IOC Report
zLwT7vCojz.exe

loading gif

Files

File Path
Type
Category
Malicious
zLwT7vCojz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
JSON data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Qg_Appv5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\pfswlxy
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\u48o.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u48o.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\wyftaheq
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DBKKFCBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DUKNXICOZT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DWTHNHNNJB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DWTHNHNNJB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FIIIIDGHJEBFBGDHDGIIIIJDHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GLTYDMDUST.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GNLQNHOLWB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HCGCAAKJDHJJJJJKKKFBKFBAEB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIIIEGDBKJKEBGCBAFCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HMPPSXQPQV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HMPPSXQPQV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IYEPUIQXSK.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IZMFBFKMEB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDAFBKECAKFCAAAKJDAKJEGDAF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDHJKKFBAEGDGDGCBKECBGCGCF
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\JEHIIDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KECGHIJDGCBKECAAKKEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\LFOPODGVOH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LIJDSFKJZG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LIJDSFKJZG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u48o.0.exe_dee1b1ea4a9ae441cb96d7d5f1d83f52d6e9b_43204522_92a37e22-e842-46c4-b06a-41186f4d0fa6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zLwT7vCojz.exe_8d4cb8727758e3c5ce8bac1351ea612d3d1fe4_54d878a7_7b68542c-fa44-4dd0-ba40-30be569c4f59\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49D0.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 09:34:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4ACB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B0B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD9E0.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 07:43:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB39.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDBA7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\OOJWCGHFZE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\QFAPOWPAFG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UNKRLCVOHV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UNKRLCVOHV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VWDFPKGDUF.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\b5e0b91a7b27ffd0fb7331dc99b6ec0fb69def5fdbdba1dc9b571f9c0e6c23b8\bzv5mzmo.f5n
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\d6072408
PNG image data, 3680 x 2256, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\db474e1d
data
modified
C:\Users\user\AppData\Local\Temp\driverRemote_debug\groupware.wav
data
dropped
C:\Users\user\AppData\Local\Temp\driverRemote_debug\macrospore.indd
data
dropped
C:\Users\user\AppData\Local\Temp\eee577ad
data
modified
C:\Users\user\AppData\Local\Temp\hplcabqlulk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 06:43:20 2024, mtime=Tue Apr 23 06:43:21 2024, atime=Tue Apr 23 06:43:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\tmp13AA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp27DB.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp37A8.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp76DC.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp76EC.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp785.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp8907.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8928.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8929.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpDB8C.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpDB9D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpDED6.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\background.js
ASCII text
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\content.js
ASCII text
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\icon.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\jquery.js
ASCII text, with very long lines (32086)
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\manifest.json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\driverRemote_debug\groupware.wav
data
dropped
C:\Users\user\AppData\Roaming\driverRemote_debug\macrospore.indd
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 80 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\zLwT7vCojz.exe
"C:\Users\user\Desktop\zLwT7vCojz.exe"
malicious
C:\Users\user\AppData\Local\Temp\u48o.0.exe
"C:\Users\user~1\AppData\Local\Temp\u48o.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\Qg_Appv5.exe
"C:\Users\user~1\AppData\Local\Temp\Qg_Appv5.exe"
malicious
C:\Users\user\AppData\Local\Temp\u48o.1.exe
"C:\Users\user~1\AppData\Local\Temp\u48o.1.exe"
malicious
C:\Users\user\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
C:\Users\user~1\AppData\Local\Temp\driverRemote_debug\UniversalInstaller.exe
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user~1\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe
"C:\Users\user\AppData\Roaming\driverRemote_debug\UniversalInstaller.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5496 -s 1476
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 2020
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phphm
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php/m
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php3m1
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.46
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllU
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllc
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllG
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://www.ecosia.org/newtab/
unknown
http://ocsp.sectigo.com0&
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://185.172.128.76/3cd2b41cbde8fc9c.php#
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php$
unknown
http://note.padd.cn.com/1/Qg_Appv5.exe
176.97.76.106
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
https://scripts.sil.org/OFLV
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpB
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exeeeC
unknown
https://www.iolo.com/company/legal/eula/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://185.172.128.76H
unknown
http://google.com
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php7
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpa
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpf
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpk
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpMM
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
iolo0.b-cdn.net
169.150.236.99
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
time.windows.com
unknown
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
TypesSupported
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
ProgramId
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
FileId
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
LowerCaseLongPath
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
LongPathHash
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
Name
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
OriginalFileName
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
Publisher
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
Version
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
BinFileVersion
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
BinaryType
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
ProductName
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
ProductVersion
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
LinkDate
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
BinProductVersion
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
AppxPackageFullName
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
AppxPackageRelativeId
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
Size
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
Language
\REGISTRY\A\{42a80737-f64c-cf68-5e2f-376ae2c6e24b}\Root\InventoryApplicationFile\zlwt7vcojz.exe|462d32c97f24462e
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
ProgramId
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
FileId
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
LowerCaseLongPath
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
LongPathHash
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
Name
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
OriginalFileName
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
Publisher
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
Version
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
BinFileVersion
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
BinaryType
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
ProductName
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
ProductVersion
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
LinkDate
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
BinProductVersion
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
AppxPackageFullName
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
AppxPackageRelativeId
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
Size
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
Language
\REGISTRY\A\{478fceb5-3d70-ae2d-acac-e4a0af67971d}\Root\InventoryApplicationFile\u48o.0.exe|dcea89f8b1b66515
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00DB39CEDBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 77 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3DE5000
heap
page read and write
malicious
256726B0000
trusted library section
page read and write
malicious
5CC0000
direct allocation
page read and write
malicious
5BA0000
direct allocation
page read and write
malicious
5C90000
direct allocation
page execute and read and write
malicious
25659B50000
trusted library section
page read and write
malicious
4082000
heap
page read and write
malicious
439E000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
5AC0000
direct allocation
page read and write
malicious
256544FB000
unkown
page readonly
malicious
54D7000
trusted library allocation
page read and write
malicious
52A6000
trusted library allocation
page read and write
malicious
256576FB000
unkown
page readonly
malicious
36EB000
heap
page read and write
malicious
37F7000
trusted library allocation
page read and write
920000
heap
page read and write
988000
heap
page read and write
358F000
trusted library allocation
page read and write
1250000
heap
page read and write
2470D000
heap
page read and write
43F000
unkown
page execute read
3691000
trusted library allocation
page read and write
2613000
direct allocation
page read and write
13F4000
heap
page read and write
253D000
direct allocation
page read and write
98B000
heap
page read and write
BF8000
heap
page read and write
304E000
heap
page read and write
24728000
heap
page read and write
27F0000
heap
page read and write
31E6000
trusted library allocation
page read and write
115D000
unkown
page readonly
466E000
trusted library allocation
page read and write
61D000
unkown
page readonly
329F000
unkown
page read and write
813000
unkown
page readonly
2471D000
heap
page read and write
2544000
direct allocation
page read and write
7FFAABD17000
trusted library allocation
page read and write
774000
unkown
page read and write
BFB000
stack
page read and write
4190000
heap
page read and write
24EC000
heap
page read and write
30D0000
trusted library allocation
page execute and read and write
2470A000
heap
page read and write
350F000
stack
page read and write
2470F000
heap
page read and write
6D91000
trusted library section
page read and write
7FFAABBB4000
trusted library allocation
page read and write
28AD000
direct allocation
page read and write
32BE000
trusted library allocation
page read and write
25674540000
heap
page read and write
2EC4000
unkown
page read and write
7FFAABD00000
trusted library allocation
page read and write
288E000
direct allocation
page read and write
801000
unkown
page execute read
1E12E000
stack
page read and write
3437000
trusted library allocation
page read and write
256580D0000
trusted library allocation
page read and write
6CE67000
unkown
page readonly
25BC000
direct allocation
page read and write
39D1000
heap
page read and write
333C000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
335B000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
2790000
heap
page read and write
7FFAABE60000
trusted library allocation
page execute and read and write
25672488000
heap
page read and write
2FA0000
heap
page read and write
530E000
trusted library allocation
page read and write
FF4C0000
trusted library allocation
page execute and read and write
5D5E000
stack
page read and write
6C46F000
unkown
page write copy
43E000
unkown
page execute and read and write
2EC4000
unkown
page read and write
942000
heap
page read and write
2A94000
trusted library allocation
page read and write
4409000
heap
page read and write
5CC0000
trusted library allocation
page execute and read and write
2567458C000
heap
page read and write
41DE000
stack
page read and write
8240BFE000
stack
page read and write
33AB000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
6580000
heap
page read and write
6A5000
unkown
page readonly
6DD0000
heap
page read and write
7FFAABC06000
trusted library allocation
page read and write
1747000
trusted library allocation
page execute and read and write
3065000
heap
page read and write
7FFAABB50000
trusted library allocation
page read and write
12A0000
heap
page read and write
6AFE000
stack
page read and write
2B7C000
trusted library allocation
page read and write
6717000
heap
page read and write
15C9000
heap
page read and write
28A0000
heap
page read and write
7FFB04316000
unkown
page readonly
5BF0000
trusted library allocation
page execute and read and write
2921000
direct allocation
page read and write
25654EFB000
unkown
page readonly
2470D000
heap
page read and write
2EC4000
unkown
page read and write
256544C0000
unkown
page readonly
6C989000
unkown
page write copy
2565A0D0000
trusted library allocation
page read and write
75E000
unkown
page read and write
306F000
heap
page read and write
3375000
trusted library allocation
page read and write
A10000
unkown
page write copy
256583C0000
trusted library section
page read and write
CE8000
heap
page read and write
2A7E1000
heap
page read and write
256723F7000
heap
page read and write
D02000
heap
page read and write
2A7AC000
heap
page read and write
39BB000
heap
page read and write
2B91000
trusted library allocation
page read and write
29CE000
unkown
page read and write
3387000
trusted library allocation
page read and write
744000
heap
page read and write
7FFAABCC8000
trusted library allocation
page read and write
7FFB04322000
unkown
page readonly
33A5000
trusted library allocation
page read and write
13F4000
heap
page read and write
AAA000
unkown
page read and write
268C000
trusted library allocation
page read and write
7FFAABA26000
trusted library allocation
page execute and read and write
256725C2000
heap
page read and write
2B48000
trusted library allocation
page read and write
A23000
unkown
page readonly
C30000
heap
page read and write
891000
unkown
page execute read
400000
unkown
page readonly
2567456E000
heap
page read and write
77B000
unkown
page write copy
4F7E000
stack
page read and write
129E000
stack
page read and write
5C4E000
stack
page read and write
25669CA9000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
9A6000
heap
page read and write
2896000
direct allocation
page read and write
778000
unkown
page read and write
1DFAF000
stack
page read and write
305E000
heap
page read and write
6620000
trusted library allocation
page read and write
2472B000
heap
page read and write
3443000
trusted library allocation
page read and write
256769E7000
heap
page read and write
114C000
unkown
page readonly
37D1000
trusted library allocation
page read and write
25672480000
heap
page read and write
34F0000
trusted library allocation
page read and write
A40000
heap
page read and write
740000
heap
page read and write
25D9000
direct allocation
page read and write
7BFE000
stack
page read and write
4E6000
unkown
page read and write
AB3000
unkown
page readonly
2EC4000
unkown
page read and write
AB3000
unkown
page readonly
7FFAABC40000
trusted library allocation
page read and write
57E5000
unkown
page read and write
98F000
heap
page read and write
2EC4000
unkown
page read and write
25658038000
heap
page read and write
574D000
unkown
page read and write
717F000
stack
page read and write
1F5000
heap
page read and write
1E780000
trusted library allocation
page read and write
427E000
stack
page read and write
25673230000
trusted library section
page read and write
29C0000
heap
page read and write
36EA000
trusted library allocation
page read and write
6C830000
unkown
page readonly
2887000
direct allocation
page read and write
6631000
heap
page read and write
2471D000
heap
page read and write
29BB000
trusted library allocation
page read and write
256723D0000
heap
page read and write
7FFAABE10000
trusted library allocation
page read and write
7FFAABD30000
trusted library allocation
page read and write
3550000
unkown
page read and write
66C9000
heap
page read and write
3268000
trusted library allocation
page read and write
DB4000
heap
page read and write
2567690C000
heap
page read and write
246F6000
heap
page read and write
11A8000
unkown
page readonly
5693000
trusted library allocation
page read and write
2C4A000
trusted library allocation
page read and write
885000
heap
page read and write
DB4000
heap
page read and write
3687000
trusted library allocation
page read and write
6B9B000
heap
page read and write
2E20000
heap
page read and write
400000
unkown
page readonly
3D1E000
trusted library allocation
page read and write
7FFAABBB0000
trusted library allocation
page read and write
1736000
trusted library allocation
page execute and read and write
5610000
direct allocation
page read and write
37E5000
trusted library allocation
page read and write
11B4000
unkown
page readonly
256745A8000
heap
page read and write
39B2000
heap
page read and write
585F000
stack
page read and write
25AE000
direct allocation
page read and write
267F000
stack
page read and write
13F4000
heap
page read and write
2FAA000
heap
page read and write
1520000
trusted library allocation
page read and write
306F000
heap
page read and write
66F000
unkown
page readonly
55B0000
heap
page read and write
2C51000
trusted library allocation
page read and write
6B1000
unkown
page readonly
1E78A000
heap
page read and write
D50000
heap
page read and write
4DF000
unkown
page read and write
C5E000
stack
page read and write
2470B000
heap
page read and write
3430000
heap
page read and write
7FFAABB0B000
trusted library allocation
page read and write
2470A000
heap
page read and write
6710000
trusted library allocation
page execute and read and write
2AB0000
heap
page read and write
2472B000
heap
page read and write
890000
unkown
page readonly
3697A000
heap
page read and write
329B000
trusted library allocation
page read and write
6701000
trusted library allocation
page read and write
8241C38000
stack
page read and write
6D9E000
trusted library section
page read and write
8365000
trusted library allocation
page read and write
7FFAABE70000
trusted library allocation
page read and write
251F000
direct allocation
page read and write
25673150000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
5EB0000
heap
page read and write
76A000
unkown
page read and write
25659C11000
trusted library allocation
page read and write
7230000
heap
page read and write
32B2000
trusted library allocation
page read and write
28FD000
direct allocation
page read and write
2450000
direct allocation
page execute and read and write
3055000
heap
page read and write
7FFAABB60000
trusted library allocation
page read and write
25658225000
heap
page read and write
6C27E000
unkown
page read and write
6A7E000
stack
page read and write
8ED000
trusted library allocation
page execute and read and write
29E0000
direct allocation
page read and write
1770000
heap
page read and write
6B7B000
heap
page read and write
4B56000
trusted library allocation
page read and write
7C00000
heap
page read and write
8E4000
trusted library allocation
page read and write
14EE000
stack
page read and write
7FFB04301000
unkown
page execute read
5178000
trusted library allocation
page read and write
256723C0000
heap
page read and write
119E000
unkown
page readonly
8FE000
stack
page read and write
24710000
heap
page read and write
6C5000
unkown
page readonly
A31000
heap
page read and write
248E000
stack
page read and write
AA0000
unkown
page read and write
25657F60000
heap
page read and write
256725B0000
heap
page read and write
8778000
trusted library allocation
page read and write
25672A40000
trusted library allocation
page read and write
409000
unkown
page execute read
5DCE000
stack
page read and write
5649000
trusted library allocation
page read and write
6625000
trusted library allocation
page read and write
25674673000
heap
page read and write
1566000
heap
page read and write
115B000
unkown
page readonly
739E000
heap
page read and write
4047000
unkown
page readonly
82413F6000
stack
page read and write
369F8000
heap
page read and write
25676AAC000
heap
page read and write
2479A000
heap
page read and write
61ECD000
direct allocation
page readonly
9C2000
heap
page read and write
32F8000
trusted library allocation
page read and write
7060000
heap
page read and write
3581000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
2F10000
unkown
page read and write
256731C0000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
4FA9000
heap
page read and write
7FFAABAE2000
trusted library allocation
page read and write
968000
heap
page read and write
880000
heap
page read and write
43E0000
heap
page read and write
671E000
heap
page read and write
24709000
heap
page read and write
7FFAAB940000
trusted library allocation
page read and write
71BB000
stack
page read and write
783000
unkown
page readonly
B5C000
stack
page read and write
41C000
unkown
page write copy
AA9000
unkown
page write copy
2F60000
heap
page read and write
7ABE000
stack
page read and write
8241A3E000
stack
page read and write
6672000
trusted library allocation
page read and write
4798000
heap
page read and write
2EC4000
unkown
page read and write
9B000
stack
page read and write
66ED000
heap
page read and write
1138000
stack
page read and write
744000
heap
page read and write
5780000
unkown
page read and write
7FFAABE80000
trusted library allocation
page read and write
7FF4DE5B0000
trusted library allocation
page execute and read and write
6C9000
unkown
page readonly
8240DFB000
stack
page read and write
5E90000
heap
page read and write
25D2000
direct allocation
page read and write
15CF000
stack
page read and write
4D8E000
stack
page read and write
96F000
heap
page read and write
30E4000
unkown
page read and write
72E0000
trusted library allocation
page read and write
2AB1000
heap
page read and write
29B0000
heap
page read and write
29D0000
unkown
page read and write
65B000
unkown
page readonly
335E000
unkown
page read and write
710000
heap
page read and write
66E9000
heap
page read and write
7FFAAB944000
trusted library allocation
page read and write
C90000
heap
page read and write
900000
trusted library allocation
page read and write
97000
stack
page read and write
6680000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
69B000
unkown
page readonly
2440000
heap
page read and write
9C6000
heap
page read and write
82408FA000
stack
page read and write
1379000
heap
page read and write
1760000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
898E000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
F50000
heap
page read and write
360A000
trusted library allocation
page read and write
7FFAAB96B000
trusted library allocation
page execute and read and write
2F1D000
unkown
page read and write
2472B000
heap
page read and write
3695000
heap
page read and write
D06000
heap
page read and write
24710000
heap
page read and write
6CEB7000
unkown
page readonly
8E0000
trusted library allocation
page read and write
65B0000
heap
page read and write
644000
unkown
page readonly
6C291000
unkown
page execute read
7FF4DE592000
trusted library allocation
page readonly
902000
trusted library allocation
page read and write
6C1000
unkown
page readonly
66F0000
trusted library allocation
page execute and read and write
A10000
unkown
page read and write
28BC000
direct allocation
page read and write
256731B0000
trusted library allocation
page read and write
5781000
unkown
page read and write
8241B3D000
stack
page read and write
1305000
heap
page read and write
C60000
trusted library allocation
page execute and read and write
5CB0000
trusted library allocation
page read and write
29F0000
heap
page read and write
3584000
trusted library allocation
page read and write
27E0000
heap
page read and write
EBE000
stack
page read and write
2567684F000
heap
page read and write
549000
unkown
page execute and read and write
906000
trusted library allocation
page execute and read and write
2EC4000
unkown
page read and write
2565800E000
heap
page read and write
1D0000
heap
page read and write
1E681000
heap
page read and write
30AE000
unkown
page read and write
1171000
unkown
page readonly
6A3C000
stack
page read and write
24710000
heap
page read and write
824203E000
stack
page read and write
2EC4000
unkown
page read and write
2B81000
trusted library allocation
page read and write
6E8E000
heap
page read and write
DB0000
heap
page read and write
8378000
trusted library allocation
page read and write
256769D8000
heap
page read and write
4B63000
trusted library allocation
page read and write
F4B000
heap
page read and write
11F8000
unkown
page readonly
25672444000
heap
page read and write
25659F88000
trusted library allocation
page read and write
9E4000
heap
page read and write
6C98E000
unkown
page write copy
260C000
direct allocation
page read and write
7FFAAB964000
trusted library allocation
page read and write
2470D000
heap
page read and write
EEE000
stack
page read and write
24F0000
direct allocation
page read and write
37FC000
trusted library allocation
page read and write
116B000
unkown
page readonly
7E0000
heap
page read and write
4546000
heap
page read and write
25669C11000
trusted library allocation
page read and write
30B0000
heap
page read and write
2BB5000
heap
page read and write
174B000
trusted library allocation
page execute and read and write
6900000
heap
page read and write
24717000
heap
page read and write
681D000
stack
page read and write
51D0000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
673000
unkown
page readonly
5680000
trusted library allocation
page read and write
119B000
unkown
page readonly
334F000
trusted library allocation
page read and write
589E000
stack
page read and write
25674567000
heap
page read and write
960000
heap
page read and write
548E000
trusted library allocation
page read and write
D94000
heap
page read and write
25674557000
heap
page read and write
36A8000
trusted library allocation
page read and write
6FB000
stack
page read and write
31D5000
heap
page read and write
256724F0000
trusted library section
page read and write
2EC4000
unkown
page read and write
556E000
direct allocation
page read and write
25674544000
heap
page read and write
1184000
unkown
page readonly
2EC4000
unkown
page read and write
7FF4DE5AB000
trusted library allocation
page execute read
44BF000
unkown
page read and write
31EB000
trusted library allocation
page read and write
9F6000
heap
page read and write
2B03000
heap
page read and write
85E000
stack
page read and write
246F8000
heap
page read and write
30B0000
unkown
page read and write
824015B000
stack
page read and write
6D9B000
trusted library section
page read and write
67BE000
stack
page read and write
379D000
trusted library allocation
page read and write
7220000
heap
page read and write
2EC4000
unkown
page read and write
2470B000
heap
page read and write
9C5000
heap
page read and write
917000
trusted library allocation
page execute and read and write
28D9000
direct allocation
page read and write
2C6D000
trusted library allocation
page read and write
6C98D000
unkown
page read and write
2A4C000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
32CE000
stack
page read and write
632000
unkown
page readonly
173A000
trusted library allocation
page execute and read and write
6CEB4000
unkown
page read and write
1150000
unkown
page readonly
3932000
heap
page read and write
2EC4000
unkown
page read and write
32E4000
trusted library allocation
page read and write
2E70000
unkown
page read and write
2EC4000
unkown
page read and write
11D6000
unkown
page readonly
9D7000
heap
page read and write
2C39000
heap
page read and write
7FFAAB9FC000
trusted library allocation
page execute and read and write
30C0000
direct allocation
page read and write
5C8D000
stack
page read and write
3111000
trusted library allocation
page read and write
2870000
direct allocation
page read and write
256C000
direct allocation
page read and write
40AE000
trusted library allocation
page read and write
25676AEF000
heap
page read and write
2EC4000
unkown
page read and write
2DEF000
stack
page read and write
75EE000
stack
page read and write
12B8000
heap
page read and write
2C78000
trusted library allocation
page read and write
DB4000
heap
page read and write
3237000
trusted library allocation
page read and write
28A6000
direct allocation
page read and write
256725E0000
heap
page read and write
27F3000
heap
page read and write
91B000
trusted library allocation
page execute and read and write
2EC4000
unkown
page read and write
12A0000
heap
page read and write
2C9D000
stack
page read and write
24E6000
heap
page read and write
962000
heap
page read and write
25674564000
heap
page read and write
2565803A000
heap
page read and write
834F000
trusted library allocation
page read and write
25676912000
heap
page read and write
36AF000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
972000
heap
page read and write
AAA000
unkown
page read and write
25C4000
direct allocation
page read and write
12B0000
heap
page read and write
2E60000
direct allocation
page read and write
7FF4DE5A9000
trusted library allocation
page execute read
7FFAABCB7000
trusted library allocation
page read and write
11CC000
unkown
page readonly
43ED000
unkown
page read and write
3207000
trusted library allocation
page read and write
256583F0000
heap
page read and write
1530000
heap
page read and write
37A3000
trusted library allocation
page read and write
5162000
trusted library allocation
page read and write
42CA000
unkown
page read and write
639C000
stack
page read and write
501C000
heap
page read and write
25676930000
heap
page read and write
384C000
trusted library allocation
page read and write
636000
unkown
page readonly
4023000
unkown
page readonly
786E000
stack
page read and write
1732000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
DB4000
heap
page read and write
7040F000
unkown
page readonly
7BE000
stack
page read and write
7FFAAB9F6000
trusted library allocation
page read and write
7FFAABBA0000
trusted library allocation
page read and write
401000
unkown
page execute read
891000
unkown
page execute read
8B0000
heap
page read and write
6BA6000
heap
page read and write
27EA000
trusted library allocation
page read and write
6B3E000
stack
page read and write
C7B000
trusted library allocation
page read and write
4AF2000
trusted library allocation
page read and write
624000
unkown
page execute and read and write
7030000
trusted library allocation
page read and write
6620000
heap
page read and write
3058000
heap
page read and write
305F000
heap
page read and write
2760000
heap
page read and write
137D000
heap
page read and write
40F000
unkown
page execute read
44EF000
stack
page read and write
36AA000
trusted library allocation
page read and write
25659B80000
trusted library section
page read and write
379A000
trusted library allocation
page read and write
2498000
trusted library allocation
page read and write
7FFAABBE0000
trusted library allocation
page execute and read and write
3816000
trusted library allocation
page read and write
6A1000
unkown
page readonly
7FFB04300000
unkown
page readonly
745D000
stack
page read and write
2DB000
stack
page read and write
66D7000
heap
page read and write
2EC4000
unkown
page read and write
66B0000
trusted library allocation
page read and write
695C000
heap
page read and write
1D5000
heap
page read and write
6A3000
unkown
page readonly
28C4000
direct allocation
page read and write
11F0000
unkown
page readonly
25674666000
heap
page read and write
38A1000
trusted library allocation
page read and write
2471D000
heap
page read and write
1623000
heap
page read and write
7FFAABB40000
trusted library allocation
page read and write
7FF4DE5A7000
trusted library allocation
page execute read
4215000
trusted library allocation
page read and write
761000
unkown
page read and write
2A42000
trusted library allocation
page read and write
6C997000
unkown
page readonly
13F4000
heap
page read and write
6910000
heap
page read and write
3448000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
EEA000
stack
page read and write
2EC4000
unkown
page read and write
1E54E000
stack
page read and write
5690000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
39D0000
heap
page read and write
7040D000
unkown
page read and write
6CEAE000
unkown
page write copy
2598000
direct allocation
page read and write
2A856000
heap
page read and write
4477000
unkown
page read and write
477D000
stack
page read and write
4B00000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
70DA000
stack
page read and write
D13000
heap
page read and write
32C0000
unkown
page read and write
25657FB0000
trusted library allocation
page read and write
75FE000
stack
page read and write
30B2000
heap
page read and write
4DB0000
trusted library allocation
page read and write
915000
trusted library allocation
page execute and read and write
3060000
heap
page read and write
24729000
heap
page read and write
2A54000
trusted library allocation
page read and write
11B7000
unkown
page readonly
2EC4000
unkown
page read and write
3325000
trusted library allocation
page read and write
25672980000
trusted library section
page read and write
7FFAABEB0000
trusted library allocation
page read and write
306F000
heap
page read and write
9B4000
heap
page read and write
1394000
heap
page read and write
6B8B000
heap
page read and write
3089D000
heap
page read and write
3067000
heap
page read and write
11D2000
unkown
page readonly
64CE000
stack
page read and write
7219000
stack
page read and write
192000
stack
page read and write
394B000
heap
page read and write
242E000
stack
page read and write
661E000
stack
page read and write
2C11000
trusted library allocation
page read and write
6C989000
unkown
page write copy
369F3000
heap
page read and write
32D1000
unkown
page read and write
43AD000
heap
page execute and read and write
7300000
trusted library section
page readonly
36B3000
trusted library allocation
page read and write
24710000
heap
page read and write
75E000
stack
page read and write
464F000
stack
page read and write
891000
unkown
page execute read
25659E43000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
744000
heap
page read and write
4B53000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
900000
heap
page read and write
284A000
direct allocation
page read and write
69F000
unkown
page readonly
256544C0000
unkown
page readonly
7FFAABB0E000
trusted library allocation
page read and write
66BF000
heap
page read and write
9DE000
heap
page read and write
7390000
trusted library allocation
page execute and read and write
25FD000
direct allocation
page read and write
4D1C000
trusted library allocation
page read and write
7FFAABC30000
trusted library allocation
page read and write
7FFAABB64000
trusted library allocation
page read and write
A19000
unkown
page write copy
4230000
heap
page read and write
2EC4000
unkown
page read and write
2513000
direct allocation
page read and write
256562FB000
unkown
page readonly
3400000
heap
page read and write
2EC4000
unkown
page read and write
974000
heap
page read and write
401000
unkown
page execute read
573D000
direct allocation
page read and write
3059000
heap
page read and write
3064000
heap
page read and write
44D0000
trusted library allocation
page read and write
7FFAABB10000
trusted library allocation
page read and write
291C000
stack
page read and write
2504000
direct allocation
page read and write
4DFF000
stack
page read and write
5800000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
4690000
heap
page read and write
256745C8000
heap
page read and write
1513000
trusted library allocation
page execute and read and write
998000
heap
page read and write
291A000
direct allocation
page read and write
25672AE0000
trusted library section
page read and write
5650000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
52AE000
stack
page read and write
2796000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
197000
stack
page read and write
3828000
heap
page read and write
5621000
trusted library allocation
page read and write
36C9000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
40DA000
heap
page read and write
5739000
direct allocation
page read and write
32C4000
unkown
page read and write
2EC4000
unkown
page read and write
7FF4DE5A1000
trusted library allocation
page execute read
F18000
heap
page read and write
2A7A2000
heap
page read and write
3681000
trusted library allocation
page read and write
252E000
direct allocation
page read and write
29F8000
heap
page read and write
3380000
direct allocation
page read and write
677E000
stack
page read and write
25674634000
heap
page read and write
62A000
unkown
page readonly
24BC000
stack
page read and write
5170000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
759C000
stack
page read and write
679000
unkown
page readonly
368D0000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
1514000
trusted library allocation
page read and write
57AE000
direct allocation
page read and write
3050000
heap
page read and write
30E0000
heap
page read and write
25658200000
trusted library section
page read and write
3540000
unkown
page read and write
7FFAABE00000
trusted library allocation
page read and write
6C831000
unkown
page execute read
25676AF1000
heap
page read and write
12F0000
heap
page read and write
59DD000
stack
page read and write
25672441000
heap
page read and write
56D0000
unkown
page read and write
2470B000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
27FE000
trusted library allocation
page read and write
6B8D000
heap
page read and write
4B50000
trusted library allocation
page read and write
650E000
stack
page read and write
25674720000
heap
page read and write
13F4000
heap
page read and write
3EE7000
heap
page read and write
30E4000
unkown
page read and write
15AE000
heap
page read and write
338F000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
6700000
heap
page read and write
DB4000
heap
page read and write
3100000
heap
page execute and read and write
24708000
heap
page read and write
6706000
heap
page read and write
DB4000
heap
page read and write
9DC000
heap
page read and write
4D0E000
stack
page read and write
2877000
direct allocation
page read and write
256580E0000
trusted library allocation
page read and write
2472C000
heap
page read and write
1DFEE000
stack
page read and write
1D7000
heap
page read and write
2567468E000
heap
page read and write
FAF000
stack
page read and write
7FFAABAF2000
trusted library allocation
page read and write
54FD000
direct allocation
page read and write
405A000
heap
page read and write
6C994000
unkown
page read and write
261A000
direct allocation
page read and write
AAC000
unkown
page read and write
11D4000
unkown
page readonly
246FF000
heap
page read and write
64DD000
stack
page read and write
24710000
heap
page read and write
777000
heap
page read and write
66A0000
heap
page read and write
25676953000
heap
page read and write
25657D70000
unkown
page readonly
69B0000
trusted library allocation
page read and write
7FFAABC5B000
trusted library allocation
page read and write
37B8000
trusted library allocation
page read and write
B3E000
stack
page read and write
306D000
heap
page read and write
403D000
trusted library allocation
page read and write
C1D000
unkown
page readonly
25672900000
trusted library section
page read and write
30F0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
2A7A4000
heap
page read and write
60D0000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
5185000
trusted library allocation
page read and write
7FFAABE56000
trusted library allocation
page read and write
801000
unkown
page execute read
401000
unkown
page execute read
1370000
heap
page read and write
4162000
unkown
page read and write
7AFE000
stack
page read and write
948000
heap
page read and write
25B5000
direct allocation
page read and write
1742000
trusted library allocation
page read and write
4BAD000
stack
page read and write
67FE000
stack
page read and write
7FFAABCF0000
trusted library allocation
page read and write
95C000
heap
page read and write
7FFB04325000
unkown
page readonly
2A7A0000
heap
page read and write
766000
unkown
page read and write
5628000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
417000
unkown
page execute read
24703000
heap
page read and write
63DE000
stack
page read and write
389E000
trusted library allocation
page read and write
2F00000
heap
page read and write
7FF4DE593000
trusted library allocation
page execute read
3618000
trusted library allocation
page read and write
1159000
unkown
page readonly
33FE000
stack
page read and write
3910000
heap
page read and write
25E8000
direct allocation
page read and write
4B30000
trusted library allocation
page read and write
72C3000
heap
page read and write
688000
unkown
page readonly
400000
unkown
page readonly
2970000
unkown
page readonly
37DE000
trusted library allocation
page read and write
2470A000
heap
page read and write
2E00000
heap
page read and write
2A7B000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page execute and read and write
342C000
trusted library allocation
page read and write
25676933000
heap
page read and write
2567470F000
heap
page read and write
663F000
trusted library allocation
page read and write
67BF000
stack
page read and write
306F000
stack
page read and write
517F000
trusted library allocation
page read and write
F59000
heap
page read and write
4117000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
25657E40000
heap
page read and write
4ADD000
stack
page read and write
2C63000
trusted library allocation
page read and write
760000
heap
page read and write
2F80000
unkown
page readonly
636000
unkown
page execute and read and write
CA7000
heap
page read and write
40BA000
heap
page read and write
447000
unkown
page execute and read and write
2EC4000
unkown
page read and write
5A7F000
stack
page read and write
6C475000
unkown
page readonly
605B000
stack
page read and write
24703000
heap
page read and write
8D0000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
3282000
trusted library allocation
page read and write
69C0000
trusted library allocation
page execute and read and write
4AED000
trusted library allocation
page read and write
118A000
unkown
page readonly
31EF000
unkown
page read and write
4233000
trusted library allocation
page read and write
2471D000
heap
page read and write
11F4000
unkown
page readonly
308A3000
heap
page read and write
2567454E000
heap
page read and write
2857000
direct allocation
page read and write
912000
trusted library allocation
page read and write
7FFAABE30000
trusted library allocation
page read and write
24703000
heap
page read and write
4237000
unkown
page read and write
6F0C000
stack
page read and write
D0A000
heap
page read and write
2562000
direct allocation
page read and write
1240000
heap
page read and write
32C4000
unkown
page read and write
11FA000
unkown
page readonly
154E000
heap
page read and write
5299000
trusted library allocation
page read and write
6622000
trusted library allocation
page read and write
43A000
unkown
page execute read
832E000
trusted library allocation
page read and write
7600000
trusted library allocation
page execute and read and write
6C42F000
unkown
page readonly
3070000
heap
page read and write
C8E000
stack
page read and write
251C000
direct allocation
page read and write
5614000
trusted library allocation
page read and write
401000
unkown
page execute read
7FF4DE5A5000
trusted library allocation
page execute read
97F000
heap
page read and write
73A0000
trusted library allocation
page read and write
30E4000
unkown
page read and write
7FF4DE590000
trusted library allocation
page readonly
2900000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
2A7BE000
heap
page read and write
13F4000
heap
page read and write
943000
heap
page read and write
42DF000
stack
page read and write
7FFAAB950000
trusted library allocation
page read and write
D5B000
heap
page read and write
677000
unkown
page readonly
1DEAE000
stack
page read and write
1E36E000
stack
page read and write
37C4000
trusted library allocation
page read and write
2471D000
heap
page read and write
74AC000
stack
page read and write
3564000
unkown
page read and write
3801000
trusted library allocation
page read and write
28F6000
direct allocation
page read and write
82404FE000
stack
page read and write
2470A000
heap
page read and write
971000
heap
page read and write
525D000
trusted library allocation
page read and write
30E4000
unkown
page read and write
2EC4000
unkown
page read and write
353F000
unkown
page read and write
A3C000
unkown
page readonly
3F10000
trusted library allocation
page read and write
1564000
heap
page read and write
7FFAABA60000
trusted library allocation
page execute and read and write
4B13000
heap
page read and write
66A0000
trusted library allocation
page execute and read and write
7FFAABBD0000
trusted library allocation
page read and write
439E000
heap
page read and write
9B8000
heap
page read and write
3613000
trusted library allocation
page read and write
773D000
stack
page read and write
5BD1000
trusted library allocation
page read and write
36D3000
trusted library allocation
page read and write
9BA000
heap
page read and write
3897000
trusted library allocation
page read and write
28E8000
direct allocation
page read and write
24721000
heap
page read and write
256581B0000
heap
page execute and read and write
2621000
direct allocation
page read and write
57D1000
unkown
page read and write
3586000
trusted library allocation
page read and write
25658220000
heap
page read and write
2A7C1000
heap
page read and write
2472B000
heap
page read and write
2B33000
heap
page read and write
890000
unkown
page readonly
2EC4000
unkown
page read and write
76D000
unkown
page read and write
6DE0000
heap
page read and write
4F3E000
stack
page read and write
30E4000
unkown
page read and write
30FC000
trusted library allocation
page read and write
322C000
heap
page read and write
358B000
trusted library allocation
page read and write
4021000
unkown
page read and write
4ACB000
trusted library allocation
page read and write
5781000
unkown
page read and write
C30000
heap
page read and write
2B86000
trusted library allocation
page read and write
BF0000
heap
page read and write
72BD000
stack
page read and write
3793000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
4EF9000
heap
page read and write
2960000
unkown
page readonly
152D000
trusted library allocation
page execute and read and write
AA9000
unkown
page write copy
7FFAABB32000
trusted library allocation
page read and write
13E6000
heap
page read and write
24FD000
direct allocation
page read and write
7FFAABBC5000
trusted library allocation
page read and write
C4F000
stack
page read and write
25676840000
heap
page read and write
59EC000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
4B09000
trusted library allocation
page read and write
2F30000
heap
page read and write
3062000
heap
page read and write
744000
heap
page read and write
9AC000
unkown
page readonly
4B10000
heap
page read and write
6C947000
unkown
page readonly
64E0000
heap
page read and write
3CA9000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
3220000
heap
page read and write
303E000
stack
page read and write
2980000
heap
page read and write
24721000
heap
page read and write
2506000
direct allocation
page read and write
6B4000
unkown
page readonly
37A6000
trusted library allocation
page read and write
25659FE2000
trusted library allocation
page read and write
4AE1000
trusted library allocation
page read and write
25674714000
heap
page read and write
6C26D000
unkown
page readonly
256745F1000
heap
page read and write
30895000
heap
page read and write
7370000
trusted library allocation
page execute and read and write
B68000
heap
page read and write
59E0000
trusted library allocation
page read and write
6B6F000
heap
page read and write
25674554000
heap
page read and write
259F000
direct allocation
page read and write
25659F66000
trusted library allocation
page read and write
25676B2A000
heap
page read and write
246F6000
heap
page read and write
1730000
trusted library allocation
page read and write
82407FF000
stack
page read and write
11E0000
unkown
page readonly
2490000
trusted library allocation
page read and write
25659B20000
heap
page read and write
7FFAABE20000
trusted library allocation
page read and write
2842000
direct allocation
page read and write
2470D000
heap
page read and write
66AF000
heap
page read and write
5683000
trusted library allocation
page read and write
670C000
heap
page read and write
63E000
unkown
page readonly
7FFAABCD0000
trusted library allocation
page read and write
2567457E000
heap
page read and write
7FFAABDF0000
trusted library allocation
page execute and read and write
59C0000
unkown
page read and write
256725FC000
heap
page read and write
AB3000
unkown
page readonly
116F000
unkown
page readonly
6CD51000
unkown
page execute read
7FFAABEC0000
trusted library allocation
page read and write
2E0E000
unkown
page read and write
3045000
heap
page read and write
6CD50000
unkown
page readonly
AB3000
unkown
page readonly
A3C000
unkown
page readonly
24701000
heap
page read and write
2C3D000
trusted library allocation
page read and write
25676947000
heap
page read and write
4ADE000
trusted library allocation
page read and write
7FFAABA00000
trusted library allocation
page execute and read and write
3CAD000
trusted library allocation
page read and write
4070000
heap
page read and write
2913000
direct allocation
page read and write
6623000
heap
page read and write
2790000
heap
page read and write
256725A0000
heap
page execute and read and write
2A9F000
trusted library allocation
page read and write
25676A1C000
heap
page read and write
6C831000
unkown
page execute read
4111000
trusted library allocation
page read and write
5790000
unkown
page read and write
6070000
trusted library allocation
page read and write
13F4000
heap
page read and write
2470A000
heap
page read and write
3821000
trusted library allocation
page read and write
7278000
heap
page read and write
1E26E000
stack
page read and write
2C5C000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
439A000
heap
page read and write
671000
unkown
page readonly
675000
unkown
page readonly
25669C8F000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
2471D000
heap
page read and write
99E000
heap
page read and write
613000
unkown
page readonly
82414FB000
stack
page read and write
4348000
heap
page read and write
1745000
trusted library allocation
page execute and read and write
4DA2000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
8240AFD000
stack
page read and write
59E9000
trusted library allocation
page read and write
3075000
heap
page read and write
2535000
direct allocation
page read and write
AAC000
unkown
page read and write
7FFAABEA0000
trusted library allocation
page execute and read and write
6B7F000
stack
page read and write
256746A1000
heap
page read and write
4DF000
unkown
page write copy
305F000
heap
page read and write
2A2F000
stack
page read and write
97C000
heap
page read and write
256544C2000
unkown
page readonly
891000
unkown
page execute read
306F000
heap
page read and write
25E0000
direct allocation
page read and write
24721000
heap
page read and write
24E0000
heap
page read and write
7630000
trusted library allocation
page execute and read and write
25676B3B000
heap
page read and write
3079000
heap
page read and write
6930000
heap
page read and write
994000
heap
page read and write
6CB000
unkown
page readonly
97000
stack
page read and write
6C1F0000
unkown
page readonly
7FFAABC08000
trusted library allocation
page read and write
3564000
unkown
page read and write
6B80000
heap
page read and write
2A8E000
heap
page read and write
2867000
direct allocation
page read and write
4DA0000
trusted library allocation
page read and write
25672A50000
trusted library section
page readonly
3368000
trusted library allocation
page read and write
70406000
unkown
page readonly
6629000
trusted library allocation
page read and write
256731F0000
trusted library section
page read and write
25657F40000
heap
page read and write
5640000
trusted library allocation
page read and write
7FFAABC20000
trusted library allocation
page read and write
9E4000
heap
page read and write
7FFAABBCC000
trusted library allocation
page read and write
5CE0000
heap
page read and write
246F5000
heap
page read and write
247F9000
heap
page read and write
744000
heap
page read and write
3062000
heap
page read and write
2A7B8000
heap
page read and write
5CE0000
trusted library allocation
page read and write
2F90000
heap
page read and write
254D000
direct allocation
page read and write
25672454000
heap
page read and write
4E8000
unkown
page write copy
6690000
trusted library allocation
page execute and read and write
6638000
trusted library allocation
page read and write
39A0000
heap
page read and write
4222000
trusted library allocation
page read and write
256723EF000
heap
page read and write
57D1000
unkown
page read and write
662B000
heap
page read and write
13F4000
heap
page read and write
416000
unkown
page write copy
2B3B000
trusted library allocation
page read and write
A1C000
unkown
page read and write
4ACE000
trusted library allocation
page read and write
518A000
trusted library allocation
page read and write
1E4AD000
stack
page read and write
3275000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
25657FD9000
heap
page read and write
30E0000
heap
page read and write
57D4000
unkown
page read and write
6C7000
unkown
page readonly
27E3000
trusted library allocation
page read and write
278E000
stack
page read and write
824163B000
stack
page read and write
561E000
trusted library allocation
page read and write
6C994000
unkown
page read and write
5600000
trusted library allocation
page read and write
610000
unkown
page readonly
6C46E000
unkown
page read and write
33C0000
heap
page read and write
66F2000
heap
page read and write
382B000
trusted library allocation
page read and write
11F2000
unkown
page readonly
7FFAABB56000
trusted library allocation
page read and write
3090000
heap
page read and write
25673140000
trusted library allocation
page read and write
82401AE000
stack
page read and write
51C0000
trusted library allocation
page execute and read and write
2EC4000
unkown
page read and write
256C000
stack
page read and write
25676C62000
trusted library allocation
page read and write
A3C000
unkown
page readonly
87E000
unkown
page readonly
3228000
trusted library allocation
page read and write
4C70000
trusted library allocation
page execute and read and write
32A0000
unkown
page read and write
2F5E000
stack
page read and write
256725F9000
heap
page read and write
621000
unkown
page readonly
7870000
heap
page read and write
3294000
trusted library allocation
page read and write
7040D000
unkown
page read and write
2582000
direct allocation
page read and write
25674559000
heap
page read and write
68FE000
stack
page read and write
2472B000
heap
page read and write
4047000
unkown
page readonly
25657F20000
heap
page read and write
381C000
trusted library allocation
page read and write
683000
unkown
page readonly
CE0000
heap
page read and write
4ADA000
trusted library allocation
page read and write
5ECA000
heap
page read and write
4050000
heap
page read and write
41C000
unkown
page execute read
29C3000
trusted library allocation
page read and write
64F0000
heap
page read and write
2C83000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
744000
heap
page read and write
2B30000
heap
page read and write
6720000
trusted library allocation
page execute and read and write
67E0000
trusted library allocation
page read and write
13F4000
heap
page read and write
13F0000
heap
page read and write
305D000
heap
page read and write
5781000
unkown
page read and write
3098000
heap
page read and write
9A9000
heap
page read and write
4AC0000
trusted library allocation
page read and write
40AA000
heap
page read and write
9CB000
heap
page read and write
2AB1000
heap
page read and write
35F5000
trusted library allocation
page read and write
256745B1000
heap
page read and write
2EC4000
unkown
page read and write
6C4B000
stack
page read and write
2A12000
heap
page read and write
344C000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
9C7000
heap
page read and write
48E4000
unkown
page read and write
2EC4000
unkown
page read and write
6970000
trusted library allocation
page execute and read and write
1E64E000
stack
page read and write
3616000
trusted library allocation
page read and write
38D0000
heap
page read and write
3EE0000
heap
page read and write
2860000
direct allocation
page read and write
6BF000
unkown
page readonly
7FFAABB00000
trusted library allocation
page read and write
7070000
trusted library allocation
page execute and read and write
308AB000
heap
page read and write
A70000
heap
page read and write
701F000
heap
page read and write
256745CF000
heap
page read and write
3453000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
41EF000
unkown
page read and write
66C0000
trusted library allocation
page read and write
13F4000
heap
page read and write
82410FB000
stack
page read and write
4EC000
unkown
page read and write
7FFAABD50000
trusted library allocation
page read and write
24705000
heap
page read and write
36DE000
trusted library allocation
page read and write
6A9000
unkown
page readonly
25659C00000
heap
page read and write
1163000
unkown
page readonly
3B80000
trusted library allocation
page read and write
41C000
unkown
page write copy
54F9000
direct allocation
page read and write
4DB0000
heap
page execute and read and write
2F60000
heap
page read and write
85A000
stack
page read and write
3930000
heap
page read and write
2567699B000
heap
page read and write
256724BA000
heap
page read and write
25A6000
direct allocation
page read and write
6C1F1000
unkown
page execute read
634000
unkown
page readonly
172F000
stack
page read and write
928000
heap
page read and write
6CEA9000
unkown
page write copy
2EC4000
unkown
page read and write
246F0000
heap
page read and write
53D0000
direct allocation
page read and write
4C64000
trusted library allocation
page read and write
256581A0000
trusted library allocation
page read and write
2567244E000
heap
page read and write
25676A29000
heap
page read and write
5660000
trusted library allocation
page read and write
19C000
stack
page read and write
5F02000
heap
page read and write
437F000
stack
page read and write
2B55000
trusted library allocation
page read and write
63A000
unkown
page readonly
4D20000
trusted library allocation
page execute and read and write
7FF4DE5A2000
trusted library allocation
page readonly
4540000
heap
page read and write
3563000
trusted library allocation
page read and write
1E0EF000
stack
page read and write
416000
unkown
page write copy
68A000
unkown
page readonly
AA0000
unkown
page read and write
369E0000
heap
page read and write
6C470000
unkown
page read and write
693C000
stack
page read and write
256725A4000
heap
page execute and read and write
325B000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
257B000
direct allocation
page read and write
24FB000
direct allocation
page read and write
195000
stack
page read and write
3D8000
stack
page read and write
28B5000
direct allocation
page read and write
256580E3000
trusted library allocation
page read and write
640000
unkown
page readonly
76F000
unkown
page read and write
4D90000
trusted library allocation
page read and write
686000
unkown
page readonly
7FFAAB9F0000
trusted library allocation
page read and write
8E3000
trusted library allocation
page execute and read and write
25671C40000
trusted library allocation
page read and write
337C000
trusted library allocation
page read and write
97E000
heap
page read and write
5B7F000
stack
page read and write
642000
unkown
page readonly
49DC000
stack
page read and write
34EC000
trusted library allocation
page read and write
6C947000
unkown
page readonly
13E0000
heap
page read and write
60B0000
trusted library allocation
page read and write
405E000
heap
page read and write
61EB4000
direct allocation
page read and write
6D70000
heap
page read and write
24F9000
direct allocation
page read and write
2B62000
trusted library allocation
page read and write
1890000
heap
page read and write
3560000
unkown
page read and write
328F000
stack
page read and write
2EC4000
unkown
page read and write
98A000
heap
page read and write
800000
unkown
page readonly
A23000
unkown
page readonly
31F0000
trusted library allocation
page read and write
2A7A6000
heap
page read and write
11A4000
unkown
page readonly
24724000
heap
page read and write
B60000
heap
page read and write
6960000
trusted library allocation
page execute and read and write
7FFAABB80000
trusted library allocation
page read and write
5165000
trusted library allocation
page read and write
30E4000
unkown
page read and write
7FF4DE5AC000
trusted library allocation
page readonly
DB4000
heap
page read and write
1186000
unkown
page readonly
272F000
stack
page read and write
A1A000
unkown
page read and write
11F6000
unkown
page readonly
30AC000
stack
page read and write
11D8000
unkown
page readonly
3057000
heap
page read and write
28D2000
direct allocation
page read and write
C70000
trusted library allocation
page read and write
7FF4DE591000
trusted library allocation
page execute read
4490000
direct allocation
page read and write
43BE000
stack
page read and write
25659F4C000
trusted library allocation
page read and write
735C000
heap
page read and write
377D000
trusted library allocation
page read and write
30E4000
unkown
page read and write
800000
unkown
page readonly
2EC4000
unkown
page read and write
2EC4000
unkown
page read and write
82401EE000
stack
page read and write
2628000
direct allocation
page read and write
6A7000
unkown
page readonly
6C98D000
unkown
page read and write
34F7000
trusted library allocation
page read and write
D91000
heap
page read and write
2A8E000
trusted library allocation
page read and write
655000
unkown
page readonly
38AA000
trusted library allocation
page read and write
C40000
heap
page read and write
5528000
unkown
page read and write
6F71000
heap
page read and write
13F5000
heap
page read and write
66BE000
stack
page read and write
6C997000
unkown
page readonly
560C000
trusted library allocation
page read and write
7FFAABB4D000
trusted library allocation
page read and write
597E000
unkown
page read and write
700C000
stack
page read and write
25676A6E000
heap
page read and write
2479B000
heap
page read and write
6CEAD000
unkown
page read and write
7FFAABBF0000
trusted library allocation
page read and write
43EB000
heap
page read and write
34E7000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
75E000
unkown
page write copy
66B4000
heap
page read and write
FEB000
stack
page read and write
6682000
heap
page read and write
1510000
trusted library allocation
page read and write
2470D000
heap
page read and write
1596000
heap
page read and write
33E6000
heap
page read and write
3420000
trusted library allocation
page read and write
6649000
heap
page read and write
2CFA000
stack
page read and write
13EE000
stack
page read and write
9AC000
unkown
page readonly
305A000
heap
page read and write
7FF4DE5A6000
trusted library allocation
page readonly
2565A0CC000
trusted library allocation
page read and write
7FFAABE40000
trusted library allocation
page read and write
403F000
unkown
page read and write
7FF4DE5A8000
trusted library allocation
page readonly
39A000
stack
page read and write
447C000
heap
page read and write
103B000
stack
page read and write
25658010000
heap
page read and write
25673250000
trusted library section
page read and write
3F30000
unkown
page read and write
3C49000
heap
page read and write
7FFAABBC2000
trusted library allocation
page read and write
2471D000
heap
page read and write
25657FF8000
heap
page read and write
25674573000
heap
page read and write
7090000
trusted library allocation
page read and write
6912000
heap
page read and write
2526000
direct allocation
page read and write
FDD000
heap
page read and write
3621000
trusted library allocation
page read and write
256746B5000
heap
page read and write
159C000
heap
page read and write
32A0000
trusted library allocation
page read and write
11A2000
unkown
page readonly
4045000
unkown
page read and write
24703000
heap
page read and write
25676C44000
trusted library allocation
page read and write
3055000
heap
page read and write
30E4000
unkown
page read and write
C39000
heap
page read and write
9AC000
heap
page read and write
5EA0000
heap
page read and write
25676ABA000
heap
page read and write
7FF4DE5A4000
trusted library allocation
page readonly
749D000
stack
page read and write
4B20000
trusted library allocation
page read and write
4023000
unkown
page readonly
5C00000
trusted library allocation
page read and write
256583F5000
heap
page read and write
7FFAABE50000
trusted library allocation
page read and write
1895000
heap
page read and write
2EC4000
unkown
page read and write
2B00000
heap
page read and write
5635000
trusted library allocation
page read and write
25674675000
heap
page read and write
25669CE7000
trusted library allocation
page read and write
3070000
heap
page read and write
13F5000
heap
page read and write
7FFAABCE0000
trusted library allocation
page read and write
82412F7000
stack
page read and write
2F63000
heap
page read and write
2A6E000
trusted library allocation
page read and write
1E680000
heap
page read and write
5790000
trusted library allocation
page read and write
664A000
trusted library allocation
page read and write
3608000
trusted library allocation
page read and write
25658098000
heap
page read and write
2570000
heap
page execute and read and write
770000
heap
page read and write
256581F0000
trusted library section
page read and write
2604000
direct allocation
page read and write
37A9000
trusted library allocation
page read and write
3699000
trusted library allocation
page read and write
2472B000
heap
page read and write
25669C8C000
trusted library allocation
page read and write
12EB000
heap
page read and write
256724E0000
heap
page read and write
910000
trusted library allocation
page read and write
2EC0000
heap
page read and write
2564000
direct allocation
page read and write
8372000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
25678840000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
940000
heap
page read and write
25659A16000
heap
page read and write
2472B000
heap
page read and write
735E000
stack
page read and write
5626000
trusted library allocation
page read and write
7FFAABC00000
trusted library allocation
page read and write
700000
heap
page read and write
318E000
stack
page read and write
2554000
direct allocation
page read and write
5804000
trusted library allocation
page read and write
29F4000
heap
page read and write
25673220000
trusted library allocation
page read and write
CBA000
heap
page read and write
7FFAABB14000
trusted library allocation
page read and write
39D1000
heap
page read and write
577D000
stack
page read and write
33A0000
trusted library allocation
page read and write
2859000
direct allocation
page read and write
25669C2C000
trusted library allocation
page read and write
1F0000
heap
page read and write
74EE000
stack
page read and write
2F5E000
stack
page read and write
256768A8000
heap
page read and write
7FFAABC96000
trusted library allocation
page read and write
24710000
heap
page read and write
135D000
stack
page read and write
256583D0000
trusted library section
page read and write
63C000
unkown
page readonly
7FF4DE5AD000
trusted library allocation
page execute read
400000
unkown
page readonly
66C000
unkown
page readonly
5ECE000
stack
page read and write
406C000
heap
page execute and read and write
996000
heap
page read and write
710000
heap
page read and write
5781000
unkown
page read and write
2567469F000
heap
page read and write
7320000
trusted library allocation
page read and write
F10000
heap
page read and write
5CBC000
stack
page read and write
7FFAABB3A000
trusted library allocation
page read and write
7FFAAB95D000
trusted library allocation
page execute and read and write
3FA0000
heap
page read and write
CBD000
heap
page read and write
19B000
stack
page read and write
11A0000
unkown
page readonly
2591000
direct allocation
page read and write
7FFAAB94D000
trusted library allocation
page execute and read and write
319F000
unkown
page read and write
25674737000
heap
page read and write
25676926000
heap
page read and write
4B28000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
27D0000
heap
page read and write
45FD000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
25676B33000
heap
page read and write
A3C000
unkown
page readonly
95F000
heap
page read and write
30A0000
heap
page read and write
11D0000
unkown
page readonly
2EC4000
unkown
page read and write
246F5000
heap
page read and write
703F0000
unkown
page readonly
2567468B000
heap
page read and write
3FA1000
heap
page read and write
61E00000
direct allocation
page execute and read and write
2A760000
heap
page read and write
2ECC000
stack
page read and write
D4E000
stack
page read and write
25656CFB000
unkown
page readonly
1538000
heap
page read and write
2C32000
trusted library allocation
page read and write
19B000
stack
page read and write
29B3000
trusted library allocation
page read and write
2780000
heap
page read and write
2F07000
heap
page read and write
11B9000
unkown
page readonly
7FFAABE90000
trusted library allocation
page execute and read and write
3094000
heap
page read and write
4150000
heap
page read and write
983000
heap
page read and write
5E5F000
stack
page read and write
256558FB000
unkown
page readonly
7E6000
heap
page read and write
1188000
unkown
page readonly
2904000
direct allocation
page read and write
664F000
trusted library allocation
page read and write
7FFAABB70000
trusted library allocation
page read and write
2CEE000
stack
page read and write
256745C1000
heap
page read and write
32C4000
unkown
page read and write
DB4000
heap
page read and write
6D4D000
stack
page read and write
6C290000
unkown
page readonly
306B000
heap
page read and write
59BC000
stack
page read and write
2567691A000
heap
page read and write
33CF000
stack
page read and write
2EC4000
unkown
page read and write
6060000
trusted library allocation
page execute and read and write
27FA000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
11E3000
unkown
page readonly
7FFAAB99C000
trusted library allocation
page execute and read and write
72F0000
trusted library allocation
page execute and read and write
A75000
heap
page read and write
3891000
trusted library allocation
page read and write
25659F6A000
trusted library allocation
page read and write
339B000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
256723EB000
heap
page read and write
5169000
trusted library allocation
page read and write
155A000
heap
page read and write
256731D0000
heap
page execute and read and write
7FFAABB37000
trusted library allocation
page read and write
2F60000
unkown
page readonly
4390000
heap
page read and write
3067000
heap
page read and write
3ADF000
heap
page read and write
5606000
trusted library allocation
page read and write
29A0000
heap
page read and write
2548000
direct allocation
page read and write
974000
heap
page read and write
2471E000
heap
page read and write
835F000
trusted library allocation
page read and write
4147000
heap
page read and write
4039000
trusted library allocation
page read and write
6B57000
heap
page read and write
67F0000
trusted library allocation
page execute and read and write
9E8000
heap
page read and write
7FFAABC10000
trusted library allocation
page read and write
25671C10000
trusted library allocation
page read and write
90A000
trusted library allocation
page execute and read and write
334D000
trusted library allocation
page read and write
151D000
trusted library allocation
page execute and read and write
11CA000
unkown
page readonly
5BC0000
trusted library allocation
page execute and read and write
11A6000
unkown
page readonly
1360000
heap
page read and write
5BBC000
stack
page read and write
2B6A000
trusted library allocation
page read and write
25674579000
heap
page read and write
6635000
heap
page read and write
7FFAABAF0000
trusted library allocation
page read and write
824153E000
stack
page read and write
512F000
heap
page read and write
256583E0000
trusted library section
page read and write
27C0000
heap
page read and write
43E6000
heap
page read and write
2F70000
unkown
page readonly
62C000
unkown
page readonly
256723C3000
heap
page read and write
25676923000
heap
page read and write
6645000
trusted library allocation
page read and write
2B33000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4150000
heap
page read and write
1142000
unkown
page readonly
40D000
unkown
page execute read
7FFAABD60000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
7FFAAB960000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
9BF000
heap
page read and write
744000
heap
page read and write
25659F59000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
6D60000
heap
page read and write
6C3000
unkown
page readonly
31CB000
trusted library allocation
page read and write
3D8F000
heap
page read and write
7FFAABB20000
trusted library allocation
page read and write
D10000
heap
page read and write
361D000
trusted library allocation
page read and write
35FE000
trusted library allocation
page read and write
116D000
unkown
page readonly
306D000
heap
page read and write
5604000
trusted library allocation
page read and write
9C000
stack
page read and write
C2C000
heap
page read and write
30E4000
unkown
page read and write
30F9000
trusted library allocation
page read and write
7FF4DE5A3000
trusted library allocation
page execute read
2F60000
unkown
page read and write
5618000
trusted library allocation
page read and write
82411FD000
stack
page read and write
340E000
stack
page read and write
2472C000
heap
page read and write
D9E000
stack
page read and write
2E3C000
stack
page read and write
2471D000
heap
page read and write
824193E000
stack
page read and write
703F1000
unkown
page execute read
431E000
stack
page read and write
6670000
trusted library allocation
page read and write
357A000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
6F92000
heap
page read and write
13F4000
heap
page read and write
8240DFD000
stack
page read and write
5252000
heap
page read and write
16CE000
stack
page read and write
7FFB04320000
unkown
page read and write
2B9C000
trusted library allocation
page read and write
3071000
heap
page read and write
1165000
unkown
page readonly
256745CB000
heap
page read and write
2928000
direct allocation
page read and write
13BD000
stack
page read and write
6C282000
unkown
page readonly
1740000
trusted library allocation
page read and write
5D8B000
heap
page read and write
369F0000
heap
page read and write
28CB000
direct allocation
page read and write
31FB000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
7FFAABC50000
trusted library allocation
page read and write
1300000
heap
page read and write
D15000
heap
page read and write
2567247C000
heap
page read and write
2470A000
heap
page read and write
37AB000
trusted library allocation
page read and write
25F6000
direct allocation
page read and write
3140000
heap
page read and write
61ED0000
direct allocation
page read and write
2A801000
heap
page read and write
7FFAAB943000
trusted library allocation
page execute and read and write
6D50000
trusted library allocation
page read and write
4AE6000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
2B16000
heap
page read and write
27C8000
trusted library allocation
page read and write
11B2000
unkown
page readonly
13F4000
heap
page read and write
5ABF000
stack
page read and write
25659F7A000
trusted library allocation
page read and write
37C18000
heap
page read and write
692C000
heap
page read and write
66BA000
heap
page read and write
3530000
heap
page read and write
47A6000
heap
page read and write
890000
unkown
page readonly
29F0000
heap
page read and write
9BB000
heap
page read and write
110F000
stack
page read and write
2589000
direct allocation
page read and write
36CE000
trusted library allocation
page read and write
FDA000
heap
page read and write
890000
unkown
page readonly
744000
heap
page read and write
19D000
stack
page read and write
1D7000
heap
page read and write
3420000
unkown
page read and write
25672A30000
trusted library allocation
page read and write
BDB000
unkown
page readonly
15A2000
heap
page read and write
B64000
heap
page read and write
2EC4000
unkown
page read and write
2C68000
trusted library allocation
page read and write
D54000
heap
page read and write
1173000
unkown
page readonly
369D000
trusted library allocation
page read and write
4EFE000
stack
page read and write
66A6000
heap
page read and write
68FF000
stack
page read and write
380C000
trusted library allocation
page read and write
24718000
heap
page read and write
3062000
heap
page read and write
25657FD0000
heap
page read and write
12B0000
heap
page read and write
DEF000
stack
page read and write
5810000
heap
page execute and read and write
600E000
stack
page read and write
9E2000
heap
page read and write
2472C000
heap
page read and write
25676918000
heap
page read and write
7FFAABD40000
trusted library allocation
page read and write
306C000
heap
page read and write
3068000
heap
page read and write
1E681000
heap
page read and write
59C1000
unkown
page read and write
518F000
trusted library allocation
page read and write
11E5000
unkown
page readonly
305E000
heap
page read and write
255B000
direct allocation
page read and write
33DD000
heap
page read and write
2471D000
heap
page read and write
7FFAAB953000
trusted library allocation
page read and write
1E22F000
stack
page read and write
C90000
heap
page read and write
4EF000
unkown
page readonly
6C830000
unkown
page readonly
25674688000
heap
page read and write
1E670000
heap
page read and write
4208000
heap
page read and write
6C98E000
unkown
page write copy
FFC80000
trusted library allocation
page execute and read and write
966000
heap
page read and write
7FFAABC18000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
3EA0000
heap
page read and write
39AA000
heap
page read and write
28EF000
direct allocation
page read and write
2567246D000
heap
page read and write
59C1000
unkown
page read and write
308A3000
heap
page read and write
CA0000
heap
page read and write
8240EF1000
stack
page read and write
1169000
unkown
page readonly
5F0E000
stack
page read and write
34BF000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
2A780000
heap
page read and write
2A30000
trusted library allocation
page read and write
8240FF4000
stack
page read and write
659000
unkown
page readonly
4320000
direct allocation
page execute and read and write
25672473000
heap
page read and write
7FFAABB90000
trusted library allocation
page read and write
2472C000
heap
page read and write
40F000
unkown
page readonly
40F000
unkown
page readonly
975000
heap
page read and write
36970000
heap
page read and write
2681000
trusted library allocation
page read and write
7C03000
heap
page read and write
290C000
direct allocation
page read and write
8FD000
trusted library allocation
page execute and read and write
2950000
unkown
page readonly
657000
unkown
page readonly
488B000
unkown
page read and write
25EF000
direct allocation
page read and write
25673210000
trusted library allocation
page read and write
56A1000
heap
page read and write
3575000
trusted library allocation
page read and write
4195000
heap
page read and write
AA0000
unkown
page write copy
2567693E000
heap
page read and write
1E3AE000
stack
page read and write
2500000
direct allocation
page read and write
7FF4DE5AA000
trusted library allocation
page readonly
4BBA000
trusted library allocation
page read and write
2A7B5000
heap
page read and write
7FFAABD20000
trusted library allocation
page read and write
25674725000
heap
page read and write
360C000
trusted library allocation
page read and write
256745EC000
heap
page read and write
7FFAABD70000
trusted library allocation
page execute and read and write
45F9000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
95E000
heap
page read and write
256731A0000
trusted library allocation
page read and write
2763000
heap
page read and write
4F67000
heap
page read and write
27D0000
direct allocation
page execute and read and write
AA0000
unkown
page write copy
28E0000
direct allocation
page read and write
25CB000
direct allocation
page read and write
5EB1000
heap
page read and write
2567690E000
heap
page read and write
7010000
heap
page read and write
8240CFB000
stack
page read and write
4170000
heap
page read and write
256581C0000
trusted library section
page read and write
5BE0000
trusted library allocation
page execute and read and write
2565A028000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
2F3A000
stack
page read and write
989000
heap
page read and write
3263000
heap
page read and write
2B75000
trusted library allocation
page read and write
2EC4000
unkown
page read and write
24708000
heap
page read and write
There are 1824 hidden memdumps, click here to show them.