CDE44000
heap
page read and write
2C168D2C000
heap
page read and write
2070D000
trusted library allocation
page read and write
20789000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE43000
heap
page read and write
26336CC4000
heap
page read and write
1F8CDE44000
heap
page read and write
1F6DDD97000
heap
page read and write
20E3E000
stack
page read and write
16C07997000
heap
page read and write
21060000
trusted library allocation
page read and write
20738000
trusted library allocation
page read and write
21170000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1F8CEB80000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1D860000
heap
page read and write
56B000
heap
page read and write
2C168302000
heap
page read and write
2C168D58000
heap
page read and write
1F8CDE3C000
heap
page read and write
1C451000
heap
page read and write
16C07989000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1602FAD0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1602FC54000
heap
page read and write
205E0000
trusted library allocation
page read and write
1F82E224000
unkown
page read and write
1FF20000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
F20000
remote allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F971000
trusted library allocation
page read and write
1FEE5000
trusted library allocation
page read and write
1F6DDDB3000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1F8CDEC5000
heap
page read and write
1FEB1000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F980000
trusted library allocation
page read and write
1F8CDE38000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
16C07990000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1F8CDE43000
heap
page read and write
1FF00000
trusted library allocation
page read and write
16C0799C000
heap
page read and write
1F8CEAB2000
heap
page read and write
16C0799F000
heap
page read and write
7FF6F4471000
unkown
page execute read
1602DEC0000
heap
page read and write
1F6DDDC8000
heap
page read and write
400000
unkown
page readonly
1C451000
heap
page read and write
20834000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1D6BC000
stack
page read and write
1FEC0000
trusted library allocation
page read and write
56B000
heap
page read and write
7FF752351000
unkown
page readonly
7FF71C58B000
unkown
page readonly
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
1F8CDE3B000
heap
page read and write
13FD000
heap
page read and write
1FA10000
trusted library allocation
page read and write
195950A0000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1602DF29000
heap
page read and write
7FF7D39B0000
unkown
page readonly
1836E655000
heap
page read and write
1D850000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
2086A000
trusted library allocation
page read and write
16C07983000
heap
page read and write
1C451000
heap
page read and write
7FF74F151000
unkown
page readonly
1FEE5000
trusted library allocation
page read and write
2C1681B0000
trusted library allocation
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
26336CA9000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
7FF7D39B0000
unkown
page readonly
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDB90000
heap
page read and write
1C451000
heap
page read and write
207B2000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE01000
heap
page read and write
1602DF17000
heap
page read and write
99E000
stack
page read and write
1F8CDE52000
heap
page read and write
1602FA70000
trusted library allocation
page read and write
2C168285000
heap
page read and write
2C16827B000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
205E0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1F8CDE03000
heap
page read and write
20690000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
56B000
heap
page read and write
F20000
remote allocation
page read and write
1602FC98000
heap
page read and write
1D0E11CF000
heap
page read and write
20B7D000
stack
page read and write
26336C99000
heap
page read and write
26336ADB000
heap
page read and write
1C451000
heap
page read and write
16C0798D000
heap
page read and write
22C0000
heap
page read and write
16C07B90000
heap
page read and write
16C07997000
heap
page read and write
1F82E702000
heap
page read and write
1602DE5E000
heap
page read and write
1D0E122D000
heap
page read and write
56B000
heap
page read and write
1F8CEA81000
heap
page read and write
1D0E1170000
heap
page read and write
1D0E1415000
heap
page read and write
1C451000
heap
page read and write
26336CEF000
heap
page read and write
21030000
trusted library allocation
page read and write
1F6DDD90000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEE1000
trusted library allocation
page read and write
1F8CDE3B000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FA90000
trusted library allocation
page read and write
1DE0F547000
heap
page read and write
16C0799A000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
56B000
heap
page read and write
1FA10000
trusted library allocation
page read and write
1F6DDDB8000
heap
page read and write
1C560000
unclassified section
page readonly
1C451000
heap
page read and write
1F8CDDD0000
heap
page read and write
205E0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CEA5A000
heap
page read and write
1C451000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1D850000
trusted library allocation
page read and write
1FA00000
trusted library allocation
page read and write
55F3F7F000
trusted library allocation
page read and write
20600000
trusted library allocation
page read and write
20F7E000
stack
page read and write
1F8CDE5D000
heap
page read and write
16C07981000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
55F3E7F000
trusted library allocation
page read and write
16C07999000
heap
page read and write
2C168200000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1F82E700000
heap
page read and write
16C0796D000
heap
page read and write
1C451000
heap
page read and write
1D45D000
trusted library allocation
page execute and read and write
1D870000
heap
page execute and read and write
1C451000
heap
page read and write
16C079A1000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1D1BE000
stack
page read and write
1F8CDE42000
heap
page read and write
21040000
trusted library allocation
page read and write
7FF74E711000
unkown
page execute read
1DE0F500000
heap
page read and write
1F82E700000
heap
page read and write
E60000
trusted library allocation
page read and write
1D855000
trusted library allocation
page read and write
26336CB3000
heap
page read and write
1602DEB3000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1FEB5000
trusted library allocation
page read and write
39DB39E000
stack
page read and write
1C451000
heap
page read and write
16C0799C000
heap
page read and write
1FA90000
trusted library allocation
page read and write
C284AFC000
stack
page read and write
56B000
heap
page read and write
1FA4C000
stack
page read and write
13AF000
heap
page read and write
7FF700EDF000
unkown
page readonly
1FEC0000
trusted library allocation
page read and write
1602DCB0000
heap
page read and write
7FF71C590000
unkown
page read and write
56B000
heap
page read and write
1FED0000
trusted library allocation
page read and write
26336CCF000
heap
page read and write
1F6DD7F0000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1F8CDE44000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1602E600000
heap
page read and write
1C451000
heap
page read and write
16C0799C000
heap
page read and write
1F6DD7F7000
heap
page read and write
1D440000
trusted library allocation
page read and write
1F8CDE58000
heap
page read and write
1C451000
heap
page read and write
205E0000
trusted library allocation
page read and write
1D840000
trusted library allocation
page read and write
1C451000
heap
page read and write
2072C000
trusted library allocation
page read and write
1FEB1000
trusted library allocation
page read and write
2BA0000
heap
page read and write
7FF71C591000
unkown
page readonly
1C451000
heap
page read and write
1F8CDE44000
heap
page read and write
1C451000
heap
page read and write
1FED1000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F82E22A000
heap
page read and write
1F8CDE5D000
heap
page read and write
1F8CDE3D000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FEC0000
trusted library allocation
page read and write
1F8CDDE4000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
22C4000
heap
page read and write
1F82E302000
trusted library allocation
page read and write
16C0799C000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
BFD000
stack
page read and write
1FEA0000
trusted library allocation
page read and write
16C07997000
heap
page read and write
1C451000
heap
page read and write
2C168D32000
heap
page read and write
1C451000
heap
page read and write
1F8CDDFB000
heap
page read and write
1F8CDE5E000
heap
page read and write
16033EBB000
trusted library allocation
page read and write
13AF000
heap
page read and write
1D994000
trusted library allocation
page read and write
6BCBAEB000
stack
page read and write
20600000
trusted library allocation
page read and write
26336D15000
heap
page read and write
205E0000
trusted library allocation
page read and write
16C07994000
heap
page read and write
1C451000
heap
page read and write
1F8CDE44000
heap
page read and write
21030000
trusted library allocation
page read and write
1F6DDDD7000
heap
page read and write
56B000
heap
page read and write
26336C9D000
heap
page read and write
26336ADE000
heap
page read and write
1FED0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1F6DDDBA000
heap
page read and write
1F8CE5AB000
heap
page read and write
19A000
stack
page read and write
1FEA0000
trusted library allocation
page read and write
1FA20000
trusted library allocation
page read and write
1FEA1000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
56B000
heap
page read and write
1F6DDDBB000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1602FAE0000
trusted library allocation
page read and write
1DE0F527000
heap
page read and write
2C168D74000
heap
page read and write
1FF20000
trusted library allocation
page read and write
7DF000
stack
page read and write
1D7F2000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
26336CA5000
heap
page read and write
207A0000
trusted library allocation
page read and write
16C07991000
heap
page read and write
1F6DDDA8000
heap
page read and write
13A3000
heap
page read and write
1C451000
heap
page read and write
1F8CEAA7000
heap
page read and write
1C451000
heap
page read and write
1F6DDDA0000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
16C07988000
heap
page read and write
1C451000
heap
page read and write
20A3D000
stack
page read and write
1FEB5000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1D44D000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FA10000
trusted library allocation
page read and write
47692FB000
stack
page read and write
2072C000
trusted library allocation
page read and write
16C07997000
heap
page read and write
16C07969000
heap
page read and write
1C451000
heap
page read and write
16C07991000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
2085F000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DDDF2000
heap
page read and write
C70000
heap
page read and write
2C168D29000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1602FB34000
trusted library allocation
page read and write
56B000
heap
page read and write
16033EB0000
remote allocation
page read and write
1FEB0000
trusted library allocation
page read and write
2083C000
trusted library allocation
page read and write
1C451000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1FA00000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
2C16822A000
heap
page read and write
36EB17F000
stack
page read and write
16C07999000
heap
page read and write
1C451000
heap
page read and write
26336CBB000
heap
page read and write
1C451000
heap
page read and write
1D670000
heap
page read and write
56B000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1D7EE000
trusted library allocation
page read and write
1F6DDDE1000
heap
page read and write
16C0799C000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C0798F000
heap
page read and write
1FA10000
trusted library allocation
page read and write
1D2BE000
stack
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
16C0799C000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
16C07992000
heap
page read and write
26336CD4000
heap
page read and write
20600000
trusted library allocation
page read and write
16C07989000
heap
page read and write
2C168D37000
heap
page read and write
16C07950000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
40A000
unkown
page read and write
1C451000
heap
page read and write
1836E63C000
heap
page read and write
16C079A1000
heap
page read and write
1FED0000
trusted library allocation
page read and write
16C0797E000
heap
page read and write
1C451000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
1F8CDE3D000
heap
page read and write
16C07986000
heap
page read and write
1FEB5000
trusted library allocation
page read and write
E7E000
stack
page read and write
16C0799C000
heap
page read and write
1F8CDE3D000
heap
page read and write
1D0000
unclassified section
page readonly
1C451000
heap
page read and write
1C451000
heap
page read and write
1F6DDDA5000
heap
page read and write
1FF00000
trusted library allocation
page read and write
2C16828A000
heap
page read and write
56B000
heap
page read and write
1836EE02000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE1D000
heap
page read and write
16C07981000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
1C451000
heap
page read and write
2C168D70000
heap
page read and write
1602FC8F000
heap
page read and write
26336CC8000
heap
page read and write
1C451000
heap
page read and write
1F8CDE52000
heap
page read and write
1FA00000
trusted library allocation
page read and write
2078C000
trusted library allocation
page read and write
54D000
heap
page read and write
263364B3000
heap
page read and write
1C451000
heap
page read and write
2C168C15000
heap
page read and write
16C079A1000
heap
page read and write
1C451000
heap
page read and write
29D0000
trusted library allocation
page read and write
1FA00000
trusted library allocation
page read and write
1F6DDDB3000
heap
page read and write
2C168D31000
heap
page read and write
56B000
heap
page read and write
1FED0000
trusted library allocation
page read and write
20824000
trusted library allocation
page read and write
16C07981000
heap
page read and write
2C168110000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
16C07997000
heap
page read and write
16C07994000
heap
page read and write
1F8CDE44000
heap
page read and write
1602DEAA000
heap
page read and write
1F8CDDEF000
heap
page read and write
1F951000
trusted library allocation
page read and write
1C451000
heap
page read and write
16C07983000
heap
page read and write
1F6DDDCE000
heap
page read and write
1DE0F547000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1DE0F547000
heap
page read and write
1C451000
heap
page read and write
1F8CDE44000
heap
page read and write
1D0E11F0000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
1FF20000
trusted library allocation
page read and write
1F6DD6A0000
heap
page read and write
1602FA60000
trusted library allocation
page read and write
16C0798F000
heap
page read and write
16C07997000
heap
page read and write
16C0798F000
heap
page read and write
21170000
trusted library allocation
page read and write
1F8CDE42000
heap
page read and write
21220000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
16C07992000
heap
page read and write
1C451000
heap
page read and write
130C7E000
stack
page read and write
210A0000
trusted library allocation
page read and write
2C168D2F000
heap
page read and write
16C079A3000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1602E615000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1836E64D000
heap
page read and write
2C168D13000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F8CDE2F000
heap
page read and write
2078F000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1F8CDE41000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
16C07997000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
26336CCD000
heap
page read and write
1D462000
trusted library allocation
page read and write
AD0E87E000
stack
page read and write
56B000
heap
page read and write
39DB6FE000
stack
page read and write
1FA20000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DD7FA000
heap
page read and write
16C07982000
heap
page read and write
1CF70000
heap
page read and write
1F967000
trusted library allocation
page read and write
1F6DD7F3000
heap
page read and write
1D850000
trusted library allocation
page read and write
1FEC0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1DE0F51E000
heap
page read and write
16033E20000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
1D9AD000
trusted library allocation
page read and write
16C079A1000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1F8CDE2E000
heap
page read and write
20792000
trusted library allocation
page read and write
1FEE0000
trusted library allocation
page read and write
56B000
heap
page read and write
1836E613000
heap
page read and write
1602DEFD000
heap
page read and write
1C451000
heap
page read and write
1FF20000
trusted library allocation
page read and write
26336CA8000
heap
page read and write
1F8CDE54000
heap
page read and write
16C07997000
heap
page read and write
1FAA0000
trusted library allocation
page execute and read and write
1FF20000
trusted library allocation
page read and write
2C168D2C000
heap
page read and write
1FEB5000
trusted library allocation
page read and write
1F8CDE91000
heap
page read and write
1FEB0000
trusted library allocation
page read and write
206E0000
trusted library section
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
21030000
trusted library allocation
page read and write
1FF00000
trusted library allocation
page read and write
1DE0F52B000
heap
page read and write
1C451000
heap
page read and write
1836E651000
heap
page read and write
205E0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
26336D16000
heap
page read and write
7FF700EB0000
unkown
page readonly
16C07997000
heap
page read and write
1C451000
heap
page read and write
21180000
trusted library allocation
page read and write
20610000
trusted library allocation
page execute and read and write
7FF6F4529000
unkown
page read and write
1C451000
heap
page read and write
26336CC8000
heap
page read and write
56B000
heap
page read and write
16C079B1000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
91E000
stack
page read and write
20798000
trusted library allocation
page read and write
16033E4E000
trusted library allocation
page read and write
1F6DD800000
heap
page read and write
1FF00000
trusted library allocation
page read and write
1D855000
trusted library allocation
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
56B000
heap
page read and write
21030000
trusted library allocation
page read and write
1FEB0000
trusted library allocation
page read and write
1C451000
heap
page read and write
1F6DD7FA000
heap
page read and write
1F82E23B000
heap
page read and write
26336650000
heap
page read and write
16C07994000
heap
page read and write
C2841CB000
stack
page read and write
13A3000
heap
page read and write
1FF02000
trusted library allocation
page read and write
2C168D2F000
heap
page read and write
20600000
trusted library allocation
page read and write
56B000
heap
page read and write
16C0799C000
heap
page read and write
16C0799B000
heap
page read and write
1F8CDE44000
heap
page read and write
1C451000
heap
page read and write
56B000
heap
page read and write
26336D04000
heap
page read and write
1C451000
heap
page read and write
1C451000
heap
page read and write
26336C9F000
heap
page read and write
26336CAA000
heap
page read and write
1F8CDE44000
heap
page read and write
4F0000
heap
page read and write
56B000
heap
page read and write
1602FB00000
trusted library allocation
page read and write
20764000
trusted library allocation
page read and write
1FEC0000
trusted library allocation
page read and write
2C168D56000
heap
page read and write
1C451000
heap
page read and write
2B11000
trusted library allocation
page read and write
56B000
heap
page read and write
155E000
stack
page read and write
9BD197B000
stack
page read and write
1C451000
heap
page read and write
1602DE6F000
heap
page read and write
1F8CDE99000
heap
page read and write
16C07996000
heap
page read and write
1FEA0000
trusted library allocation
page read and write
1C451000
heap
page read and write
26336CEE000
heap
page read and write
1FF20000
trusted library allocation
page read and write
1FA00000
trusted library allocation
page read and write
1F82E713000
heap
page read and write
13A3000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1F967000
trusted library allocation
page read and write
1FEA0000
trusted library allocation
page read and write
1F9C0000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
There are 2480 hidden memdumps, click here to show them.