IOC Report
kdsyitkxmS.exe

loading gif

Files

File Path
Type
Category
Malicious
kdsyitkxmS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
B:\EFI\Boot\old.efi (copy)
MS-DOS executable PE32+ executable (DLL) (EFI application) x86-64, for MS Windows
dropped
malicious
B:\EFI\Microsoft\Boot\fw.efi (copy)
MS-DOS executable PE32+ executable (DLL) (EFI application) x86-64, for MS Windows
dropped
malicious
C:\EFI\Boot\EfiGuardDxe.efi
MS-DOS executable PE32+ executable (DLL) (EFI runtime driver) x86-64, for MS Windows
dropped
malicious
C:\EFI\Boot\bootx64.efi
MS-DOS executable PE32+ executable (DLL) (EFI application) x86-64, for MS Windows
dropped
malicious
C:\EFI\Microsoft\Boot\bootmgfw.efi
MS-DOS executable PE32+ executable (DLL) (EFI application) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\injector\injector.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\proxy\proxy.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libcrypto-1_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libssl-1_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\tor-gencert.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\tor.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\zlib1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\rss\csrss.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0uibbw2n.u0u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5gkzpulr.xo3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajj1lsit.dlx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gyaqtjvj.20x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0v4qict.nfz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ko53wgif.wdf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krlqmr0f.alj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mlnhpbeb.3a4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rci1q53k.l45.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v0csvqjz.0mw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vo50bj3f.c2o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vsxja3qu.dio.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnlrizwa.4cp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y5wemjya.mmm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ybf3cx44.ob0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycup24wz.ubg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Data\Tor\geoip
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Data\Tor\geoip6
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\cached-certs (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\cached-certs.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\cached-microdesc-consensus (copy)
ASCII text, with very long lines (951)
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\cached-microdesc-consensus.tmp
ASCII text, with very long lines (951)
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\cached-microdescs.new
ASCII text, with very long lines (9078)
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\geoip (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\geoip6 (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libevent-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libevent_core-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libevent_extra-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libgcc_s_dw2-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libssp-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\libwinpthread-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\state (copy)
ASCII text, with very long lines (350), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\state.tmp
ASCII text, with very long lines (350), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\unverified-microdesc-consensus (copy)
ASCII text, with very long lines (951)
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\unverified-microdesc-consensus.tmp
ASCII text, with very long lines (951)
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\log.txt
ASCII text, with very long lines (307), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\csrss\tor\torrc
ASCII text
dropped
C:\Windows\Logs\CBS\CBS.log
data
modified
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_1ewy3cvt.jss.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_1od21bnc.bfu.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_21wsrwkm.diw.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_3rofccwi.uii.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_4de0bier.p14.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_4s3rvv3n.rtg.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_5qrv0usa.uxk.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_a2mhl3l4.pvr.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_bhfirt3m.nxm.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_bsjf2icv.uai.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_by2l5cwc.djl.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_d4v40a4p.rwa.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_dhhjokcf.tvo.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_f4fsltzy.hmk.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_h5xdg0go.5zu.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_hkmzxwzm.f43.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_iaeeuynx.bsw.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_ish2ux4i.kia.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_j4hdcsn2.r34.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_jltvgfag.d53.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_kd2kjadw.klc.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_kf5iwc0g.sz5.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_kyh0g1mw.hwq.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_n0hqfvai.v0b.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_nbpsbzwb.gyw.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_p1fyep2c.0n1.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_qaoshhnk.ihw.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_qr05aytm.izs.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_r1s3rjiq.n4j.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_rhtrp13g.gkd.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_rkujaaq0.sto.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_skaxtcny.v0s.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_vjxpx4ni.vlv.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_x1dopqms.lgl.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_x5juog1b.n4r.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_ze0yliox.mzm.ps1
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text
dropped
There are 82 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kdsyitkxmS.exe
C:\Users\user\Desktop\kdsyitkxmS.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Users\user\Desktop\kdsyitkxmS.exe
C:\Users\user\Desktop\kdsyitkxmS.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\System32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
"C:\Windows\rss\csrss.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C fodhelper
malicious
C:\Windows\System32\fodhelper.exe
fodhelper
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Windows\rss\csrss.exe
"C:\Windows\rss\csrss.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
malicious
C:\Windows\System32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
"C:\Windows\rss\csrss.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C fodhelper
malicious
C:\Windows\System32\fodhelper.exe
fodhelper
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Windows\rss\csrss.exe
"C:\Windows\rss\csrss.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
malicious
C:\Windows\SysWOW64\mountvol.exe
mountvol B: /s
malicious
C:\Windows\SysWOW64\mountvol.exe
mountvol B: /d
malicious
C:\Windows\SysWOW64\mountvol.exe
mountvol B: /s
malicious
C:\Windows\SysWOW64\mountvol.exe
mountvol B: /d
malicious
C:\Users\user\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\user\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\user\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
malicious
C:\Windows\SysWOW64\shutdown.exe
shutdown -r -t 5
malicious
C:\Windows\System32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
malicious
C:\Users\user\AppData\Local\Temp\csrss\proxy\proxy.exe
C:\Users\user\AppData\Local\Temp\csrss\proxy\proxy.exe -bind-address 127.0.0.1:31466
malicious
C:\Windows\System32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\tor.exe
C:\Users\user\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\user\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\user\AppData\Local\Temp\csrss\tor\log.txt
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 68 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onion/api/cdn?c=03d8840b313d
unknown
malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onion/api/pollxennHbdeCkATuZ
unknown
malicious
https://server5.duniadekho.bar/api/signature/21f67ca2e1b8b0405399c65a0e0d031e
185.82.216.50
malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onionserver5.vcr4vuv4sf5233b
unknown
malicious
https://duniadekho.bar
unknown
malicious
http://vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onionC:
unknown
malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onion/api/poll
unknown
malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onion/api/pollnnHbdeCkATuZNP
unknown
malicious
https://server5.duniadekho.bar/api/poll
185.82.216.50
malicious
https://server5.duniadekho.bar/api/restriction-us
185.82.216.50
malicious
http://vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onion
unknown
malicious
https://duniadekho.barhttp://vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onionCommonPro
unknown
malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onionhttp://server5.vcr4vuv4
unknown
malicious
https://server5.duniadekho.bar/api/cdn?c=50d7801a966ceaa4&uuid=ec87b504-92ea-4d22-a937-161700799581
185.82.216.50
malicious
http://server5.vcr4vuv4sf5233btfy7xboezl7umjw7rljdmaeztmmf4s6k2ivinj3yd.onion
unknown
malicious
http://localhost:3433/https://duniadekho.baridna:
unknown
malicious
https://cdn.discordapp.com/attachments/1087398815188910163/1087399133926674453/LZ.zip
162.159.134.233
https://github.com
unknown
https://duniadekho.barSETCONF
unknown
http://invalidlog.txtlookup
unknown
https://server5.duniadekho.bararch=64-bit&build_number=19042&Intel%28R%29
unknown
https://github.comW
unknown
https://server5.duniadekho.bar/api/restriction-usH2
unknown
https://github.com/Snawoot/opera-proxy/releases/download/v1.2.2/opera-proxy.windows-386.exe
140.82.121.3
http://devlog.gregarius.net/docs/ua)Links
unknown
https://twopixis.com/w/w-8-debug.exe
104.21.54.103
https://twopixis.com/watchdog/watchdog.exe
172.67.168.112
https://github.com/ameshkov/dnslookup/
unknown
https://twopixis.com/watchdog
unknown
https://turnitin.com/robot/crawlerinfo.html)cannot
unknown
https://twopixis.com/wupxarch-6162-dcb505dc2b9d8aac05f4ca0727f5eadb.exe
104.21.54.103
http://search.msn.com/msnbot.htm)net/http:
unknown
https://twopixis.com/smbscanlocal-1bf850b4d9587c1017a75a47680584c4.exe
104.21.54.103
https://api.sec-tunnel.com/v4/subscriber_logininconsistent
unknown
https://twopixis.com/gm-305-7507ffc9a340f774985cb5ca11ca78c4.exe
104.21.54.103
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://search.msn.com/msnbot.htm)msnbot/1.1
unknown
https://api.sec-tunnel.com/v4/discoverhttps://api.sec-tunnel.com/v4/geo_listindex
unknown
https://twopixis.com/watchdog/watchdog.exeSETCONF
unknown
https://duniadekho.barMicrosoft
unknown
http://www.baidu.com/search/spider.htm)MobileSafari/600.1.4
unknown
https://objects.githubusercontent.com/github-production-release-asset-2e65be/350494541/0257ea00-a853
unknown
https://api.sec-tunnel.com/v4/register_subscriber
77.111.247.15
https://api.sec-tunnel.com/v4/register_device
77.111.247.15
https://1.1.1.1/dns-query
unknown
http://https://_bad_pdb_file.pdb
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://www.cloudflare.com/5xx-error
unknown
http://www.zlib.net/
unknown
https://server5.duniadekho.bar
unknown
http://www.google.com/feedfetcher.html)HKLM
unknown
http://www.zlib.net/D
unknown
https://api.sec-tunnel.com/v4/device_generate_passwordinternal
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://blockchain.infoindex
unknown
https://server5.duniadekho.bar/api/signature/
unknown
https://api.sec-tunnel.com/v4/discover
77.111.247.15
http://www.avantbrowser.com)MOT-V9mm/00.62
unknown
https://server5.duniadekho.barH
unknown
http://www.xmlspy.com)
unknown
https://twopixis.com/watchdog/watchdog.exeno-store
unknown
http://search.msn.com/msnbot.htm)pkcs7:
unknown
https://duniadekho.barTransfer-Encodingtworkpoll
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stun4.l.google.com
74.125.204.127
twopixis.com
172.67.168.112
server5.duniadekho.bar
185.82.216.50
github.com
140.82.121.3
stun.stunprotocol.org
127.0.0.1
cdn.discordapp.com
162.159.134.233
api.sec-tunnel.com
77.111.247.15
objects.githubusercontent.com
185.199.110.133
ec87b504-92ea-4d22-a937-161700799581.uuid.duniadekho.bar
unknown

IPs

IP
Domain
Country
Malicious
172.67.168.112
twopixis.com
United States
77.68.94.106
unknown
United Kingdom
140.82.121.3
github.com
United States
62.210.99.238
unknown
France
185.82.216.50
server5.duniadekho.bar
Bulgaria
147.135.65.26
unknown
United States
74.125.204.127
stun4.l.google.com
United States
51.159.136.111
unknown
France
158.69.205.247
unknown
Canada
104.21.54.103
unknown
United States
77.111.247.15
api.sec-tunnel.com
Norway
185.199.110.133
objects.githubusercontent.com
Netherlands
77.111.247.137
unknown
Norway
127.0.0.1
stun.stunprotocol.org
unknown
162.159.134.233
cdn.discordapp.com
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
csrss
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
Servers
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
UUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
FirstInstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
ServiceVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PGDSE
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
ServersVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
OSCaption
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
OSArchitecture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
IsAdmin
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
AV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PatchTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
CPU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
GPU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
DistributorID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
CampaignID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Uninstaller
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Uninstaller
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Uninstaller
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
SB
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
UUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PGDSE
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\e4d2c4f7
PC
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
DelegateExecute
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
DelegateExecute
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4141000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
3EF1000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
3ED1000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
4141000
direct allocation
page read and write
malicious
52AB000
heap
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
D0CE000
direct allocation
page read and write
71A11000
unkown
page write copy
C7AE000
direct allocation
page read and write
DBD4000
direct allocation
page read and write
711E7000
unkown
page write copy
C468000
direct allocation
page read and write
4696000
heap
page read and write
3D01000
heap
page read and write
C620000
direct allocation
page read and write
49F1000
trusted library allocation
page read and write
2269BF20000
heap
page read and write
7FF57F437000
unkown
page readonly
4906000
heap
page read and write
6C8E6000
unkown
page read and write
766E000
stack
page read and write
486E000
stack
page read and write
2D50000
unclassified section
page readonly
8435000
trusted library allocation
page read and write
DBE4000
direct allocation
page read and write
C690000
direct allocation
page read and write
108F000
heap
page read and write
C5EC000
direct allocation
page read and write
1074000
heap
page read and write
719C2000
unkown
page read and write
86BD000
stack
page read and write
C52E000
direct allocation
page read and write
C790000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
3280000
heap
page read and write
284231E0000
trusted library allocation
page read and write
DC54000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C5D1000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28CD000
trusted library allocation
page execute and read and write
D794000
direct allocation
page read and write
D6B4000
direct allocation
page read and write
711F8000
unkown
page write copy
28423040000
trusted library allocation
page read and write
C5A2000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
711B5000
unkown
page read and write
28423040000
trusted library allocation
page read and write
C920000
direct allocation
page read and write
2240AE00000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6B5CD000
unkown
page execute read
1F0000
unclassified section
page readonly
28423040000
trusted library allocation
page read and write
CA00000
direct allocation
page read and write
CFAE000
direct allocation
page read and write
C518000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C592000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6C7D0000
unkown
page write copy
C87E000
direct allocation
page read and write
71A0D000
unkown
page read and write
DC04000
direct allocation
page read and write
DA84000
direct allocation
page read and write
C5FA000
direct allocation
page read and write
6C5D6000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
1096000
heap
page read and write
2240AD02000
unkown
page read and write
6CA0F000
unkown
page read and write
6E8B000
heap
page read and write
28423040000
trusted library allocation
page read and write
2F8E000
stack
page read and write
D214000
direct allocation
page read and write
4E41000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C6A0000
direct allocation
page read and write
7FF57F445000
unkown
page readonly
28423040000
trusted library allocation
page read and write
C46E000
direct allocation
page read and write
C480000
direct allocation
page read and write
6C90A000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
719D1000
unkown
page write copy
7FF57F3FC000
unkown
page readonly
CE7E000
direct allocation
page read and write
F3B000
heap
page read and write
81C0000
trusted library allocation
page read and write
D294000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6A50000
heap
page read and write
D2D4000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
7134A000
unkown
page read and write
D744000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28F2000
trusted library allocation
page read and write
DA34000
direct allocation
page read and write
6CA2F000
unkown
page write copy
712EA000
unkown
page write copy
816E000
stack
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C93C000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C548000
direct allocation
page read and write
400000
unkown
page readonly
C7B0000
direct allocation
page read and write
C602000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
71ADE000
unkown
page write copy
7620000
trusted library allocation
page execute and read and write
711B8000
unkown
page read and write
6C5D3000
unkown
page read and write
8422000
trusted library allocation
page read and write
7FF57F434000
unkown
page readonly
1051000
heap
page read and write
28423040000
trusted library allocation
page read and write
6B502000
unkown
page write copy
F19000
heap
page read and write
284231E0000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
C618000
direct allocation
page read and write
4FD000
stack
page read and write
3CBD000
heap
page read and write
4305000
direct allocation
page read and write
CA4E000
direct allocation
page read and write
25CE000
stack
page read and write
6A8E5000
unkown
page read and write
6C361000
unkown
page read and write
D7E4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
4D9E000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
8660000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
19C000
stack
page read and write
7094E000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
CA8E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
CF8E000
direct allocation
page read and write
6C7A2000
unkown
page write copy
45D0000
heap
page read and write
1096000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
CDF4000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
109D000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C7EA000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
DD84000
direct allocation
page read and write
D4B4000
direct allocation
page read and write
DA94000
direct allocation
page read and write
485F000
heap
page read and write
7090C000
unkown
page write copy
257E000
unkown
page read and write
C656000
direct allocation
page read and write
EF8000
heap
page read and write
482B000
stack
page read and write
284231E0000
trusted library allocation
page read and write
D634000
direct allocation
page read and write
8430000
trusted library allocation
page read and write
28C3000
trusted library allocation
page execute and read and write
C71C000
direct allocation
page read and write
6BB80000
unkown
page write copy
1097000
heap
page read and write
28423040000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
6E3000
unkown
page write copy
28423040000
trusted library allocation
page read and write
3602000
heap
page read and write
C6B2000
direct allocation
page read and write
6C696000
unkown
page write copy
2A50000
heap
page read and write
284231E0000
trusted library allocation
page read and write
6CA10000
unkown
page write copy
28423040000
trusted library allocation
page read and write
107A000
heap
page read and write
6CA70000
unkown
page write copy
28423040000
trusted library allocation
page read and write
6DFB000
heap
page read and write
7093A000
unkown
page read and write
267E000
stack
page read and write
C688000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
70901000
unkown
page read and write
6CA1B000
unkown
page write copy
CFBE000
direct allocation
page read and write
400000
unkown
page readonly
28423040000
trusted library allocation
page read and write
55CE000
heap
page read and write
C900000
direct allocation
page read and write
1090000
heap
page read and write
28423040000
trusted library allocation
page read and write
719D4000
unkown
page read and write
28423040000
trusted library allocation
page read and write
CADE000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
8252000
heap
page read and write
6EB9000
heap
page read and write
7FF769B9F000
unkown
page readonly
D15000
unkown
page readonly
1E0000
unclassified section
page readonly
C50E000
direct allocation
page read and write
DC94000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
8660000
trusted library allocation
page read and write
30000
heap
page read and write
284231E0000
trusted library allocation
page read and write
27EC000
heap
page read and write
2BAC000
stack
page read and write
C47A000
direct allocation
page read and write
C6AA000
direct allocation
page read and write
70923000
unkown
page write copy
6DF3000
heap
page read and write
719DA000
unkown
page read and write
7FF57F3D0000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6E31000
heap
page read and write
28423040000
trusted library allocation
page read and write
73BC000
stack
page read and write
C474000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
D8B4000
direct allocation
page read and write
5371000
heap
page read and write
D08E000
direct allocation
page read and write
D494000
direct allocation
page read and write
4575000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C624000
direct allocation
page read and write
2240AB60000
unkown
page readonly
A53000
unkown
page readonly
7FF57F463000
unkown
page readonly
28423040000
trusted library allocation
page read and write
1059000
heap
page read and write
719B0000
unkown
page readonly
286AD3A0000
heap
page read and write
C832000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
8690000
trusted library allocation
page read and write
71000
unkown
page execute read
4575000
direct allocation
page read and write
C4AC000
direct allocation
page read and write
C46E000
direct allocation
page read and write
2240ABC0000
unkown
page read and write
34F0000
heap
page read and write
1C0000
heap
page read and write
CDAE000
direct allocation
page read and write
C620000
direct allocation
page read and write
1C0000
heap
page read and write
284231E0000
trusted library allocation
page read and write
10000
unclassified section
page readonly
C6C2000
direct allocation
page read and write
2240AC40000
unkown
page read and write
401000
unkown
page execute read
711EF000
unkown
page read and write
C830000
direct allocation
page read and write
400000
unkown
page execute and read and write
2CDD000
stack
page read and write
284231E0000
trusted library allocation
page read and write
C65E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
3D00000
direct allocation
page read and write
6B515000
unkown
page read and write
C61C000
direct allocation
page read and write
CF4E000
direct allocation
page read and write
6B60E000
unkown
page readonly
D404000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
50DE000
heap
page read and write
C4B2000
direct allocation
page read and write
CD2E000
direct allocation
page read and write
F2F000
heap
page read and write
2C50000
unclassified section
page readonly
7FF57F3DE000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
C528000
direct allocation
page read and write
400000
unkown
page readonly
C472000
direct allocation
page read and write
711AD000
unkown
page read and write
D00E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
711EB000
unkown
page read and write
3CB9000
heap
page read and write
28423040000
trusted library allocation
page read and write
5504000
heap
page read and write
F2F000
heap
page read and write
2EF0000
unclassified section
page readonly
8430000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
D984000
direct allocation
page read and write
D734000
direct allocation
page read and write
71AF9000
unkown
page write copy
C5DC000
direct allocation
page read and write
7191E000
unkown
page readonly
28423040000
trusted library allocation
page read and write
C696000
direct allocation
page read and write
6BB82000
unkown
page read and write
28423040000
trusted library allocation
page read and write
51E5000
heap
page read and write
6BC32000
unkown
page execute read
C59E000
direct allocation
page read and write
C58A000
direct allocation
page read and write
4F4A000
trusted library allocation
page read and write
C888000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
5479000
heap
page read and write
C564000
direct allocation
page read and write
6A823000
unkown
page read and write
4905000
heap
page read and write
C5AA000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C540000
direct allocation
page read and write
8236000
heap
page read and write
71283000
unkown
page read and write
2CE80000
trusted library allocation
page read and write
19C000
stack
page read and write
6E44000
heap
page read and write
284231E0000
trusted library allocation
page read and write
6C5C9000
unkown
page read and write
28423040000
trusted library allocation
page read and write
DB34000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C50A000
direct allocation
page read and write
C514000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
CF7E000
direct allocation
page read and write
400000
unkown
page execute and read and write
7109F000
unkown
page read and write
70938000
unkown
page write copy
711B4000
unkown
page write copy
2798000
heap
page read and write
71291000
unkown
page read and write
719EA000
unkown
page write copy
55A0000
heap
page read and write
D514000
direct allocation
page read and write
CB1E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C480000
direct allocation
page read and write
6E66000
heap
page read and write
28423040000
trusted library allocation
page read and write
6E57000
heap
page read and write
D924000
direct allocation
page read and write
7097C000
unkown
page write copy
D15000
unkown
page readonly
28423040000
trusted library allocation
page read and write
20000
unclassified section
page readonly
719D7000
unkown
page write copy
C714000
direct allocation
page read and write
71A96000
unkown
page read and write
C80A000
direct allocation
page read and write
C518000
direct allocation
page read and write
3CEA000
heap
page read and write
707E000
stack
page read and write
2269BED5000
heap
page read and write
C584000
direct allocation
page read and write
6C8E7000
unkown
page write copy
CF9E000
direct allocation
page read and write
C61C000
direct allocation
page read and write
8660000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
5161000
heap
page read and write
284231E0000
trusted library allocation
page read and write
4267000
heap
page read and write
6C93C000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
2CDB0000
trusted library allocation
page read and write
711DB000
unkown
page write copy
401000
unkown
page execute read
6C89B000
unkown
page read and write
719E8000
unkown
page write copy
D6A4000
direct allocation
page read and write
7122F000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
1A924600000
heap
page read and write
C71C000
direct allocation
page read and write
719FB000
unkown
page write copy
6C4B0000
unkown
page execute read
19DE9DF0000
heap
page read and write
80E0000
trusted library allocation
page execute and read and write
19C000
stack
page read and write
4605000
heap
page read and write
C60C000
direct allocation
page read and write
CB4E000
direct allocation
page read and write
6A801000
unkown
page read and write
D564000
direct allocation
page read and write
80D000
unkown
page write copy
C4D6000
direct allocation
page read and write
D15000
unkown
page readonly
2240AC13000
unkown
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
515D000
heap
page read and write
6E1D000
heap
page read and write
CAEE000
direct allocation
page read and write
F19000
heap
page read and write
D7C4000
direct allocation
page read and write
6C96A000
unkown
page read and write
8463000
trusted library allocation
page read and write
71AB9000
unkown
page read and write
400000
unkown
page execute and read and write
71A03000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
41CC000
stack
page read and write
59C2000
heap
page read and write
420C000
stack
page read and write
28423040000
trusted library allocation
page read and write
E04000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C4AA000
direct allocation
page read and write
330000
unclassified section
page readonly
7FF57F3BF000
unkown
page readonly
C81A000
direct allocation
page read and write
DCE4000
direct allocation
page read and write
2240AB60000
unkown
page readonly
C7CC000
direct allocation
page read and write
28B0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
7FF57F33C000
unkown
page readonly
6E7E000
heap
page read and write
C790000
direct allocation
page read and write
D800000
direct allocation
page read and write
6FD0000
heap
page execute and read and write
6C369000
unkown
page write copy
DA64000
direct allocation
page read and write
DA54000
direct allocation
page read and write
C880000
direct allocation
page read and write
C693000
direct allocation
page read and write
C642000
direct allocation
page read and write
719B1000
unkown
page read and write
CB3E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
CF2E000
direct allocation
page read and write
6AEC9BE000
stack
page read and write
CF5E000
direct allocation
page read and write
6CA89000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
286AD43F000
heap
page read and write
711E3000
unkown
page read and write
5FD8000
heap
page read and write
401000
unkown
page execute read
C6B0000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
81C9000
trusted library allocation
page read and write
3C71000
heap
page read and write
7093C000
unkown
page read and write
6BB41000
unkown
page read and write
340000
heap
page read and write
CACE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C5F2000
direct allocation
page read and write
51A3000
heap
page read and write
D654000
direct allocation
page read and write
8020000
trusted library allocation
page read and write
DB14000
direct allocation
page read and write
53E000
stack
page read and write
4A2D0FF000
stack
page read and write
CE2E000
direct allocation
page read and write
610000
heap
page read and write
7093B000
unkown
page write copy
71AB7000
unkown
page read and write
3D01000
heap
page read and write
2947000
heap
page read and write
C4B8000
direct allocation
page read and write
C5FA000
direct allocation
page read and write
104F000
heap
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
5051000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C57C000
direct allocation
page read and write
C468000
direct allocation
page read and write
712B4000
unkown
page read and write
81C0000
trusted library allocation
page read and write
C650000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
109B000
heap
page read and write
28423040000
trusted library allocation
page read and write
D7F4000
direct allocation
page read and write
C7B2000
direct allocation
page read and write
C67B000
direct allocation
page read and write
4E76000
trusted library allocation
page read and write
D09E000
direct allocation
page read and write
4838000
heap
page read and write
C79E000
direct allocation
page read and write
4308000
direct allocation
page read and write
70934000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
19DE9F2F000
heap
page read and write
28423040000
trusted library allocation
page read and write
6C78C000
unkown
page read and write
6C928000
unkown
page write copy
C784000
direct allocation
page read and write
CE9E000
direct allocation
page read and write
D754000
direct allocation
page read and write
6C6D9000
unkown
page read and write
D9A4000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6E85000
heap
page read and write
C652000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
711C7000
unkown
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C4B4000
direct allocation
page read and write
8262000
heap
page read and write
70905000
unkown
page write copy
6BBEC000
unkown
page write copy
C4B6000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6CA83000
unkown
page read and write
511F000
heap
page read and write
30000
heap
page read and write
400000
unkown
page execute and read and write
711AC000
unkown
page write copy
712A8000
unkown
page write copy
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
48AE000
stack
page read and write
1C0000
unclassified section
page readonly
71A98000
unkown
page write copy
28423040000
trusted library allocation
page read and write
F2D000
heap
page read and write
420000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
C64E000
direct allocation
page read and write
1F0000
unclassified section
page readonly
28423040000
trusted library allocation
page read and write
6CA22000
unkown
page write copy
CBBE000
direct allocation
page read and write
59C3000
heap
page read and write
D3C4000
direct allocation
page read and write
C695000
direct allocation
page read and write
F2F000
heap
page read and write
284231E0000
trusted library allocation
page read and write
51E6000
heap
page read and write
7129E000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
7FF57F3D4000
unkown
page readonly
C85C000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C57C000
direct allocation
page read and write
3ED000
stack
page read and write
C616000
direct allocation
page read and write
1F0000
unclassified section
page readonly
C817000
direct allocation
page read and write
712B0000
unkown
page read and write
D2C4000
direct allocation
page read and write
400000
unkown
page execute and read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
412E000
stack
page read and write
C838000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
4115000
heap
page read and write
284231E0000
trusted library allocation
page read and write
826A000
heap
page read and write
C9EE000
direct allocation
page read and write
8430000
trusted library allocation
page read and write
6C491000
unkown
page read and write
E13000
heap
page read and write
401000
unkown
page execute read
70000
unkown
page readonly
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
2B6C000
stack
page read and write
C650000
direct allocation
page read and write
4740000
heap
page execute and read and write
4882000
heap
page read and write
8680000
trusted library allocation
page read and write
3CBC000
heap
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
3D00000
direct allocation
page read and write
D694000
direct allocation
page read and write
71A57000
unkown
page write copy
D724000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C7B2000
direct allocation
page read and write
DCD4000
direct allocation
page read and write
6C5C0000
unkown
page readonly
C632000
direct allocation
page read and write
286AD3A9000
heap
page read and write
D0B2000
direct allocation
page read and write
71225000
unkown
page read and write
6CA7B000
unkown
page read and write
C884000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
8660000
trusted library allocation
page read and write
2C46000
heap
page read and write
401000
unkown
page execute read
82D8000
heap
page read and write
C9BC000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
25D5000
heap
page read and write
6E4E000
heap
page read and write
3A90000
direct allocation
page read and write
286AEDF0000
heap
page read and write
C598000
direct allocation
page read and write
6C7D4000
unkown
page write copy
109A000
heap
page read and write
28423040000
trusted library allocation
page read and write
108E000
heap
page read and write
1F0000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
2C46000
heap
page read and write
284231E0000
trusted library allocation
page read and write
D2F991B000
stack
page read and write
82FC000
heap
page read and write
327F000
stack
page read and write
6A7C0000
unkown
page readonly
D354000
direct allocation
page read and write
72FE000
stack
page read and write
4A2D07B000
stack
page read and write
28423040000
trusted library allocation
page read and write
817B000
trusted library allocation
page read and write
D9E4000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
D092000
direct allocation
page read and write
C7CA000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
DAF4000
direct allocation
page read and write
28CE000
stack
page read and write
C5EA000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C608000
direct allocation
page read and write
286AED40000
heap
page read and write
400000
unkown
page readonly
5981000
heap
page read and write
3CE7000
heap
page read and write
C646000
direct allocation
page read and write
C9AC000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6B3D1000
unkown
page read and write
6C7F9000
unkown
page write copy
6E8F000
heap
page read and write
C7E6000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
E04000
heap
page read and write
C64C000
direct allocation
page read and write
C5A2000
direct allocation
page read and write
C708000
direct allocation
page read and write
C5FE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
DD94000
direct allocation
page read and write
486A000
heap
page read and write
7FF57F322000
unkown
page readonly
4178000
trusted library allocation
page read and write
2880000
unclassified section
page readonly
C6E8000
direct allocation
page read and write
81C0000
trusted library allocation
page read and write
704F7000
unkown
page execute read
704F3000
unkown
page read and write
6AECCFE000
stack
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
7FF769B70000
unkown
page readonly
CB5F5BA000
stack
page read and write
706D5000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6CA90000
unkown
page write copy
43CB000
direct allocation
page read and write
8470000
trusted library allocation
page read and write
6CA0C000
unkown
page write copy
711E0000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
711E1000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
71191000
unkown
page read and write
2240AC02000
unkown
page read and write
C5AA000
direct allocation
page read and write
C5FA000
direct allocation
page read and write
CB5F8FD000
stack
page read and write
9C000
stack
page read and write
71A93000
unkown
page read and write
711E6000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
D594000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6BB7F000
unkown
page read and write
D454000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C52A000
direct allocation
page read and write
6A821000
unkown
page write copy
6EA8000
heap
page read and write
19C000
stack
page read and write
71A3E000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
719F5000
unkown
page read and write
829E000
heap
page read and write
3CBC000
heap
page read and write
28423040000
trusted library allocation
page read and write
D4E4000
direct allocation
page read and write
21AB000
stack
page read and write
284231E0000
trusted library allocation
page read and write
8440000
trusted library allocation
page execute and read and write
7FF57ED57000
unkown
page readonly
6C7D3000
unkown
page read and write
5FD1000
heap
page read and write
28423040000
trusted library allocation
page read and write
CC68000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6B3D0000
unkown
page readonly
D334000
direct allocation
page read and write
81C0000
trusted library allocation
page read and write
6E87000
heap
page read and write
CEEE000
direct allocation
page read and write
FB1000
unkown
page execute read
28423040000
trusted library allocation
page read and write
6E69000
heap
page read and write
3D00000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C666000
direct allocation
page read and write
12B1000
unkown
page write copy
C5D1000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
1065000
heap
page read and write
71FE000
stack
page read and write
19C000
stack
page read and write
C7BC000
direct allocation
page read and write
1A924680000
heap
page read and write
D644000
direct allocation
page read and write
D9D4000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
711FE000
unkown
page read and write
2F6D000
stack
page read and write
284231E0000
trusted library allocation
page read and write
4790000
heap
page read and write
109D000
heap
page read and write
C808000
direct allocation
page read and write
DC74000
direct allocation
page read and write
C594000
direct allocation
page read and write
C675000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
CA7E000
direct allocation
page read and write
6B23F000
unkown
page execute read
284231E0000
trusted library allocation
page read and write
7FF57F3EA000
unkown
page readonly
719F9000
unkown
page write copy
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
71341000
unkown
page read and write
7098C000
unkown
page write copy
C912000
direct allocation
page read and write
27F6000
heap
page read and write
28423040000
trusted library allocation
page read and write
CB5FAFE000
stack
page read and write
6C8D9000
unkown
page read and write
D0AE000
direct allocation
page read and write
71883000
unkown
page execute read
3D00000
direct allocation
page read and write
6C640000
unkown
page readonly
6B3D7000
unkown
page write copy
7FF769B71000
unkown
page execute read
D824000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6C4AF000
unkown
page read and write
27C8000
heap
page read and write
28423040000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
4328000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
1F0000
unclassified section
page readonly
550C000
heap
page read and write
E13000
heap
page read and write
503E000
heap
page read and write
286AD3D7000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C4CC000
direct allocation
page read and write
4AAB000
heap
page read and write
C780000
direct allocation
page read and write
6CA81000
unkown
page write copy
19DE9EE8000
heap
page read and write
538D000
trusted library allocation
page read and write
7130C000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
320F000
stack
page read and write
286AD419000
heap
page read and write
28423040000
trusted library allocation
page read and write
43CB000
direct allocation
page read and write
6C664000
unkown
page write copy
1CA7000
heap
page read and write
6EAA000
heap
page read and write
19C000
stack
page read and write
F00000
heap
page read and write
6F1E000
stack
page read and write
DCB4000
direct allocation
page read and write
711C4000
unkown
page write copy
28423040000
trusted library allocation
page read and write
719DF000
unkown
page read and write
C69E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
3D47000
heap
page read and write
10A2000
heap
page read and write
C5A8000
direct allocation
page read and write
401000
unkown
page execute read
C5D1000
direct allocation
page read and write
DD24000
direct allocation
page read and write
DB04000
direct allocation
page read and write
EF8000
heap
page read and write
DAE4000
direct allocation
page read and write
70932000
unkown
page read and write
DDA4000
direct allocation
page read and write
D384000
direct allocation
page read and write
712A5000
unkown
page read and write
81C5000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C60A000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
2890000
heap
page read and write
2240AB50000
unkown
page readonly
45E9000
heap
page read and write
809D000
stack
page read and write
4F1D000
trusted library allocation
page read and write
C59E000
direct allocation
page read and write
C560000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C820000
direct allocation
page read and write
C61A000
direct allocation
page read and write
108F000
heap
page read and write
71A95000
unkown
page write copy
2805000
heap
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
CD6E000
direct allocation
page read and write
9C000
stack
page read and write
C82E000
direct allocation
page read and write
CE8E000
direct allocation
page read and write
C712000
direct allocation
page read and write
71ABA000
unkown
page write copy
CEFE000
direct allocation
page read and write
286AD453000
heap
page read and write
C4F2000
direct allocation
page read and write
286AD433000
heap
page read and write
36C2000
heap
page read and write
284231E0000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
30000
heap
page read and write
CEAE000
direct allocation
page read and write
401000
unkown
page execute read
10000
unclassified section
page readonly
3C39000
heap
page read and write
80D000
unkown
page write copy
4745000
heap
page execute and read and write
35C0000
heap
page read and write
C58C000
direct allocation
page read and write
6A794000
unkown
page read and write
4838000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
CF0E000
direct allocation
page read and write
E13000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C628000
direct allocation
page read and write
CFEE000
direct allocation
page read and write
1A924673000
heap
page read and write
C7B4000
direct allocation
page read and write
C8B4000
direct allocation
page read and write
8430000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
1054000
heap
page read and write
C94C000
direct allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C822000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
13DE000
unkown
page readonly
CF3E000
direct allocation
page read and write
5991000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6B516000
unkown
page execute read
DF7000
heap
page read and write
1A924676000
heap
page read and write
51A3000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C628000
direct allocation
page read and write
71A23000
unkown
page write copy
C6BA000
direct allocation
page read and write
28C0000
trusted library allocation
page read and write
71319000
unkown
page read and write
C6AA000
direct allocation
page read and write
E04000
heap
page read and write
D0EE000
direct allocation
page read and write
C892000
direct allocation
page read and write
6AECF7C000
stack
page read and write
825E000
heap
page read and write
71217000
unkown
page write copy
C90A000
direct allocation
page read and write
7FF769BB3000
unkown
page write copy
6BB5C000
unkown
page write copy
C68F000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6A7B6000
unkown
page readonly
D4F4000
direct allocation
page read and write
F42000
heap
page read and write
401000
unkown
page execute read
10000
unclassified section
page readonly
CC2E000
direct allocation
page read and write
7FF57F3DE000
unkown
page readonly
28423040000
trusted library allocation
page read and write
D15000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6EAD000
heap
page read and write
6E8D000
heap
page read and write
753E000
stack
page read and write
70982000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
6DE9000
heap
page read and write
1C02000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C5D6000
direct allocation
page read and write
4A2CCFE000
stack
page read and write
CBAE000
direct allocation
page read and write
7FF57F463000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6C5D2000
unkown
page write copy
C4F4000
direct allocation
page read and write
3D0000
unkown
page readonly
1C0000
heap
page read and write
4F3F000
trusted library allocation
page read and write
4F0E000
trusted library allocation
page read and write
2ADF000
stack
page read and write
4578000
direct allocation
page read and write
6B509000
unkown
page read and write
28423040000
trusted library allocation
page read and write
C600000
direct allocation
page read and write
711F1000
unkown
page read and write
29DF000
unkown
page read and write
759000
unkown
page write copy
8322000
heap
page read and write
28F5000
trusted library allocation
page execute and read and write
74FE000
stack
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
EF0000
unclassified section
page readonly
6F50000
heap
page read and write
6B3D2000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
2CF00000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
D2F9DFB000
stack
page read and write
36BE000
heap
page read and write
3D09000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
D2F9CFE000
stack
page read and write
C858000
direct allocation
page read and write
C558000
direct allocation
page read and write
286AD43F000
heap
page read and write
284231E0000
trusted library allocation
page read and write
2AF1000
heap
page read and write
284231E0000
trusted library allocation
page read and write
400000
unkown
page readonly
3000000
heap
page read and write
C5AA000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
F68000
heap
page read and write
8470000
trusted library allocation
page read and write
3891000
heap
page read and write
6C985000
unkown
page read and write
4E0000
unclassified section
page readonly
2269BF70000
heap
page read and write
2240AC00000
unkown
page read and write
8450000
trusted library allocation
page read and write
71A85000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
C502000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
30000
heap
page read and write
284231E0000
trusted library allocation
page read and write
CFCE000
direct allocation
page read and write
CF54000
direct allocation
page read and write
A53000
unkown
page readonly
C870000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
A53000
unkown
page readonly
D304000
direct allocation
page read and write
19C000
stack
page read and write
284231E0000
trusted library allocation
page read and write
71000
unkown
page execute read
71A48000
unkown
page write copy
8470000
trusted library allocation
page read and write
C4B4000
direct allocation
page read and write
290E000
stack
page read and write
20000
unclassified section
page readonly
6CA7C000
unkown
page write copy
28423040000
trusted library allocation
page read and write
550C000
heap
page read and write
86A0000
trusted library allocation
page read and write
D854000
direct allocation
page read and write
C5A6000
direct allocation
page read and write
E04000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C908000
direct allocation
page read and write
C5A6000
direct allocation
page read and write
6DE56000
unkown
page readonly
5A04000
heap
page read and write
6A0E000
stack
page read and write
5A04000
heap
page read and write
401000
unkown
page execute read
7134B000
unkown
page write copy
CB5F87E000
unkown
page read and write
C7FC000
direct allocation
page read and write
709CC000
unkown
page read and write
8430000
trusted library allocation
page read and write
719E9000
unkown
page read and write
70946000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
C622000
direct allocation
page read and write
D374000
direct allocation
page read and write
C6DC000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
2920000
heap
page readonly
DB74000
direct allocation
page read and write
C89A000
direct allocation
page read and write
711DE000
unkown
page write copy
C6F6000
direct allocation
page read and write
7FF57F42D000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
D0F2000
direct allocation
page read and write
C97A000
direct allocation
page read and write
7FF57F427000
unkown
page readonly
71A50000
unkown
page write copy
107D000
heap
page read and write
28423040000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
283D000
stack
page read and write
6C7CF000
unkown
page read and write
2D9E000
stack
page read and write
6C659000
unkown
page read and write
1A924645000
heap
page read and write
711EC000
unkown
page write copy
6E9F000
heap
page read and write
6A89A000
unkown
page write copy
43CB000
direct allocation
page read and write
6CE2000
heap
page read and write
28423040000
trusted library allocation
page read and write
2240AA50000
heap
page read and write
8180000
trusted library allocation
page read and write
400000
unkown
page readonly
C82A000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
2AE0000
unclassified section
page readonly
C6C6000
direct allocation
page read and write
9C000
stack
page read and write
D7B4000
direct allocation
page read and write
70931000
unkown
page write copy
2120000
unclassified section
page readonly
5051000
heap
page read and write
DB64000
direct allocation
page read and write
8430000
trusted library allocation
page read and write
30000
heap
page read and write
C62E000
direct allocation
page read and write
2240AB50000
unkown
page readonly
C6F6000
direct allocation
page read and write
D584000
direct allocation
page read and write
DA04000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6B3EB000
unkown
page read and write
4578000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
EF0000
heap
page read and write
6A812000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
71A3D000
unkown
page write copy
7122A000
unkown
page read and write
C815000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
70650000
unkown
page readonly
7580000
trusted library allocation
page read and write
C8A0000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
719BA000
unkown
page write copy
28423040000
trusted library allocation
page read and write
CE6E000
direct allocation
page read and write
6C981000
unkown
page write copy
70924000
unkown
page read and write
C6FE000
direct allocation
page read and write
C64A000
direct allocation
page read and write
4F86000
heap
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C694000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6E3B000
heap
page read and write
CB5FBFF000
stack
page read and write
284231E0000
trusted library allocation
page read and write
C70C000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C79C000
direct allocation
page read and write
D664000
direct allocation
page read and write
3CBA000
heap
page read and write
E04000
heap
page read and write
6CA78000
unkown
page read and write
286AD3D9000
heap
page read and write
71891000
unkown
page execute read
C63E000
direct allocation
page read and write
1A9245A0000
trusted library allocation
page read and write
29F0000
heap
page read and write
A53000
unkown
page readonly
6E76000
heap
page read and write
28423040000
trusted library allocation
page read and write
400000
unkown
page readonly
709CD000
unkown
page execute read
812E000
stack
page read and write
3AB0000
direct allocation
page read and write
712B1000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C70F000
direct allocation
page read and write
6A4E000
stack
page read and write
2240A9E0000
heap
page read and write
C4AE000
direct allocation
page read and write
C80C000
direct allocation
page read and write
6C78E000
unkown
page write copy
6E1B000
heap
page read and write
CAFE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
66A107B000
stack
page read and write
286AD3CD000
heap
page read and write
1A924613000
heap
page read and write
CC8E000
direct allocation
page read and write
3CE7000
heap
page read and write
28423040000
trusted library allocation
page read and write
C634000
direct allocation
page read and write
C7BE000
direct allocation
page read and write
2CE80000
trusted library allocation
page read and write
48C4000
heap
page read and write
711C0000
unkown
page read and write
1C08000
heap
page read and write
D964000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C700000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C4B2000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
711DD000
unkown
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C5A0000
direct allocation
page read and write
ECC000
stack
page read and write
6C9A5000
unkown
page read and write
45D0000
heap
page read and write
104F000
heap
page read and write
CAAE000
direct allocation
page read and write
8430000
trusted library allocation
page execute and read and write
4A3B000
heap
page read and write
28423040000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
DB94000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
7FF57F3A5000
unkown
page readonly
6E6F000
heap
page read and write
2800000
heap
page read and write
2240AC4B000
unkown
page read and write
D904000
direct allocation
page read and write
109D000
heap
page read and write
DCF4000
direct allocation
page read and write
4A2CE76000
stack
page read and write
284231E0000
trusted library allocation
page read and write
13D8000
unkown
page write copy
43CB000
direct allocation
page read and write
C616000
direct allocation
page read and write
CD3E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
71297000
unkown
page read and write
D02E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
26C0000
heap
page read and write
C612000
direct allocation
page read and write
D394000
direct allocation
page read and write
863E000
stack
page read and write
6C894000
unkown
page write copy
43CB000
direct allocation
page read and write
82CA000
heap
page read and write
284231E0000
trusted library allocation
page read and write
10000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
6C890000
unkown
page read and write
1A924702000
heap
page read and write
28423040000
trusted library allocation
page read and write
F31000
heap
page read and write
CC9E000
direct allocation
page read and write
3D00000
direct allocation
page read and write
12BD000
unkown
page readonly
1085000
heap
page read and write
70659000
unkown
page read and write
8430000
trusted library allocation
page read and write
2240AE00000
unkown
page readonly
CA9E000
direct allocation
page read and write
487A000
heap
page read and write
C48C000
direct allocation
page read and write
5227000
heap
page read and write
CF6E000
direct allocation
page read and write
C4A6000
direct allocation
page read and write
8220000
heap
page read and write
80D000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
C4F8000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
80D000
unkown
page write copy
CA5E000
direct allocation
page read and write
CDCE000
direct allocation
page read and write
1A92462A000
heap
page read and write
4F8E000
heap
page read and write
C66C000
direct allocation
page read and write
C674000
direct allocation
page read and write
C69A000
direct allocation
page read and write
C8FE000
direct allocation
page read and write
6EC4000
heap
page read and write
D15000
unkown
page readonly
C49C000
direct allocation
page read and write
401000
unkown
page execute read
3070000
heap
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
2C941000
heap
page read and write
6E6F000
heap
page read and write
C522000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6C5C1000
unkown
page read and write
30000
heap
page read and write
4F99000
heap
page read and write
719DB000
unkown
page write copy
C800000
direct allocation
page read and write
D0FE000
direct allocation
page read and write
2F0D000
stack
page read and write
6E96000
heap
page read and write
56D000
stack
page read and write
CB5FB7E000
stack
page read and write
D06E000
direct allocation
page read and write
DBC4000
direct allocation
page read and write
5437000
heap
page read and write
1C0000
heap
page read and write
3D47000
heap
page read and write
5227000
heap
page read and write
C68C000
direct allocation
page read and write
D224000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C826000
direct allocation
page read and write
9C000
stack
page read and write
19DEA0C0000
heap
page read and write
284231E0000
trusted library allocation
page read and write
D414000
direct allocation
page read and write
30000
heap
page read and write
82F7000
heap
page read and write
C52C000
direct allocation
page read and write
D4C4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
5015000
heap
page read and write
E13000
heap
page read and write
F19000
heap
page read and write
C984000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
462F000
stack
page read and write
CB5F97E000
stack
page read and write
DC00000
direct allocation
page read and write
C6E6000
direct allocation
page read and write
7121A000
unkown
page read and write
53E4000
trusted library allocation
page read and write
D6F4000
direct allocation
page read and write
D2F991B000
stack
page read and write
70947000
unkown
page read and write
400000
unkown
page execute and read and write
D15000
unkown
page readonly
74BE000
stack
page read and write
6CA40000
unkown
page write copy
1083000
heap
page read and write
DC24000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
5051000
heap
page read and write
28423040000
trusted library allocation
page read and write
C870000
direct allocation
page read and write
2CA31000
heap
page read and write
6A60000
heap
page read and write
1F0000
unclassified section
page readonly
6C9B8000
unkown
page write copy
400000
unkown
page execute and read and write
8010000
trusted library allocation
page read and write
40FA000
heap
page read and write
DB44000
direct allocation
page read and write
D624000
direct allocation
page read and write
C805000
direct allocation
page read and write
C628000
direct allocation
page read and write
D5A4000
direct allocation
page read and write
71097000
unkown
page write copy
28423040000
trusted library allocation
page read and write
7FF57F427000
unkown
page readonly
D574000
direct allocation
page read and write
6C78F000
unkown
page read and write
54BB000
heap
page read and write
4FA5000
heap
page read and write
71ABD000
unkown
page read and write
28423040000
trusted library allocation
page read and write
A53000
unkown
page readonly
C554000
direct allocation
page read and write
1C0A000
heap
page read and write
D7D4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
D6E4000
direct allocation
page read and write
6E31000
heap
page read and write
6C362000
unkown
page write copy
75A0000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
D3F4000
direct allocation
page read and write
28A0000
heap
page read and write
28423040000
trusted library allocation
page read and write
D834000
direct allocation
page read and write
55B0000
heap
page read and write
1A924665000
heap
page read and write
D804000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
D400000
direct allocation
page read and write
3D09000
heap
page read and write
70655000
unkown
page write copy
28423040000
trusted library allocation
page read and write
CC7E000
direct allocation
page read and write
866C000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
CFFE000
direct allocation
page read and write
6C47D000
unkown
page readonly
4F8B000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
4FE6000
heap
page read and write
28423040000
trusted library allocation
page read and write
1097000
heap
page read and write
6C9BC000
unkown
page read and write
4531000
heap
page read and write
C57E000
direct allocation
page read and write
4F36000
trusted library allocation
page read and write
6DF7000
heap
page read and write
C472000
direct allocation
page read and write
DDB4000
direct allocation
page read and write
4F00000
trusted library allocation
page read and write
286AD3C3000
heap
page read and write
6C9A3000
unkown
page write copy
287D000
stack
page read and write
C6A6000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
F4A000
heap
page read and write
C4E6000
direct allocation
page read and write
6E6F000
heap
page read and write
28423040000
trusted library allocation
page read and write
1A924681000
heap
page read and write
30000
heap
page read and write
5238000
trusted library allocation
page read and write
20000
unclassified section
page readonly
28423040000
trusted library allocation
page read and write
80DF000
stack
page read and write
284231E0000
trusted library allocation
page read and write
7FF57F3FC000
unkown
page readonly
53B3000
heap
page read and write
284231E0000
trusted library allocation
page read and write
30E0000
heap
page read and write
6E38000
heap
page read and write
3C9D000
heap
page read and write
C49A000
direct allocation
page read and write
719EF000
unkown
page write copy
2240B191000
unkown
page readonly
6C490000
unkown
page readonly
C504000
direct allocation
page read and write
CECE000
direct allocation
page read and write
453B000
heap
page read and write
C994000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
71AB8000
unkown
page write copy
CDEE000
direct allocation
page read and write
401000
unkown
page execute read
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
7FF57ED57000
unkown
page readonly
6C643000
unkown
page write copy
719F0000
unkown
page read and write
28423040000
trusted library allocation
page read and write
CE4E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
CB48000
direct allocation
page read and write
C562000
direct allocation
page read and write
30000
heap
page read and write
107D000
heap
page read and write
C6D6000
direct allocation
page read and write
1065000
heap
page read and write
C4A0000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
28423040000
trusted library allocation
page read and write
70970000
unkown
page read and write
2BA0000
heap
page read and write
7097B000
unkown
page read and write
6C382000
unkown
page execute read
DBF4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6AECC7E000
stack
page read and write
28423040000
trusted library allocation
page read and write
1CA6000
heap
page read and write
28423040000
trusted library allocation
page read and write
71089000
unkown
page write copy
743E000
stack
page read and write
284231E0000
trusted library allocation
page read and write
1070000
heap
page read and write
6C497000
unkown
page read and write
6A7CA000
unkown
page read and write
28423040000
trusted library allocation
page read and write
1F0000
unclassified section
page readonly
6B5B0000
unkown
page readonly
2F00000
heap
page read and write
2269BF8D000
heap
page read and write
3C3D000
heap
page read and write
4730000
trusted library allocation
page read and write
2240B402000
unkown
page read and write
5007000
heap
page read and write
28423040000
trusted library allocation
page read and write
D934000
direct allocation
page read and write
2940000
heap
page read and write
711E4000
unkown
page write copy
28423040000
trusted library allocation
page read and write
1C01000
heap
page read and write
8326000
heap
page read and write
C61C000
direct allocation
page read and write
C96E000
direct allocation
page read and write
C62C000
direct allocation
page read and write
E40000
unclassified section
page readonly
401000
unkown
page execute read
7FF57F44C000
unkown
page readonly
71222000
unkown
page write copy
8670000
trusted library allocation
page execute and read and write
C950000
direct allocation
page read and write
60E000
stack
page read and write
6EB2000
heap
page read and write
2240ABC0000
unkown
page read and write
C66E000
direct allocation
page read and write
D5B4000
direct allocation
page read and write
C70C000
direct allocation
page read and write
400000
unkown
page readonly
2AF1000
heap
page read and write
C7FA000
direct allocation
page read and write
29C0000
heap
page read and write
711A6000
unkown
page read and write
71A72000
unkown
page write copy
C4C0000
direct allocation
page read and write
6A80C000
unkown
page read and write
8470000
trusted library allocation
page read and write
2E1C0000
trusted library allocation
page read and write
54BB000
heap
page read and write
261E000
stack
page read and write
466E000
stack
page read and write
28423040000
trusted library allocation
page read and write
6CA5F000
unkown
page write copy
71084000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
10000
unclassified section
page readonly
66A127E000
stack
page read and write
711D5000
unkown
page write copy
712A3000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
DD14000
direct allocation
page read and write
43CB000
direct allocation
page read and write
DC14000
direct allocation
page read and write
6E78000
heap
page read and write
6B50B000
unkown
page write copy
6CBF000
stack
page read and write
6C973000
unkown
page read and write
CDBA000
direct allocation
page read and write
6DC9E000
unkown
page execute read
F67000
heap
page read and write
20000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
DAB4000
direct allocation
page read and write
C45A000
direct allocation
page read and write
70999000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
5295000
heap
page read and write
6CA6C000
unkown
page write copy
C8A8000
direct allocation
page read and write
66A117D000
stack
page read and write
28423040000
trusted library allocation
page read and write
C51A000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C936000
direct allocation
page read and write
71093000
unkown
page write copy
C6D0000
direct allocation
page read and write
C67E000
direct allocation
page read and write
4A2CD7E000
stack
page read and write
28423040000
trusted library allocation
page read and write
109E000
heap
page read and write
C4A6000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
D5E8000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6CA1C000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
C69C000
direct allocation
page read and write
6AECE7F000
stack
page read and write
6CA21000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
2240AB70000
heap
page read and write
D2A4000
direct allocation
page read and write
4325000
direct allocation
page read and write
55AA000
heap
page read and write
C6C8000
direct allocation
page read and write
E50000
unclassified section
page readonly
2590000
unclassified section
page readonly
472E000
stack
page read and write
719D5000
unkown
page write copy
C670000
direct allocation
page read and write
6C999000
unkown
page read and write
CC6E000
direct allocation
page read and write
7FF57F445000
unkown
page readonly
8675000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C7E4000
direct allocation
page read and write
75B0000
trusted library allocation
page read and write
40E0000
heap
page read and write
CB58000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
556A000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C79E000
direct allocation
page read and write
71ABF000
unkown
page write copy
C460000
direct allocation
page read and write
CD1E000
direct allocation
page read and write
C780000
direct allocation
page read and write
82E5000
heap
page read and write
3D00000
direct allocation
page read and write
CF1E000
direct allocation
page read and write
D6C4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6E57000
heap
page read and write
2240AC37000
unkown
page read and write
D03E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
704F4000
unkown
page write copy
C65E000
direct allocation
page read and write
D704000
direct allocation
page read and write
20000
unclassified section
page readonly
E13000
heap
page read and write
737E000
stack
page read and write
6E74000
heap
page read and write
75F0000
trusted library allocation
page read and write
C5A2000
direct allocation
page read and write
719F2000
unkown
page write copy
5B42000
trusted library allocation
page read and write
21E8000
stack
page read and write
320000
unclassified section
page readonly
C606000
direct allocation
page read and write
6BB86000
unkown
page read and write
71A1F000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
401000
unkown
page execute read
28423040000
trusted library allocation
page read and write
6C5AF000
unkown
page readonly
28423040000
trusted library allocation
page read and write
C648000
direct allocation
page read and write
C69A000
direct allocation
page read and write
C68F000
direct allocation
page read and write
71190000
unkown
page readonly
9C000
stack
page read and write
E13000
heap
page read and write
CCEE000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
1F0000
unclassified section
page readonly
9C000
stack
page read and write
2FE0000
heap
page read and write
6A7C1000
unkown
page read and write
D944000
direct allocation
page read and write
E13000
heap
page read and write
6C5D9000
unkown
page execute read
28423040000
trusted library allocation
page read and write
6C7F8000
unkown
page read and write
EF0000
heap
page read and write
401000
unkown
page execute read
E04000
heap
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
D9F4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C7AC000
direct allocation
page read and write
7FF57F43B000
unkown
page readonly
6E35000
heap
page read and write
C8A4000
direct allocation
page read and write
C67B000
direct allocation
page read and write
6A8E7000
unkown
page write copy
727E000
stack
page read and write
C8A6000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
7FF57F3CB000
unkown
page readonly
C514000
direct allocation
page read and write
2240AA50000
heap
page read and write
719E6000
unkown
page write copy
1C0000
heap
page read and write
7129D000
unkown
page read and write
28423040000
trusted library allocation
page read and write
C914000
direct allocation
page read and write
1A9243C0000
heap
page read and write
3C92000
heap
page read and write
6BFE000
stack
page read and write
2940000
heap
page read and write
47F7000
heap
page read and write
8290000
heap
page read and write
76AE000
stack
page read and write
401000
unkown
page execute read
6C90B000
unkown
page write copy
1A924672000
heap
page read and write
719C9000
unkown
page write copy
DD74000
direct allocation
page read and write
2240A9F0000
unkown
page readonly
CA3E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C7C6000
direct allocation
page read and write
2DB0000
heap
page read and write
6E5A000
heap
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C8B8000
direct allocation
page read and write
71A04000
unkown
page write copy
2420000
unclassified section
page readonly
4A2CFFE000
stack
page read and write
6E71000
heap
page read and write
CCDE000
direct allocation
page read and write
8660000
trusted library allocation
page read and write
C61A000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C686000
direct allocation
page read and write
71313000
unkown
page read and write
500000
heap
page read and write
D07E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C6A6000
direct allocation
page read and write
6C367000
unkown
page read and write
82CF000
heap
page read and write
28423040000
trusted library allocation
page read and write
26BE000
stack
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6E93000
heap
page read and write
8305000
heap
page read and write
284231E0000
trusted library allocation
page read and write
10A2000
heap
page read and write
28423040000
trusted library allocation
page read and write
2FCE000
stack
page read and write
71A36000
unkown
page read and write
DC64000
direct allocation
page read and write
2790000
heap
page read and write
7FF57F3D4000
unkown
page readonly
C614000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C5AC000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C688000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
712A6000
unkown
page write copy
1F0000
unclassified section
page readonly
7FF57F42D000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
C45E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C49A000
direct allocation
page read and write
800F000
trusted library allocation
page read and write
A53000
unkown
page readonly
70658000
unkown
page write copy
2240AC2A000
unkown
page read and write
69CB000
stack
page read and write
6C73D000
unkown
page write copy
28423040000
trusted library allocation
page read and write
CDA8000
direct allocation
page read and write
71096000
unkown
page read and write
28423040000
trusted library allocation
page read and write
D000000
direct allocation
page read and write
46EE000
stack
page read and write
82E6000
heap
page read and write
70968000
unkown
page read and write
7108A000
unkown
page read and write
70922000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
C4EE000
direct allocation
page read and write
E04000
heap
page read and write
55A0000
heap
page read and write
284231E0000
trusted library allocation
page read and write
2AF0000
unclassified section
page readonly
6C5CD000
unkown
page read and write
28423040000
trusted library allocation
page read and write
7FF769BB6000
unkown
page readonly
6CB27000
unkown
page execute read
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C92C000
direct allocation
page read and write
C54C000
direct allocation
page read and write
C466000
direct allocation
page read and write
C618000
direct allocation
page read and write
71BD000
stack
page read and write
DA74000
direct allocation
page read and write
C6D6000
direct allocation
page read and write
C562000
direct allocation
page read and write
7FF57F441000
unkown
page readonly
9C000
stack
page read and write
32E0000
heap
page read and write
C486000
direct allocation
page read and write
D4D4000
direct allocation
page read and write
C895000
direct allocation
page read and write
1A924430000
heap
page read and write
CC1E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
515B000
heap
page read and write
F3B000
heap
page read and write
28423040000
trusted library allocation
page read and write
70930000
unkown
page read and write
2D980000
trusted library allocation
page read and write
C8A2000
direct allocation
page read and write
C693000
direct allocation
page read and write
C978000
direct allocation
page read and write
8177000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C706000
direct allocation
page read and write
286AEDD5000
heap
page read and write
28423040000
trusted library allocation
page read and write
4980000
heap
page execute and read and write
D5F4000
direct allocation
page read and write
D608000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6CA68000
unkown
page read and write
1F0000
unclassified section
page readonly
F41000
heap
page read and write
284231E0000
trusted library allocation
page read and write
4575000
direct allocation
page read and write
1A924698000
heap
page read and write
109C000
heap
page read and write
C48C000
direct allocation
page read and write
719BF000
unkown
page read and write
31D7000
heap
page read and write
C542000
direct allocation
page read and write
8670000
trusted library allocation
page read and write
1F0000
unclassified section
page readonly
C5EE000
direct allocation
page read and write
CB5E000
direct allocation
page read and write
8470000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
C4D2000
direct allocation
page read and write
711F0000
unkown
page write copy
400000
unkown
page readonly
C5AC000
direct allocation
page read and write
C679000
direct allocation
page read and write
70906000
unkown
page read and write
28423040000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
6CA7E000
unkown
page read and write
6A813000
unkown
page read and write
1C0000
heap
page read and write
6CA84000
unkown
page write copy
28423040000
trusted library allocation
page read and write
2DC0000
heap
page read and write
C47E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6A826000
unkown
page read and write
6B2AB000
unkown
page readonly
C6A2000
direct allocation
page read and write
400000
unkown
page execute and read and write
59DF000
heap
page read and write
CB5FA7E000
stack
page read and write
CC00000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C80A000
direct allocation
page read and write
71000
unkown
page execute read
6B505000
unkown
page read and write
7133E000
unkown
page write copy
6A790000
unkown
page readonly
4570000
heap
page read and write
28423040000
trusted library allocation
page read and write
C8AE000
direct allocation
page read and write
6CA28000
unkown
page write copy
C0000
unclassified section
page readonly
CE1E000
direct allocation
page read and write
2B00000
heap
page read and write
6B5CB000
unkown
page read and write
6CA8C000
unkown
page write copy
1A924677000
heap
page read and write
C5A0000
direct allocation
page read and write
8431000
trusted library allocation
page read and write
D324000
direct allocation
page read and write
7117B000
unkown
page readonly
E60000
heap
page read and write
C6B8000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
DC84000
direct allocation
page read and write
C8EA000
direct allocation
page read and write
70943000
unkown
page read and write
6CA16000
unkown
page read and write
6DE9000
heap
page read and write
5500000
heap
page read and write
CD0E000
direct allocation
page read and write
C9C8000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
20000
unclassified section
page readonly
C727000
direct allocation
page read and write
7030000
trusted library allocation
page read and write
8660000
trusted library allocation
page read and write
D464000
direct allocation
page read and write
C582000
direct allocation
page read and write
C684000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
CC58000
direct allocation
page read and write
286AD455000
heap
page read and write
10000
unclassified section
page readonly
71A0C000
unkown
page write copy
6E6B000
heap
page read and write
D474000
direct allocation
page read and write
3CFD000
heap
page read and write
D234000
direct allocation
page read and write
C52C000
direct allocation
page read and write
8660000
trusted library allocation
page read and write
2882000
heap
page read and write
284231E0000
trusted library allocation
page read and write
712B6000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
2240AC13000
unkown
page read and write
C564000
direct allocation
page read and write
81D0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C688000
direct allocation
page read and write
650000
heap
page read and write
286AD3C8000
heap
page read and write
6CA39000
unkown
page write copy
75C0000
trusted library allocation
page read and write
6E02000
heap
page read and write
D2B4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
71375000
unkown
page read and write
45B1000
heap
page read and write
6B5CA000
unkown
page write copy
D864000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
1A924654000
heap
page read and write
478D000
stack
page read and write
4260000
heap
page read and write
284231E0000
trusted library allocation
page read and write
2240AC20000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
DA24000
direct allocation
page read and write
719E5000
unkown
page read and write
A53000
unkown
page readonly
D0C2000
direct allocation
page read and write
4928000
heap
page read and write
C666000
direct allocation
page read and write
286AD43F000
heap
page read and write
F3B000
heap
page read and write
284231E0000
trusted library allocation
page read and write
D344000
direct allocation
page read and write
108E000
heap
page read and write
284231E0000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
711B7000
unkown
page write copy
C582000
direct allocation
page read and write
CC3E000
direct allocation
page read and write
4551000
heap
page read and write
6AECEFE000
stack
page read and write
6C997000
unkown
page write copy
8470000
trusted library allocation
page read and write
4131000
heap
page read and write
3CFE000
heap
page read and write
7020000
trusted library allocation
page read and write
81C4000
trusted library allocation
page read and write
7440000
heap
page read and write
51A3000
heap
page read and write
E13000
heap
page read and write
4F20000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
F2D000
heap
page read and write
C6CE000
direct allocation
page read and write
CABE000
direct allocation
page read and write
6A7D3000
unkown
page write copy
C48A000
direct allocation
page read and write
C572000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
25BE000
stack
page read and write
C9D2000
direct allocation
page read and write
550F000
heap
page read and write
C686000
direct allocation
page read and write
C70A000
direct allocation
page read and write
71ADC000
unkown
page read and write
D814000
direct allocation
page read and write
CC5E000
direct allocation
page read and write
401000
unkown
page execute read
C8D6000
direct allocation
page read and write
DC34000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6C665000
unkown
page read and write
6B3D6000
unkown
page read and write
C4BC000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6C8E9000
unkown
page read and write
C5FE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
500F000
heap
page read and write
1A924550000
heap
page read and write
3416000
heap
page read and write
28C4000
trusted library allocation
page read and write
D01E000
direct allocation
page read and write
B0000
unclassified section
page readonly
C4B2000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6AEC93C000
stack
page read and write
D3B4000
direct allocation
page read and write
80D000
unkown
page write copy
2240B191000
unkown
page readonly
19DEA0D0000
heap
page read and write
C5D4000
direct allocation
page read and write
71022000
unkown
page readonly
C6CA000
direct allocation
page read and write
70BE000
stack
page read and write
52C2000
trusted library allocation
page read and write
6CA8B000
unkown
page read and write
7FF57F3BF000
unkown
page readonly
C6A8000
direct allocation
page read and write
286AD3F2000
heap
page read and write
28423040000
trusted library allocation
page read and write
D8E4000
direct allocation
page read and write
C800000
direct allocation
page read and write
6C980000
unkown
page read and write
D504000
direct allocation
page read and write
C686000
direct allocation
page read and write
D524000
direct allocation
page read and write
6CA86000
unkown
page read and write
C99E000
direct allocation
page read and write
4A2CC7D000
stack
page read and write
FB0000
unkown
page readonly
C7D0000
direct allocation
page read and write
6B500000
unkown
page readonly
3CEA000
heap
page read and write
6B5C9000
unkown
page read and write
6B507000
unkown
page write copy
6C7A4000
unkown
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
FB1000
unkown
page execute read
C4CA000
direct allocation
page read and write
2CDB0000
trusted library allocation
page read and write
D974000
direct allocation
page read and write
20000
unclassified section
page readonly
6CACA000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
E13000
heap
page read and write
45D0000
heap
page read and write
D082000
direct allocation
page read and write
31D0000
heap
page read and write
C980000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
CE3E000
direct allocation
page read and write
CBFE000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C4B0000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C4B8000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6A7C2000
unkown
page write copy
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
80D000
unkown
page write copy
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6CB26000
unkown
page read and write
286AEDD0000
heap
page read and write
D254000
direct allocation
page read and write
CEDE000
direct allocation
page read and write
DDD4000
direct allocation
page read and write
E13000
heap
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
85FE000
stack
page read and write
C474000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C80E000
direct allocation
page read and write
D0BE000
direct allocation
page read and write
19C000
stack
page read and write
286AD2B0000
heap
page read and write
CB68000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6C638000
unkown
page readonly
8430000
trusted library allocation
page read and write
C62C000
direct allocation
page read and write
C8B6000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6C5D5000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
25F0000
unclassified section
page readonly
C51C000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6C73F000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
C57E000
direct allocation
page read and write
CA2E000
direct allocation
page read and write
DB54000
direct allocation
page read and write
2240AC02000
unkown
page read and write
6A795000
unkown
page execute read
D8F4000
direct allocation
page read and write
6E7A000
heap
page read and write
28423040000
trusted library allocation
page read and write
48ED000
stack
page read and write
28423040000
trusted library allocation
page read and write
717E000
stack
page read and write
CA0E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C584000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
DB24000
direct allocation
page read and write
8327000
heap
page read and write
20000
unclassified section
page readonly
C5A6000
direct allocation
page read and write
6B5C4000
unkown
page write copy
7FF57F3D0000
unkown
page readonly
C5D8000
direct allocation
page read and write
82B2000
heap
page read and write
416F000
stack
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
A53000
unkown
page readonly
C47A000
direct allocation
page read and write
C5F4000
direct allocation
page read and write
286AD433000
heap
page read and write
6C65F000
unkown
page write copy
28423040000
trusted library allocation
page read and write
D6D4000
direct allocation
page read and write
F2F000
heap
page read and write
80D000
unkown
page write copy
719D6000
unkown
page read and write
6E7D000
heap
page read and write
4210000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6C5CA000
unkown
page write copy
7610000
trusted library allocation
page read and write
719E7000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
71A0B000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
70535000
unkown
page readonly
6CAF4000
unkown
page read and write
C4B6000
direct allocation
page read and write
6ECD000
heap
page read and write
28423040000
trusted library allocation
page read and write
3D3F000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
757E000
stack
page read and write
C65A000
direct allocation
page read and write
CDFE000
direct allocation
page read and write
C47E000
direct allocation
page read and write
509B000
heap
page read and write
71B3D000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
401000
unkown
page execute read
6C381000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
3CFD000
heap
page read and write
28423040000
trusted library allocation
page read and write
5269000
heap
page read and write
C5F0000
direct allocation
page read and write
C582000
direct allocation
page read and write
400000
unkown
page execute and read and write
CB7E000
direct allocation
page read and write
EF0000
heap
page read and write
28423040000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
F47000
heap
page read and write
D5E4000
direct allocation
page read and write
6C309000
unkown
page readonly
CBDE000
direct allocation
page read and write
4F0000
unclassified section
page readonly
6E8F000
heap
page read and write
1C0000
heap
page read and write
28423040000
trusted library allocation
page read and write
6A895000
unkown
page read and write
70000
unkown
page readonly
400000
unkown
page execute and read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
D4A4000
direct allocation
page read and write
DD54000
direct allocation
page read and write
9C000
stack
page read and write
C5A4000
direct allocation
page read and write
DD04000
direct allocation
page read and write
59FE000
trusted library allocation
page read and write
1059000
heap
page read and write
C678000
direct allocation
page read and write
CD9E000
direct allocation
page read and write
71286000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
DAA4000
direct allocation
page read and write
CE04000
direct allocation
page read and write
CC78000
direct allocation
page read and write
6E99000
heap
page read and write
C67E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
25D0000
heap
page read and write
28423040000
trusted library allocation
page read and write
6C8D1000
unkown
page read and write
28423040000
trusted library allocation
page read and write
C677000
direct allocation
page read and write
C5D4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
3D00000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6C78B000
unkown
page write copy
4531000
heap
page read and write
D604000
direct allocation
page read and write
C534000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
C584000
direct allocation
page read and write
D04E000
direct allocation
page read and write
6C8D8000
unkown
page write copy
253E000
unkown
page read and write
109C000
heap
page read and write
28423040000
trusted library allocation
page read and write
723E000
stack
page read and write
C4A8000
direct allocation
page read and write
710A0000
unkown
page execute read
6E13000
heap
page read and write
C904000
direct allocation
page read and write
D764000
direct allocation
page read and write
6C3E000
stack
page read and write
71088000
unkown
page read and write
40EC000
heap
page read and write
286AD44A000
heap
page read and write
D244000
direct allocation
page read and write
8470000
trusted library allocation
page read and write
80D000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C684000
direct allocation
page read and write
2269BF9E000
heap
page read and write
1074000
heap
page read and write
28423040000
trusted library allocation
page read and write
D484000
direct allocation
page read and write
20000
unclassified section
page readonly
6C5D4000
unkown
page write copy
28423040000
trusted library allocation
page read and write
6C641000
unkown
page read and write
28423040000
trusted library allocation
page read and write
D5C4000
direct allocation
page read and write
C60C000
direct allocation
page read and write
70651000
unkown
page read and write
719FA000
unkown
page read and write
6CAF5000
unkown
page write copy
4A2CDFE000
stack
page read and write
284231E0000
trusted library allocation
page read and write
D0000
heap
page read and write
6C5D8000
unkown
page read and write
419C000
heap
page read and write
D714000
direct allocation
page read and write
CA6E000
direct allocation
page read and write
6BB88000
unkown
page write copy
2240ABA1000
unkown
page readonly
C6B4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
109B000
heap
page read and write
19C000
stack
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
E04000
heap
page read and write
28423040000
trusted library allocation
page read and write
2CDB0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
401000
unkown
page execute read
7098B000
unkown
page read and write
6BBD3000
unkown
page write copy
6CACB000
unkown
page write copy
81C0000
trusted library allocation
page read and write
401000
unkown
page execute read
1095000
heap
page read and write
284231E0000
trusted library allocation
page read and write
82D3000
heap
page read and write
8660000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
19DE9E60000
heap
page read and write
704F2000
unkown
page write copy
28423040000
trusted library allocation
page read and write
C856000
direct allocation
page read and write
D274000
direct allocation
page read and write
4948000
heap
page read and write
54B6000
heap
page read and write
6C8A3000
unkown
page write copy
800C000
trusted library allocation
page read and write
4655000
heap
page read and write
6CA5E000
unkown
page read and write
CF44000
direct allocation
page read and write
6C89A000
unkown
page write copy
6B3ED000
unkown
page execute read
8470000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6C5C7000
unkown
page write copy
830B000
heap
page read and write
D894000
direct allocation
page read and write
C7AA000
direct allocation
page read and write
C69E000
direct allocation
page read and write
7FF57F437000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
70971000
unkown
page write copy
2F4E000
stack
page read and write
1C0000
heap
page read and write
DBA4000
direct allocation
page read and write
D15000
unkown
page readonly
6CAEF000
unkown
page read and write
6A802000
unkown
page write copy
CF34000
direct allocation
page read and write
825A000
heap
page read and write
719C8000
unkown
page read and write
C9A6000
direct allocation
page read and write
27D1000
heap
page read and write
2BE0000
unclassified section
page readonly
CE5E000
direct allocation
page read and write
C4BA000
direct allocation
page read and write
6C499000
unkown
page write copy
6CA20000
unkown
page write copy
4F06000
trusted library allocation
page read and write
A53000
unkown
page readonly
711D2000
unkown
page write copy
4FD3000
heap
page read and write
C648000
direct allocation
page read and write
2240B402000
unkown
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
1CB8000
heap
page read and write
284231E0000
trusted library allocation
page read and write
D5F8000
direct allocation
page read and write
C554000
direct allocation
page read and write
32E8000
heap
page read and write
711B9000
unkown
page write copy
3D09000
heap
page read and write
28423040000
trusted library allocation
page read and write
CBEE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
DAC4000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C7B0000
direct allocation
page read and write
6C6D8000
unkown
page write copy
6CA38000
unkown
page read and write
C572000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
D0E2000
direct allocation
page read and write
C610000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
D534000
direct allocation
page read and write
1C0F000
heap
page read and write
6A827000
unkown
page write copy
286AD419000
heap
page read and write
6C99F000
unkown
page write copy
109B000
heap
page read and write
DD34000
direct allocation
page read and write
C498000
direct allocation
page read and write
1C0F000
heap
page read and write
1054000
heap
page read and write
109A000
heap
page read and write
6BBEB000
unkown
page read and write
80D000
unkown
page write copy
10000
unclassified section
page readonly
C691000
direct allocation
page read and write
C4A0000
direct allocation
page read and write
D994000
direct allocation
page read and write
80D000
unkown
page write copy
70CDF000
unkown
page execute read
6C697000
unkown
page read and write
8640000
trusted library allocation
page read and write
1A924540000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
C48A000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
711CC000
unkown
page read and write
C622000
direct allocation
page read and write
6C791000
unkown
page write copy
28423040000
trusted library allocation
page read and write
712B5000
unkown
page write copy
C682000
direct allocation
page read and write
417B000
direct allocation
page read and write
4578000
direct allocation
page read and write
57F000
stack
page read and write
6EBD000
heap
page read and write
6A7EA000
unkown
page read and write
C8AA000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
286AD44F000
heap
page read and write
6CA0B000
unkown
page read and write
28423040000
trusted library allocation
page read and write
71294000
unkown
page write copy
704F6000
unkown
page read and write
4A2CF7E000
stack
page read and write
C498000
direct allocation
page read and write
71314000
unkown
page write copy
6A815000
unkown
page write copy
C675000
direct allocation
page read and write
1A924686000
heap
page read and write
46AC000
stack
page read and write
284231E0000
trusted library allocation
page read and write
704F0000
unkown
page readonly
496E000
stack
page read and write
6CA79000
unkown
page write copy
2CDB0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
D5D4000
direct allocation
page read and write
28D9000
trusted library allocation
page read and write
1054000
heap
page read and write
6E6D000
heap
page read and write
DD64000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C695000
direct allocation
page read and write
E04000
heap
page read and write
109E000
heap
page read and write
6C8EB000
unkown
page write copy
C6BE000
direct allocation
page read and write
5161000
heap
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C5D4000
direct allocation
page read and write
81B0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
711F6000
unkown
page read and write
D314000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
711D1000
unkown
page read and write
CCBE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C640000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
70942000
unkown
page write copy
CCCE000
direct allocation
page read and write
1BE000
unkown
page read and write
52ED000
heap
page read and write
286AD433000
heap
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6B5C1000
unkown
page read and write
28423040000
trusted library allocation
page read and write
7FF57F3BA000
unkown
page readonly
2240AC3E000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
1A9243D0000
unclassified section
page readonly
48C3000
heap
page read and write
E04000
heap
page read and write
6E80000
heap
page read and write
284231E0000
trusted library allocation
page read and write
7130D000
unkown
page write copy
6C892000
unkown
page write copy
81D0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6C996000
unkown
page read and write
28423040000
trusted library allocation
page read and write
CD8E000
direct allocation
page read and write
7FF57F3A5000
unkown
page readonly
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
71A34000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
C6BA000
direct allocation
page read and write
45EE000
stack
page read and write
C6D8000
direct allocation
page read and write
CC0E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6DD9000
heap
page read and write
6A7D1000
unkown
page read and write
7FF57F3CB000
unkown
page readonly
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C470000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6C741000
unkown
page write copy
37CC000
heap
page read and write
8170000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
F7E000
stack
page read and write
6CA6B000
unkown
page read and write
28423040000
trusted library allocation
page read and write
6BB5B000
unkown
page read and write
53E8000
trusted library allocation
page read and write
711FC000
unkown
page write copy
28423040000
trusted library allocation
page read and write
C55E000
direct allocation
page read and write
286AD419000
heap
page read and write
284231E0000
trusted library allocation
page read and write
6C990000
unkown
page read and write
C4AA000
direct allocation
page read and write
70965000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
2269C020000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C6FC000
direct allocation
page read and write
C62A000
direct allocation
page read and write
711A4000
unkown
page write copy
6CA3F000
unkown
page read and write
532F000
heap
page read and write
C530000
direct allocation
page read and write
C53E000
direct allocation
page read and write
81C0000
trusted library allocation
page read and write
D364000
direct allocation
page read and write
19C000
stack
page read and write
284231E0000
trusted library allocation
page read and write
6BBD2000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
302E000
stack
page read and write
6C9A1000
unkown
page read and write
108E000
heap
page read and write
8000000
trusted library allocation
page read and write
C4DA000
direct allocation
page read and write
C8DB000
direct allocation
page read and write
1A924E02000
trusted library allocation
page read and write
1095000
heap
page read and write
D9C4000
direct allocation
page read and write
2C46000
heap
page read and write
401000
unkown
page execute read
28423040000
trusted library allocation
page read and write
DC44000
direct allocation
page read and write
C594000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6CAF3000
unkown
page write copy
3D01000
heap
page read and write
28423040000
trusted library allocation
page read and write
7FF57F3BA000
unkown
page readonly
28423040000
trusted library allocation
page read and write
47F7000
heap
page read and write
719CF000
unkown
page read and write
7092D000
unkown
page write copy
28423040000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
824E000
heap
page read and write
D774000
direct allocation
page read and write
53F5000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
70662000
unkown
page execute read
7FF57F434000
unkown
page readonly
71091000
unkown
page write copy
CCFE000
direct allocation
page read and write
D8C4000
direct allocation
page read and write
CD7E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6C972000
unkown
page write copy
2140000
heap
page read and write
D15000
unkown
page readonly
5B52000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C7E2000
direct allocation
page read and write
109D000
heap
page read and write
2930000
trusted library allocation
page execute and read and write
8430000
trusted library allocation
page read and write
C706000
direct allocation
page read and write
82A9000
heap
page read and write
CB0E000
direct allocation
page read and write
C698000
direct allocation
page read and write
104F000
heap
page read and write
71A10000
unkown
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
6C893000
unkown
page read and write
2930000
heap
page read and write
4AE5000
trusted library allocation
page read and write
472A000
heap
page read and write
6C78A000
unkown
page read and write
C528000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
2CB30000
trusted library allocation
page read and write
75A000
unkown
page readonly
CFDE000
direct allocation
page read and write
CB8E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
323E000
stack
page read and write
DB84000
direct allocation
page read and write
70964000
unkown
page read and write
30000
heap
page read and write
71A00000
unkown
page read and write
F19000
heap
page read and write
C82C000
direct allocation
page read and write
2FAD000
stack
page read and write
7124A000
unkown
page write copy
6B4A5000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
71347000
unkown
page write copy
C634000
direct allocation
page read and write
6B501000
unkown
page read and write
48C4000
heap
page read and write
28423040000
trusted library allocation
page read and write
D772000
direct allocation
page read and write
6BB43000
unkown
page write copy
C8E4000
direct allocation
page read and write
712E9000
unkown
page read and write
72BE000
stack
page read and write
D874000
direct allocation
page read and write
6A7FA000
unkown
page read and write
2240AD02000
unkown
page read and write
D614000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
550A000
heap
page read and write
28423040000
trusted library allocation
page read and write
71A01000
unkown
page write copy
CE0E000
direct allocation
page read and write
19DEBA30000
heap
page read and write
28423040000
trusted library allocation
page read and write
C5A4000
direct allocation
page read and write
C534000
direct allocation
page read and write
D7A4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
71A3A000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
6A810000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
C8B2000
direct allocation
page read and write
71A71000
unkown
page read and write
DA14000
direct allocation
page read and write
EF8000
heap
page read and write
3D00000
direct allocation
page read and write
6DD0000
heap
page read and write
1097000
heap
page read and write
5227000
heap
page read and write
DD44000
direct allocation
page read and write
71A51000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
70935000
unkown
page read and write
D684000
direct allocation
page read and write
2269D880000
heap
page read and write
284231E0000
trusted library allocation
page read and write
F19000
heap
page read and write
C638000
direct allocation
page read and write
6A825000
unkown
page write copy
82F3000
heap
page read and write
3D0A000
heap
page read and write
6C927000
unkown
page read and write
CCAE000
direct allocation
page read and write
6E73000
heap
page read and write
C486000
direct allocation
page read and write
532F000
heap
page read and write
C798000
direct allocation
page read and write
75D0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
F3B000
heap
page read and write
C4E4000
direct allocation
page read and write
C644000
direct allocation
page read and write
C6A4000
direct allocation
page read and write
711FB000
unkown
page read and write
1A924530000
unclassified section
page readonly
F41000
heap
page read and write
C6FA000
direct allocation
page read and write
C483000
direct allocation
page read and write
C630000
direct allocation
page read and write
C45C000
direct allocation
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
D9B4000
direct allocation
page read and write
D0DE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
719E1000
unkown
page write copy
28423040000
trusted library allocation
page read and write
D434000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
71A49000
unkown
page read and write
C62A000
direct allocation
page read and write
D3A4000
direct allocation
page read and write
3CFE000
heap
page read and write
6A924000
unkown
page execute read
2C60000
unclassified section
page readonly
2C42000
heap
page read and write
1C9D000
heap
page read and write
2240ABA1000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
25A0000
unclassified section
page readonly
712A4000
unkown
page write copy
4ACB000
heap
page read and write
28423040000
trusted library allocation
page read and write
C9D0000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
DBB4000
direct allocation
page read and write
C53E000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
C5DC000
direct allocation
page read and write
30000
heap
page read and write
7093F000
unkown
page write copy
6CA8A000
unkown
page write copy
CDBE000
direct allocation
page read and write
7133D000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
570000
heap
page read and write
401000
unkown
page execute read
DAD4000
direct allocation
page read and write
1C0000
unclassified section
page readonly
C640000
direct allocation
page read and write
C719000
direct allocation
page read and write
D844000
direct allocation
page read and write
71081000
unkown
page read and write
C62A000
direct allocation
page read and write
1A92469A000
heap
page read and write
28423040000
trusted library allocation
page read and write
6C660000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
C83C000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
712B7000
unkown
page write copy
C680000
direct allocation
page read and write
2EE0000
unclassified section
page readonly
1CA9000
heap
page read and write
733E000
stack
page read and write
2C70000
heap
page read and write
400000
unkown
page readonly
10000
unclassified section
page readonly
6C982000
unkown
page read and write
28423040000
trusted library allocation
page read and write
286AD3F2000
heap
page read and write
2C941000
heap
page read and write
28423040000
trusted library allocation
page read and write
6C97F000
unkown
page write copy
28423040000
trusted library allocation
page read and write
2240AC40000
unkown
page read and write
D772000
direct allocation
page read and write
C677000
direct allocation
page read and write
7119D000
unkown
page write copy
C560000
direct allocation
page read and write
3CE7000
heap
page read and write
6CA2E000
unkown
page read and write
7096E000
unkown
page write copy
1E0000
unclassified section
page readonly
81C0000
trusted library allocation
page read and write
CB2E000
direct allocation
page read and write
70998000
unkown
page read and write
28423040000
trusted library allocation
page read and write
CB9E000
direct allocation
page read and write
28D0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
492A000
stack
page read and write
CD5E000
direct allocation
page read and write
C7A2000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6C8DA000
unkown
page write copy
CBCE000
direct allocation
page read and write
70983000
unkown
page write copy
7119F000
unkown
page read and write
7FF57F3EA000
unkown
page readonly
28423040000
trusted library allocation
page read and write
6A811000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
F19000
heap
page read and write
E04000
heap
page read and write
D674000
direct allocation
page read and write
6E5C000
heap
page read and write
A53000
unkown
page readonly
28423040000
trusted library allocation
page read and write
711D4000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
6C98B000
unkown
page write copy
6C360000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
DCA4000
direct allocation
page read and write
505A000
heap
page read and write
70900000
unkown
page readonly
6CA26000
unkown
page read and write
28423040000
trusted library allocation
page read and write
711D6000
unkown
page read and write
C6C6000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
713D000
stack
page read and write
37C2000
heap
page read and write
104F000
heap
page read and write
400000
unkown
page readonly
6C984000
unkown
page write copy
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
711FF000
unkown
page write copy
8470000
trusted library allocation
page read and write
D544000
direct allocation
page read and write
711D0000
unkown
page write copy
C811000
direct allocation
page read and write
719C3000
unkown
page write copy
2240AC3E000
unkown
page read and write
306F000
stack
page read and write
C680000
direct allocation
page read and write
2C40000
heap
page read and write
170000
unclassified section
page readonly
28423040000
trusted library allocation
page read and write
D784000
direct allocation
page read and write
1A92469A000
heap
page read and write
284F000
heap
page read and write
CD4E000
direct allocation
page read and write
E3D000
heap
page read and write
C5EE000
direct allocation
page read and write
2801000
heap
page read and write
4A2CEFB000
stack
page read and write
71092000
unkown
page read and write
290F000
stack
page read and write
6C7B3000
unkown
page write copy
6C969000
unkown
page write copy
43CB000
direct allocation
page read and write
1A92465C000
heap
page read and write
F41000
heap
page read and write
28423040000
trusted library allocation
page read and write
C68A000
direct allocation
page read and write
C682000
direct allocation
page read and write
C880000
direct allocation
page read and write
C88C000
direct allocation
page read and write
DDC4000
direct allocation
page read and write
CC4E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
3CBC000
heap
page read and write
70FE000
stack
page read and write
C55E000
direct allocation
page read and write
C5A4000
direct allocation
page read and write
C6E8000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
34EF000
stack
page read and write
8438000
trusted library allocation
page read and write
712A7000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
D3E4000
direct allocation
page read and write
6A791000
unkown
page read and write
6CA88000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
C7FE000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
80D000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
2269BF29000
heap
page read and write
6E46000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6E23000
heap
page read and write
711C9000
unkown
page write copy
8660000
trusted library allocation
page read and write
10000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
6CAEC000
unkown
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
1D0000
heap
page read and write
70656000
unkown
page read and write
DA44000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
286AD3B7000
heap
page read and write
284231E0000
trusted library allocation
page read and write
71376000
unkown
page execute read
70661000
unkown
page read and write
6A7EB000
unkown
page write copy
D15000
unkown
page readonly
C63C000
direct allocation
page read and write
2269BCE0000
heap
page read and write
284231E0000
trusted library allocation
page read and write
1A92467A000
heap
page read and write
28423040000
trusted library allocation
page read and write
71B3E000
unkown
page execute read
C6A0000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C470000
direct allocation
page read and write
2240AC2A000
unkown
page read and write
28423040000
trusted library allocation
page read and write
7FF57F441000
unkown
page readonly
C544000
direct allocation
page read and write
6D527000
unkown
page execute read
28423040000
trusted library allocation
page read and write
E13000
heap
page read and write
6E09000
heap
page read and write
6E76000
heap
page read and write
75E0000
trusted library allocation
page read and write
9C000
stack
page read and write
C4D8000
direct allocation
page read and write
6C792000
unkown
page read and write
70927000
unkown
page write copy
7131A000
unkown
page write copy
C60E000
direct allocation
page read and write
D0D2000
direct allocation
page read and write
286AD320000
heap
page read and write
E04000
heap
page read and write
28423040000
trusted library allocation
page read and write
82C7000
heap
page read and write
6E38000
heap
page read and write
6A81F000
unkown
page read and write
8020000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
A53000
unkown
page readonly
28423040000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
C4A8000
direct allocation
page read and write
8470000
trusted library allocation
page read and write
711A7000
unkown
page write copy
19C000
stack
page read and write
43CB000
direct allocation
page read and write
7FF57F33C000
unkown
page readonly
6CAEE000
unkown
page write copy
28423040000
trusted library allocation
page read and write
CDDE000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C6C0000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
13D000
stack
page read and write
C9DA000
direct allocation
page read and write
5410000
trusted library allocation
page read and write
D0A2000
direct allocation
page read and write
C5EC000
direct allocation
page read and write
6AECDFB000
stack
page read and write
704F1000
unkown
page read and write
F41000
heap
page read and write
28423040000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
2269BE20000
heap
page read and write
28423040000
trusted library allocation
page read and write
7FF57F44C000
unkown
page readonly
6FC0000
heap
page read and write
284231E0000
trusted library allocation
page read and write
C60A000
direct allocation
page read and write
7092A000
unkown
page read and write
6A7FB000
unkown
page write copy
28423040000
trusted library allocation
page read and write
2845000
heap
page read and write
6BB40000
unkown
page readonly
71080000
unkown
page readonly
C5C4000
direct allocation
page read and write
D20E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6CA6F000
unkown
page read and write
1A924657000
heap
page read and write
3CB9000
heap
page read and write
28423040000
trusted library allocation
page read and write
4991000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C5A0000
direct allocation
page read and write
55BC000
heap
page read and write
71A86000
unkown
page write copy
3CEA000
heap
page read and write
719C0000
unkown
page write copy
F3B000
heap
page read and write
6C9BD000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
1C0B000
heap
page read and write
3CBD000
heap
page read and write
27E0000
heap
page read and write
10000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
6CA8E000
unkown
page read and write
5427000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
7FF57F322000
unkown
page readonly
71A2E000
unkown
page write copy
1A924678000
heap
page read and write
28423040000
trusted library allocation
page read and write
71A2A000
unkown
page read and write
FB0000
unkown
page readonly
CE14000
direct allocation
page read and write
D2F4000
direct allocation
page read and write
CE24000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C679000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6BC31000
unkown
page read and write
E04000
heap
page read and write
28423040000
trusted library allocation
page read and write
2240A9E0000
heap
page read and write
F3B000
heap
page read and write
28423040000
trusted library allocation
page read and write
32CE000
stack
page read and write
2240A9F0000
unkown
page readonly
D424000
direct allocation
page read and write
3AD000
stack
page read and write
284231E0000
trusted library allocation
page read and write
1A924640000
heap
page read and write
C530000
direct allocation
page read and write
C49C000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
D444000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
6CA69000
unkown
page write copy
D8D4000
direct allocation
page read and write
F3D000
heap
page read and write
536E000
trusted library allocation
page read and write
70979000
unkown
page write copy
2240AB70000
heap
page read and write
1085000
heap
page read and write
3D00000
direct allocation
page read and write
7065F000
unkown
page write copy
6AECD75000
stack
page read and write
6C492000
unkown
page write copy
C5FE000
direct allocation
page read and write
E13000
heap
page read and write
CEBE000
direct allocation
page read and write
5437000
heap
page read and write
711AA000
unkown
page read and write
1C0000
heap
page read and write
71A33000
unkown
page read and write
284231E0000
trusted library allocation
page read and write
70CE1000
unkown
page execute read
D15000
unkown
page readonly
31ED000
heap
page read and write
C848000
direct allocation
page read and write
C81C000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
C968000
direct allocation
page read and write
C626000
direct allocation
page read and write
CB6E000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
DCC4000
direct allocation
page read and write
1CAE000
heap
page read and write
7FF57F43B000
unkown
page readonly
71298000
unkown
page write copy
6C898000
unkown
page read and write
C895000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
6AECFFF000
stack
page read and write
28423040000
trusted library allocation
page read and write
71A0E000
unkown
page write copy
711F5000
unkown
page write copy
2D1E000
stack
page read and write
70978000
unkown
page read and write
28423040000
trusted library allocation
page read and write
3C3D000
heap
page read and write
284231E0000
trusted library allocation
page read and write
1A924627000
heap
page read and write
20000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
C522000
direct allocation
page read and write
6B5C0000
unkown
page readonly
284231E0000
trusted library allocation
page read and write
1CAB000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
27B8000
heap
page read and write
2CDB0000
trusted library allocation
page read and write
43CB000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
109B000
heap
page read and write
6C994000
unkown
page write copy
C9DC000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
6A7CB000
unkown
page write copy
284231E0000
trusted library allocation
page read and write
28423040000
trusted library allocation
page read and write
71A3B000
unkown
page read and write
8317000
heap
page read and write
284231E0000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
C5AC000
direct allocation
page read and write
6EBE000
heap
page read and write
D884000
direct allocation
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C558000
direct allocation
page read and write
C6B4000
direct allocation
page read and write
284231E0000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
2269BED0000
heap
page read and write
28423040000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
286AD3F2000
heap
page read and write
C813000
direct allocation
page read and write
1A924678000
heap
page read and write
C59B000
direct allocation
page read and write
71249000
unkown
page read and write
D05E000
direct allocation
page read and write
D8A4000
direct allocation
page read and write
C5EA000
direct allocation
page read and write
19DE9EE0000
heap
page read and write
C4E2000
direct allocation
page read and write
C96C000
direct allocation
page read and write
6A923000
unkown
page read and write
2720000
heap
page read and write
28423040000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
D954000
direct allocation
page read and write
C7B4000
direct allocation
page read and write
D15000
unkown
page readonly
28423040000
trusted library allocation
page read and write
70940000
unkown
page read and write
2CE80000
trusted library allocation
page read and write
8266000
heap
page read and write
D914000
direct allocation
page read and write
8430000
trusted library allocation
page read and write
284231E0000
trusted library allocation
page read and write
C52A000
direct allocation
page read and write
D3D4000
direct allocation
page read and write
CA1E000
direct allocation
page read and write
C90E000
direct allocation
page read and write
D2E4000
direct allocation
page read and write
2240AC00000
unkown
page read and write
297F000
stack
page read and write
28423040000
trusted library allocation
page read and write
4575000
direct allocation
page read and write
D554000
direct allocation
page read and write
D284000
direct allocation
page read and write
6DF1000
heap
page read and write
73FE000
stack
page read and write
6A792000
unkown
page write copy
415B000
direct allocation
page read and write
719EC000
unkown
page read and write
20000
unclassified section
page readonly
401000
unkown
page execute read
10000
unclassified section
page readonly
284231E0000
trusted library allocation
page read and write
1065000
heap
page read and write
284231E0000
trusted library allocation
page read and write
1A924658000
heap
page read and write
284231E0000
trusted library allocation
page read and write
6C7E000
stack
page read and write
8430000
trusted library allocation
page read and write
CB5FC7E000
stack
page read and write
C464000
direct allocation
page read and write
D264000
direct allocation
page read and write
71213000
unkown
page read and write
C691000
direct allocation
page read and write
8430000
trusted library allocation
page read and write
2FE0000
unclassified section
page readonly
49FA000
heap
page read and write
284231E0000
trusted library allocation
page read and write
3CFE000
heap
page read and write
284231E0000
trusted library allocation
page read and write
19DEA0C5000
heap
page read and write
F31000
heap
page read and write
28423040000
trusted library allocation
page read and write
There are 3126 hidden memdumps, click here to show them.