IOC Report
sx8RE6LbG0.exe

loading gif

Files

File Path
Type
Category
Malicious
sx8RE6LbG0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dvffdl
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\jipsoiol
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u2ts.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u2ts.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u2ts.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u2ts.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u2ts.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AEBKFIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\AEHIJKKFHIEGCBGCAFIJJJJKKJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CAFHDBGHJKFIDHJJJEBKEBGIEB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CBGCGDBKEGHIEBGDBFHDHIDAFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\CGDBFBGIDHCAAKEBAKFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGHIDHCAAKECGCBFIJDBAAFBGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HIIIIEGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HYGZTMOBZN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDAEHJJECAEGCAAAAEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JDDHMPCDUJ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDDHMPCDUJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LHEPQPGEWF.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LIJDSFKJZG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_sx8RE6LbG0.exe_ec768124741a5055b4b4232dfd71a75b17cb66b9_0b85c9ac_9c0cde91-98b7-4237-b79f-8d3a7e450502\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u2ts.0.exe_b5ac63fe82419030e2849a75afdac37ad289d9d6_bd17ec83_8e81aa90-a432-4586-9259-7069b2d67fd8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15AA.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Apr 28 23:27:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1696.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16B6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA2FB.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Apr 28 23:27:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF12.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0B9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
modified
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\5031d305a611656da7ab8203ae6a6b12e704f90cc3b1d89a8de243f466cad47b\etxok1ie.o3g
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7ea457ad
data
dropped
C:\Users\user\AppData\Local\Temp\9c7cb905
data
dropped
C:\Users\user\AppData\Local\Temp\ckdbvgabeggvnc
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Sun Apr 28 22:27:04 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1C08.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp82F2.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpBACC.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpBADD.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\u2ts.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u2ts.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u2ts.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:27:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:27:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:27:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:27:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Apr 28 22:27:53 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 147
ASCII text, with very long lines (763)
downloaded
There are 69 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sx8RE6LbG0.exe
"C:\Users\user\Desktop\sx8RE6LbG0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u2ts.0.exe
"C:\Users\user\AppData\Local\Temp\u2ts.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u2ts.2\run.exe
"C:\Users\user\AppData\Local\Temp\u2ts.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u2ts.3.exe
"C:\Users\user\AppData\Local\Temp\u2ts.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\u2ts.2\run.exe
"C:\Users\user\AppData\Local\Temp\u2ts.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 968
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5256 -s 2004
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1960,i,3941094488393127091,5949992932868240586,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1604 --field-trial-handle=1968,i,3321473652488425193,11369094571635147960,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4164 --field-trial-handle=1960,i,3941094488393127091,5949992932868240586,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.150/c698e1bc8a2f5e6d.php
185.172.128.150
malicious
http://185.172.128.150/b7d0cfdb1d966bdd/vcruntime140.dll
185.172.128.150
malicious
http://185.172.128.150/b7d0cfdb1d966bdd/freebl3.dll
185.172.128.150
malicious
http://185.172.128.150/b7d0cfdb1d966bdd/softokn3.dll
185.172.128.150
malicious
http://185.172.128.59/syncUpd.exe
185.172.128.59
malicious
http://91.215.85.66:9000/wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F
91.215.85.66
malicious
http://185.172.128.150/b7d0cfdb1d966bdd/msvcp140.dll
185.172.128.150
malicious
http://185.172.128.150/b7d0cfdb1d966bdd/mozglue.dll
185.172.128.150
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtT5aGPm2u7EGIjCw4PtzX5gzzDlwzXIWtDXrCiRfdbHDSucDXyTngU0wLJluDFuO6KRqHMbqhlFxbvMyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.191.132
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.191.132
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
https://westus2-2.in.applicationinsights.azure.comrent
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpqD
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://rt.services.visualstudio.com/0l
unknown
https://www.iolo.com/company/legal/privacy/
unknown
https://mozilla.org0/
unknown
http://91.215.85.66:
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://pastebin.com/raw/z9pYkqPQPO
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.php2496b2f8604de64a7a02afb624c0-release
unknown
http://185.172.128.150/b7d0cfdb1d966bdd/mozglue.dllx
unknown
http://www.symauth.com/rpa00
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpD%D
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
185.93.1.243
http://185.172.128.150/b7d0cfdb1d966bdd/nss3.dllB
unknown
http://www.info-zip.org/
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpQrR
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
http://185.172.128.228/ping.php?substr=two
185.172.128.228
http://91.215.85.66:9000t-
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpu
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpl.
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpr
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpy
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpv
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.php~
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpe
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpb
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpW%Microsoft
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpn
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
http://185.172.128.150/c698e1bc8a2f5e6d.phpY
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
iolo0.b-cdn.net
185.93.1.243
www.google.com
142.250.191.132
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
185.172.128.150
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation
172.217.5.4
unknown
United States
239.255.255.250
unknown
Reserved
142.250.191.132
www.google.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
TypesSupported
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
ProgramId
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
FileId
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
LowerCaseLongPath
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
LongPathHash
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
Name
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
OriginalFileName
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
Publisher
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
Version
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
BinFileVersion
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
BinaryType
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
ProductName
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
ProductVersion
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
LinkDate
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
BinProductVersion
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
AppxPackageFullName
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
AppxPackageRelativeId
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
Size
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
Language
\REGISTRY\A\{6b9ccfdc-5e4a-1496-b189-ccf014a7a4ef}\Root\InventoryApplicationFile\sx8re6lbg0.exe|622296b4affaf62
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
ProgramId
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
FileId
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
LowerCaseLongPath
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
LongPathHash
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
Name
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
OriginalFileName
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
Publisher
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
Version
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
BinFileVersion
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
BinaryType
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
ProductName
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
ProductVersion
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
LinkDate
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
BinProductVersion
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
AppxPackageFullName
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
AppxPackageRelativeId
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
Size
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
Language
\REGISTRY\A\{4b9ebd00-30ac-5f71-ca11-056b729a6c34}\Root\InventoryApplicationFile\u2ts.0.exe|fe3d9356eb024524
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000F0860E8E4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 79 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21731EA0000
trusted library section
page read and write
malicious
21729403000
trusted library allocation
page read and write
malicious
40C3000
heap
page read and write
malicious
5B00000
direct allocation
page read and write
malicious
3530000
direct allocation
page read and write
malicious
5B60000
direct allocation
page read and write
malicious
5522000
trusted library allocation
page read and write
malicious
5113000
trusted library allocation
page read and write
malicious
3500000
direct allocation
page execute and read and write
malicious
21732000000
trusted library section
page read and write
malicious
1202000
unkown
page readonly
malicious
1A5A000
heap
page read and write
malicious
38B8000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
21713EAB000
unkown
page readonly
malicious
217170AB000
unkown
page readonly
malicious
55F1000
unkown
page read and write
217293BE000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
3745000
heap
page read and write
2FE2000
trusted library allocation
page read and write
401000
unkown
page execute read
35A0000
heap
page read and write
7FF838940000
trusted library allocation
page read and write
3745000
heap
page read and write
3795000
heap
page read and write
3595000
unkown
page read and write
1775000
heap
page read and write
14F4000
heap
page read and write
19F7000
unkown
page read and write
2BB4000
unkown
page read and write
3729000
heap
page read and write
53DA000
stack
page read and write
4B24000
unkown
page read and write
CA2000
heap
page read and write
4FC3000
heap
page read and write
DA0000
heap
page read and write
3101000
trusted library allocation
page read and write
37B9000
heap
page read and write
221CC000
heap
page read and write
2868000
heap
page read and write
2BB4000
unkown
page read and write
2ECC000
trusted library allocation
page read and write
7B2D000
stack
page read and write
347F17D000
stack
page read and write
52F0000
heap
page read and write
217327B1000
heap
page read and write
574E000
stack
page read and write
37B8000
heap
page read and write
6CE0000
trusted library allocation
page execute and read and write
1368000
heap
page read and write
24A5000
heap
page read and write
1A3A000
heap
page read and write
4C1D000
stack
page read and write
27E0000
heap
page read and write
6A5E000
stack
page read and write
18F0000
trusted library allocation
page read and write
6080000
trusted library allocation
page execute and read and write
2BB4000
unkown
page read and write
220F5000
heap
page read and write
21736024000
heap
page read and write
2FF3000
heap
page read and write
61E01000
direct allocation
page execute read
53E0000
trusted library allocation
page read and write
2FDC000
heap
page read and write
76D0000
heap
page read and write
21732450000
trusted library section
page read and write
D0A000
heap
page read and write
75E000
unkown
page write copy
2CCC000
trusted library allocation
page read and write
21717800000
heap
page read and write
317E000
unkown
page read and write
37B8000
heap
page read and write
2EDE000
trusted library allocation
page read and write
7FF83892B000
trusted library allocation
page read and write
7FF838910000
trusted library allocation
page read and write
5EC5000
trusted library allocation
page read and write
137B000
heap
page read and write
454000
unkown
page read and write
2C0F000
heap
page read and write
343C0000
heap
page read and write
2FDB000
heap
page read and write
281FC000
heap
page read and write
14F4000
heap
page read and write
A42000
heap
page read and write
39F0000
heap
page read and write
30A5000
trusted library allocation
page read and write
21735FE4000
heap
page read and write
28165000
heap
page read and write
D9D000
trusted library allocation
page execute and read and write
2FC5000
heap
page read and write
29A0000
heap
page read and write
217321C0000
trusted library section
page read and write
2FDF000
heap
page read and write
27E3000
heap
page read and write
21732C20000
heap
page execute and read and write
4342000
unkown
page read and write
3A32000
heap
page read and write
2BB4000
unkown
page read and write
2BB4000
unkown
page read and write
A22000
heap
page read and write
2F79000
trusted library allocation
page read and write
2FE1000
heap
page read and write
7FF838C80000
trusted library allocation
page execute and read and write
97000
stack
page read and write
9E1000
heap
page read and write
220D9000
heap
page read and write
37B8000
heap
page read and write
7FF838C60000
trusted library allocation
page read and write
220D4000
heap
page read and write
2FDD000
heap
page read and write
C96000
heap
page read and write
6CF0000
trusted library allocation
page read and write
2FC7000
heap
page read and write
583E000
stack
page read and write
C65000
heap
page read and write
7FF83878B000
trusted library allocation
page execute and read and write
28168000
heap
page read and write
220F5000
heap
page read and write
1AB6000
heap
page read and write
217166AB000
unkown
page readonly
37B8000
heap
page read and write
37A5000
heap
page read and write
53EB000
trusted library allocation
page read and write
37DD000
heap
page read and write
7FF838B90000
trusted library allocation
page execute and read and write
37B8000
heap
page read and write
342A0000
trusted library allocation
page read and write
2FD2000
heap
page read and write
D80000
trusted library allocation
page read and write
9DF000
heap
page read and write
2BB4000
unkown
page read and write
220FD000
heap
page read and write
370D000
heap
page read and write
21731C90000
heap
page read and write
2D10000
unkown
page read and write
7FF838A7B000
trusted library allocation
page read and write
3780000
heap
page read and write
217360D0000
heap
page read and write
17BF000
stack
page read and write
281A0000
heap
page read and write
6977000
heap
page read and write
3F7E000
stack
page read and write
7FF838A40000
trusted library allocation
page read and write
3729000
heap
page read and write
220F8000
heap
page read and write
18B0000
trusted library allocation
page execute and read and write
14F4000
heap
page read and write
A31000
heap
page read and write
4A01000
unkown
page read and write
220E0000
heap
page read and write
18AE000
stack
page read and write
327B000
heap
page read and write
2F70000
trusted library allocation
page read and write
4FD6000
trusted library allocation
page read and write
24C0000
direct allocation
page read and write
310E000
stack
page read and write
31D4000
unkown
page read and write
1BF10000
heap
page read and write
39C000
unkown
page readonly
2C8B000
trusted library allocation
page read and write
FE0000
heap
page read and write
2202B000
heap
page read and write
2F99000
trusted library allocation
page read and write
39C000
unkown
page readonly
1360000
heap
page read and write
3739000
heap
page read and write
783000
unkown
page readonly
37B9000
heap
page read and write
21732813000
heap
page read and write
3788000
heap
page read and write
32D2000
heap
page read and write
577D000
direct allocation
page read and write
1910000
trusted library allocation
page read and write
39C000
unkown
page readonly
F97000
trusted library allocation
page execute and read and write
220EF000
heap
page read and write
217380F0000
trusted library allocation
page read and write
1CDE000
heap
page read and write
D30000
heap
page read and write
63BE000
stack
page read and write
347F57D000
stack
page read and write
380E000
stack
page read and write
400000
unkown
page write copy
6C819000
unkown
page write copy
21717B50000
trusted library section
page read and write
2B10000
heap
page execute and read and write
40A000
unkown
page read and write
21731DB2000
heap
page read and write
2C80000
trusted library allocation
page read and write
438A000
unkown
page read and write
21717AF0000
heap
page read and write
3E79000
trusted library allocation
page read and write
37B8000
heap
page read and write
2CA6000
trusted library allocation
page read and write
7FF4BA8CA000
trusted library allocation
page readonly
220EF000
heap
page read and write
24DC000
direct allocation
page read and write
220DB000
heap
page read and write
2BDD000
trusted library allocation
page read and write
21738090000
trusted library allocation
page read and write
7FF8389E2000
trusted library allocation
page read and write
9B000
stack
page read and write
6100000
trusted library allocation
page execute and read and write
7FF838980000
trusted library allocation
page read and write
37B9000
heap
page read and write
7FF838770000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
4319000
heap
page read and write
3745000
heap
page read and write
6BE61000
unkown
page execute read
1340000
heap
page read and write
2D78000
trusted library allocation
page read and write
3791000
heap
page read and write
217152AB000
unkown
page readonly
217324AB000
trusted library section
page read and write
37DD000
heap
page read and write
7FF8389F0000
trusted library allocation
page read and write
C8B000
heap
page read and write
7FF838B50000
trusted library allocation
page read and write
6C827000
unkown
page readonly
3738000
heap
page read and write
C5B000
heap
page read and write
21731370000
trusted library allocation
page read and write
D84000
trusted library allocation
page read and write
21717A90000
trusted library allocation
page read and write
1DB4000
heap
page read and write
7FF838810000
trusted library allocation
page read and write
21738120000
trusted library section
page read and write
379D000
heap
page read and write
18F9000
trusted library allocation
page read and write
7FF4BA8CD000
trusted library allocation
page execute read
16E4000
heap
page read and write
217177F0000
heap
page read and write
347E5FD000
stack
page read and write
21732760000
heap
page read and write
1820000
trusted library allocation
page read and write
6BDCE000
unkown
page read and write
378D000
heap
page read and write
191000
stack
page read and write
2FD5000
heap
page read and write
1050000
heap
page read and write
217361A6000
heap
page read and write
21732844000
heap
page read and write
2E1B000
heap
page read and write
379A000
heap
page read and write
220E0000
heap
page read and write
21736019000
heap
page read and write
21736199000
heap
page read and write
220F6000
heap
page read and write
14F4000
heap
page read and write
30AE000
trusted library allocation
page read and write
7FF838C40000
trusted library allocation
page read and write
774000
heap
page read and write
2F64000
trusted library allocation
page read and write
220E0000
heap
page read and write
3799000
heap
page read and write
1BC5E000
stack
page read and write
19F9000
unkown
page readonly
4FB0000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
416E000
stack
page read and write
2BB4000
unkown
page read and write
21732970000
trusted library section
page readonly
220EF000
heap
page read and write
7FF838B80000
trusted library allocation
page read and write
21731D7A000
heap
page read and write
636000
unkown
page execute and read and write
2FE0000
heap
page read and write
7FF838773000
trusted library allocation
page read and write
1A20000
heap
page read and write
37B9000
heap
page read and write
2FCF000
trusted library allocation
page read and write
60C1000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
7FF838764000
trusted library allocation
page read and write
572E000
unkown
page read and write
2FDF000
heap
page read and write
2FCA000
heap
page read and write
21731D11000
heap
page read and write
220FD000
heap
page read and write
220F5000
heap
page read and write
3780000
heap
page read and write
16E8000
heap
page read and write
594E000
stack
page read and write
2EF4000
trusted library allocation
page read and write
7FF838C20000
trusted library allocation
page read and write
1AC6000
heap
page read and write
18D0000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
220DC000
heap
page read and write
31E1000
trusted library allocation
page read and write
BFB000
heap
page read and write
2920000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
37A1000
heap
page read and write
7FF838C76000
trusted library allocation
page read and write
8B0000
heap
page read and write
6BEEE000
unkown
page read and write
7FF838A60000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
737C000
stack
page read and write
3795000
heap
page read and write
1A3E000
heap
page read and write
1BE9E000
stack
page read and write
19F9000
unkown
page readonly
14F4000
heap
page read and write
2450000
direct allocation
page execute and read and write
21719579000
trusted library allocation
page read and write
28191000
heap
page read and write
7FF838957000
trusted library allocation
page read and write
220EF000
heap
page read and write
2173606B000
heap
page read and write
1BD5D000
stack
page read and write
2FD2000
heap
page read and write
220D9000
heap
page read and write
6BDD5000
unkown
page readonly
3726000
heap
page read and write
59DE000
stack
page read and write
2E62000
trusted library allocation
page read and write
7FF838C90000
trusted library allocation
page read and write
7FF838A30000
trusted library allocation
page read and write
37DD000
heap
page read and write
220DA000
heap
page read and write
21736031000
heap
page read and write
3670000
direct allocation
page execute and read and write
21732906000
heap
page read and write
13DE000
heap
page read and write
4BF8000
heap
page read and write
7FF838AF0000
trusted library allocation
page read and write
7FF838AE8000
trusted library allocation
page read and write
774000
heap
page read and write
347EEFB000
stack
page read and write
6BBF1000
unkown
page execute read
14BE000
stack
page read and write
D90000
trusted library allocation
page read and write
74CE000
stack
page read and write
24DF000
direct allocation
page read and write
3780000
heap
page read and write
7FF838A28000
trusted library allocation
page read and write
1BF00000
heap
page read and write
BE0000
heap
page read and write
21717AB0000
heap
page read and write
2860000
heap
page read and write
21736073000
heap
page read and write
56D1000
trusted library allocation
page read and write
6920000
heap
page read and write
3037000
trusted library allocation
page read and write
2E00000
heap
page read and write
618D000
stack
page read and write
378B000
heap
page read and write
217327A7000
heap
page read and write
220DF000
heap
page read and write
6943000
heap
page read and write
2F56000
trusted library allocation
page read and write
413000
unkown
page readonly
3787000
heap
page read and write
7FF4BA8C8000
trusted library allocation
page readonly
37A3000
heap
page read and write
5B14000
unkown
page read and write
36E0000
heap
page read and write
3360000
heap
page read and write
7760000
trusted library allocation
page execute and read and write
3700000
heap
page read and write
8FE000
stack
page read and write
44EC000
stack
page read and write
2508000
direct allocation
page read and write
2BB4000
unkown
page read and write
F8E000
stack
page read and write
166D000
stack
page read and write
7FF4BA8B1000
trusted library allocation
page execute read
220E0000
heap
page read and write
3590000
unkown
page read and write
2172935C000
trusted library allocation
page read and write
2BF9000
trusted library allocation
page read and write
43EC000
stack
page read and write
2BB4000
unkown
page read and write
2FC0000
heap
page read and write
4520000
heap
page read and write
2F50000
heap
page read and write
B43000
heap
page read and write
7FF8389B0000
trusted library allocation
page read and write
220CD000
heap
page read and write
4F73000
heap
page read and write
F80000
trusted library allocation
page read and write
197000
stack
page read and write
940000
heap
page read and write
2BB1000
trusted library allocation
page read and write
950000
heap
page read and write
220C6000
heap
page read and write
1160000
heap
page read and write
37B8000
heap
page read and write
60D0000
trusted library allocation
page execute and read and write
379B000
heap
page read and write
31D4000
unkown
page read and write
7A2D000
stack
page read and write
77B000
unkown
page write copy
37A7000
heap
page read and write
A2C000
heap
page read and write
21731DE5000
heap
page read and write
30B8000
trusted library allocation
page read and write
2BB5000
unkown
page read and write
1A44000
heap
page execute and read and write
C9C000
heap
page read and write
3780000
heap
page read and write
563D000
stack
page read and write
2BB4000
unkown
page read and write
2D60000
unkown
page read and write
3746000
heap
page read and write
2BB4000
unkown
page read and write
50F5000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
21736078000
heap
page read and write
61B0000
trusted library allocation
page execute and read and write
2B00000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
21713E70000
unkown
page readonly
C67000
heap
page read and write
406D000
heap
page read and write
28154000
heap
page read and write
220D8000
heap
page read and write
220C6000
heap
page read and write
217196B0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
602C000
stack
page read and write
2FD9000
trusted library allocation
page read and write
5033000
trusted library allocation
page read and write
3782000
heap
page read and write
7FF4BA8C1000
trusted library allocation
page execute read
747D000
stack
page read and write
3790000
heap
page read and write
14F4000
heap
page read and write
17E4000
trusted library allocation
page read and write
21736049000
heap
page read and write
1CE5000
heap
page execute and read and write
37BA000
heap
page read and write
4F80000
heap
page read and write
39C000
unkown
page readonly
33F1000
heap
page read and write
37BD000
heap
page read and write
9F6000
heap
page read and write
37B8000
heap
page read and write
2E95000
trusted library allocation
page read and write
7FF4BA8B2000
trusted library allocation
page readonly
1B91F000
stack
page read and write
7FF838A50000
trusted library allocation
page read and write
192000
stack
page read and write
371F000
heap
page read and write
3027000
trusted library allocation
page read and write
12F0000
heap
page read and write
3792000
heap
page read and write
365E000
stack
page read and write
4E8B000
heap
page read and write
220EF000
heap
page read and write
37DD000
heap
page read and write
7FF838990000
trusted library allocation
page read and write
7FF83896D000
trusted library allocation
page read and write
7FF838AB6000
trusted library allocation
page read and write
3B14000
heap
page read and write
2E48000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
5EBC000
stack
page read and write
2FD7000
heap
page read and write
347EAF4000
stack
page read and write
1380000
heap
page read and write
37DD000
heap
page read and write
220D8000
heap
page read and write
21731D5E000
heap
page read and write
2E25000
trusted library allocation
page read and write
220C0000
heap
page read and write
220DA000
heap
page read and write
3008000
trusted library allocation
page read and write
21731D63000
heap
page read and write
347E6FF000
stack
page read and write
536D000
direct allocation
page read and write
220D1000
heap
page read and write
1A1D000
unkown
page readonly
417000
unkown
page execute read
2440000
heap
page read and write
2D80000
unkown
page readonly
2BB4000
unkown
page read and write
40A000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
2DB0000
heap
page read and write
3E6E000
stack
page read and write
217293A1000
trusted library allocation
page read and write
220EC000
heap
page read and write
31D4000
unkown
page read and write
988000
heap
page read and write
21729710000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page read and write
6F7E000
stack
page read and write
400000
unkown
page readonly
2B6F000
heap
page read and write
7FF838B70000
trusted library allocation
page read and write
7FF83877D000
trusted library allocation
page execute and read and write
9B000
stack
page read and write
774000
heap
page read and write
347FA7E000
stack
page read and write
5A10000
unkown
page read and write
220D6000
heap
page read and write
21717B10000
trusted library allocation
page read and write
21731CF6000
heap
page read and write
17C0000
trusted library allocation
page read and write
2FCF000
heap
page read and write
1BC1F000
stack
page read and write
426F000
stack
page read and write
347E3FA000
stack
page read and write
43AD000
stack
page read and write
2CB3000
trusted library allocation
page read and write
21731FD0000
heap
page read and write
5400000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
3780000
heap
page read and write
7FF83895A000
trusted library allocation
page read and write
3790000
heap
page read and write
46EE000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
3787000
heap
page read and write
347E1FE000
stack
page read and write
2BB4000
unkown
page read and write
31A0000
unkown
page read and write
4980000
heap
page read and write
2BB4000
unkown
page read and write
6C874000
unkown
page read and write
2E27E000
heap
page read and write
31E0000
unkown
page read and write
5010000
trusted library allocation
page read and write
1C010000
trusted library allocation
page read and write
62BF000
stack
page read and write
217360DE000
heap
page read and write
2DAB000
trusted library allocation
page read and write
4ABE000
stack
page read and write
2FF0000
heap
page read and write
22169000
heap
page read and write
220FD000
heap
page read and write
4FCE000
trusted library allocation
page read and write
37BD000
heap
page read and write
3795000
heap
page read and write
76A000
unkown
page read and write
3747000
heap
page read and write
220F5000
heap
page read and write
220DF000
heap
page read and write
5840000
heap
page read and write
21736434000
trusted library allocation
page read and write
353E4000
heap
page read and write
1200000
unkown
page readonly
1D1F000
heap
page read and write
21738080000
trusted library allocation
page read and write
37B1000
heap
page read and write
50CA000
trusted library allocation
page read and write
7E0000
heap
page read and write
220FD000
heap
page read and write
220FD000
heap
page read and write
2864000
heap
page read and write
366F000
stack
page read and write
217328C9000
heap
page read and write
37BA000
heap
page read and write
529D000
heap
page read and write
220C8000
heap
page read and write
624000
unkown
page execute and read and write
A2E000
heap
page read and write
2E276000
heap
page read and write
220E0000
heap
page read and write
3739000
heap
page read and write
21717A93000
trusted library allocation
page read and write
37DD000
heap
page read and write
1930000
heap
page read and write
5000000
trusted library allocation
page read and write
1120000
heap
page read and write
1CD0000
heap
page read and write
2B6C000
stack
page read and write
4F70000
heap
page read and write
24E6000
direct allocation
page read and write
37A5000
heap
page read and write
F92000
trusted library allocation
page read and write
6BEF2000
unkown
page readonly
34ED0000
heap
page read and write
FB0000
trusted library allocation
page read and write
21736056000
heap
page read and write
3118000
trusted library allocation
page read and write
7FF838AD7000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
32B2000
heap
page read and write
1BC5000
heap
page read and write
6C869000
unkown
page write copy
1AD3000
heap
page read and write
790000
heap
page read and write
2FE5000
heap
page read and write
2173606F000
heap
page read and write
6C711000
unkown
page execute read
2DCC000
trusted library allocation
page read and write
115F000
stack
page read and write
5779000
direct allocation
page read and write
3C3E000
trusted library allocation
page read and write
C38000
heap
page read and write
281FE000
heap
page read and write
24F5000
direct allocation
page read and write
21738140000
trusted library allocation
page read and write
347F07B000
stack
page read and write
3E70000
heap
page read and write
347F978000
stack
page read and write
374B000
heap
page read and write
413000
unkown
page readonly
4990000
heap
page read and write
21717887000
heap
page read and write
517A000
heap
page read and write
37DD000
heap
page read and write
1AD8000
heap
page read and write
6BDD0000
unkown
page read and write
301A000
trusted library allocation
page read and write
2FCF000
heap
page read and write
347E9F2000
stack
page read and write
2FD8000
heap
page read and write
D24000
heap
page read and write
6C824000
unkown
page read and write
5036000
trusted library allocation
page read and write
217380E0000
trusted library allocation
page read and write
220DA000
heap
page read and write
A4A000
heap
page read and write
37B9000
heap
page read and write
2C16000
trusted library allocation
page read and write
6BD8F000
unkown
page readonly
33AE000
stack
page read and write
3795000
heap
page read and write
5250000
heap
page execute and read and write
1057000
heap
page read and write
16CE000
stack
page read and write
220DD000
heap
page read and write
2BB4000
unkown
page read and write
220D2000
heap
page read and write
C30000
heap
page read and write
22168000
heap
page read and write
30F0000
trusted library allocation
page read and write
242E000
stack
page read and write
220F8000
heap
page read and write
1330000
heap
page read and write
766000
unkown
page read and write
2E77000
heap
page read and write
2BB4000
unkown
page read and write
21717885000
heap
page read and write
5B16000
unkown
page read and write
7FF838880000
trusted library allocation
page execute and read and write
3570000
unkown
page read and write
2173278D000
heap
page read and write
5300000
trusted library allocation
page execute and read and write
BC8000
heap
page read and write
2EED000
trusted library allocation
page read and write
7FF838C10000
trusted library allocation
page execute and read and write
1A1B000
unkown
page read and write
21732190000
trusted library section
page read and write
2DC1000
trusted library allocation
page read and write
21717A10000
heap
page read and write
21731D6F000
heap
page read and write
9C6000
heap
page read and write
4D90000
trusted library allocation
page read and write
9D0000
heap
page read and write
21736050000
heap
page read and write
774000
unkown
page read and write
2B21000
trusted library allocation
page read and write
31D4000
unkown
page read and write
2FCE000
heap
page read and write
6931000
heap
page read and write
21719742000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
371F000
heap
page read and write
220E0000
heap
page read and write
3270000
heap
page read and write
2171782F000
heap
page read and write
409000
unkown
page write copy
4BDD000
heap
page read and write
9BD000
heap
page read and write
378E000
heap
page read and write
5680000
trusted library allocation
page execute and read and write
2EEF000
trusted library allocation
page read and write
3A4B000
heap
page read and write
2EE1000
trusted library allocation
page read and write
24A0000
heap
page read and write
374B000
heap
page read and write
7FF838A10000
trusted library allocation
page read and write
347EDF6000
stack
page read and write
1320000
heap
page read and write
6BBF0000
unkown
page readonly
49CC000
stack
page read and write
F95000
trusted library allocation
page execute and read and write
2C12000
trusted library allocation
page read and write
220E0000
heap
page read and write
D8D000
trusted library allocation
page execute and read and write
2E6C000
trusted library allocation
page read and write
567E000
stack
page read and write
302C000
trusted library allocation
page read and write
2B7A000
stack
page read and write
2BB4000
unkown
page read and write
37A5000
heap
page read and write
21719695000
trusted library allocation
page read and write
220D6000
heap
page read and write
2BD0000
unkown
page readonly
5C7B000
stack
page read and write
6B9B000
stack
page read and write
379E000
heap
page read and write
50E0000
trusted library allocation
page read and write
1C018000
heap
page read and write
37B8000
heap
page read and write
61EB4000
direct allocation
page read and write
5A8E000
stack
page read and write
7FF838C50000
trusted library allocation
page read and write
162E000
stack
page read and write
37A8000
heap
page read and write
24D3000
direct allocation
page read and write
1BC0000
heap
page read and write
5F20000
trusted library allocation
page read and write
2E77000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
3840000
heap
page read and write
2BB4000
unkown
page read and write
2BB4000
unkown
page read and write
1BB1F000
stack
page read and write
2FBF000
unkown
page read and write
347F27E000
stack
page read and write
61ED4000
direct allocation
page readonly
9D2000
heap
page read and write
34F6000
heap
page read and write
16E0000
heap
page read and write
7FF838CC0000
trusted library allocation
page execute and read and write
133E000
stack
page read and write
3780000
heap
page read and write
220D7000
heap
page read and write
180B000
trusted library allocation
page execute and read and write
220EF000
heap
page read and write
217179F0000
heap
page read and write
21731D8E000
heap
page read and write
2BB4000
unkown
page read and write
3747000
heap
page read and write
217361E6000
heap
page read and write
56D4000
trusted library allocation
page read and write
13CC000
heap
page read and write
A26000
heap
page read and write
37DD000
heap
page read and write
4FA0000
trusted library allocation
page read and write
4679000
trusted library allocation
page read and write
75CD000
stack
page read and write
2171785C000
heap
page read and write
21731FC0000
trusted library section
page read and write
5BCE000
stack
page read and write
347EBFD000
stack
page read and write
30D1000
trusted library allocation
page read and write
220EF000
heap
page read and write
5B8F000
stack
page read and write
4FBB000
trusted library allocation
page read and write
21732854000
heap
page read and write
7FF4BA8B3000
trusted library allocation
page execute read
1D9F000
heap
page read and write
7DE000
stack
page read and write
2A61000
heap
page read and write
2E268000
heap
page read and write
379E000
heap
page read and write
50EB000
trusted library allocation
page read and write
F8A000
trusted library allocation
page execute and read and write
37DD000
heap
page read and write
37A7000
heap
page read and write
60B0000
trusted library allocation
page execute and read and write
52EE000
stack
page read and write
1F0000
unkown
page readonly
217327A0000
heap
page read and write
D28000
heap
page read and write
61ED0000
direct allocation
page read and write
31B1000
unkown
page read and write
19A000
stack
page read and write
3EEE000
trusted library allocation
page read and write
AFB000
stack
page read and write
2C6D000
stack
page read and write
379C000
heap
page read and write
34EDA000
heap
page read and write
9CA000
heap
page read and write
4FF9000
trusted library allocation
page read and write
7FF8389E5000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
220C6000
heap
page read and write
220E0000
heap
page read and write
56F5000
trusted library allocation
page read and write
1177000
heap
page read and write
2F16000
trusted library allocation
page read and write
4C04000
unkown
page read and write
C92000
heap
page read and write
53DE000
direct allocation
page read and write
217196D2000
trusted library allocation
page read and write
220DB000
heap
page read and write
17D4000
trusted library allocation
page read and write
18CB000
trusted library allocation
page read and write
138D000
heap
page read and write
3782000
heap
page read and write
79EE000
stack
page read and write
37A2000
heap
page read and write
14F4000
heap
page read and write
5EC0000
trusted library allocation
page read and write
75E000
unkown
page read and write
A25000
heap
page read and write
2E260000
heap
page read and write
31D4000
unkown
page read and write
2C98000
trusted library allocation
page read and write
614E000
stack
page read and write
76F0000
heap
page read and write
347E0FF000
stack
page read and write
373E000
heap
page read and write
7FF838920000
trusted library allocation
page read and write
347E8FB000
stack
page read and write
A1D000
heap
page read and write
A3B000
heap
page read and write
7700000
trusted library allocation
page read and write
1B20000
heap
page read and write
31D4000
unkown
page read and write
2DFB000
trusted library allocation
page read and write
707E000
stack
page read and write
F86000
trusted library allocation
page execute and read and write
37B8000
heap
page read and write
3701000
heap
page read and write
A19000
heap
page read and write
71A000
stack
page read and write
30C4000
trusted library allocation
page read and write
21717AF3000
heap
page read and write
412F000
stack
page read and write
D83000
trusted library allocation
page execute and read and write
2E69000
trusted library allocation
page read and write
217381B0000
trusted library allocation
page read and write
21731D34000
heap
page read and write
21731DD3000
heap
page read and write
774000
heap
page read and write
1D2F000
heap
page read and write
5DBC000
stack
page read and write
6C6C1000
unkown
page execute read
1389000
heap
page read and write
1800000
trusted library allocation
page read and write
A07000
heap
page read and write
2F4D000
trusted library allocation
page read and write
40C000
unkown
page read and write
5ED8000
trusted library allocation
page read and write
7FF4BA8CB000
trusted library allocation
page execute read
1C4E000
stack
page read and write
50F0000
trusted library allocation
page read and write
3040000
unkown
page read and write
24EE000
direct allocation
page read and write
334F000
stack
page read and write
37B8000
heap
page read and write
2D66000
trusted library allocation
page read and write
372E000
heap
page read and write
69B2000
heap
page read and write
220DA000
heap
page read and write
6987000
heap
page read and write
2FDF000
heap
page read and write
3787000
heap
page read and write
3C97000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
6C86D000
unkown
page read and write
217196CA000
trusted library allocation
page read and write
347E2FE000
stack
page read and write
2FE0000
trusted library allocation
page read and write
220ED000
heap
page read and write
BA0000
heap
page read and write
1F1000
unkown
page execute read
2BB4000
unkown
page read and write
1386000
heap
page read and write
347F37A000
stack
page read and write
28202000
heap
page read and write
28130000
heap
page read and write
37B8000
heap
page read and write
37BA000
heap
page read and write
3782000
heap
page read and write
402E000
stack
page read and write
3CA4000
trusted library allocation
page read and write
7FF4BA8C2000
trusted library allocation
page readonly
2BE0000
unkown
page readonly
217327CC000
heap
page read and write
56C6000
trusted library allocation
page read and write
42AC000
stack
page read and write
3780000
heap
page read and write
2173615C000
heap
page read and write
37DD000
heap
page read and write
9DB000
heap
page read and write
379B000
heap
page read and write
1DB4000
heap
page read and write
2FC5000
heap
page read and write
9C4000
heap
page read and write
7FF838760000
trusted library allocation
page read and write
813000
unkown
page readonly
A48000
heap
page read and write
220C2000
heap
page read and write
2BB4000
unkown
page read and write
413000
unkown
page readonly
4FDD000
trusted library allocation
page read and write
37B8000
heap
page read and write
30F7000
trusted library allocation
page read and write
B40000
heap
page read and write
2A7C000
stack
page read and write
9D3000
heap
page read and write
2FDF000
heap
page read and write
9F9000
heap
page read and write
28156000
heap
page read and write
37A2000
heap
page read and write
4ACD000
stack
page read and write
347EF3E000
stack
page read and write
5EEF000
trusted library allocation
page read and write
21731D7E000
heap
page read and write
31D4000
unkown
page read and write
1900000
heap
page execute and read and write
770000
heap
page read and write
FB9000
stack
page read and write
7FF8389EC000
trusted library allocation
page read and write
21717B45000
heap
page read and write
347EF7E000
stack
page read and write
41E5000
trusted library allocation
page read and write
30FF000
stack
page read and write
30E5000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
21717A80000
trusted library allocation
page read and write
3789000
heap
page read and write
220E0000
heap
page read and write
3721000
heap
page read and write
76D000
unkown
page read and write
7FF838A00000
trusted library allocation
page execute and read and write
24FD000
direct allocation
page read and write
347ECF6000
stack
page read and write
3792000
heap
page read and write
14F0000
heap
page read and write
1F1000
unkown
page execute read
2A61000
heap
page read and write
2173608B000
heap
page read and write
7FF838B10000
trusted library allocation
page read and write
2FD7000
heap
page read and write
2C36000
trusted library allocation
page read and write
14F4000
heap
page read and write
401000
unkown
page execute read
21738BD0000
trusted library section
page read and write
56CC000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
3C46000
trusted library allocation
page read and write
220ED000
heap
page read and write
774000
heap
page read and write
2FE9000
heap
page read and write
7FF838784000
trusted library allocation
page read and write
14F4000
heap
page read and write
5ADF000
stack
page read and write
2BD1000
trusted library allocation
page read and write
22178000
heap
page read and write
1F1000
unkown
page execute read
774000
heap
page read and write
3782000
heap
page read and write
2FDD000
heap
page read and write
21717B20000
trusted library section
page read and write
310D000
trusted library allocation
page read and write
1F5000
heap
page read and write
7FF838C30000
trusted library allocation
page read and write
400000
unkown
page readonly
220DD000
heap
page read and write
17D3000
trusted library allocation
page execute and read and write
7FF838984000
trusted library allocation
page read and write
7FF838CB0000
trusted library allocation
page execute and read and write
2FD4000
heap
page read and write
358F0000
heap
page read and write
3260000
heap
page read and write
F9B000
trusted library allocation
page execute and read and write
7FF4BA8B0000
trusted library allocation
page readonly
4550000
trusted library allocation
page read and write
346F000
unkown
page read and write
3738000
heap
page read and write
220D6000
heap
page read and write
4D68000
heap
page read and write
453D000
heap
page read and write
DA6000
heap
page read and write
3836000
heap
page read and write
7FF8389D0000
trusted library allocation
page read and write
1CDA000
heap
page read and write
21717A60000
trusted library allocation
page read and write
7FF838CD0000
trusted library allocation
page read and write
21713E72000
unkown
page readonly
21735FB0000
heap
page read and write
7FF83876D000
trusted library allocation
page execute and read and write
1A40000
heap
page read and write
2AFC000
stack
page read and write
2BB4000
unkown
page read and write
2BCB000
trusted library allocation
page read and write
220FD000
heap
page read and write
2DA4000
trusted library allocation
page read and write
1F0000
unkown
page readonly
2EE3000
trusted library allocation
page read and write
24BB000
direct allocation
page read and write
1A1D000
unkown
page readonly
3580000
unkown
page read and write
3725000
heap
page read and write
3728000
heap
page read and write
9C0000
heap
page read and write
61ECC000
direct allocation
page read and write
2815C000
heap
page read and write
5EDF000
trusted library allocation
page read and write
6B5F000
stack
page read and write
21732771000
heap
page read and write
220E8000
heap
page read and write
CAE000
heap
page read and write
37DD000
heap
page read and write
980000
heap
page read and write
21736452000
trusted library allocation
page read and write
18C0000
trusted library allocation
page read and write
9E9000
heap
page read and write
3377000
heap
page read and write
5EC9000
trusted library allocation
page read and write
21731D90000
heap
page read and write
2D92000
trusted library allocation
page read and write
55F1000
unkown
page read and write
21717820000
heap
page read and write
6929000
heap
page read and write
37DD000
heap
page read and write
1125000
heap
page read and write
21731D66000
heap
page read and write
2BB4000
unkown
page read and write
2173604B000
heap
page read and write
379C000
heap
page read and write
2E26E000
heap
page read and write
24BD000
direct allocation
page read and write
5CCF000
stack
page read and write
41F6000
heap
page read and write
5410000
trusted library allocation
page execute and read and write
6992000
heap
page read and write
3782000
heap
page read and write
37DE000
heap
page read and write
3C1D000
trusted library allocation
page read and write
379F000
heap
page read and write
21717B30000
trusted library section
page read and write
3745000
heap
page read and write
774000
heap
page read and write
37A2000
heap
page read and write
1AE5000
heap
page read and write
372E000
heap
page read and write
21736243000
heap
page read and write
2504000
direct allocation
page read and write
2CD1000
trusted library allocation
page read and write
2816E000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1B6E000
stack
page read and write
3390000
heap
page read and write
2173290B000
heap
page read and write
7FF838B40000
trusted library allocation
page read and write
28152000
heap
page read and write
37CE000
stack
page read and write
21731DA0000
heap
page read and write
220D6000
heap
page read and write
21731D27000
heap
page read and write
7FF8389C0000
trusted library allocation
page read and write
24C6000
direct allocation
page read and write
56E1000
trusted library allocation
page read and write
281B2000
heap
page read and write
3747000
heap
page read and write
21732915000
heap
page read and write
37BB000
heap
page read and write
7FF4BA8D0000
trusted library allocation
page execute and read and write
7FF838912000
trusted library allocation
page read and write
4BBC000
unkown
page read and write
37B8000
heap
page read and write
2DA0000
unkown
page readonly
220FC000
heap
page read and write
31A4000
unkown
page read and write
7279000
stack
page read and write
14F4000
heap
page read and write
21719341000
trusted library allocation
page read and write
7FF4BA8C5000
trusted library allocation
page execute read
7FF838A70000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
37A1000
heap
page read and write
1CCF000
stack
page read and write
3B21000
trusted library allocation
page read and write
27F0000
heap
page read and write
3795000
heap
page read and write
400000
unkown
page readonly
4900000
unkown
page read and write
6CB0000
trusted library allocation
page read and write
3C8B000
trusted library allocation
page read and write
19D000
stack
page read and write
220FC000
heap
page read and write
1BF11000
heap
page read and write
6CC0000
trusted library section
page read and write
7FF83892E000
trusted library allocation
page read and write
410D000
unkown
page read and write
F82000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
361E000
stack
page read and write
21717AA0000
heap
page execute and read and write
413000
unkown
page readonly
69A4000
heap
page read and write
6C877000
unkown
page readonly
A09000
heap
page read and write
37DD000
heap
page read and write
300F000
trusted library allocation
page read and write
7FF838930000
trusted library allocation
page read and write
6BDCF000
unkown
page write copy
21732270000
trusted library section
page read and write
2C40000
trusted library allocation
page read and write
1F0000
unkown
page readonly
21738110000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
3745000
heap
page read and write
FFE000
stack
page read and write
BC0000
heap
page read and write
A16000
heap
page read and write
2BB4000
unkown
page read and write
3747000
heap
page read and write
BB0000
heap
page read and write
5600000
unkown
page read and write
21719982000
trusted library allocation
page read and write
7FF838A26000
trusted library allocation
page read and write
2DED000
stack
page read and write
2F40000
heap
page read and write
31A4000
unkown
page read and write
21717846000
heap
page read and write
32C2000
heap
page read and write
21731C70000
trusted library section
page read and write
22168000
heap
page read and write
7FF838976000
trusted library allocation
page read and write
2D90000
unkown
page readonly
7FF4BA8C6000
trusted library allocation
page readonly
378F000
stack
page read and write
37B8000
heap
page read and write
7FF838780000
trusted library allocation
page read and write
139C000
heap
page read and write
1918000
trusted library allocation
page read and write
3728000
heap
page read and write
1A98000
heap
page read and write
7FF8389D4000
trusted library allocation
page read and write
9ED000
heap
page read and write
28150000
heap
page read and write
21736022000
heap
page read and write
5F10000
trusted library allocation
page read and write
2173286C000
heap
page read and write
2A61000
heap
page read and write
1BBE000
stack
page read and write
379C000
heap
page read and write
400000
unkown
page read and write
220D3000
heap
page read and write
2E73000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
5369000
direct allocation
page read and write
3780000
heap
page read and write
347F47E000
stack
page read and write
4BBF000
stack
page read and write
37DD000
heap
page read and write
39F1000
heap
page read and write
21732874000
heap
page read and write
1770000
heap
page read and write
324E000
stack
page read and write
21735FEE000
heap
page read and write
21731DCA000
heap
page read and write
41C000
unkown
page execute read
22102000
heap
page read and write
2C9B000
trusted library allocation
page read and write
7FF838970000
trusted library allocation
page read and write
7FF838960000
trusted library allocation
page read and write
21731D09000
heap
page read and write
A10000
heap
page read and write
378D000
heap
page read and write
1F7000
heap
page read and write
51E0000
trusted library allocation
page execute and read and write
2BB4000
unkown
page read and write
32B2000
heap
page read and write
3749000
heap
page read and write
596E000
stack
page read and write
63C0000
trusted library allocation
page execute and read and write
2BF0000
heap
page read and write
37B8000
heap
page read and write
140E000
heap
page read and write
220FD000
heap
page read and write
412000
unkown
page readonly
37A2000
heap
page read and write
217361A3000
heap
page read and write
3C25000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
1F0000
heap
page read and write
356F000
unkown
page read and write
5310000
trusted library allocation
page execute and read and write
322E000
unkown
page read and write
2C77000
trusted library allocation
page read and write
1ADE000
heap
page read and write
21731D73000
heap
page read and write
7FF838763000
trusted library allocation
page execute and read and write
21736058000
heap
page read and write
3738000
heap
page read and write
37DD000
heap
page read and write
A38000
heap
page read and write
40C000
unkown
page read and write
1BF20000
heap
page read and write
1170000
heap
page read and write
37DD000
heap
page read and write
409000
unkown
page write copy
2DFE000
unkown
page read and write
358E000
stack
page read and write
7FF8387BC000
trusted library allocation
page execute and read and write
87E000
unkown
page readonly
13E7000
heap
page read and write
A3E000
heap
page read and write
6C81D000
unkown
page read and write
5A11000
unkown
page read and write
2173286E000
heap
page read and write
2FCE000
heap
page read and write
37B9000
heap
page read and write
586E000
stack
page read and write
32B2000
heap
page read and write
2D99000
trusted library allocation
page read and write
3782000
heap
page read and write
32B0000
heap
page read and write
3780000
heap
page read and write
1BF11000
heap
page read and write
217327AB000
heap
page read and write
320F000
stack
page read and write
2BB4000
unkown
page read and write
378B000
heap
page read and write
1A30000
heap
page read and write
217316CC000
heap
page read and write
18FB000
trusted library allocation
page read and write
55F1000
unkown
page read and write
3230000
heap
page read and write
21731C80000
heap
page execute and read and write
6C7D7000
unkown
page readonly
6BE60000
unkown
page readonly
3780000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
3795000
heap
page read and write
33F0000
heap
page read and write
14F4000
heap
page read and write
3D50000
trusted library allocation
page read and write
7FF838B20000
trusted library allocation
page read and write
2173620E000
heap
page read and write
220CA000
heap
page read and write
347E7FB000
stack
page read and write
774000
heap
page read and write
1348000
heap
page read and write
529F000
stack
page read and write
FF740000
trusted library allocation
page execute and read and write
2BB4000
unkown
page read and write
220ED000
heap
page read and write
6C710000
unkown
page readonly
3780000
heap
page read and write
220E0000
heap
page read and write
1D4F000
stack
page read and write
37B8000
heap
page read and write
3782000
heap
page read and write
28171000
heap
page read and write
2BB4000
unkown
page read and write
13F3000
heap
page read and write
2DCB000
heap
page read and write
220F5000
heap
page read and write
4FBE000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
21731FB0000
trusted library section
page read and write
24C4000
direct allocation
page read and write
4F60000
trusted library allocation
page read and write
34AF000
stack
page read and write
E8E000
stack
page read and write
2E5D000
trusted library allocation
page read and write
2173294A000
heap
page read and write
2BB4000
unkown
page read and write
21736046000
heap
page read and write
2CE1000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
945000
heap
page read and write
5D78000
stack
page read and write
2BB4000
unkown
page read and write
C4F000
stack
page read and write
220EC000
heap
page read and write
9FB000
heap
page read and write
220E0000
heap
page read and write
2CD6000
trusted library allocation
page read and write
21731D60000
heap
page read and write
1AEA000
heap
page read and write
7FF838934000
trusted library allocation
page read and write
761000
unkown
page read and write
31DE000
stack
page read and write
2ED5000
trusted library allocation
page read and write
6C6C0000
unkown
page readonly
400000
unkown
page execute and read and write
3795000
heap
page read and write
3870000
heap
page read and write
2BB4000
unkown
page read and write
30FC000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
3F27000
heap
page read and write
401000
unkown
page execute read
3795000
heap
page read and write
1920000
heap
page read and write
EAB000
stack
page read and write
2D4C000
stack
page read and write
21F89000
heap
page read and write
1B25000
heap
page read and write
220DD000
heap
page read and write
21736015000
heap
page read and write
2173619F000
heap
page read and write
29C2000
heap
page read and write
7FF838CA0000
trusted library allocation
page read and write
1AC9000
heap
page read and write
217196C4000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
21731D85000
heap
page read and write
186E000
stack
page read and write
147E000
stack
page read and write
24B0000
direct allocation
page read and write
21717720000
unkown
page readonly
7FF4BA8CC000
trusted library allocation
page readonly
21719770000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
A12000
heap
page read and write
37DD000
heap
page read and write
3748000
heap
page read and write
2F62000
trusted library allocation
page read and write
220FD000
heap
page read and write
220DB000
heap
page read and write
347DDDF000
stack
page read and write
220D3000
heap
page read and write
2F74000
trusted library allocation
page read and write
37A1000
heap
page read and write
539E000
stack
page read and write
17E0000
trusted library allocation
page read and write
400000
unkown
page write copy
37E0000
heap
page read and write
21732990000
trusted library allocation
page read and write
37B8000
heap
page read and write
33F1000
heap
page read and write
21715CAB000
unkown
page readonly
21717B90000
heap
page read and write
4FD1000
trusted library allocation
page read and write
37B8000
heap
page read and write
7FF838952000
trusted library allocation
page read and write
5A4F000
stack
page read and write
2FDF000
heap
page read and write
32B7000
heap
page read and write
55F0000
unkown
page read and write
21713E70000
unkown
page readonly
78ED000
stack
page read and write
42B0000
unkown
page read and write
FE6000
heap
page read and write
41E1000
trusted library allocation
page read and write
7480000
heap
page read and write
5EC2000
trusted library allocation
page read and write
21731C9D000
heap
page read and write
2D5E000
unkown
page read and write
21717B40000
heap
page read and write
2FCD000
heap
page read and write
2BB4000
unkown
page read and write
21731D5C000
heap
page read and write
7FF838846000
trusted library allocation
page execute and read and write
368B000
heap
page read and write
1C00000
heap
page read and write
220DC000
heap
page read and write
7AB000
stack
page read and write
2D68000
trusted library allocation
page read and write
1F0000
unkown
page readonly
2D0E000
unkown
page read and write
30FA000
stack
page read and write
AF8000
stack
page read and write
5240000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
21738100000
trusted library allocation
page read and write
5240000
direct allocation
page read and write
2F90000
heap
page read and write
2BB4000
unkown
page read and write
2BB4000
unkown
page read and write
3E7D000
trusted library allocation
page read and write
3782000
heap
page read and write
217148AB000
unkown
page readonly
220C3000
heap
page read and write
26EF000
stack
page read and write
1F1000
unkown
page execute read
9D7000
heap
page read and write
220EF000
heap
page read and write
16B0000
heap
page read and write
3862000
heap
page read and write
2E70000
heap
page read and write
3780000
heap
page read and write
21731D40000
heap
page read and write
217360C8000
heap
page read and write
220DA000
heap
page read and write
A03000
heap
page read and write
217293A4000
trusted library allocation
page read and write
419000
unkown
page write copy
7FF838C70000
trusted library allocation
page read and write
2FC9000
heap
page read and write
535E000
stack
page read and write
FA9000
stack
page read and write
3042000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
7FF4BA8C7000
trusted library allocation
page execute read
2BB4000
unkown
page read and write
B3E000
stack
page read and write
31D4000
unkown
page read and write
37DD000
heap
page read and write
400000
unkown
page read and write
A0C000
heap
page read and write
2820000
heap
page read and write
3021000
trusted library allocation
page read and write
774000
heap
page read and write
2BB4000
unkown
page read and write
582E000
unkown
page read and write
31D0000
heap
page read and write
1BD9E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
6BEDD000
unkown
page readonly
379F000
heap
page read and write
2F6E000
trusted library allocation
page read and write
3735000
heap
page read and write
3795000
heap
page read and write
447000
unkown
page execute and read and write
7FF838B00000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
467D000
trusted library allocation
page read and write
347DD8B000
stack
page read and write
76F000
unkown
page read and write
220E0000
heap
page read and write
2E20000
heap
page read and write
220FD000
heap
page read and write
60E0000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
31AC000
heap
page read and write
18E0000
trusted library allocation
page read and write
9CF000
heap
page read and write
2CEC000
stack
page read and write
21731C84000
heap
page execute and read and write
378B000
heap
page read and write
5420000
trusted library allocation
page read and write
3680000
heap
page read and write
1040000
trusted library allocation
page execute and read and write
1BA1F000
stack
page read and write
3780000
heap
page read and write
1670000
heap
page read and write
21729341000
trusted library allocation
page read and write
21731D38000
heap
page read and write
220E0000
heap
page read and write
3070000
heap
page read and write
7FF838A38000
trusted library allocation
page read and write
33E0000
heap
page read and write
2A60000
heap
page read and write
30B6000
trusted library allocation
page read and write
372E000
heap
page read and write
24AC000
heap
page read and write
220E0000
heap
page read and write
220EF000
heap
page read and write
6C9D000
stack
page read and write
56DE000
trusted library allocation
page read and write
5650000
direct allocation
page read and write
57EE000
direct allocation
page read and write
6E40000
heap
page read and write
2BB4000
unkown
page read and write
2BC0000
unkown
page readonly
220ED000
heap
page read and write
2FC8000
heap
page read and write
7FF8389A0000
trusted library allocation
page read and write
1340000
heap
page read and write
1B20000
heap
page read and write
5244000
trusted library allocation
page read and write
217322F0000
trusted library section
page read and write
3830000
heap
page read and write
37BA000
heap
page read and write
9FC000
heap
page read and write
217196B4000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
2171980A000
trusted library allocation
page read and write
3782000
heap
page read and write
900000
heap
page read and write
21738130000
trusted library section
page read and write
3270000
heap
page read and write
37B9000
heap
page read and write
419000
unkown
page write copy
7FF4BA8C3000
trusted library allocation
page execute read
2F5E000
trusted library allocation
page read and write
37DD000
heap
page read and write
3739000
heap
page read and write
217196A3000
trusted library allocation
page read and write
39B0000
direct allocation
page read and write
31A4000
unkown
page read and write
2E15000
trusted library allocation
page read and write
2171785E000
heap
page read and write
2BE7000
trusted library allocation
page read and write
4230000
unkown
page read and write
220C5000
heap
page read and write
778000
unkown
page read and write
537E000
stack
page read and write
220D3000
heap
page read and write
5590000
heap
page read and write
7FF838902000
trusted library allocation
page read and write
36E0000
direct allocation
page read and write
63D0000
trusted library allocation
page read and write
7FF838820000
trusted library allocation
page execute and read and write
3782000
heap
page read and write
140B000
heap
page read and write
2D90000
direct allocation
page read and write
2FD2000
heap
page read and write
2DC0000
heap
page read and write
53F0000
trusted library allocation
page read and write
21731340000
trusted library allocation
page read and write
37B8000
heap
page read and write
C8E000
heap
page read and write
5A11000
unkown
page read and write
7FF83881C000
trusted library allocation
page execute and read and write
774000
heap
page read and write
7FF838B60000
trusted library allocation
page read and write
21732960000
trusted library allocation
page read and write
217383D0000
trusted library allocation
page read and write
7FF838A20000
trusted library allocation
page read and write
31D4000
unkown
page read and write
21717B95000
heap
page read and write
4FE4000
heap
page read and write
412000
unkown
page readonly
2173290E000
heap
page read and write
515D000
stack
page read and write
549000
unkown
page execute and read and write
7FF838816000
trusted library allocation
page read and write
2BB4000
unkown
page read and write
7FF4BA8C4000
trusted library allocation
page readonly
7FF4BA8C9000
trusted library allocation
page execute read
7FF838B37000
trusted library allocation
page read and write
37A3000
heap
page read and write
217360B3000
heap
page read and write
6C827000
unkown
page readonly
372B000
heap
page read and write
37DD000
heap
page read and write
4FCA000
trusted library allocation
page read and write
12FB000
stack
page read and write
21736071000
heap
page read and write
There are 1520 hidden memdumps, click here to show them.