IOC Report
4BfhCycV4B.exe

loading gif

Files

File Path
Type
Category
Malicious
4BfhCycV4B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Qg_Appv5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\fak
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3z0.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3z0.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ypbquxnwo
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGDAKEHIIDGDAAKECBFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BQJUWOYRTO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CGDBGCBGIDHCBGDHIEBFHCBFHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DGCGDBGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DGCGDBGCAAEBFIECGHDGCAAEGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DUUDTUBZFW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EBAKFIIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EFOYFBOLXA.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EHDAFIJJECFHJJKFCAKJJKEHID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EIVQSAOTAQ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FCGIJKJJKEBGHJKFIDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FGAWOVZUJP.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GRXZDKKVDB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HDGCGHIJKEGIECBFCBAECGIEBK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4BfhCycV4B.exe_efbe2ea1df186f15b396e081ebab3a86d1acd744_4892bd79_389c1736-85f1-40e3-b174-145367d5ec86\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u3z0.0.exe_2a63b4411af5b91984e3ab9b70e5a8cf4198c2f_16d0516e_412c9ff8-0d4e-400a-8d3e-5265efddec06\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F11.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 07:28:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER402C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER408A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER667F.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 07:28:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6836.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68D3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWCXBPIUYI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWCXBPIUYI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\WSHEJMDVQC.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\5031d305a611656da7ab8203ae6a6b12e704f90cc3b1d89a8de243f466cad47b\433xbfbj.3vv
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\driverRemote_debug\groupware.wav
data
dropped
C:\Users\user\AppData\Local\Temp\driverRemote_debug\macrospore.indd
data
dropped
C:\Users\user\AppData\Local\Temp\e7b0f02f
PNG image data, 3680 x 2256, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\eb11c30d
data
dropped
C:\Users\user\AppData\Local\Temp\f82d66fe
data
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\pkrvj
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 06:28:17 2024, mtime=Tue Apr 23 06:28:17 2024, atime=Tue Apr 23 06:28:17 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\tmp29BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp29CA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp29CB.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3A7C.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp673E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp74CC.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7C55.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp851.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp98A7.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp98A8.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp98B8.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpA26A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\driverRemote_debug\groupware.wav
data
dropped
C:\Users\user\AppData\Roaming\driverRemote_debug\macrospore.indd
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 69 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4BfhCycV4B.exe
"C:\Users\user\Desktop\4BfhCycV4B.exe"
malicious
C:\Users\user\AppData\Local\Temp\u3z0.0.exe
"C:\Users\user\AppData\Local\Temp\u3z0.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\Qg_Appv5.exe
"C:\Users\user\AppData\Local\Temp\Qg_Appv5.exe"
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u3z0.1.exe
"C:\Users\user\AppData\Local\Temp\u3z0.1.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
"C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5148 -s 1124
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6300 -s 2188
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpc906315950e2729657ad6775bff99-release2f2345b38ae43488aec06
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllI
unknown
https://support.iolo.com/support
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://www.ecosia.org/newtab/
unknown
http://ocsp.sectigo.com0&
unknown
http://www.symauth.com/cps0(
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpnts
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://91.215.85.66:9000/wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F
unknown
https://support.iolo.com/support/solutions/articles/44
unknown
http://note.padd.cn.com/1/Qg_Appv5.exe
176.97.76.106
http://www.symauth.com/rpa00
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php)
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://www.info-zip.org/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
https://scripts.sil.org/OFLins
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpA
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllc
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://google.com
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php-minuser-l1-1-0
unknown
http://185.172.128.228/ping.php?substr=eight
185.172.128.228
http://www.codeplex.com/prism
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpa
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpf
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpM
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpQ
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
http://185.172.128.76/3cd2b41cbde8fc9c.phpY
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.06
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://91.215.85.66:9000
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/microsoft/ApplicationInsights-dotnet/issues/2560
unknown
http://ocsp.thawte.com0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://www.vmware.com/0/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpt
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpu
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpft
unknown
https://pastebin.com/raw/z9pYkqPQ
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
iolo0.b-cdn.net
185.93.1.244
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
windowsupdatebg.s.llnwi.net
69.164.42.0
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
TypesSupported
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
ProgramId
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
FileId
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
LowerCaseLongPath
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
LongPathHash
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
Name
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
OriginalFileName
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
Publisher
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
Version
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
BinFileVersion
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
BinaryType
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
ProductName
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
ProductVersion
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
LinkDate
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
BinProductVersion
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
AppxPackageFullName
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
AppxPackageRelativeId
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
Size
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
Language
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\4bfhcycv4b.exe|c24daf5fde12510
Usn
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
ProgramId
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
FileId
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
LowerCaseLongPath
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
LongPathHash
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
Name
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
OriginalFileName
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
Publisher
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
Version
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
BinFileVersion
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
BinaryType
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
ProductName
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
ProductVersion
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
LinkDate
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
BinProductVersion
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
AppxPackageFullName
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
AppxPackageRelativeId
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
Size
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
Language
\REGISTRY\A\{3e73f158-0d5e-fd66-6282-be49f7f35ca6}\Root\InventoryApplicationFile\u3z0.0.exe|b88d6086c6d71df4
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000FF8312B9C
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
There are 74 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4402000
heap
page read and write
malicious
13E37370000
trusted library section
page read and write
malicious
13E4FF10000
trusted library section
page read and write
malicious
41F0000
direct allocation
page read and write
malicious
5361000
trusted library allocation
page read and write
malicious
34E5000
heap
page read and write
malicious
41C0000
direct allocation
page execute and read and write
malicious
4DC4000
trusted library allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
5DB0000
direct allocation
page read and write
malicious
3B73000
heap
page read and write
malicious
13E34F8B000
unkown
page readonly
malicious
36F0000
heap
page read and write
malicious
53C0000
direct allocation
page read and write
malicious
13E31D8B000
unkown
page readonly
malicious
2EEC000
trusted library allocation
page read and write
6CE0D000
unkown
page read and write
CC4000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
7FF848980000
trusted library allocation
page read and write
2944000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
4A17000
heap
page read and write
34E5000
trusted library allocation
page read and write
24839000
heap
page read and write
13E4FCC9000
heap
page read and write
1391000
unkown
page readonly
40F000
unkown
page execute read
1480000
heap
page read and write
131C000
unkown
page readonly
29F7000
direct allocation
page read and write
13E54383000
heap
page read and write
5B1D000
stack
page read and write
2930000
trusted library allocation
page read and write
5672000
trusted library allocation
page read and write
30F4000
unkown
page read and write
52A1000
unkown
page read and write
786E000
stack
page read and write
13E50160000
trusted library section
page read and write
742D000
stack
page read and write
CE0000
heap
page read and write
2BE0000
heap
page read and write
2D53000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
18D0000
heap
page read and write
3035000
heap
page read and write
9DE000
heap
page read and write
1648000
heap
page read and write
1179000
unkown
page write copy
2EC9000
trusted library allocation
page read and write
6C2AD000
unkown
page read and write
FF0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page execute and read and write
13E51E0C000
heap
page read and write
2FC7000
trusted library allocation
page read and write
2664000
direct allocation
page read and write
2A00000
direct allocation
page read and write
9FF000
heap
page read and write
35CE000
trusted library allocation
page read and write
7FF848CB6000
trusted library allocation
page read and write
34EB000
heap
page read and write
3B0E000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
C40000
heap
page read and write
16BD000
heap
page read and write
197000
stack
page read and write
24836000
heap
page read and write
14B5000
heap
page read and write
13E31D52000
unkown
page readonly
1520000
heap
page read and write
4296000
heap
page read and write
30F4000
unkown
page read and write
894000
heap
page read and write
363A000
trusted library allocation
page read and write
13E4FD0F000
heap
page read and write
26E4000
direct allocation
page read and write
65DE000
stack
page read and write
13E35A40000
trusted library section
page read and write
A8C000
unkown
page readonly
7FF8489F0000
trusted library allocation
page read and write
2A0D000
direct allocation
page read and write
2D86000
trusted library allocation
page read and write
72ED000
heap
page read and write
302A000
heap
page read and write
30A7000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
6C7CE000
unkown
page read and write
E20000
heap
page read and write
29E0000
direct allocation
page read and write
2E91000
heap
page read and write
13E51E59000
heap
page read and write
2E91000
heap
page read and write
50B9000
trusted library allocation
page read and write
7FF848A2C000
trusted library allocation
page read and write
42ED000
heap
page execute and read and write
14FD000
trusted library allocation
page execute and read and write
34D9000
trusted library allocation
page read and write
50C0000
heap
page read and write
BA0000
heap
page read and write
E94000
heap
page read and write
43E6000
trusted library allocation
page read and write
13E35A20000
trusted library section
page read and write
B40000
heap
page read and write
83C8000
trusted library allocation
page read and write
30F4000
unkown
page read and write
41F0000
heap
page read and write
9062BB000
stack
page read and write
76A000
unkown
page read and write
CC0000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
13E51EDB000
heap
page read and write
3032000
heap
page read and write
13E4FE00000
heap
page read and write
528F000
trusted library allocation
page read and write
3041000
heap
page read and write
7FF8487A4000
trusted library allocation
page read and write
373F000
heap
page read and write
30F4000
unkown
page read and write
13E37561000
trusted library allocation
page read and write
9057FE000
stack
page read and write
13E502E0000
trusted library allocation
page read and write
D8E000
stack
page read and write
61EB4000
direct allocation
page read and write
4EF000
unkown
page readonly
7BF0000
heap
page read and write
E42000
heap
page read and write
24835000
heap
page read and write
ED4000
heap
page read and write
B3E000
stack
page read and write
3C33000
trusted library allocation
page read and write
7FF848860000
trusted library allocation
page execute and read and write
2A6C000
direct allocation
page read and write
6B6E000
stack
page read and write
13E506C0000
trusted library section
page read and write
7FF84896E000
trusted library allocation
page read and write
2C30000
heap
page read and write
5E42000
trusted library allocation
page read and write
13E543CF000
heap
page read and write
30F4000
unkown
page read and write
2E51000
trusted library allocation
page read and write
D24000
heap
page read and write
30CE000
trusted library allocation
page read and write
601E000
heap
page read and write
6B16000
heap
page read and write
643B000
stack
page read and write
7FF848B30000
trusted library allocation
page read and write
A9E000
unkown
page readonly
13E356D0000
heap
page read and write
3000000
trusted library allocation
page read and write
24840000
heap
page read and write
A4D000
heap
page read and write
3037000
heap
page read and write
7FF848A78000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
364F000
trusted library allocation
page read and write
6C2B7000
unkown
page readonly
2DF2000
heap
page read and write
2D90000
heap
page read and write
26F2000
direct allocation
page read and write
6770000
trusted library allocation
page read and write
A68000
unkown
page readonly
6C7E1000
unkown
page execute read
5640000
trusted library allocation
page read and write
A98000
unkown
page readonly
7FF848974000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
34CE000
trusted library allocation
page read and write
6D70000
trusted library allocation
page execute and read and write
2E89000
trusted library allocation
page read and write
7FF8489B6000
trusted library allocation
page read and write
6B31000
heap
page read and write
AA2000
unkown
page readonly
4EC000
unkown
page readonly
5FB1000
trusted library allocation
page read and write
636000
unkown
page execute and read and write
13E54439000
heap
page read and write
17E9000
trusted library allocation
page read and write
7FF4895C4000
trusted library allocation
page readonly
1170000
unkown
page write copy
24840000
heap
page read and write
111F000
stack
page read and write
192000
stack
page read and write
67A0000
trusted library allocation
page read and write
26BF000
direct allocation
page read and write
14A0000
heap
page read and write
17CC000
stack
page read and write
3120000
trusted library allocation
page read and write
FF630000
trusted library allocation
page execute and read and write
13E579F0000
heap
page read and write
4023000
unkown
page readonly
A13000
heap
page read and write
32BE000
stack
page read and write
5DDC000
heap
page read and write
3644000
trusted library allocation
page read and write
ED0000
heap
page read and write
13E51F56000
heap
page read and write
13E5420D000
heap
page read and write
13E502F0000
heap
page execute and read and write
43BE000
heap
page read and write
2990000
heap
page execute and read and write
A32000
heap
page read and write
30F4000
unkown
page read and write
A35000
unkown
page readonly
3828000
trusted library allocation
page read and write
894000
heap
page read and write
2B4E000
unkown
page read and write
796D000
stack
page read and write
1917000
heap
page read and write
13E37947000
trusted library allocation
page read and write
13E51E09000
heap
page read and write
7071000
heap
page read and write
13E544CA000
heap
page read and write
1060000
trusted library allocation
page read and write
F61000
unkown
page execute read
7470000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
35B7000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
2A40000
direct allocation
page read and write
13E4FC23000
heap
page read and write
A2C000
unkown
page readonly
3000000
unkown
page read and write
13E564E0000
trusted library allocation
page read and write
ABB000
unkown
page readonly
52A0000
unkown
page read and write
7FF848952000
trusted library allocation
page read and write
2B84000
unkown
page read and write
2638000
heap
page read and write
5370000
trusted library allocation
page read and write
2B84000
unkown
page read and write
7FF848B17000
trusted library allocation
page read and write
137C000
unkown
page readonly
24825000
heap
page read and write
4227000
heap
page read and write
4270000
heap
page read and write
13B2000
unkown
page readonly
9ED000
heap
page read and write
30F4000
unkown
page read and write
1343000
unkown
page readonly
7FF4895CF000
trusted library allocation
page execute read
6C9BE000
unkown
page read and write
13E358D0000
heap
page read and write
5FD0000
trusted library allocation
page execute and read and write
9A8000
heap
page read and write
AC2000
unkown
page readonly
9067BE000
stack
page read and write
13E54137000
heap
page read and write
1502000
trusted library allocation
page read and write
59AE000
unkown
page read and write
7FF848CA0000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
A2F000
heap
page read and write
848E000
stack
page read and write
940000
heap
page read and write
24922000
heap
page read and write
419E000
stack
page read and write
16A1000
heap
page read and write
A1B000
heap
page read and write
510E000
stack
page read and write
2A1C000
direct allocation
page read and write
3096000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
9F0000
heap
page read and write
5DC0000
heap
page read and write
30F4000
unkown
page read and write
904DBB000
stack
page read and write
101F000
stack
page read and write
361C000
heap
page read and write
2C33000
heap
page read and write
340F000
trusted library allocation
page read and write
13B6000
unkown
page readonly
A57000
unkown
page readonly
377E000
trusted library allocation
page read and write
417000
unkown
page execute read
19C000
stack
page read and write
A0D000
unkown
page readonly
13E4FDC0000
heap
page read and write
5D70000
direct allocation
page read and write
FF7000
trusted library allocation
page execute and read and write
3010000
heap
page read and write
A96000
unkown
page readonly
A13000
heap
page read and write
75E0000
trusted library allocation
page execute and read and write
6A8E000
stack
page read and write
964000
heap
page read and write
550E000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
A2D000
heap
page read and write
ABA000
heap
page read and write
13E35A30000
trusted library section
page read and write
2B80000
heap
page read and write
2BDE000
unkown
page read and write
3B27000
trusted library allocation
page read and write
13E35A50000
heap
page read and write
33F0000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
2484B000
heap
page read and write
1E780000
trusted library allocation
page read and write
CE8000
heap
page read and write
26F9000
direct allocation
page read and write
33D6000
trusted library allocation
page read and write
4235000
unkown
page read and write
87C8000
trusted library allocation
page read and write
BDB000
unkown
page readonly
2D6F000
trusted library allocation
page read and write
DE0000
heap
page read and write
6C50000
heap
page read and write
1358000
unkown
page readonly
964000
heap
page read and write
6BB000
stack
page read and write
7FF4895C5000
trusted library allocation
page execute read
6DBE000
stack
page read and write
2655000
direct allocation
page read and write
13E51FAA000
heap
page read and write
24836000
heap
page read and write
2CB0000
trusted library allocation
page read and write
4B1F000
stack
page read and write
6C40000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
5279000
trusted library allocation
page read and write
1380000
unkown
page readonly
43DE000
heap
page read and write
61ED0000
direct allocation
page read and write
2920000
trusted library allocation
page read and write
A1B000
unkown
page readonly
13E4FCCD000
heap
page read and write
FA0000
heap
page read and write
7FF848950000
trusted library allocation
page read and write
320000
heap
page read and write
562E000
direct allocation
page read and write
2A954000
heap
page read and write
13E373B0000
heap
page read and write
2A8D1000
heap
page read and write
16AD000
heap
page read and write
26C6000
direct allocation
page read and write
2E46000
trusted library allocation
page read and write
3641000
trusted library allocation
page read and write
9054FA000
stack
page read and write
13E51E2F000
heap
page read and write
965000
heap
page read and write
13BA000
unkown
page readonly
2980000
trusted library allocation
page read and write
30F4000
unkown
page read and write
7FF848B60000
trusted library allocation
page read and write
2D0F000
heap
page read and write
AB9000
unkown
page readonly
30F1000
trusted library allocation
page read and write
6BD2000
heap
page read and write
13E541B8000
heap
page read and write
7728000
stack
page read and write
4225000
heap
page read and write
4FA0000
trusted library allocation
page execute and read and write
7FF848AF6000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
3753000
trusted library allocation
page read and write
D24000
heap
page read and write
A42000
unkown
page readonly
13E4FE40000
heap
page read and write
28AE000
stack
page read and write
13E4FE22000
heap
page read and write
312E000
stack
page read and write
D24000
heap
page read and write
302E000
heap
page read and write
2485C000
heap
page read and write
964000
heap
page read and write
6C267000
unkown
page readonly
400000
unkown
page readonly
3C2D000
trusted library allocation
page read and write
18CE000
stack
page read and write
33A9000
unkown
page read and write
3B1D000
heap
page read and write
1E670000
heap
page read and write
26B1000
direct allocation
page read and write
7FF4895B3000
trusted library allocation
page execute read
3037000
heap
page read and write
9CC000
heap
page read and write
8FE000
stack
page read and write
7B8000
stack
page read and write
3634000
trusted library allocation
page read and write
F61000
unkown
page execute read
4B3A000
heap
page read and write
341000
unkown
page execute read
5DD6000
heap
page read and write
9DE000
heap
page read and write
D24000
heap
page read and write
5019000
direct allocation
page read and write
7FF4895CB000
trusted library allocation
page execute read
2A1C000
heap
page read and write
29A8000
trusted library allocation
page read and write
43A000
unkown
page execute read
3330000
unkown
page read and write
3364000
trusted library allocation
page read and write
2700000
direct allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
6CE14000
unkown
page read and write
A2F000
heap
page read and write
2BA7000
heap
page read and write
38010000
heap
page read and write
2E20000
heap
page read and write
13E51E7D000
heap
page read and write
5E6F000
trusted library allocation
page read and write
2B1F000
stack
page read and write
7FF848A25000
trusted library allocation
page read and write
93E000
stack
page read and write
624000
unkown
page execute and read and write
32F1000
heap
page read and write
30F4000
unkown
page read and write
332F000
stack
page read and write
2ED1000
trusted library allocation
page read and write
90613A000
stack
page read and write
6C267000
unkown
page readonly
13E357D0000
heap
page read and write
960000
heap
page read and write
273F000
stack
page read and write
13E35A10000
heap
page execute and read and write
7FF848CB0000
trusted library allocation
page read and write
2C76000
trusted library allocation
page read and write
960000
heap
page read and write
5FF0000
heap
page read and write
13E51E03000
heap
page read and write
271D000
direct allocation
page read and write
2E15000
trusted library allocation
page read and write
28D0000
heap
page read and write
13E51E0E000
heap
page read and write
5BEE000
stack
page read and write
2F27000
trusted library allocation
page read and write
97000
stack
page read and write
A90000
heap
page read and write
132E000
unkown
page readonly
13E51FE1000
heap
page read and write
49CF000
stack
page read and write
3554000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
272C000
direct allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
3128000
trusted library allocation
page read and write
2550000
direct allocation
page execute and read and write
13E37550000
heap
page execute and read and write
4021000
unkown
page read and write
2D7B000
trusted library allocation
page read and write
2A8B0000
heap
page read and write
429E000
trusted library allocation
page read and write
562D000
stack
page read and write
41AE000
stack
page read and write
675B000
stack
page read and write
13E4FCC4000
heap
page read and write
13E4FCE9000
heap
page read and write
24786000
heap
page read and write
FE2000
trusted library allocation
page read and write
138B000
unkown
page readonly
2E1F000
stack
page read and write
3C3D000
trusted library allocation
page read and write
13E54234000
heap
page read and write
110C000
unkown
page readonly
B5C000
heap
page read and write
33F4000
unkown
page read and write
13E33B8B000
unkown
page readonly
2BF7000
trusted library allocation
page read and write
36C7000
trusted library allocation
page read and write
89DE000
trusted library allocation
page read and write
6BA9000
heap
page read and write
964000
heap
page read and write
6A0000
unkown
page readonly
29C0000
direct allocation
page read and write
6C10000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
FE6000
trusted library allocation
page execute and read and write
A02000
unkown
page readonly
33BE000
trusted library allocation
page read and write
7FF8489AD000
trusted library allocation
page read and write
13E4FC2A000
heap
page read and write
13E4FCD9000
heap
page read and write
2940000
heap
page read and write
D24000
heap
page read and write
267B000
direct allocation
page read and write
1E51E000
stack
page read and write
FFC40000
trusted library allocation
page execute and read and write
2954000
trusted library allocation
page read and write
9061BE000
stack
page read and write
F60000
unkown
page readonly
1389000
unkown
page readonly
7FF848B80000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page execute and read and write
9C000
stack
page read and write
4D7B000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
264E000
direct allocation
page read and write
13E54295000
heap
page read and write
139F000
unkown
page readonly
30F4000
unkown
page read and write
1515000
trusted library allocation
page execute and read and write
39D4000
heap
page read and write
13E357B0000
heap
page read and write
3C25000
trusted library allocation
page read and write
838E000
stack
page read and write
6C7BD000
unkown
page readonly
61ED4000
direct allocation
page readonly
13E50390000
trusted library section
page read and write
19B000
stack
page read and write
FEE000
stack
page read and write
3848000
trusted library allocation
page read and write
894000
heap
page read and write
2C9A000
trusted library allocation
page read and write
A6E000
stack
page read and write
7FF4895CA000
trusted library allocation
page readonly
336B000
trusted library allocation
page read and write
13E3278B000
unkown
page readonly
3DA5000
heap
page read and write
5E5F000
trusted library allocation
page read and write
4100000
trusted library allocation
page read and write
43A5000
heap
page read and write
2A39000
direct allocation
page read and write
32CF000
heap
page read and write
416000
unkown
page write copy
5850000
unkown
page read and write
13E56500000
trusted library allocation
page read and write
1517000
trusted library allocation
page execute and read and write
2F0B000
trusted library allocation
page read and write
5F50000
trusted library allocation
page execute and read and write
30F4000
unkown
page read and write
CDA000
heap
page read and write
5B20000
trusted library allocation
page execute and read and write
A81000
unkown
page readonly
13E51E1F000
heap
page read and write
29D9000
direct allocation
page read and write
814E000
stack
page read and write
5E8F000
stack
page read and write
13E35A95000
heap
page read and write
30EE000
trusted library allocation
page read and write
13E564B0000
trusted library allocation
page read and write
13E35839000
heap
page read and write
34AD000
trusted library allocation
page read and write
13E4FE4B000
heap
page read and write
14E3000
trusted library allocation
page execute and read and write
7FF848BA0000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
2E41000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
F60000
unkown
page readonly
2483A000
heap
page read and write
7FF848A10000
trusted library allocation
page read and write
71C0000
heap
page read and write
6C9C5000
unkown
page readonly
36AF000
trusted library allocation
page read and write
7FF8487B3000
trusted library allocation
page read and write
5110000
trusted library allocation
page execute and read and write
30F4000
unkown
page read and write
416000
unkown
page write copy
75E000
unkown
page read and write
6B8D000
stack
page read and write
2A06000
direct allocation
page read and write
14E0000
trusted library allocation
page read and write
3EC8000
heap
page read and write
2A81000
direct allocation
page read and write
9F5000
heap
page read and write
55A000
unkown
page read and write
2C5C000
trusted library allocation
page read and write
7D30000
heap
page read and write
3110000
trusted library allocation
page read and write
F61000
unkown
page execute read
C08000
heap
page read and write
17D7000
heap
page read and write
9B000
stack
page read and write
67F0000
trusted library allocation
page read and write
A1D000
unkown
page readonly
3551000
heap
page read and write
2CA5000
trusted library allocation
page read and write
3045000
heap
page read and write
671F000
stack
page read and write
43ED000
heap
page execute and read and write
30F4000
unkown
page read and write
6C7D2000
unkown
page readonly
2D6A000
trusted library allocation
page read and write
2A10000
heap
page read and write
6F1D000
heap
page read and write
D48000
heap
page read and write
135C000
unkown
page readonly
93E000
stack
page read and write
4FB7000
heap
page read and write
6C6F000
stack
page read and write
13E4FC96000
heap
page read and write
2A32000
direct allocation
page read and write
818E000
stack
page read and write
400000
unkown
page readonly
2878000
heap
page read and write
7AED000
stack
page read and write
529F000
trusted library allocation
page read and write
2DD0000
heap
page read and write
29C9000
direct allocation
page read and write
2AC0000
heap
page read and write
964000
heap
page read and write
2A48000
direct allocation
page read and write
7FF848B90000
trusted library allocation
page read and write
13E4FDF0000
trusted library section
page readonly
32F0000
heap
page read and write
2D65000
trusted library allocation
page read and write
1E28E000
stack
page read and write
7FF848A30000
trusted library allocation
page read and write
2B80000
heap
page read and write
13E4FDE0000
trusted library allocation
page read and write
162E000
stack
page read and write
2E40000
unkown
page read and write
3156000
trusted library allocation
page read and write
9F0000
heap
page read and write
50A4000
trusted library allocation
page read and write
2C8F000
unkown
page read and write
2CF0000
heap
page read and write
13E4FD20000
trusted library section
page read and write
303B000
heap
page read and write
6C2B4000
unkown
page read and write
2D32000
trusted library allocation
page read and write
13E51E80000
heap
page read and write
30F6000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
303F000
heap
page read and write
55C000
unkown
page read and write
6C151000
unkown
page execute read
6C2A9000
unkown
page write copy
30C0000
trusted library allocation
page read and write
13B8000
unkown
page readonly
58D4000
unkown
page read and write
616E000
stack
page read and write
549D000
trusted library allocation
page read and write
3806000
trusted library allocation
page read and write
4200000
direct allocation
page execute and read and write
661E000
stack
page read and write
79AC000
stack
page read and write
265D000
direct allocation
page read and write
5670000
trusted library allocation
page read and write
362C000
trusted library allocation
page read and write
13E547F4000
trusted library allocation
page read and write
1170000
unkown
page read and write
6CE17000
unkown
page readonly
8D64000
trusted library allocation
page read and write
13E37CB9000
trusted library allocation
page read and write
13E378CD000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
13E3724E000
heap
page read and write
894000
heap
page read and write
3767000
trusted library allocation
page read and write
105E000
stack
page read and write
263F000
direct allocation
page read and write
74B0000
trusted library allocation
page read and write
5019000
heap
page read and write
24837000
heap
page read and write
303F000
heap
page read and write
7FF8487AD000
trusted library allocation
page execute and read and write
30F4000
unkown
page read and write
349F000
trusted library allocation
page read and write
9A0000
heap
page read and write
2BF0000
direct allocation
page read and write
9DB000
heap
page read and write
26DC000
direct allocation
page read and write
1183000
unkown
page readonly
E9C000
heap
page read and write
24834000
heap
page read and write
2A00000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
F60000
unkown
page readonly
13E54316000
heap
page read and write
1338000
unkown
page readonly
15AC000
stack
page read and write
2EFA000
stack
page read and write
1E681000
heap
page read and write
138F000
unkown
page readonly
6B1E000
heap
page read and write
28C0000
heap
page read and write
261B000
direct allocation
page read and write
4047000
unkown
page readonly
7FF848AB0000
trusted library allocation
page read and write
2483C000
heap
page read and write
C50000
heap
page read and write
30F4000
unkown
page read and write
4FF3000
heap
page read and write
5F60000
trusted library allocation
page read and write
3727000
trusted library allocation
page read and write
964000
heap
page read and write
9F3000
heap
page read and write
2B70000
unkown
page readonly
4229000
trusted library allocation
page read and write
1F0000
heap
page read and write
13E51E66000
heap
page read and write
37C6000
trusted library allocation
page read and write
4330000
heap
page read and write
13E54183000
heap
page read and write
2485C000
heap
page read and write
117C000
unkown
page read and write
30D0000
trusted library allocation
page read and write
2BFA000
heap
page read and write
2F17000
trusted library allocation
page read and write
6B0C000
stack
page read and write
36A70000
heap
page read and write
1327000
unkown
page readonly
2C4E000
trusted library allocation
page read and write
13E4FE5C000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
35A2000
trusted library allocation
page read and write
F50000
heap
page read and write
7D70000
heap
page read and write
75E000
unkown
page write copy
6450000
heap
page execute and read and write
58D1000
unkown
page read and write
EFE000
stack
page read and write
31E4000
heap
page read and write
246EC000
heap
page read and write
732B000
stack
page read and write
76D000
unkown
page read and write
3366000
trusted library allocation
page read and write
964000
heap
page read and write
110C000
unkown
page readonly
401000
unkown
page execute read
905EF9000
stack
page read and write
5DEA000
heap
page read and write
2FBE000
trusted library allocation
page read and write
1397000
unkown
page readonly
2929000
trusted library allocation
page read and write
400000
unkown
page readonly
A3F000
heap
page read and write
13E56D00000
trusted library allocation
page read and write
309DB000
heap
page read and write
7FF8489A0000
trusted library allocation
page read and write
68AE000
stack
page read and write
1E24F000
stack
page read and write
67A2000
trusted library allocation
page read and write
24838000
heap
page read and write
A04000
heap
page read and write
29B0000
trusted library allocation
page read and write
58D1000
unkown
page read and write
266D000
direct allocation
page read and write
33FC000
heap
page read and write
3A99000
trusted library allocation
page read and write
389B000
trusted library allocation
page read and write
13E35960000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
13E51EA0000
heap
page read and write
341000
unkown
page execute read
302E000
heap
page read and write
2A7A000
direct allocation
page read and write
A73000
unkown
page readonly
13E56460000
trusted library allocation
page read and write
24840000
heap
page read and write
B60000
heap
page read and write
4154000
unkown
page read and write
964000
heap
page read and write
5E40000
trusted library allocation
page read and write
1399000
unkown
page readonly
2E35000
trusted library allocation
page read and write
3017000
heap
page read and write
FF0000
heap
page read and write
24826000
heap
page read and write
83AF000
trusted library allocation
page read and write
13E31D50000
unkown
page readonly
7FF8487FC000
trusted library allocation
page execute and read and write
3738000
trusted library allocation
page read and write
FDE000
stack
page read and write
300B000
trusted library allocation
page read and write
61A0000
trusted library allocation
page execute and read and write
13E5422F000
heap
page read and write
30F4000
unkown
page read and write
5E2D000
stack
page read and write
2741000
direct allocation
page read and write
665D000
stack
page read and write
3032000
heap
page read and write
42D0000
heap
page read and write
2B84000
unkown
page read and write
13E35A55000
heap
page read and write
434A000
heap
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
13E4FCAC000
heap
page read and write
13E4FCE1000
heap
page read and write
A28000
unkown
page readonly
13E35970000
trusted library allocation
page read and write
7FF848B28000
trusted library allocation
page read and write
447000
unkown
page execute and read and write
AA0000
heap
page read and write
D6F000
stack
page read and write
3032000
heap
page read and write
30F4000
trusted library allocation
page read and write
6C7E0000
unkown
page readonly
828E000
stack
page read and write
31AD000
stack
page read and write
2C95000
trusted library allocation
page read and write
964000
heap
page read and write
5288000
trusted library allocation
page read and write
762A000
stack
page read and write
2B84000
unkown
page read and write
71C2000
heap
page read and write
32CE000
unkown
page read and write
303D000
heap
page read and write
7FF4895C1000
trusted library allocation
page execute read
379A000
trusted library allocation
page read and write
366D000
trusted library allocation
page read and write
C59000
heap
page read and write
2484A000
heap
page read and write
24833000
heap
page read and write
ECE000
stack
page read and write
3018000
trusted library allocation
page read and write
4C1D000
stack
page read and write
3D20000
unkown
page read and write
3854000
trusted library allocation
page read and write
27F0000
unkown
page read and write
33E3000
trusted library allocation
page read and write
7FF8487CB000
trusted library allocation
page execute and read and write
336D000
stack
page read and write
24828000
heap
page read and write
45B6000
unkown
page read and write
286F000
stack
page read and write
2BE0000
unkown
page read and write
9E2000
heap
page read and write
2600000
heap
page read and write
77B000
unkown
page write copy
62AE000
stack
page read and write
2BA0000
heap
page read and write
133A000
unkown
page readonly
AD5000
heap
page read and write
3401000
unkown
page read and write
1506000
trusted library allocation
page execute and read and write
9059FB000
stack
page read and write
9F2000
heap
page read and write
5FA0000
trusted library allocation
page execute and read and write
2B84000
unkown
page read and write
F3B000
stack
page read and write
2C8F000
trusted library allocation
page read and write
4DF000
unkown
page read and write
905BF4000
stack
page read and write
9F2000
heap
page read and write
43D0000
heap
page read and write
1170000
unkown
page read and write
5F2C000
stack
page read and write
1880000
heap
page read and write
7FF8489CB000
trusted library allocation
page read and write
30F4000
unkown
page read and write
5860000
unkown
page read and write
13E51E83000
heap
page read and write
BEE000
stack
page read and write
6BA0000
trusted library section
page readonly
63EE000
stack
page read and write
7FF8487BD000
trusted library allocation
page execute and read and write
13E4FD50000
trusted library section
page read and write
36A7A000
heap
page read and write
7C00000
heap
page read and write
13E4F590000
trusted library allocation
page read and write
6C150000
unkown
page readonly
13E4FC20000
heap
page read and write
25BC000
stack
page read and write
33F4000
unkown
page read and write
2958000
trusted library allocation
page read and write
1493000
heap
page read and write
130C000
unkown
page readonly
690000
unkown
page readonly
C60000
heap
page read and write
2AC7000
heap
page read and write
341F000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
A71000
unkown
page readonly
9056FD000
stack
page read and write
139D000
unkown
page readonly
47F0000
heap
page read and write
24846000
heap
page read and write
3040000
heap
page read and write
3033000
trusted library allocation
page read and write
2DE9000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
563000
unkown
page readonly
6CDC7000
unkown
page readonly
2989000
trusted library allocation
page read and write
42DA000
heap
page read and write
4FB1000
heap
page read and write
55BD000
direct allocation
page read and write
13E31D50000
unkown
page readonly
13E51E24000
heap
page read and write
13E51E29000
heap
page read and write
CDE000
heap
page read and write
29D0000
trusted library allocation
page read and write
6CCB1000
unkown
page execute read
5EB000
stack
page read and write
26EB000
direct allocation
page read and write
52A1000
unkown
page read and write
2485B000
heap
page read and write
2B84000
unkown
page read and write
1367000
unkown
page readonly
7FF848A00000
trusted library allocation
page read and write
2733000
direct allocation
page read and write
661C000
stack
page read and write
594C000
trusted library allocation
page read and write
24826000
heap
page read and write
AB5000
unkown
page readonly
309CF000
heap
page read and write
BF0000
heap
page read and write
559000
unkown
page write copy
5DE4000
heap
page read and write
7FF8487C0000
trusted library allocation
page read and write
6000000
heap
page read and write
5295000
trusted library allocation
page read and write
6720000
heap
page read and write
6C60000
heap
page read and write
35B4000
trusted library allocation
page read and write
2F50000
heap
page read and write
563000
unkown
page readonly
7FF848A68000
trusted library allocation
page read and write
64A000
stack
page read and write
7FF848B1F000
trusted library allocation
page read and write
2FEE000
stack
page read and write
CC3000
trusted library allocation
page execute and read and write
5E6A000
trusted library allocation
page read and write
5275000
trusted library allocation
page read and write
2748000
direct allocation
page read and write
2D1D000
stack
page read and write
3457000
trusted library allocation
page read and write
D20000
heap
page read and write
2F00000
trusted library allocation
page read and write
3020000
heap
page read and write
964000
heap
page read and write
804E000
stack
page read and write
549000
unkown
page execute and read and write
50BC000
trusted library allocation
page read and write
13E4FCA4000
heap
page read and write
2E54000
unkown
page read and write
9066BD000
stack
page read and write
3130000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
28D3000
heap
page read and write
36A00000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
156E000
stack
page read and write
2A64000
direct allocation
page read and write
1331000
unkown
page readonly
7FF848A50000
trusted library allocation
page read and write
6C9C0000
unkown
page read and write
6043000
heap
page read and write
4EF0000
direct allocation
page read and write
13E54319000
heap
page read and write
3049000
heap
page read and write
2485C000
heap
page read and write
326C000
stack
page read and write
400000
unkown
page execute and read and write
7FF4895C9000
trusted library allocation
page execute read
33CF000
unkown
page read and write
2E90000
heap
page read and write
C70000
heap
page read and write
9EF000
heap
page read and write
2484B000
heap
page read and write
3D9F000
stack
page read and write
9068BD000
stack
page read and write
A2A000
heap
page read and write
766000
unkown
page read and write
4762000
unkown
page read and write
294F000
trusted library allocation
page read and write
59DE000
stack
page read and write
26A2000
direct allocation
page read and write
13E37AAC000
trusted library allocation
page read and write
63AE000
stack
page read and write
CD0000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
13E3792B000
trusted library allocation
page read and write
5DD0000
heap
page read and write
30EA000
trusted library allocation
page read and write
6B2E000
stack
page read and write
29AB000
direct allocation
page read and write
29D0000
direct allocation
page read and write
A30000
unkown
page readonly
294C000
trusted library allocation
page read and write
13E51F9D000
heap
page read and write
13E5424B000
heap
page read and write
24840000
heap
page read and write
117C000
unkown
page read and write
43BE000
heap
page read and write
1183000
unkown
page readonly
2BA5000
heap
page read and write
292C000
trusted library allocation
page read and write
3027000
heap
page read and write
30B0000
direct allocation
page read and write
7730000
heap
page read and write
9058FB000
stack
page read and write
2485C000
heap
page read and write
13E3580F000
heap
page read and write
4227000
heap
page read and write
2D3F000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page read and write
7FF84896B000
trusted library allocation
page read and write
2946000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
7FF8489E0000
trusted library allocation
page read and write
24831000
heap
page read and write
2FD1000
trusted library allocation
page read and write
13E50210000
trusted library section
page read and write
FF5000
trusted library allocation
page execute and read and write
A90000
unkown
page readonly
905CFB000
stack
page read and write
30F4000
unkown
page read and write
1E680000
heap
page read and write
50B0000
trusted library allocation
page read and write
4327000
heap
page read and write
273A000
direct allocation
page read and write
5490000
direct allocation
page read and write
1500000
trusted library allocation
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
50A0000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
14E4000
trusted library allocation
page read and write
24E3000
heap
page read and write
7FF848992000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
40D000
unkown
page execute read
5813000
heap
page read and write
CB0000
trusted library allocation
page read and write
2674000
direct allocation
page read and write
55B9000
direct allocation
page read and write
13E47637000
trusted library allocation
page read and write
1526000
heap
page read and write
348F000
heap
page read and write
6C150000
unkown
page readonly
13E4FD1E000
heap
page read and write
3150000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
6B0000
heap
page read and write
110C000
unkown
page readonly
6920000
trusted library allocation
page execute and read and write
6EE0000
heap
page read and write
2940000
trusted library allocation
page read and write
30F4000
unkown
page read and write
A3B000
heap
page read and write
47E2000
heap
page read and write
309D7000
heap
page read and write
24840000
heap
page read and write
2B84000
unkown
page read and write
13E50690000
trusted library section
page read and write
3034000
heap
page read and write
24835000
heap
page read and write
C75000
heap
page read and write
178E000
stack
page read and write
1372000
unkown
page readonly
2FEA000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
3824000
heap
page read and write
A25000
heap
page read and write
A5B000
unkown
page readonly
A27000
heap
page read and write
7C20000
trusted library allocation
page read and write
43AE000
stack
page read and write
F60000
unkown
page readonly
A2A000
unkown
page readonly
A00000
unkown
page readonly
33F0000
unkown
page read and write
4E6000
unkown
page read and write
FFB000
trusted library allocation
page execute and read and write
28D0000
direct allocation
page execute and read and write
2FEC000
trusted library allocation
page read and write
1100000
heap
page read and write
36C9000
trusted library allocation
page read and write
3038000
heap
page read and write
13E4FC30000
heap
page read and write
36B9000
trusted library allocation
page read and write
5BF0000
unkown
page read and write
6C2AD000
unkown
page read and write
2A890000
heap
page read and write
C6F000
stack
page read and write
2A956000
heap
page read and write
2C03000
heap
page read and write
72CA000
heap
page read and write
1909000
trusted library allocation
page read and write
195000
stack
page read and write
5810000
heap
page read and write
4120000
heap
page read and write
508E000
direct allocation
page read and write
58CA000
trusted library allocation
page read and write
240000
heap
page read and write
30F4000
unkown
page read and write
529A000
trusted library allocation
page read and write
2483F000
heap
page read and write
A9C000
unkown
page readonly
2EDF000
trusted library allocation
page read and write
3025000
heap
page read and write
6831000
trusted library allocation
page read and write
E4A000
heap
page read and write
68CE000
stack
page read and write
A5D000
unkown
page readonly
30F4000
unkown
page read and write
42DE000
heap
page read and write
2A56000
direct allocation
page read and write
2A80000
heap
page read and write
3F30000
unkown
page read and write
894000
heap
page read and write
3028000
trusted library allocation
page read and write
4435000
trusted library allocation
page read and write
5841000
unkown
page read and write
6190000
trusted library allocation
page read and write
2910000
trusted library allocation
page execute and read and write
150A000
trusted library allocation
page execute and read and write
13E37D7E000
trusted library allocation
page read and write
5F0E000
stack
page read and write
3C46000
trusted library allocation
page read and write
C10000
heap
page read and write
340000
unkown
page readonly
1183000
unkown
page readonly
1E04F000
stack
page read and write
2484B000
heap
page read and write
6BC1000
heap
page read and write
41F5000
heap
page read and write
3970000
trusted library allocation
page read and write
3252000
heap
page read and write
732F000
heap
page read and write
13E51F85000
heap
page read and write
6840000
trusted library allocation
page execute and read and write
55EE000
stack
page read and write
7FF848970000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
6C97F000
unkown
page readonly
7FF848A66000
trusted library allocation
page read and write
33D0000
unkown
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
29E3000
trusted library allocation
page read and write
2A4F000
direct allocation
page read and write
1900000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
A7D000
unkown
page readonly
36C5000
trusted library allocation
page read and write
2C2C000
stack
page read and write
30F4000
unkown
page read and write
1365000
unkown
page readonly
37B0D000
heap
page read and write
13E4FE57000
heap
page read and write
9AE000
stack
page read and write
5630000
trusted library allocation
page read and write
35B9000
trusted library allocation
page read and write
2634000
heap
page read and write
24832000
heap
page read and write
117A000
unkown
page read and write
30F4000
unkown
page read and write
A55000
unkown
page readonly
3730000
trusted library allocation
page read and write
2450000
heap
page read and write
528A000
trusted library allocation
page read and write
D24000
heap
page read and write
7FF4895CE000
trusted library allocation
page readonly
906036000
stack
page read and write
2A916000
heap
page read and write
19D000
stack
page read and write
5DE7000
heap
page read and write
2DB3000
trusted library allocation
page read and write
2F40000
heap
page read and write
AF0000
heap
page read and write
348E000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
30F4000
unkown
page read and write
C85000
heap
page read and write
4429000
trusted library allocation
page read and write
13E56450000
trusted library allocation
page read and write
32F1000
heap
page read and write
2CCE000
unkown
page read and write
4150000
heap
page read and write
35C5000
trusted library allocation
page read and write
13E51FA6000
heap
page read and write
2F60000
heap
page read and write
B20000
heap
page read and write
30B5000
trusted library allocation
page read and write
2630000
heap
page read and write
C80000
heap
page read and write
7FF4895C3000
trusted library allocation
page execute read
30F4000
unkown
page read and write
1E3CE000
stack
page read and write
601A000
heap
page read and write
7FF848C80000
trusted library allocation
page read and write
680000
unkown
page readonly
2DCF000
unkown
page read and write
13E359D0000
trusted library section
page read and write
6C2B4000
unkown
page read and write
302D000
heap
page read and write
A3B000
unkown
page readonly
906CB8000
stack
page read and write
5C8E000
stack
page read and write
7FF848A22000
trusted library allocation
page read and write
13E54492000
heap
page read and write
3029000
heap
page read and write
3153000
trusted library allocation
page read and write
13E47561000
trusted library allocation
page read and write
6C151000
unkown
page execute read
34BA000
trusted library allocation
page read and write
24855000
heap
page read and write
5F70000
heap
page read and write
5950000
heap
page execute and read and write
34F5000
trusted library allocation
page read and write
5E22000
heap
page read and write
90617E000
stack
page read and write
2624000
direct allocation
page read and write
61E01000
direct allocation
page execute read
513C000
heap
page read and write
50DA000
heap
page read and write
6C741000
unkown
page execute read
401000
unkown
page execute read
6860000
trusted library allocation
page read and write
8B0000
heap
page read and write
7FF8489C9000
trusted library allocation
page read and write
5934000
trusted library allocation
page read and write
13E51F0C000
heap
page read and write
26D5000
direct allocation
page read and write
34C7000
trusted library allocation
page read and write
9D6000
heap
page read and write
34F4000
heap
page read and write
51AE000
stack
page read and write
71E0000
heap
page read and write
BEB000
heap
page read and write
A34000
heap
page read and write
2684000
direct allocation
page read and write
721D000
heap
page read and write
30F4000
unkown
page read and write
7FF848AA0000
trusted library allocation
page read and write
2A10000
heap
page read and write
A7F000
unkown
page readonly
3163000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
A5D000
heap
page read and write
13E564C0000
trusted library allocation
page read and write
30E1000
heap
page read and write
2972000
trusted library allocation
page read and write
24835000
heap
page read and write
2A2B000
direct allocation
page read and write
34EA000
trusted library allocation
page read and write
4C6F000
stack
page read and write
32C1000
trusted library allocation
page read and write
2F5C000
heap
page read and write
2ED3000
trusted library allocation
page read and write
2483A000
heap
page read and write
30F4000
unkown
page read and write
45E0000
heap
page read and write
1640000
heap
page read and write
131A000
unkown
page readonly
4B6E000
stack
page read and write
337C000
trusted library allocation
page read and write
2633000
direct allocation
page read and write
894000
heap
page read and write
13E4FE03000
heap
page read and write
7FF848B77000
trusted library allocation
page read and write
45EB000
heap
page read and write
8FF000
stack
page read and write
13E51E5F000
heap
page read and write
76F000
unkown
page read and write
24840000
heap
page read and write
F10000
heap
page read and write
2E08000
trusted library allocation
page read and write
3783000
trusted library allocation
page read and write
2626000
direct allocation
page read and write
30E0000
heap
page read and write
CDD000
trusted library allocation
page execute and read and write
302F000
heap
page read and write
2484A000
heap
page read and write
2C44000
trusted library allocation
page read and write
6CE0E000
unkown
page write copy
4F9E000
stack
page read and write
2E5C000
trusted library allocation
page read and write
24840000
heap
page read and write
2D5E000
trusted library allocation
page read and write
13E4FE10000
heap
page read and write
13E35A90000
heap
page read and write
A37000
unkown
page readonly
2A24000
direct allocation
page read and write
2874000
heap
page read and write
43DA000
heap
page read and write
24836000
heap
page read and write
26CE000
direct allocation
page read and write
40F000
unkown
page readonly
24840000
heap
page read and write
2708000
direct allocation
page read and write
2DFB000
trusted library allocation
page read and write
839F000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
5E3E000
stack
page read and write
F61000
unkown
page execute read
58E5000
unkown
page read and write
4023000
unkown
page readonly
90553E000
stack
page read and write
2510000
heap
page read and write
24838000
heap
page read and write
28F0000
heap
page read and write
5D2C000
stack
page read and write
F3D000
stack
page read and write
9E4000
heap
page read and write
2D13000
trusted library allocation
page read and write
2B80000
unkown
page readonly
2620000
direct allocation
page read and write
2483C000
heap
page read and write
24835000
heap
page read and write
4A1E000
stack
page read and write
2968000
trusted library allocation
page read and write
37FC000
trusted library allocation
page read and write
1348000
unkown
page readonly
342A000
trusted library allocation
page read and write
E50000
heap
page read and write
4070000
heap
page read and write
3862000
trusted library allocation
page read and write
3028000
heap
page read and write
369A000
heap
page read and write
24B0000
heap
page read and write
C1D000
unkown
page readonly
35C3000
trusted library allocation
page read and write
C18000
heap
page read and write
309F000
trusted library allocation
page read and write
30F4000
unkown
page read and write
7FF84885C000
trusted library allocation
page execute and read and write
5318000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
36D2000
trusted library allocation
page read and write
AA0000
unkown
page readonly
13E506A0000
trusted library section
page read and write
9F8000
heap
page read and write
30F4000
unkown
page read and write
24840000
heap
page read and write
416E000
stack
page read and write
12F8000
stack
page read and write
24840000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
5EE000
stack
page read and write
61ECC000
direct allocation
page read and write
2870000
heap
page read and write
19B000
stack
page read and write
13E54179000
heap
page read and write
15EE000
stack
page read and write
61ECD000
direct allocation
page readonly
2610000
direct allocation
page read and write
67C0000
trusted library allocation
page execute and read and write
7FF4895C8000
trusted library allocation
page readonly
30F4000
unkown
page read and write
A8E000
unkown
page readonly
3B80000
trusted library allocation
page read and write
13E4FCD5000
heap
page read and write
A2C000
heap
page read and write
43DE000
trusted library allocation
page read and write
A06000
heap
page read and write
3501000
trusted library allocation
page read and write
BEF000
heap
page read and write
4047000
unkown
page readonly
A60000
heap
page read and write
2646000
direct allocation
page read and write
501D000
direct allocation
page read and write
C90000
heap
page read and write
3414000
trusted library allocation
page read and write
964000
heap
page read and write
1DB000
stack
page read and write
13E358F0000
heap
page read and write
7FF4895B2000
trusted library allocation
page readonly
44CE000
stack
page read and write
13E378AE000
trusted library allocation
page read and write
7FFE000
stack
page read and write
13E542D3000
heap
page read and write
7AAC000
stack
page read and write
35CA000
trusted library allocation
page read and write
6CCB0000
unkown
page readonly
3D1E000
trusted library allocation
page read and write
D5C000
heap
page read and write
29C2000
direct allocation
page read and write
17D0000
heap
page read and write
75BE000
stack
page read and write
2A8F1000
heap
page read and write
302F000
heap
page read and write
B6B000
heap
page read and write
7FF8487A3000
trusted library allocation
page execute and read and write
13E51E3D000
heap
page read and write
2B60000
unkown
page readonly
2F1C000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
138D000
unkown
page readonly
28EC000
stack
page read and write
7FF848BB0000
trusted library allocation
page read and write
6C2AE000
unkown
page write copy
270F000
direct allocation
page read and write
83B5000
trusted library allocation
page read and write
53BD000
stack
page read and write
C30000
heap
page read and write
2C50000
trusted library allocation
page read and write
87E000
unkown
page readonly
672D000
heap
page read and write
7FF848CE0000
trusted library allocation
page read and write
B46000
heap
page read and write
6760000
trusted library allocation
page read and write
2A911000
heap
page read and write
29B2000
direct allocation
page read and write
1E14F000
stack
page read and write
13E540F0000
heap
page read and write
30F4000
unkown
page read and write
9FD000
heap
page read and write
3E20000
unkown
page read and write
28B0000
heap
page read and write
4DF000
unkown
page write copy
9E2000
heap
page read and write
7FF848ABB000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
24834000
heap
page read and write
43C5000
trusted library allocation
page read and write
3020000
heap
page read and write
151B000
trusted library allocation
page execute and read and write
24833000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
35AB000
trusted library allocation
page read and write
2E30000
unkown
page read and write
1356000
unkown
page readonly
3C1D000
trusted library allocation
page read and write
13E5417C000
heap
page read and write
6A0C000
stack
page read and write
13E35A14000
heap
page execute and read and write
24840000
heap
page read and write
9053FE000
stack
page read and write
6BCD000
heap
page read and write
4438000
heap
page read and write
58D0000
trusted library allocation
page execute and read and write
2483D000
heap
page read and write
48CE000
stack
page read and write
248C2000
heap
page read and write
7FF848A90000
trusted library allocation
page read and write
5841000
unkown
page read and write
D24000
heap
page read and write
309DD000
heap
page read and write
6B2C000
heap
page read and write
13E54404000
heap
page read and write
57F9000
stack
page read and write
30C2000
trusted library allocation
page read and write
7FF848856000
trusted library allocation
page read and write
7D53000
trusted library allocation
page read and write
13E54174000
heap
page read and write
13E5431B000
heap
page read and write
4FEE000
stack
page read and write
13E57A77000
heap
page read and write
69CF000
stack
page read and write
2D80000
heap
page read and write
1512000
trusted library allocation
page read and write
5AAE000
unkown
page read and write
2724000
direct allocation
page read and write
2484C000
heap
page read and write
2E3B000
trusted library allocation
page read and write
2484E000
heap
page read and write
6C2A9000
unkown
page write copy
13E378BB000
trusted library allocation
page read and write
132B000
unkown
page readonly
C4B000
heap
page read and write
860000
heap
page read and write
13E542E2000
heap
page read and write
5E58000
trusted library allocation
page read and write
5841000
unkown
page read and write
30F4000
unkown
page read and write
3531000
trusted library allocation
page read and write
5852000
unkown
page read and write
1910000
heap
page read and write
190C000
trusted library allocation
page read and write
2485C000
heap
page read and write
A39000
unkown
page readonly
7FF848A14000
trusted library allocation
page read and write
7FF4895C7000
trusted library allocation
page execute read
30F4000
unkown
page read and write
31F0000
heap
page read and write
340000
unkown
page readonly
2C88000
trusted library allocation
page read and write
13E4F560000
trusted library allocation
page read and write
905DFD000
stack
page read and write
30F4000
unkown
page read and write
30F4000
unkown
page read and write
7FF8488C0000
trusted library allocation
page execute and read and write
2485C000
heap
page read and write
4045000
unkown
page read and write
2A88000
direct allocation
page read and write
2F3E000
unkown
page read and write
F53000
heap
page read and write
2B21000
trusted library allocation
page read and write
778000
unkown
page read and write
46E0000
heap
page read and write
268C000
direct allocation
page read and write
5FE0000
trusted library allocation
page read and write
45CF000
stack
page read and write
3760000
trusted library allocation
page read and write
46D9000
unkown
page read and write
36A6000
trusted library allocation
page read and write
2485C000
heap
page read and write
67D0000
trusted library allocation
page execute and read and write
9063BB000
stack
page read and write
378E000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
2716000
direct allocation
page read and write
894000
heap
page read and write
7FF8489C0000
trusted library allocation
page read and write
A66000
unkown
page readonly
30F4000
unkown
page read and write
305F000
trusted library allocation
page read and write
135A000
unkown
page readonly
6CE09000
unkown
page write copy
3E79000
unkown
page read and write
5DD1000
heap
page read and write
2B84000
unkown
page read and write
13E54246000
heap
page read and write
A47000
unkown
page readonly
1675000
heap
page read and write
6C2AE000
unkown
page write copy
34E0000
trusted library allocation
page read and write
2F93000
heap
page read and write
5FC0000
trusted library allocation
page execute and read and write
DCE000
stack
page read and write
13E51DF2000
heap
page read and write
45CF000
stack
page read and write
13E357D8000
heap
page read and write
3779000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
E53000
heap
page read and write
FF2000
trusted library allocation
page read and write
3623000
trusted library allocation
page read and write
36B50000
heap
page read and write
774000
unkown
page read and write
12CE000
stack
page read and write
4EC000
unkown
page read and write
783000
unkown
page readonly
761000
unkown
page read and write
FEA000
trusted library allocation
page execute and read and write
5D8F000
stack
page read and write
4290000
heap
page read and write
DA000
stack
page read and write
13E35600000
unkown
page readonly
13E475DF000
trusted library allocation
page read and write
409000
unkown
page execute read
4457000
heap
page read and write
2B2C000
stack
page read and write
13E51E76000
heap
page read and write
41C000
unkown
page write copy
13E51DF0000
heap
page read and write
33B3000
trusted library allocation
page read and write
7FF4895B1000
trusted library allocation
page execute read
13E3580C000
heap
page read and write
2668000
direct allocation
page read and write
41ED000
unkown
page read and write
43BD000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
2CDE000
stack
page read and write
56F1000
heap
page read and write
2F63000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
13E475F9000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
29FE000
direct allocation
page read and write
3859000
trusted library allocation
page read and write
6063000
heap
page read and write
13E378BF000
trusted library allocation
page read and write
3772000
trusted library allocation
page read and write
C70000
heap
page read and write
13E4FC99000
heap
page read and write
C5E000
stack
page read and write
2E50000
unkown
page read and write
E55000
heap
page read and write
2C7D000
trusted library allocation
page read and write
6C2B7000
unkown
page readonly
13E51F3B000
heap
page read and write
14D0000
trusted library allocation
page read and write
1678000
heap
page read and write
117A000
unkown
page read and write
13E57A5C000
heap
page read and write
7EFD000
stack
page read and write
2FF9000
trusted library allocation
page read and write
13E51F99000
heap
page read and write
9DA000
heap
page read and write
30F4000
unkown
page read and write
7FF4895B0000
trusted library allocation
page readonly
24840000
heap
page read and write
6A2E000
stack
page read and write
7FF848C60000
trusted library allocation
page read and write
B3B000
stack
page read and write
4EC000
unkown
page readonly
422D000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
13E51FA0000
heap
page read and write
2975000
trusted library allocation
page read and write
1183000
unkown
page readonly
58C0000
trusted library allocation
page read and write
13E543C0000
heap
page read and write
30F4000
unkown
page read and write
295E000
trusted library allocation
page read and write
3C3A000
trusted library allocation
page read and write
E46000
heap
page read and write
5722000
unkown
page read and write
4EA000
stack
page read and write
3889000
trusted library allocation
page read and write
A39000
heap
page read and write
850000
heap
page read and write
64D0000
heap
page read and write
2605000
heap
page read and write
5ECE000
stack
page read and write
43F000
unkown
page execute read
67E0000
trusted library allocation
page read and write
110C000
unkown
page readonly
13E4757C000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
D24000
heap
page read and write
13E35837000
heap
page read and write
30F0000
heap
page read and write
44B0000
unkown
page read and write
71CE000
heap
page read and write
2D06000
heap
page read and write
1354000
unkown
page readonly
30F4000
unkown
page read and write
F20000
heap
page read and write
30A9000
trusted library allocation
page read and write
7FF848886000
trusted library allocation
page execute and read and write
3345000
heap
page read and write
30F4000
unkown
page read and write
263C000
direct allocation
page read and write
17E0000
trusted library allocation
page read and write
3947000
heap
page read and write
6EBE000
stack
page read and write
7FF8487C4000
trusted library allocation
page read and write
24833000
heap
page read and write
30F4000
unkown
page read and write
894000
heap
page read and write
24820000
heap
page read and write
2C69000
trusted library allocation
page read and write
7FF8489B0000
trusted library allocation
page read and write
6440000
trusted library allocation
page execute and read and write
550000
unkown
page write copy
7FF848960000
trusted library allocation
page read and write
4442000
trusted library allocation
page read and write
2482A000
heap
page read and write
13E35A60000
trusted library section
page read and write
3012000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
24840000
heap
page read and write
1329000
unkown
page readonly
905AF1000
stack
page read and write
1069000
trusted library allocation
page read and write
54C000
stack
page read and write
5E5A000
trusted library allocation
page read and write
A53000
unkown
page readonly
33F4000
unkown
page read and write
ABE000
heap
page read and write
B28000
heap
page read and write
AD0000
heap
page read and write
24840000
heap
page read and write
7FF4895C2000
trusted library allocation
page readonly
3835000
trusted library allocation
page read and write
166B000
heap
page read and write
13E564D0000
trusted library allocation
page read and write
5F40000
trusted library allocation
page execute and read and write
68EE000
stack
page read and write
5E49000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
1E61E000
stack
page read and write
3A9D000
trusted library allocation
page read and write
A8A000
unkown
page readonly
A39000
stack
page read and write
71C4000
heap
page read and write
5F4E000
stack
page read and write
30F4000
unkown
page read and write
7FF4895D0000
trusted library allocation
page execute and read and write
4E8000
unkown
page write copy
309D3000
heap
page read and write
13E3789F000
trusted library allocation
page read and write
3CAD000
trusted library allocation
page read and write
3497000
trusted library allocation
page read and write
13E37350000
heap
page read and write
5270000
trusted library allocation
page read and write
7FF848C40000
trusted library allocation
page read and write
6EFC000
heap
page read and write
9D8000
heap
page read and write
B1E000
stack
page read and write
432F000
stack
page read and write
13E51F42000
heap
page read and write
7FF8487A0000
trusted library allocation
page read and write
9CB000
heap
page read and write
36CE000
trusted library allocation
page read and write
651C000
stack
page read and write
303C000
heap
page read and write
35C0000
trusted library allocation
page read and write
41C000
unkown
page execute read
2E6C000
heap
page read and write
5D70000
heap
page read and write
3CA9000
trusted library allocation
page read and write
43E000
unkown
page execute and read and write
383C000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
7BED000
stack
page read and write
A51000
heap
page read and write
1179000
unkown
page write copy
30FD000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
5DDB000
heap
page read and write
4031000
unkown
page read and write
2C04000
trusted library allocation
page read and write
13E3458B000
unkown
page readonly
24828000
heap
page read and write
A59000
unkown
page readonly
13E54476000
heap
page read and write
13E54812000
trusted library allocation
page read and write
30F4000
unkown
page read and write
13E54248000
heap
page read and write
4220000
heap
page read and write
13E35973000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
24E0000
heap
page read and write
A09000
heap
page read and write
2D26000
trusted library allocation
page read and write
172D000
heap
page read and write
71F0000
heap
page read and write
5E45000
trusted library allocation
page read and write
83C2000
trusted library allocation
page read and write
1E780000
heap
page read and write
2A15000
direct allocation
page read and write
5930000
trusted library allocation
page read and write
13E51E17000
heap
page read and write
837E000
trusted library allocation
page read and write
72E0000
trusted library allocation
page execute and read and write
24840000
heap
page read and write
41C000
unkown
page write copy
137E000
unkown
page readonly
2D24000
trusted library allocation
page read and write
3646000
trusted library allocation
page read and write
612E000
stack
page read and write
47AA000
unkown
page read and write
7315000
heap
page read and write
384E000
trusted library allocation
page read and write
13A1000
unkown
page readonly
A2B000
heap
page read and write
13E357F6000
heap
page read and write
7FF4895C6000
trusted library allocation
page readonly
5E65000
trusted library allocation
page read and write
2A5D000
direct allocation
page read and write
139B000
unkown
page readonly
BEF000
stack
page read and write
5499000
trusted library allocation
page read and write
EDE000
stack
page read and write
4FF3000
heap
page execute and read and write
2D1C000
trusted library allocation
page read and write
13E359C0000
trusted library allocation
page read and write
649E000
stack
page read and write
1336000
unkown
page readonly
813000
unkown
page readonly
400000
unkown
page readonly
4330000
heap
page read and write
16B5000
heap
page read and write
2A73000
direct allocation
page read and write
2930000
heap
page read and write
18F0000
trusted library allocation
page execute and read and write
D19000
heap
page read and write
1170000
unkown
page write copy
2BE0000
trusted library allocation
page read and write
2A944000
heap
page read and write
7FF8489D0000
trusted library allocation
page read and write
5840000
unkown
page read and write
3402000
trusted library allocation
page read and write
2484B000
heap
page read and write
26A9000
direct allocation
page read and write
7FF8487B0000
trusted library allocation
page read and write
1490000
heap
page read and write
5DE4000
heap
page read and write
AB7000
unkown
page readonly
2485C000
heap
page read and write
E28000
heap
page read and write
7FF848850000
trusted library allocation
page read and write
5E22000
heap
page read and write
13E37793000
trusted library allocation
page read and write
9FA000
heap
page read and write
248C1000
heap
page read and write
3C43000
trusted library allocation
page read and write
1369000
unkown
page readonly
7FF848D10000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
2540000
heap
page read and write
13E35A70000
trusted library section
page read and write
5DFE000
stack
page read and write
30DE000
trusted library allocation
page read and write
13E475DC000
trusted library allocation
page read and write
906DBE000
stack
page read and write
133C000
unkown
page readonly
2E54000
unkown
page read and write
ED1000
heap
page read and write
2EF9000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
A9A000
unkown
page readonly
2B90000
heap
page read and write
1E681000
heap
page read and write
599F000
stack
page read and write
1E38D000
stack
page read and write
97000
stack
page read and write
41DE000
stack
page read and write
7D50000
trusted library allocation
page read and write
24846000
heap
page read and write
303C000
heap
page read and write
A3C000
heap
page read and write
26B8000
direct allocation
page read and write
6C740000
unkown
page readonly
13E3318B000
unkown
page readonly
2B84000
unkown
page read and write
7FF848942000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
3025000
heap
page read and write
13E35940000
trusted library allocation
page read and write
30F4000
unkown
page read and write
14B0000
heap
page read and write
5AED000
stack
page read and write
1E4CE000
stack
page read and write
261D000
direct allocation
page read and write
24834000
heap
page read and write
40F000
unkown
page readonly
7FF848BC0000
trusted library allocation
page execute and read and write
13C1000
unkown
page readonly
890000
heap
page read and write
7FF848A60000
trusted library allocation
page read and write
55AD000
stack
page read and write
2961000
trusted library allocation
page read and write
A07000
heap
page read and write
6C9BF000
unkown
page write copy
303F000
heap
page read and write
31B0000
heap
page execute and read and write
2D00000
heap
page read and write
550000
unkown
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
3230000
heap
page read and write
There are 1806 hidden memdumps, click here to show them.