IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\AIE570.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1251, Title: Installation Database, Subject: DisplayLink Graphics, Author: DisplayLink Corp., Keywords: Installer, MSI, Database, Comments: Installs DisplayLink Graphics., Create Time/Date: Fri Dec 11 11:47:46 2009, Name of Creating Application: Advanced Installer 15.1 build 1ac8a36b05, Security: 0, Template: x64;2057, Last Saved By: x64;1049, Revision Number: {312AEE13-2735-4088-B726-C3CA64D81215}10.2.6709.0;{3B719D3D-BF94-4CEF-80B9-2C1E4AEDE0AC}10.2.6709.0;{0AECE230-D5D2-4880-B3ED-F23905ED66A9}, Number of Pages: 200, Number of Characters: 63
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\FileOperations.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\New
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\PowerShellScriptLauncher.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\Prereq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\Up
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\aicustact.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\banner
PC bitmap, Windows 3.x format, 500 x 59 x 8
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\cmdlinkarrow
MS Windows icon resource - 3 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\completi
MS Windows icon resource - 2 icons, 32x32, 16 colors, 32x32
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\custicon
MS Windows icon resource - 2 icons, 32x32, 16 colors, 32x32
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\dialog
PC bitmap, Windows 3.x format, 500 x 316 x 8
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\dialogBackground.bmp
PC bitmap, Windows 3.x format, 10 x 10 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\dialogBackgroundGray.bmp
PC bitmap, Windows 3.x format, 10 x 10 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\dlImageButton.bmp
PC bitmap, Windows 3.x format, 1176 x 46 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\dlProgress.png
PNG image data, 121 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\exclamic
MS Windows icon resource - 1 icon, 32x32, 16 colors
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\info
MS Windows icon resource - 2 icons, 32x32, 16 colors, 16x16, 16 colors
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\insticon
MS Windows icon resource - 2 icons, 32x32, 16 colors, 32x32
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\lzmaextractor.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\publicSoftwareBanner.bmp
PC bitmap, Windows 3.x format, 2000 x 180 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\radioDoing.bmp
PC bitmap, Windows 3.x format, 115 x 115 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\radioDone.bmp
PNG image data, 115 x 115, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\radioError.bmp
PNG image data, 115 x 115, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\radioPending.bmp
PC bitmap, Windows 3.x format, 115 x 115 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\radioWaiting.gif
GIF image data, version 89a, 115 x 115
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\removico
MS Windows icon resource - 2 icons, 32x32, 16 colors, 32x32
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\repairic
MS Windows icon resource - 2 icons, 32x32, 16 colors, 32x32
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\tabback
PC bitmap, Windows 3.x format, 1 x 200 x 24
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_6084\tempFiles.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x64\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x64\dl-usbnet-ncm.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x64\dl-usbnet-ncm.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x64\dl-usbnet-ncm.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x86\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x86\dl-usbnet-ncm.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x86\dl-usbnet-ncm.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DL-USBNET-NCM\x86\dl-usbnet-ncm.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLC3A4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLC3A4.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCABA.tmp
Microsoft Cabinet archive data, 2366 bytes, 3 files
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCDCNCM\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCDCNCM\dlcdcncm.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCDCNCM\dlcdcncm.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCDCNCM\dlcdcncm62.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCDCNCM\dlcdcncm62_x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dl-usbnet-ncm.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dl-usbnet-ncm.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dl-usbnet-ncm.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlidusb.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlidusb.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlidusb.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlidusb2.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlidusb3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlusbaudio.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlusbaudio.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlusbaudio.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\dlusbaudio_x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\ella-dock-release.spkg
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\firefly-monitor-release.spkg
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64\ridge-dock-release.spkg
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dl-usbnet-ncm.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dl-usbnet-ncm.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dl-usbnet-ncm.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlidusb.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlidusb.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlidusb.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlidusb2.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlidusb3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlusbaudio.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlusbaudio.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlusbaudio.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\dlusbaudio_x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\ella-dock-release.spkg
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\firefly-monitor-release.spkg
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x86\ridge-dock-release.spkg
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLUSBAUDIO\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLUSBAUDIO\dlusbaudio.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLUSBAUDIO\dlusbaudio.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLUSBAUDIO\dlusbaudio.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLUSBAUDIO\dlusbaudio_x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DPINST32\DpInst.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\DPINST64\DpInst.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DPInst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkCore.dat
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkCore64.dat
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkUsb.inf
Windows setup INFormation, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkUsbCo2.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkUsbCo64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkUsbIo.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\DisplayLinkUsbIo_x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\NIVO\displaylinkusb.cat
data
dropped
C:\Users\user\AppData\Local\Temp\DL2.tmp\additional.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI206C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI23B9.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI257F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI2707.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI28CD.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI2AF1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI2C59.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI2DB2.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI345A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI38DF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI414C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI4852.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI4A86.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI4D75.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI98D7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\banner.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\cl_6709.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\shi1E77.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\systemCheck.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{312AEE13-2735-4088-B726-C3CA64D81215}\1033.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{312AEE13-2735-4088-B726-C3CA64D81215}\4D81215\DisplayLinkIDD.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1251, Title: Installation Database, Subject: DisplayLink Graphics, Author: DisplayLink Corp., Keywords: Installer, MSI, Database, Comments: Installs DisplayLink Graphics., Create Time/Date: Fri Dec 11 11:47:46 2009, Name of Creating Application: Advanced Installer 15.1 build 1ac8a36b05, Security: 0, Template: x64;2057, Last Saved By: x64;1049, Revision Number: {312AEE13-2735-4088-B726-C3CA64D81215}10.2.6709.0;{3B719D3D-BF94-4CEF-80B9-2C1E4AEDE0AC}10.2.6709.0;{0AECE230-D5D2-4880-B3ED-F23905ED66A9}, Number of Pages: 200, Number of Characters: 63
dropped
C:\Users\user\AppData\Local\Temp\{312AEE13-2735-4088-B726-C3CA64D81215}\decoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{312AEE13-2735-4088-B726-C3CA64D81215}\holder0.aiph
data
dropped
C:\Users\user\AppData\Local\Temp\~DFC74A98E467F75109.TMP
data
dropped
C:\Windows\INF\oem0.PNF
data
dropped
C:\Windows\INF\oem1.PNF
data
dropped
C:\Windows\INF\oem2.PNF
data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 114 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
C:\Users\user\AppData\Local\Temp\DL2.tmp\additional.exe
C:\Users\user\AppData\Local\Temp\DL2.tmp\additional.exe" -y -o"C:\Users\user\AppData\Local\Temp\DL2.tmp\
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\DL2.tmp\DLC3A4.exe
DLC3A4.exe /exelang 1033 ALLOW64BIT=Yes DL_PROMOTE_STORE_APP=Yes DL_PRODUCT_NAME="DisplayLink Graphics" DL_BRANDING_UPGRADE_CODE="{78A36ACD-80D5-490f-B4C4-83D7FCC08391}" DL_BRANDING_PRODUCT_CODE="{08DDE00A-EEEA-416E-9E61-B9085D542140}" DL_BRANDING_CAB="C:\Users\user\AppData\Local\Temp\DL2.tmp\DLCABA.tmp" DL_BRANDING_NEW_DEVICE_ACTIVITY=mirror DL_ID_USBDRIVER_PATH="C:\Users\user\AppData\Local\Temp\DL2.tmp\DLIDUSB\x64" DL_HOTDESK_SERVICE="No" DL_INSTALL_ANALYTICS=Yes DL_TEMP_DIR="C:\Users\user\AppData\Local\Temp\DL2.tmp\" /lv "C:\Users\user\AppData\Local\Temp\DLC335A.LOG"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding A63054042D1C239EA3B02585E95E450D C
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding A71763BA0B19F12D058A5205CCDD4884 C

URLs

Name
IP
Malicious
http://www.typography.netD
unknown
http://www.displaylink.com/support/compcheckredirect.php
unknown
https://www.thawte.com/cps
unknown
http://www.displaylink.com/
unknown
https://www.thawte.com/cps0/
unknown
https://www.displaylink.com/downloads/windows.
unknown
https://www.thawte.com/repository0W
unknown
https://www.displaylink.com/downloads/windows
unknown
http://www.displaylink.com/m
unknown
https://www.displaylink.com/downloads/windows.x
unknown
https://www.advancedinstaller.com
unknown
http://www.google.com
unknown
http://www.winimage.com/zLibDll
unknown
http://www.yahoo.com
unknown
http://www.displaylink.com/DlPublicSoftwareBannerpublicSoftwareBanner.bmpAI_REQUIRED_WINDOWS_INSTALL
unknown
There are 5 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_CURRENT_USER\Software\Microsoft\Windows Script\Settings
JITDebug
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer
Debug
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer
Logging
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
LogLevel

Memdumps

Base Address
Regiontype
Protect
Malicious
3C4B000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
245B29E0000
remote allocation
page read and write
34F0000
trusted library allocation
page read and write
245B338A000
heap
page read and write
BB51000
trusted library allocation
page read and write
FE4000
heap
page read and write
82E6000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
33A6000
stack
page read and write
8E6B17F000
stack
page read and write
2AA0000
heap
page read and write
83A3000
trusted library allocation
page read and write
74C6000
trusted library allocation
page read and write
520000
direct allocation
page read and write
610000
heap
page read and write
8E6AD7F000
stack
page read and write
3D85000
unkown
page readonly
284A000
direct allocation
page read and write
8313000
trusted library allocation
page read and write
53E8000
unkown
page readonly
245B2B13000
heap
page read and write
756A000
trusted library allocation
page read and write
2AC3000
direct allocation
page read and write
83AB000
trusted library allocation
page read and write
22229965000
heap
page read and write
3BA7000
trusted library allocation
page read and write
830D000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
4E55000
trusted library allocation
page read and write
1A51EE83000
heap
page read and write
2440000
direct allocation
page read and write
4E80000
trusted library allocation
page read and write
82EA000
trusted library allocation
page read and write
3CD8000
trusted library allocation
page read and write
2526D000000
heap
page read and write
B95A7F8000
stack
page read and write
3619000
unkown
page readonly
2AA27C02000
trusted library allocation
page read and write
245B3379000
heap
page read and write
1F98000
unkown
page readonly
74D8000
trusted library allocation
page read and write
8E6A7EC000
stack
page read and write
7507000
trusted library allocation
page read and write
46AC000
stack
page read and write
726A000
trusted library allocation
page read and write
3893000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
74BB000
trusted library allocation
page read and write
401000
unkown
page execute read
245B3381000
heap
page read and write
1598000
unkown
page readonly
245B3802000
heap
page read and write
103A000
heap
page read and write
429F000
trusted library allocation
page read and write
993C4F9000
stack
page read and write
1011000
heap
page read and write
3E90000
trusted library allocation
page read and write
FBD75F7000
stack
page read and write
2AC0000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
2C88000
direct allocation
page read and write
2AA27370000
trusted library allocation
page read and write
7FAB000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
245B2A83000
heap
page read and write
74C5000
trusted library allocation
page read and write
245B3394000
heap
page read and write
74C3000
trusted library allocation
page read and write
3C5E000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
754B000
trusted library allocation
page read and write
3BC0000
unkown
page readonly
9D000
stack
page read and write
83D0000
unkown
page execute
7EFA000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
74A5000
trusted library allocation
page read and write
3C14000
trusted library allocation
page read and write
8307000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
5357000
unkown
page readonly
245B2AB7000
heap
page read and write
82E2000
trusted library allocation
page read and write
BB3A000
trusted library allocation
page read and write
2D3E000
direct allocation
page read and write
8410000
unkown
page read and write
394D000
trusted library allocation
page read and write
7519000
trusted library allocation
page read and write
2BD3000
direct allocation
page read and write
42AF000
trusted library allocation
page read and write
245B3803000
heap
page read and write
B95A8FF000
stack
page read and write
1CEF2FA0000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
245B2A64000
heap
page read and write
396C000
trusted library allocation
page read and write
7499000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
4E68000
trusted library allocation
page read and write
4E7D000
trusted library allocation
page read and write
504000
unkown
page readonly
380000
unkown
page readonly
22229520000
trusted library allocation
page read and write
1060000
heap
page read and write
3969000
trusted library allocation
page read and write
3C48000
trusted library allocation
page read and write
245B3202000
heap
page read and write
3C7A000
trusted library allocation
page read and write
4E39000
trusted library allocation
page read and write
82C8000
trusted library allocation
page read and write
2C3E000
stack
page read and write
7EFC000
trusted library allocation
page read and write
3EDE000
unkown
page read and write
1097000
heap
page read and write
400000
unkown
page readonly
34F0000
trusted library allocation
page read and write
7EF7000
trusted library allocation
page read and write
394B000
trusted library allocation
page read and write
71F5000
trusted library allocation
page read and write
2526CDC0000
heap
page read and write
B98000
unkown
page readonly
7FA6000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
5D0000
direct allocation
page read and write
B98000
unkown
page readonly
40A0000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
7555000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
7EF5000
trusted library allocation
page read and write
401000
unkown
page execute read
41EE000
trusted library allocation
page read and write
1CEF285F000
heap
page read and write
2240000
direct allocation
page read and write
367C000
stack
page read and write
750C000
trusted library allocation
page read and write
41D8000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
2AA27200000
heap
page read and write
FBD74FB000
stack
page read and write
34F0000
trusted library allocation
page read and write
1CEF288E000
heap
page read and write
B95A2FE000
stack
page read and write
395E000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
1088000
heap
page read and write
74CF000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
245B3369000
heap
page read and write
396A000
trusted library allocation
page read and write
42AF000
stack
page read and write
3C1B000
unkown
page readonly
3E90000
trusted library allocation
page read and write
2222968D000
heap
page read and write
5B0000
direct allocation
page read and write
28FD000
direct allocation
page read and write
34F0000
trusted library allocation
page read and write
71D5000
trusted library allocation
page read and write
7258000
trusted library allocation
page read and write
3C5E000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
BB3A000
trusted library allocation
page read and write
7EF5000
trusted library allocation
page read and write
1A51EE87000
heap
page read and write
245B33A5000
heap
page read and write
245B2B08000
heap
page read and write
245B2AF8000
heap
page read and write
3C38000
trusted library allocation
page read and write
749B000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
245B3387000
heap
page read and write
7470000
unkown
page read and write
71B5000
trusted library allocation
page read and write
47EE000
stack
page read and write
7260000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
A5A0000
trusted library section
page readonly
4EF8000
unkown
page readonly
2AFC000
heap
page read and write
395E000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
7FB7000
trusted library allocation
page read and write
245B2A5E000
heap
page read and write
74AF000
trusted library allocation
page read and write
FBD727E000
stack
page read and write
245B2A6B000
heap
page read and write
3B7C000
trusted library allocation
page read and write
4E8F000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
41B000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
3C32000
trusted library allocation
page read and write
720A000
trusted library allocation
page read and write
7519000
trusted library allocation
page read and write
752C000
trusted library allocation
page read and write
2AA2743C000
heap
page read and write
74AA000
trusted library allocation
page read and write
7590000
unkown
page read and write
19C000
stack
page read and write
36CF000
unkown
page readonly
74C3000
trusted library allocation
page read and write
7FAB000
trusted library allocation
page read and write
74C2000
trusted library allocation
page read and write
B90000
stack
page read and write
41F9000
trusted library allocation
page read and write
74C2000
trusted library allocation
page read and write
1A51EE90000
heap
page read and write
754B000
trusted library allocation
page read and write
426000
unkown
page readonly
245B3379000
heap
page read and write
381000
unkown
page execute read
74CC000
trusted library allocation
page read and write
48ED000
stack
page read and write
45E0000
unkown
page read and write
8392000
trusted library allocation
page read and write
2C7E000
stack
page read and write
FA0000
heap
page read and write
4203000
trusted library allocation
page read and write
3DE0000
unkown
page readonly
3C42000
trusted library allocation
page read and write
4E9E000
unkown
page readonly
1CEF2813000
heap
page read and write
7FAB000
trusted library allocation
page read and write
3C2A000
trusted library allocation
page read and write
7FBE000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
74AA000
trusted library allocation
page read and write
4640000
trusted library allocation
page read and write
5373000
unkown
page readonly
245B33A5000
heap
page read and write
4A40000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
756C000
trusted library allocation
page read and write
245B3376000
heap
page read and write
3928000
trusted library allocation
page read and write
82C4000
trusted library allocation
page read and write
245B3392000
heap
page read and write
7FAD000
trusted library allocation
page read and write
752A000
trusted library allocation
page read and write
1029000
heap
page read and write
3BF6000
trusted library allocation
page read and write
5A67000
heap
page read and write
3E90000
trusted library allocation
page read and write
3C8C000
trusted library allocation
page read and write
400000
unkown
page readonly
7FB7000
trusted library allocation
page read and write
74AC000
trusted library allocation
page read and write
53FE000
unkown
page readonly
245B33A1000
heap
page read and write
8E6AAFF000
stack
page read and write
7FB8000
trusted library allocation
page read and write
2AA27508000
heap
page read and write
82D0000
unkown
page read and write
423C000
trusted library allocation
page read and write
2AA27502000
heap
page read and write
2526D049000
heap
page read and write
3AAF000
unkown
page readonly
3E90000
trusted library allocation
page read and write
3BFE000
trusted library allocation
page read and write
4AEAB9A000
stack
page read and write
756C000
trusted library allocation
page read and write
2AA2745B000
heap
page read and write
7499000
trusted library allocation
page read and write
2AA27400000
heap
page read and write
83B1000
trusted library allocation
page read and write
245B3383000
heap
page read and write
7580000
unkown
page read and write
CD40000
unkown
page read and write
3104000
unkown
page readonly
3C15000
trusted library allocation
page read and write
74A7000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
1058000
heap
page read and write
2AA27270000
heap
page read and write
FFC000
heap
page read and write
7EF8000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3BA7000
trusted library allocation
page read and write
245B3318000
heap
page read and write
4AEAF79000
stack
page read and write
245B33AB000
heap
page read and write
535D000
unkown
page readonly
396A000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
395E000
trusted library allocation
page read and write
74C2000
trusted library allocation
page read and write
1A51EE72000
heap
page read and write
3C46000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
7FB4000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3C2A000
trusted library allocation
page read and write
7F9E000
stack
page read and write
723E000
trusted library allocation
page read and write
4292000
trusted library allocation
page read and write
1060000
heap
page read and write
3C2C000
trusted library allocation
page read and write
FBD6F0B000
stack
page read and write
38F3000
trusted library allocation
page read and write
1A51EE6B000
heap
page read and write
1A51EEA6000
heap
page read and write
74CA000
trusted library allocation
page read and write
381000
unkown
page execute read
22229580000
heap
page read and write
8E6AE77000
stack
page read and write
53F1000
unkown
page readonly
7210000
trusted library allocation
page read and write
BB40000
trusted library allocation
page read and write
7FBC000
trusted library allocation
page read and write
4C23000
unkown
page readonly
316E000
stack
page read and write
3C83000
trusted library allocation
page read and write
B95AA7F000
unkown
page read and write
245B3389000
heap
page read and write
45DF000
unkown
page read and write
3969000
trusted library allocation
page read and write
D148000
unkown
page read and write
74CF000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
7F03000
trusted library allocation
page read and write
71C7000
trusted library allocation
page read and write
72C0000
unkown
page read and write
2AF9000
heap
page read and write
BB39000
trusted library allocation
page read and write
C71E000
stack
page read and write
BB53000
trusted library allocation
page read and write
30D0000
unkown
page readonly
3B65000
unkown
page readonly
394B000
trusted library allocation
page read and write
1A51EE86000
heap
page read and write
7562000
trusted library allocation
page read and write
372A000
unkown
page readonly
119E000
stack
page read and write
2AC0000
trusted library allocation
page read and write
4E79000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
222298B0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
540B000
unkown
page readonly
83B7000
trusted library allocation
page read and write
41F5000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
2440000
direct allocation
page read and write
34F0000
trusted library allocation
page read and write
41F3000
trusted library allocation
page read and write
394B000
trusted library allocation
page read and write
42B7000
trusted library allocation
page read and write
3C78000
trusted library allocation
page read and write
41B000
unkown
page readonly
7F02000
trusted library allocation
page read and write
81AC000
unkown
page read and write
3B41000
trusted library allocation
page read and write
83AD000
trusted library allocation
page read and write
108A000
heap
page read and write
E50000
heap
page read and write
39A0000
trusted library allocation
page read and write
245B3392000
heap
page read and write
38C8000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
1060000
heap
page read and write
245B3802000
heap
page read and write
53F4000
unkown
page readonly
3C71000
trusted library allocation
page read and write
7FB5000
trusted library allocation
page read and write
82E8000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
1A51EEA4000
heap
page read and write
245B331A000
heap
page read and write
245B33B7000
heap
page read and write
7FA0000
trusted library allocation
page read and write
22229910000
trusted library allocation
page read and write
FAB000
heap
page read and write
BB3C000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
82CC000
trusted library allocation
page read and write
71DB000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4215000
trusted library allocation
page read and write
1A51EEA1000
heap
page read and write
2526D080000
heap
page read and write
748B000
trusted library allocation
page read and write
82FF000
trusted library allocation
page read and write
74F4000
trusted library allocation
page read and write
4E41000
trusted library allocation
page read and write
7555000
trusted library allocation
page read and write
41E6000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
245B2A68000
heap
page read and write
22229610000
trusted library allocation
page read and write
2AA27210000
heap
page read and write
7FA20000
unkown
page execute read
4E48000
trusted library allocation
page read and write
BB54000
trusted library allocation
page read and write
7F05000
trusted library allocation
page read and write
42B5000
trusted library allocation
page read and write
245B3369000
heap
page read and write
245B3392000
heap
page read and write
38F3000
trusted library allocation
page read and write
BB31000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
1CEF2913000
heap
page read and write
1CEF2861000
heap
page read and write
7FBF000
trusted library allocation
page read and write
1019000
heap
page read and write
72B0000
unkown
page read and write
245B2AE9000
heap
page read and write
833E000
trusted library allocation
page read and write
3BDD000
trusted library allocation
page read and write
4AEAEFF000
stack
page read and write
20B0000
trusted library allocation
page read and write
245B3363000
heap
page read and write
41EA000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
3A55000
unkown
page readonly
34F0000
trusted library allocation
page read and write
830B000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
245B3388000
heap
page read and write
7543000
trusted library allocation
page read and write
1087000
heap
page read and write
40A0000
trusted library allocation
page read and write
4842000
unkown
page readonly
BB54000
trusted library allocation
page read and write
D14E000
unkown
page read and write
C76A000
trusted library allocation
page read and write
82D8000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
709A000
heap
page read and write
1A51ECA0000
heap
page read and write
5D0000
direct allocation
page read and write
61A000
heap
page read and write
B95A27C000
stack
page read and write
4E68000
trusted library allocation
page read and write
429D000
trusted library allocation
page read and write
7FAE000
trusted library allocation
page read and write
1A51EE60000
heap
page read and write
7FA4000
trusted library allocation
page read and write
74B4000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
3C7A000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
82F1000
trusted library allocation
page read and write
245B3802000
heap
page read and write
245B337C000
heap
page read and write
7499000
trusted library allocation
page read and write
B37000
unkown
page readonly
245B337C000
heap
page read and write
1CEF2700000
heap
page read and write
1018000
heap
page read and write
3E90000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
710000
direct allocation
page read and write
71AF000
trusted library allocation
page read and write
DC3000
unkown
page read and write
245B338A000
heap
page read and write
C751000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
838C000
trusted library allocation
page read and write
2240000
direct allocation
page read and write
7FFE000
stack
page read and write
245B3378000
heap
page read and write
3C8F000
trusted library allocation
page read and write
245B29E0000
remote allocation
page read and write
1D3D177000
stack
page read and write
3E90000
trusted library allocation
page read and write
28A4000
direct allocation
page read and write
3969000
trusted library allocation
page read and write
B724000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
4E29000
trusted library allocation
page read and write
7EFC000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
43DE000
stack
page read and write
245B3394000
heap
page read and write
742E000
unkown
page read and write
3928000
trusted library allocation
page read and write
1059000
heap
page read and write
82E4000
trusted library allocation
page read and write
2526CE30000
heap
page read and write
7543000
trusted library allocation
page read and write
245B3387000
heap
page read and write
1CEF2863000
heap
page read and write
3C12000
trusted library allocation
page read and write
39FC000
unkown
page readonly
4A5F000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
22229890000
trusted library allocation
page read and write
3BF8000
trusted library allocation
page read and write
2998000
unkown
page readonly
74D8000
trusted library allocation
page read and write
80FE000
stack
page read and write
2AC0000
trusted library allocation
page read and write
3C68000
trusted library allocation
page read and write
7F01000
trusted library allocation
page read and write
411E000
stack
page read and write
4E37000
trusted library allocation
page read and write
428A000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
4A05000
unkown
page readonly
397D000
trusted library allocation
page read and write
7272000
trusted library allocation
page read and write
2526D050000
heap
page read and write
7EF7000
trusted library allocation
page read and write
7248000
trusted library allocation
page read and write
FBD77FD000
stack
page read and write
B95A47C000
stack
page read and write
3C2F000
trusted library allocation
page read and write
22229630000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
41CA000
trusted library allocation
page read and write
2526D052000
heap
page read and write
3838000
unkown
page readonly
41C8000
trusted library allocation
page read and write
3398000
unkown
page readonly
3C5C000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
2B78000
direct allocation
page read and write
326F000
stack
page read and write
396A000
trusted library allocation
page read and write
1A51EDF0000
heap
page read and write
536D000
unkown
page readonly
8E8000
direct allocation
page read and write
40A0000
trusted library allocation
page read and write
BB54000
trusted library allocation
page read and write
428E000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
106F000
heap
page read and write
4ED6000
trusted library section
page read and write
3E90000
trusted library allocation
page read and write
2AA27513000
heap
page read and write
222298A0000
heap
page readonly
C61E000
unkown
page read and write
1A51EE76000
heap
page read and write
397D000
trusted library allocation
page read and write
4F53000
unkown
page readonly
3C83000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
7488000
trusted library allocation
page read and write
520000
direct allocation
page read and write
74C6000
trusted library allocation
page read and write
2526D057000
heap
page read and write
34F0000
trusted library allocation
page read and write
8315000
trusted library allocation
page read and write
83A5000
trusted library allocation
page read and write
53D000
unkown
page readonly
70A0000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
4951000
unkown
page readonly
245B33C6000
heap
page read and write
245B331A000
heap
page read and write
2222968D000
heap
page read and write
74D8000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
5408000
unkown
page readonly
3C73000
trusted library allocation
page read and write
F7E000
stack
page read and write
245B2B16000
heap
page read and write
4E65000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4A7000
unkown
page readonly
4B13000
unkown
page readonly
7492000
trusted library allocation
page read and write
C75D000
trusted library allocation
page read and write
29B3000
direct allocation
page read and write
BB31000
trusted library allocation
page read and write
1CEF2690000
heap
page read and write
4236000
trusted library allocation
page read and write
1094000
heap
page read and write
5414000
unkown
page readonly
48F6000
unkown
page readonly
40A0000
trusted library allocation
page read and write
245B2970000
trusted library allocation
page read and write
245B3802000
heap
page read and write
1CEF2889000
heap
page read and write
DBA000
unkown
page read and write
53D8000
unkown
page readonly
71C9000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
82F9000
trusted library allocation
page read and write
30000
heap
page read and write
38EE000
unkown
page readonly
3BC6000
trusted library allocation
page read and write
22229969000
heap
page read and write
993C3F9000
stack
page read and write
245B2B02000
heap
page read and write
4E56000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
8E6AF7E000
stack
page read and write
3C73000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
3B0A000
unkown
page readonly
245B33C9000
heap
page read and write
22229686000
heap
page read and write
245B3802000
heap
page read and write
377D000
stack
page read and write
3B7C000
trusted library allocation
page read and write
3C25000
trusted library allocation
page read and write
7FAB000
trusted library allocation
page read and write
3CA0000
trusted library allocation
page read and write
A55E000
stack
page read and write
395E000
trusted library allocation
page read and write
2526D802000
trusted library allocation
page read and write
3C96000
trusted library allocation
page read and write
245B2810000
heap
page read and write
1A51EE90000
heap
page read and write
5367000
unkown
page readonly
7518000
trusted library allocation
page read and write
420F000
trusted library allocation
page read and write
A59E000
stack
page read and write
40AD000
stack
page read and write
82EC000
trusted library allocation
page read and write
4AEAFF9000
stack
page read and write
245B3350000
heap
page read and write
420B000
trusted library allocation
page read and write
4205000
trusted library allocation
page read and write
70A4000
trusted library allocation
page read and write
245B3394000
heap
page read and write
102F000
heap
page read and write
3B40000
trusted library allocation
page read and write
74AA000
trusted library allocation
page read and write
22229960000
heap
page read and write
1CEF285D000
heap
page read and write
4A50000
trusted library allocation
page read and write
BB2E000
trusted library allocation
page read and write
4AC0000
heap
page read and write
52D0000
unkown
page readonly
74D8000
trusted library allocation
page read and write
245B3383000
heap
page read and write
393A000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
1026000
heap
page read and write
245B2A29000
heap
page read and write
34F0000
trusted library allocation
page read and write
245B2AAD000
heap
page read and write
38E1000
trusted library allocation
page read and write
7509000
trusted library allocation
page read and write
1CEF26A0000
heap
page read and write
5441000
unkown
page readonly
74F0000
trusted library allocation
page read and write
993C2FE000
stack
page read and write
7F05000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
3C55000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
428C000
trusted library allocation
page read and write
748B000
trusted library allocation
page read and write
24D6000
direct allocation
page read and write
41FB000
trusted library allocation
page read and write
74CF000
trusted library allocation
page read and write
3968000
trusted library allocation
page read and write
7F08000
trusted library allocation
page read and write
FBD73FE000
stack
page read and write
2AA27461000
heap
page read and write
3C78000
trusted library allocation
page read and write
74E7000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
39A2000
unkown
page readonly
74CF000
trusted library allocation
page read and write
4190000
unkown
page read and write
245B2A13000
heap
page read and write
1017000
heap
page read and write
4AEB0FC000
stack
page read and write
C777000
trusted library allocation
page read and write
D154000
unkown
page read and write
245B3802000
heap
page read and write
39B2000
trusted library allocation
page read and write
7543000
trusted library allocation
page read and write
478D000
unkown
page readonly
4DD1000
trusted library allocation
page read and write
7519000
trusted library allocation
page read and write
7FBA000
trusted library allocation
page read and write
245B3322000
heap
page read and write
3969000
trusted library allocation
page read and write
7080000
stack
page read and write
4267000
trusted library allocation
page read and write
245B2A61000
heap
page read and write
74CC000
trusted library allocation
page read and write
8311000
trusted library allocation
page read and write
DB7000
unkown
page read and write
3C96000
trusted library allocation
page read and write
3A3E000
stack
page read and write
756C000
trusted library allocation
page read and write
2526CDD0000
heap
page read and write
423A000
trusted library allocation
page read and write
74AA000
trusted library allocation
page read and write
41BB000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
245B3381000
heap
page read and write
82EE000
trusted library allocation
page read and write
245B2A7C000
heap
page read and write
34F0000
trusted library allocation
page read and write
41C4000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2526D102000
heap
page read and write
35BE000
unkown
page readonly
2222A460000
trusted library allocation
page read and write
7FBE000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
3C76000
unkown
page readonly
1A51EE85000
heap
page read and write
2240000
direct allocation
page read and write
7499000
trusted library allocation
page read and write
74C1000
trusted library allocation
page read and write
2C83000
heap
page read and write
8317000
trusted library allocation
page read and write
7090000
heap
page read and write
7FB9000
trusted library allocation
page read and write
46D7000
unkown
page readonly
5B0000
direct allocation
page read and write
7208000
trusted library allocation
page read and write
245B33A7000
heap
page read and write
30D2000
unkown
page readonly
3B74000
trusted library allocation
page read and write
2C80000
heap
page read and write
245B3318000
heap
page read and write
5A57000
heap
page read and write
245B3378000
heap
page read and write
394B000
trusted library allocation
page read and write
420000
unkown
page write copy
2AFB000
heap
page read and write
82F7000
trusted library allocation
page read and write
4217000
trusted library allocation
page read and write
32AC000
stack
page read and write
2AA27467000
heap
page read and write
2AC0000
trusted library allocation
page read and write
245B3361000
heap
page read and write
721F000
trusted library allocation
page read and write
3C75000
trusted library allocation
page read and write
752C000
trusted library allocation
page read and write
245B3392000
heap
page read and write
74C6000
trusted library allocation
page read and write
53EB000
unkown
page readonly
245B33D5000
heap
page read and write
4CD9000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
1F98000
unkown
page readonly
74D8000
trusted library allocation
page read and write
245B2A3C000
heap
page read and write
44DF000
stack
page read and write
4E68000
trusted library allocation
page read and write
391F000
trusted library allocation
page read and write
5BB9000
unkown
page readonly
723B000
trusted library allocation
page read and write
2526D04E000
heap
page read and write
74CA000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7FB4000
trusted library allocation
page read and write
B95A6F7000
stack
page read and write
42A7000
trusted library allocation
page read and write
245B3394000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
2526D070000
heap
page read and write
83B5000
trusted library allocation
page read and write
3F30000
unkown
page read and write
3B41000
trusted library allocation
page read and write
2526D029000
heap
page read and write
754D000
trusted library allocation
page read and write
1D3CF7C000
stack
page read and write
7555000
trusted library allocation
page read and write
7525000
trusted library allocation
page read and write
3C93000
trusted library allocation
page read and write
103C000
heap
page read and write
74F0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
47E7000
unkown
page readonly
5536000
unkown
page readonly
396A000
trusted library allocation
page read and write
8332000
trusted library allocation
page read and write
7EFA000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
41EC000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
53EE000
unkown
page readonly
2AA27500000
heap
page read and write
245B3394000
heap
page read and write
4BC8000
unkown
page readonly
38EA000
trusted library allocation
page read and write
DC0000
unkown
page read and write
3B6C000
trusted library allocation
page read and write
42AD000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
8303000
trusted library allocation
page read and write
70A6000
trusted library allocation
page read and write
3CD7000
trusted library allocation
page read and write
245B3862000
heap
page read and write
7555000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
82C6000
trusted library allocation
page read and write
8334000
trusted library allocation
page read and write
2526D055000
heap
page read and write
3BF8000
trusted library allocation
page read and write
535A000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
72E0000
heap
page read and write
71FA000
trusted library allocation
page read and write
4207000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
41E8000
trusted library allocation
page read and write
22229620000
trusted library allocation
page read and write
7440000
unkown
page read and write
4FC000
unkown
page read and write
B85000
unkown
page write copy
33ED000
stack
page read and write
7480000
trusted library allocation
page read and write
7FA7000
trusted library allocation
page read and write
4610000
unkown
page read and write
4AEB07E000
stack
page read and write
7F00000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
BB40000
trusted library allocation
page read and write
83B3000
trusted library allocation
page read and write
756A000
trusted library allocation
page read and write
42AB000
trusted library allocation
page read and write
7488000
trusted library allocation
page read and write
2AF0000
heap
page read and write
D192000
unkown
page read and write
4EC3000
trusted library allocation
page read and write
245B3318000
heap
page read and write
3942000
trusted library allocation
page read and write
1057000
heap
page read and write
74D8000
trusted library allocation
page read and write
4E43000
unkown
page readonly
BB3B000
trusted library allocation
page read and write
5D0000
direct allocation
page read and write
8342000
trusted library allocation
page read and write
1CEF2800000
heap
page read and write
BB40000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
4620000
heap
page read and write
354D000
unkown
page readonly
22229970000
trusted library allocation
page read and write
750B000
trusted library allocation
page read and write
3916000
trusted library allocation
page read and write
3C24000
trusted library allocation
page read and write
836B000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
71FE000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
2B4A000
direct allocation
page read and write
34F0000
trusted library allocation
page read and write
838C000
unkown
page read and write
3500000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
41C6000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
2526D113000
heap
page read and write
22229651000
heap
page read and write
3C75000
trusted library allocation
page read and write
839B000
trusted library allocation
page read and write
BB54000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
3E90000
unkown
page readonly
7EFE000
trusted library allocation
page read and write
245B3803000
heap
page read and write
7480000
trusted library allocation
page read and write
7EFA000
trusted library allocation
page read and write
4E62000
trusted library allocation
page read and write
2958000
direct allocation
page read and write
1065000
heap
page read and write
748B000
trusted library allocation
page read and write
5A5E000
heap
page read and write
38BD000
stack
page read and write
7FBE000
trusted library allocation
page read and write
106C000
heap
page read and write
54B0000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
74D8000
trusted library allocation
page read and write
5D0000
direct allocation
page read and write
750C000
trusted library allocation
page read and write
47AC000
stack
page read and write
4FC000
unkown
page write copy
504000
unkown
page readonly
41E4000
trusted library allocation
page read and write
492E000
stack
page read and write
38C0000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
394D000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3C83000
trusted library allocation
page read and write
8390000
unkown
page execute
4621000
unkown
page readonly
7507000
trusted library allocation
page read and write
4A7000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
74C6000
trusted library allocation
page read and write
101A000
heap
page read and write
396A000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
82F0000
unkown
page readonly
2236000
heap
page read and write
4D50000
trusted library allocation
page read and write
71E3000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
8412000
unkown
page read and write
34F0000
trusted library allocation
page read and write
2AF3000
heap
page read and write
3C0C000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
7096000
heap
page read and write
7505000
trusted library allocation
page read and write
394E000
trusted library allocation
page read and write
4E68000
trusted library allocation
page read and write
2AA2747E000
heap
page read and write
724C000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
1024000
heap
page read and write
390D000
trusted library allocation
page read and write
4AEAE7F000
stack
page read and write
245B2AC2000
heap
page read and write
2AA27449000
heap
page read and write
7F4E000
stack
page read and write
74C6000
trusted library allocation
page read and write
2526D053000
heap
page read and write
3930000
trusted library allocation
page read and write
1D3D07B000
stack
page read and write
1085000
heap
page read and write
3C2A000
trusted library allocation
page read and write
993C47E000
stack
page read and write
34F0000
trusted library allocation
page read and write
74DA000
trusted library allocation
page read and write
7214000
trusted library allocation
page read and write
245B3394000
heap
page read and write
C750000
trusted library allocation
page read and write
245B2A5A000
heap
page read and write
41F7000
trusted library allocation
page read and write
BB20000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
1CEF287D000
heap
page read and write
22229510000
heap
page read and write
3E95000
unkown
page readonly
8336000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
74D8000
trusted library allocation
page read and write
74C2000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
245B3378000
heap
page read and write
3D2B000
unkown
page readonly
2C3C000
direct allocation
page read and write
3CD8000
trusted library allocation
page read and write
7508000
trusted library allocation
page read and write
82B0000
unkown
page readonly
74CF000
trusted library allocation
page read and write
429B000
trusted library allocation
page read and write
2526D100000
heap
page read and write
830F000
trusted library allocation
page read and write
1598000
unkown
page readonly
1CEF283C000
heap
page read and write
C76A000
trusted library allocation
page read and write
4240000
trusted library allocation
page read and write
834E000
unkown
page read and write
3CD8000
trusted library allocation
page read and write
BB54000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
7EF7000
trusted library allocation
page read and write
245B2A00000
heap
page read and write
BB43000
trusted library allocation
page read and write
245B335F000
heap
page read and write
102A000
heap
page read and write
420000
unkown
page read and write
4B6E000
unkown
page readonly
245B3376000
heap
page read and write
7450000
unkown
page readonly
34F0000
trusted library allocation
page read and write
756A000
trusted library allocation
page read and write
721A000
trusted library allocation
page read and write
993C27E000
stack
page read and write
74EA000
trusted library allocation
page read and write
42A3000
trusted library allocation
page read and write
4360000
unkown
page read and write
3BFA000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
45B1000
unkown
page readonly
4263000
trusted library allocation
page read and write
74ED000
trusted library allocation
page read and write
71B3000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
3C14000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
7EFC000
trusted library allocation
page read and write
83A7000
trusted library allocation
page read and write
3D40000
unkown
page read and write
1CEF2824000
heap
page read and write
74CF000
trusted library allocation
page read and write
245B3821000
heap
page read and write
3C24000
trusted library allocation
page read and write
8338000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
426B000
trusted library allocation
page read and write
395E000
trusted library allocation
page read and write
245B3379000
heap
page read and write
2AC0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
8365000
trusted library allocation
page read and write
2230000
heap
page read and write
54E2000
unkown
page readonly
245B33A5000
heap
page read and write
833C000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
38FC000
trusted library allocation
page read and write
5411000
unkown
page readonly
1CEF2860000
heap
page read and write
BB39000
trusted library allocation
page read and write
74CF000
trusted library allocation
page read and write
245B3303000
heap
page read and write
74D2000
trusted library allocation
page read and write
30CF000
stack
page read and write
8FD000
direct allocation
page read and write
1D3D27E000
stack
page read and write
2A3E000
stack
page read and write
1A51EE77000
heap
page read and write
1CEF2866000
heap
page read and write
82C2000
trusted library allocation
page read and write
3C2A000
trusted library allocation
page read and write
2A68000
direct allocation
page read and write
245B2870000
heap
page read and write
74C6000
trusted library allocation
page read and write
83A9000
trusted library allocation
page read and write
7EF1000
trusted library allocation
page read and write
222296AF000
heap
page read and write
245B2A7C000
heap
page read and write
245B335F000
heap
page read and write
74D9000
trusted library allocation
page read and write
3EF0000
unkown
page readonly
3C9B000
trusted library allocation
page read and write
74D8000
trusted library allocation
page read and write
4C7E000
unkown
page readonly
7480000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3B43000
trusted library allocation
page read and write
8340000
trusted library allocation
page read and write
7FA9000
trusted library allocation
page read and write
549B000
unkown
page readonly
53CB000
unkown
page readonly
74C6000
trusted library allocation
page read and write
FDB000
heap
page read and write
3C26000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
3C83000
trusted library allocation
page read and write
2526D058000
heap
page read and write
7EF5000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
245B3396000
heap
page read and write
756C000
trusted library allocation
page read and write
245B3394000
heap
page read and write
245B3361000
heap
page read and write
53DB000
unkown
page readonly
71CC000
trusted library allocation
page read and write
22229687000
heap
page read and write
1D3CBDE000
stack
page read and write
245B3389000
heap
page read and write
41CC000
trusted library allocation
page read and write
2AA2745A000
heap
page read and write
3975000
trusted library allocation
page read and write
2B47000
direct allocation
page read and write
7F05000
trusted library allocation
page read and write
7430000
unkown
page read and write
1A51F0C0000
heap
page read and write
3674000
unkown
page readonly
245B3381000
heap
page read and write
4AB8000
unkown
page readonly
993C379000
stack
page read and write
FE6000
heap
page read and write
395E000
trusted library allocation
page read and write
E3E000
stack
page read and write
1F0000
trusted library allocation
page read and write
7499000
trusted library allocation
page read and write
8E6AA7E000
stack
page read and write
82FD000
trusted library allocation
page read and write
7FA8000
trusted library allocation
page read and write
B95A4FE000
stack
page read and write
8410000
trusted library allocation
page execute
2D98000
direct allocation
page read and write
1CEF3002000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
4DE8000
unkown
page readonly
7060000
stack
page readonly
3E90000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
245B3300000
heap
page read and write
74C6000
trusted library allocation
page read and write
7FBB000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
245B3392000
heap
page read and write
993C57E000
stack
page read and write
82F5000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
4EA5000
trusted library allocation
page read and write
3BF8000
trusted library allocation
page read and write
BB2C000
trusted library allocation
page read and write
7489000
trusted library allocation
page read and write
2AB5000
heap
page read and write
3C24000
trusted library allocation
page read and write
2AA27455000
heap
page read and write
7FB8000
trusted library allocation
page read and write
2526D03C000
heap
page read and write
3F2F000
unkown
page read and write
BB2F000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
3C2A000
trusted library allocation
page read and write
8361000
trusted library allocation
page read and write
7FA6000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4180000
unkown
page read and write
4242000
trusted library allocation
page read and write
74C6000
trusted library allocation
page read and write
7FA6000
trusted library allocation
page read and write
1078000
heap
page read and write
245B3393000
heap
page read and write
5A72000
heap
page read and write
74AA000
trusted library allocation
page read and write
1CEF2900000
heap
page read and write
3CD8000
trusted library allocation
page read and write
7FAC000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
839F000
trusted library allocation
page read and write
245B3391000
heap
page read and write
8367000
trusted library allocation
page read and write
756A000
trusted library allocation
page read and write
8305000
trusted library allocation
page read and write
53E2000
unkown
page readonly
380000
unkown
page readonly
245B3303000
heap
page read and write
38F3000
trusted library allocation
page read and write
FD7000
heap
page read and write
4D8E000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
2240000
direct allocation
page read and write
4A2F000
stack
page read and write
2AC0000
trusted library allocation
page read and write
245B3389000
heap
page read and write
245B2800000
heap
page read and write
245B3802000
heap
page read and write
FBD76FF000
stack
page read and write
2526D04B000
heap
page read and write
74DE000
trusted library allocation
page read and write
3956000
trusted library allocation
page read and write
756A000
trusted library allocation
page read and write
1088000
heap
page read and write
2CE3000
direct allocation
page read and write
3B3C000
stack
page read and write
1CEF2855000
heap
page read and write
4E9D000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
8330000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
245B3372000
heap
page read and write
7FB8000
trusted library allocation
page read and write
245B2AE3000
heap
page read and write
A99000
stack
page read and write
39AA000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
41FD000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
40A0000
trusted library allocation
page read and write
721C000
trusted library allocation
page read and write
41E2000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
1CEF2908000
heap
page read and write
9D0000
unkown
page readonly
2526CF30000
trusted library allocation
page read and write
34EE000
stack
page read and write
2AB0000
heap
page read and write
C761000
trusted library allocation
page read and write
4E8F000
trusted library allocation
page read and write
74A7000
trusted library allocation
page read and write
7050000
stack
page read and write
3E90000
trusted library allocation
page read and write
2526D013000
heap
page read and write
396A000
trusted library allocation
page read and write
752C000
trusted library allocation
page read and write
2526D04F000
heap
page read and write
21B0000
direct allocation
page read and write
D141000
unkown
page read and write
5A54000
heap
page read and write
8E6B07D000
stack
page read and write
7234000
trusted library allocation
page read and write
3968000
trusted library allocation
page read and write
8301000
trusted library allocation
page read and write
4A70000
unkown
page read and write
74C1000
trusted library allocation
page read and write
398E000
trusted library allocation
page read and write
74CF000
trusted library allocation
page read and write
245B3360000
heap
page read and write
749B000
trusted library allocation
page read and write
59CD000
unkown
page readonly
394B000
trusted library allocation
page read and write
245B33BB000
heap
page read and write
2AA27429000
heap
page read and write
1025000
heap
page read and write
3969000
trusted library allocation
page read and write
7212000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
2C2E000
direct allocation
page read and write
40A0000
trusted library allocation
page read and write
245B3378000
heap
page read and write
82F3000
trusted library allocation
page read and write
832E000
trusted library allocation
page read and write
1CEF2902000
heap
page read and write
245B3387000
heap
page read and write
838A000
trusted library allocation
page read and write
222295A0000
heap
page read and write
2AF9000
heap
page read and write
34F0000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
245B33B3000
heap
page read and write
3C61000
trusted library allocation
page read and write
245B3381000
heap
page read and write
3C8E000
trusted library allocation
page read and write
74AA000
trusted library allocation
page read and write
B95A5F8000
stack
page read and write
245B3800000
heap
page read and write
2A0D000
direct allocation
page read and write
245B3383000
heap
page read and write
74EB000
trusted library allocation
page read and write
7FB4000
trusted library allocation
page read and write
1D3D37D000
stack
page read and write
2526D04D000
heap
page read and write
993BFCC000
stack
page read and write
2AC0000
trusted library allocation
page read and write
7519000
trusted library allocation
page read and write
38D8000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
107F000
heap
page read and write
5B0000
direct allocation
page read and write
2AC0000
trusted library allocation
page read and write
750C000
trusted library allocation
page read and write
2AA27487000
heap
page read and write
245B3802000
heap
page read and write
2C0C000
direct allocation
page read and write
7F01000
trusted library allocation
page read and write
74C4000
trusted library allocation
page read and write
4D40000
unkown
page read and write
34F0000
trusted library allocation
page read and write
105B000
heap
page read and write
3CA0000
trusted library allocation
page read and write
7488000
trusted library allocation
page read and write
1A51EDD0000
heap
page read and write
37BC000
stack
page read and write
245B381A000
heap
page read and write
BB32000
trusted library allocation
page read and write
1CEF285E000
heap
page read and write
3969000
trusted library allocation
page read and write
2AA27413000
heap
page read and write
426000
unkown
page readonly
7508000
trusted library allocation
page read and write
1A51F0C5000
heap
page read and write
245B2AB2000
heap
page read and write
4290000
trusted library allocation
page read and write
489B000
unkown
page readonly
245B3389000
heap
page read and write
A30000
heap
page read and write
3C67000
trusted library allocation
page read and write
467C000
unkown
page readonly
245B331A000
heap
page read and write
245B2A66000
heap
page read and write
245B2A5C000
heap
page read and write
245B33BB000
heap
page read and write
39B2000
trusted library allocation
page read and write
74C6000
trusted library allocation
page read and write
3C9B000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
1062000
heap
page read and write
245B33A5000
heap
page read and write
7F0E000
trusted library allocation
page read and write
B95A37D000
stack
page read and write
3C15000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
833A000
trusted library allocation
page read and write
1CEF2864000
heap
page read and write
4201000
trusted library allocation
page read and write
3784000
unkown
page readonly
3240000
direct allocation
page read and write
82CA000
trusted library allocation
page read and write
4732000
unkown
page readonly
396A000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
750C000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
74CF000
trusted library allocation
page read and write
2C96000
direct allocation
page read and write
74C6000
trusted library allocation
page read and write
2B44000
direct allocation
page read and write
1D3D47E000
stack
page read and write
9D1000
unkown
page execute read
B742000
trusted library allocation
page read and write
82BB000
trusted library allocation
page read and write
8363000
trusted library allocation
page read and write
74CF000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
245B3383000
heap
page read and write
3E90000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
22229640000
heap
page read and write
245B2AC9000
heap
page read and write
245B2A62000
heap
page read and write
42A9000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
7EFE000
trusted library allocation
page read and write
3C64000
trusted library allocation
page read and write
4261000
trusted library allocation
page read and write
7EF3000
trusted library allocation
page read and write
1005000
heap
page read and write
245B33A5000
heap
page read and write
2B1E000
direct allocation
page read and write
74FB000
trusted library allocation
page read and write
53D000
unkown
page readonly
74A6000
trusted library allocation
page read and write
245B338C000
heap
page read and write
838E000
trusted library allocation
page read and write
53E5000
unkown
page readonly
2B3C000
stack
page read and write
37DF000
unkown
page readonly
3C1B000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
1063000
heap
page read and write
710000
direct allocation
page read and write
245B3369000
heap
page read and write
39AA000
trusted library allocation
page read and write
3E3B000
unkown
page readonly
3962000
trusted library allocation
page read and write
4E39000
trusted library allocation
page read and write
1D3CB5C000
stack
page read and write
3C83000
trusted library allocation
page read and write
4ED0000
trusted library section
page read and write
E40000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
2222968E000
heap
page read and write
245B2AD6000
heap
page read and write
74D8000
trusted library allocation
page read and write
3C67000
trusted library allocation
page read and write
1D3CE7F000
stack
page read and write
4209000
trusted library allocation
page read and write
7FB4000
trusted library allocation
page read and write
DBD000
unkown
page read and write
82AE000
unkown
page read and write
3C15000
trusted library allocation
page read and write
41A0000
unkown
page read and write
7EFA000
trusted library allocation
page read and write
BB2E000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
540E000
unkown
page readonly
2526D088000
heap
page read and write
74D8000
trusted library allocation
page read and write
7EFC000
trusted library allocation
page read and write
245B339A000
heap
page read and write
222298C0000
trusted library allocation
page read and write
E56000
heap
page read and write
34F0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
7FBE000
trusted library allocation
page read and write
7268000
trusted library allocation
page read and write
3949000
unkown
page readonly
83AF000
trusted library allocation
page read and write
3F40000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
3CD0000
unkown
page readonly
41FF000
trusted library allocation
page read and write
8E6ACFB000
stack
page read and write
2AC0000
trusted library allocation
page read and write
7489000
trusted library allocation
page read and write
FBD6F8E000
stack
page read and write
74ED000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
D189000
unkown
page read and write
2AF9000
heap
page read and write
4D33000
unkown
page readonly
245B2A5F000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2526D056000
heap
page read and write
49AC000
unkown
page readonly
245B29E0000
remote allocation
page read and write
71D7000
trusted library allocation
page read and write
3C71000
trusted library allocation
page read and write
1A51EEA0000
heap
page read and write
5360000
unkown
page readonly
B95A9F8000
stack
page read and write
7226000
trusted library allocation
page read and write
82FB000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
7FB4000
trusted library allocation
page read and write
3CA0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
2526D108000
heap
page read and write
245B2A6A000
heap
page read and write
74AD000
trusted library allocation
page read and write
7FB1000
trusted library allocation
page read and write
7EDC000
trusted library allocation
page read and write
7093000
heap
page read and write
2AC0000
trusted library allocation
page read and write
1093000
heap
page read and write
4234000
trusted library allocation
page read and write
71CF000
trusted library allocation
page read and write
245B3394000
heap
page read and write
4E51000
trusted library allocation
page read and write
8309000
trusted library allocation
page read and write
74ED000
trusted library allocation
page read and write
245B3376000
heap
page read and write
3C1A000
trusted library allocation
page read and write
3CCE000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
839D000
trusted library allocation
page read and write
C777000
trusted library allocation
page read and write
510000
heap
page read and write
1A51EE90000
heap
page read and write
70AF000
trusted library allocation
page read and write
2240000
direct allocation
page read and write
74D8000
trusted library allocation
page read and write
42A5000
trusted library allocation
page read and write
74D9000
trusted library allocation
page read and write
BB3A000
trusted library allocation
page read and write
2526D04A000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
7EF3000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
There are 1455 hidden memdumps, click here to show them.