IOC Report
ibaAnalyzerSetup_x64_v7.3.6.exe

loading gif

Files

File Path
Type
Category
Malicious
ibaAnalyzerSetup_x64_v7.3.6.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files\iba\ibaAnalyzer\DevExpress.Data.v16.1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DevExpress.Printing.v16.1.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DevExpress.Sparkline.v16.1.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DevExpress.Utils.v16.1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DevExpress.XtraEditors.v16.1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DevExpress.XtraGrid.v16.1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DevExpress.XtraPrinting.v16.1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\DotNetMagic2005.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\GMap.NET.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\GMap.NET.WindowsForms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\License_Agreement_ibaAnalyzer.pdf
PDF document, version 1.7
dropped
C:\Program Files\iba\ibaAnalyzer\OverlayWindow.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\Plugins\View.GeoView.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
C:\Program Files\iba\ibaAnalyzer\Plugins\View.ibaAnalyzerViewHostGraphManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\Plugins\View.ibaFFT.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\Plugins\View.ibaGraphManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\Plugins\View.ibaOrbit.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\PowerCollections.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\SQLite.Interop.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\SciLexer.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\System.Data.SQLite.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\View.ibaEventTable.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\View.ibaGraphManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\View.GeoView.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\View.ibaAnalyzerViewHostGraphManager.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\View.ibaEventTable.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\View.ibaFFT.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\View.ibaGraphManager.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\View.ibaOrbit.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\hdClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\hdCommon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaAnalyzerViewHostViewWrapper.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaHDOffline.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaShared.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaSharedGui.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaUser.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaUser.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\de\ibaViewUtilities.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\View.GeoView.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\View.ibaAnalyzerViewHostGraphManager.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\View.ibaEventTable.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\View.ibaFFT.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\View.ibaGraphManager.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\View.ibaOrbit.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\hdClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\hdCommon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaAnalyzerViewHostViewWrapper.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaHDOffline.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaShared.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaSharedGui.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaUser.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaUser.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\fr\ibaViewUtilities.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\hdClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\hdClientInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\hdCommon.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\hdCore.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaAnalyzer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaAnalyzerViewHost.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaAnalyzerViewHostActiveX.ocx
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaAnalyzerViewHostViewWrapper.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaDataExtractor.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaDataExtractorMC.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaExpressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaHDOffline.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaHdOfflineActiveX.ocx
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaHdViewUtilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaLogger.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaManagedFFT.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaPdaPluginInterface.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaPdaServerInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaRunTime64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaShared.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaSharedGui.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaThreadSafeNativeFFT.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaUser.Forms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaUser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaViewInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\ibaViewUtilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\libiomp5md.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\mkl64_parallel.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\msvcp100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\iba\ibaAnalyzer\reg_dataextractor.bat
ASCII text, with CRLF line terminators
dropped
C:\Program Files\iba\ibaAnalyzer\reg_dataextractorMC.bat
ASCII text, with CRLF line terminators
dropped
C:\Program Files\iba\ibaAnalyzer\support.htm
HTML document, UTF-8 Unicode text, with very long lines
dropped
C:\Program Files\iba\ibaAnalyzer\versions.htm
HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\SimpleSC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\UserInfo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\databaseoptions.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\ioSpecial.ini
ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\licenseserveroptions.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\modern-header.bmp
PC bitmap, Windows 3.x format, 150 x 57 x 24
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 24
dropped
C:\Users\user\AppData\Local\Temp\nss310.tmp\nsSCMEx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 90 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ibaAnalyzerSetup_x64_v7.3.6.exe
"C:\Users\user\Desktop\ibaAnalyzerSetup_x64_v7.3.6.exe"
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\iba\ibaAnalyzer\ibaHDOfflineActiveX.ocx
C:\Windows\System32\regsvr32.exe
/s "C:\Program Files\iba\ibaAnalyzer\ibaHDOfflineActiveX.ocx"
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\iba\ibaAnalyzer\ibaAnalyzerViewHostActiveX.ocx
C:\Windows\System32\regsvr32.exe
/s "C:\Program Files\iba\ibaAnalyzer\ibaAnalyzerViewHostActiveX.ocx"

URLs

Name
IP
Malicious
http://dc5.maps.lt/cache/mapslt_relief_vector/map/_alllayers/L
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/ESRI_ShadedRelief_World_2D/MapServer/tile/
unknown
http://www.darb.ae/ArcGIS/rest/services/BaseMaps/Q2_2011_NAVTQ_Eng_V5/MapServer/tile/
unknown
https://www.linkedin.com/company/iba-italia-srl/
unknown
http://www.maps.lt/map/K
unknown
https://www.xing.com/companies/ibaag-messtechnik-undautomatisierungssysteme
unknown
http://greatmaps.codeplex.com
unknown
https://twitter.com/ibaagcom
unknown
https://www.linkedin.com/company/iba-ag/
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/ESRI_StreetMap_World_2D/MapServer/tile/
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/ESRI_Imagery_World_2D/MapServer/tile/
unknown
http://www.iba-ag.com.
unknown
https://system.data.sqlite.org/X
unknown
http://dev.virtualearth.net/REST/v1/Locations?
unknown
http://www.opencyclemap.org/whttp://
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/World_Shaded_Relief/MapServer/tile/
unknown
http://sourceforge.net/projects/nspring).
unknown
http://tiles.ump.waw.pl/ump_tiles/
unknown
https://kso.etjanster.lantmateriet.se/?lang=en#
unknown
http://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=0&fmt=1&type=
unknown
https://www.linkedin.com/company/begner-agenturer-ab/
unknown
http://wego.here.com/w
unknown
http://www.topografix.com/GPX/1/1
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://dc5.maps.lt/cache/mapslt/map/_alllayers/L
unknown
http://where.yahooapis.com/geocode?q=
unknown
http://www.4umaps.eu/map.htmu
unknown
https://mapserver.mapy.cz/turist-m/
unknown
http://sigpac.mapa.es/kmlserver/raster/
unknown
https://api.maptiler.com/maps/
unknown
https://kso.etjanster.lantmateriet.se/karta/topowebb/v1.1/wmts?SERVICE=WMTS&REQUEST=GetTile&VERSION=
unknown
http://dc5.maps.lt/cache/mapslt_ortofoto/map/_alllayers/L
unknown
http://dc5.maps.lt/cache/mapslt_ortofoto_overlay/map/_alllayers/L
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/World_Topo_Map/MapServer/tile/
unknown
http://sourceforge.net/projects/nspring)
unknown
https://nominatim.openstreetmap.org/search?street=
unknown
http://ajax.aspnetcdn.com/ajax/jquery/jquery-1.9.1.min.js
unknown
https://nominatim.openstreetmap.org/reverse?format=xml&lat=
unknown
http://code.jquery.com/mobile/1.3.2/jquery.mobile-1.3.2.min.css
unknown
http://where.yahooapis.com/geocode?country=
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/World_Terrain_Base/MapServer/tile/
unknown
http://wikimapia.org/S
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/World_Street_Map/MapServer/tile/
unknown
https://www.linkedin.com/company/adegis/
unknown
http://4umaps.eu/
unknown
http://www.ikarte.lv/default.aspx?lang=en
unknown
http://ocsp.thawte.com0
unknown
http://openseamap.org/ghttp://tiles.openseamap.org/seamark/
unknown
http://analyzer-doc.iba-ag.com/%TEMP%
unknown
http://dev.virtualearth.net/REST/V1/Routes/
unknown
http://ump.waw.pl/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.linkedin.com/company/ibabeneluxbvba/
unknown
https://www.sqlite.org/copyright.html2
unknown
http://dc1.maps.lt/cache/mapslt_25d_vkkp/map/_alllayers/L
unknown
https://www.maptiler.com/#providersComboBox
unknown
http://ajax.aspnetcdn.com/ajax/jquery.mobile/1.3.2/jquery.mobile-1.3.2.min.css
unknown
http://dev.virtualearth.net/REST/V1/Imagery/Metadata/
unknown
http://services.maps.lt/mapsk_services/rest/services/ikartelv/MapServer/tile/
unknown
http://dc1.maps.lt/cache/mapslt_ortofoto_2010/map/_alllayers/L
unknown
https://nominatim.openstreetmap.org/search?q=
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/World_Physical_Map/MapServer/tile/
unknown
http://www.yournavigation.org/api/1.0/gosmore.php?format=kml&flat=
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://www.mapy.cz/I6A1AF99A-84C6-4EF6-91A5-77B9D03257C2
unknown
http://mapbender.wheregroup.com/cgi-bin/mapserv?map=/data/umn/osm/osm_basic.map&VERSION=1.1.1&REQUES
unknown
https://www.thawte.com/cps0/
unknown
http://www.topografix.com/GPX/1/1T
unknown
http://maps.yahoo.com/
unknown
https://www.thawte.com/repository0W
unknown
http://earth.google.com/kml/2.0
unknown
http://code.jquery.com/jquery-1.9.1.min.js
unknown
https://api.maptiler.com/maps/tiles/Basic?key=_Software
unknown
http://greatmaps.codeplex.com/discussions/252531
unknown
http://code.jquery.com/mobile/1.3.2/jquery.mobile-1.3.2.min.js
unknown
http://routes.cloudmade.com/
unknown
http://www.topografix.com/GPX/1/1D
unknown
https://system.data.sqlite.org/
unknown
http://ajax.aspnetcdn.com/ajax/jquery.mobile/1.3.2/jquery.mobile-1.3.2.min.js
unknown
http://ecn.t
unknown
http://www.dnguard.net/
unknown
http://www.nearmap.com/
unknown
http://server.arcgisonline.com/ArcGIS/rest/services/NGS_Topo_US_2D/MapServer/tile/
unknown
There are 73 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{5C5417F9-71C1-43B1-8900-2AE7CC09158D}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\ibaHDOfflineActiveX.DLL
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EE757A5-8656-4B9D-98BE-CB4FA368CFC9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EE757A5-8656-4B9D-98BE-CB4FA368CFC9}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EE757A5-8656-4B9D-98BE-CB4FA368CFC9}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EE757A5-8656-4B9D-98BE-CB4FA368CFC9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EE757A5-8656-4B9D-98BE-CB4FA368CFC9}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E8EE2541-7E30-4F18-9297-7E36C67D224D}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E8EE2541-7E30-4F18-9297-7E36C67D224D}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E8EE2541-7E30-4F18-9297-7E36C67D224D}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E8EE2541-7E30-4F18-9297-7E36C67D224D}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E8EE2541-7E30-4F18-9297-7E36C67D224D}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C7A14696-C255-4756-8B9D-5E0AFD0C809B}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C7A14696-C255-4756-8B9D-5E0AFD0C809B}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C7A14696-C255-4756-8B9D-5E0AFD0C809B}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C7A14696-C255-4756-8B9D-5E0AFD0C809B}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F2FEE5C6-3CE4-4275-9839-7966CE410684}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9573F6BD-053E-434B-BF65-983B03807CA9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C5DC433-3F15-470C-B1DA-61ECAAE84DAC}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{77276176-861C-415E-8903-F4727E66B962}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{77276176-861C-415E-8903-F4727E66B962}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{77276176-861C-415E-8903-F4727E66B962}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{77276176-861C-415E-8903-F4727E66B962}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77276176-861C-415E-8903-F4727E66B962}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77276176-861C-415E-8903-F4727E66B962}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77276176-861C-415E-8903-F4727E66B962}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77276176-861C-415E-8903-F4727E66B962}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6FC43263-35B4-4FEC-90AC-2679E864A578}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6FC43263-35B4-4FEC-90AC-2679E864A578}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\iba.ibaHDOfflineActiveXCtrl.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\iba.ibaHDOfflineActiveXCtrl.1\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\ToolboxBitmap32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\MiscStatus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\MiscStatus\1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\Control
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8B98469B-18FF-4E31-BFBD-CDB144031D4A}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C7A14696-C255-4756-8B9D-5E0AFD0C809B}\1.0\HELPDIR
NULL
There are 53 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2920000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2610000
heap
page read and write
1B230000
unkown
page readonly
2920000
trusted library allocation
page read and write
2041E520000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2041E600000
heap
page read and write
1C91E584000
heap
page read and write
2950000
trusted library allocation
page read and write
482C7FC000
stack
page read and write
3660000
heap
page read and write
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2980000
unkown
page readonly
1B780000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
20419113000
heap
page read and write
1DE5AB90000
heap
page read and write
2921000
trusted library allocation
page read and write
7FF9EE560000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
166DAEB000
stack
page read and write
2940000
trusted library allocation
page read and write
1B780000
trusted library allocation
page read and write
2970000
unkown
page readonly
1F0D4A3C000
heap
page read and write
1C91DCDC000
heap
page read and write
20419059000
heap
page read and write
BFA000
heap
page read and write
1B7D0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1DE5B602000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
293D000
trusted library allocation
page read and write
1C91EA00000
unkown
page read and write
1B7F0000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
27A40213000
heap
page read and write
2920000
trusted library allocation
page read and write
31C1000
unkown
page execute read
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
409000
unkown
page read and write
1080000
heap
page read and write
2930000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1B6F6000
trusted library allocation
page read and write
16A5D77000
stack
page read and write
3310000
trusted library allocation
page read and write
2207908A000
heap
page read and write
2920000
trusted library allocation
page read and write
7FF9EE4B0000
trusted library allocation
page read and write
27A40257000
heap
page read and write
2920000
trusted library allocation
page read and write
2926000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2F5B57E0000
heap
page read and write
1AEE6000
stack
page read and write
2041E904000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
1C91E3B0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FF9EE566000
trusted library allocation
page read and write
1B750000
trusted library allocation
page read and write
29A1000
unkown
page readonly
482C39B000
stack
page read and write
2930000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
1F0D59E0000
trusted library allocation
page read and write
AD7907B000
stack
page read and write
2890000
heap
page execute and read and write
3320000
trusted library allocation
page read and write
2080000
heap
page read and write
2041A520000
trusted library allocation
page read and write
1DE5AB20000
heap
page read and write
D70000
heap
page read and write
A9D80FF000
stack
page read and write
2920000
trusted library allocation
page read and write
BED000
heap
page read and write
31D0000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
6D9000
heap
page read and write
5E0000
heap
page read and write
2920000
trusted library allocation
page read and write
1B740000
trusted library allocation
page read and write
430000
unkown
page readonly
2920000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1B5E4000
heap
page read and write
1DE5AC29000
heap
page read and write
1B5A2000
unkown
page readonly
29D0000
trusted library allocation
page read and write
A9D7B7E000
stack
page read and write
2928000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
27A40302000
heap
page read and write
2930000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2041A190000
trusted library section
page readonly
1DE5AC4F000
heap
page read and write
1B480000
trusted library allocation
page read and write
7DF4B2DE0000
trusted library allocation
page execute and read and write
AC3797A000
stack
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1F0D4A3E000
heap
page read and write
2F00000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2922000
trusted library allocation
page read and write
1D6ACB08000
heap
page read and write
3310000
trusted library allocation
page read and write
2041E6AA000
heap
page read and write
2940000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
482C67F000
stack
page read and write
2900000
trusted library allocation
page read and write
345B000
stack
page read and write
7FFA668C0000
unkown
page readonly
2910000
trusted library allocation
page read and write
670000
heap
page read and write
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2041E530000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
7FF9EE4D0000
trusted library allocation
page read and write
27A40247000
heap
page read and write
2921000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
7FF9EE6A0000
trusted library allocation
page read and write
1C91DD02000
heap
page read and write
AD796FE000
stack
page read and write
3320000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
BBA000
heap
page read and write
2350000
heap
page readonly
1D6ACB02000
heap
page read and write
2920000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
1B7A7000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2041E661000
heap
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
27A40254000
heap
page read and write
128B1000
trusted library allocation
page read and write
16A5BFC000
stack
page read and write
2041A070000
trusted library allocation
page read and write
1B231000
unkown
page execute read
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
A59A27D000
stack
page read and write
3320000
trusted library allocation
page read and write
20418F20000
heap
page read and write
2924000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2041908B000
heap
page read and write
1B810000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
31C8000
unkown
page readonly
1F0D4940000
trusted library allocation
page read and write
2041E62C000
heap
page read and write
16A6179000
stack
page read and write
2850000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2041E6E9000
heap
page read and write
27A40A02000
trusted library allocation
page read and write
7FF9EE4C3000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
1B39F000
unkown
page readonly
2900000
trusted library allocation
page read and write
26CF000
stack
page read and write
1C91DC13000
heap
page read and write
2920000
trusted library allocation
page read and write
BE7000
heap
page read and write
2950000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
482C97B000
stack
page read and write
7FF9EE660000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
B71000
heap
page read and write
3130000
trusted library allocation
page read and write
20419900000
heap
page read and write
22079108000
heap
page read and write
2974000
trusted library allocation
page read and write
1B760000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
5E5000
heap
page read and write
1B720000
trusted library allocation
page read and write
A599D7D000
stack
page read and write
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
1B7B0000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
1DE5AD13000
heap
page read and write
3320000
trusted library allocation
page read and write
1F0D4930000
heap
page read and write
28B5000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
409000
unkown
page write copy
7FF9EE596000
trusted library allocation
page execute and read and write
2930000
trusted library allocation
page read and write
A9D7EF7000
stack
page read and write
7FF9EE6C0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
4FB000
stack
page read and write
3310000
trusted library allocation
page read and write
1F0D4C10000
trusted library allocation
page read and write
2041E5D0000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
AD7917F000
stack
page read and write
2860000
trusted library allocation
page read and write
258F000
stack
page read and write
1DE5AC3C000
heap
page read and write
3320000
trusted library allocation
page read and write
1C91E5A5000
heap
page read and write
2940000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
248E000
stack
page read and write
7FF9EE4B3000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
A9D7A7B000
stack
page read and write
BE0000
heap
page read and write
2041E702000
heap
page read and write
AD793FB000
stack
page read and write
3310000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
275D000
unkown
page readonly
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
1C91DAA0000
heap
page read and write
1B480000
trusted library allocation
page read and write
1C91E500000
heap
page read and write
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1B790000
trusted library allocation
page read and write
1F0D4A1E000
heap
page read and write
27A40050000
heap
page read and write
BF5000
heap
page read and write
31C0000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
1C91DCC0000
heap
page read and write
7FF9EE5E0000
unkown
page execute and read and write
2F5B5A02000
heap
page read and write
1C91DCAF000
heap
page read and write
2930000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1AF56000
unkown
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FF9EE5E0000
trusted library allocation
page execute and read and write
31D0000
trusted library allocation
page read and write
1C91E9B0000
remote allocation
page read and write
2390000
unkown
page readonly
2920000
trusted library allocation
page read and write
96D000
heap
page read and write
560000
heap
page read and write
9EC000
heap
page read and write
20419000000
heap
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
7FFA66850000
unkown
page readonly
C70000
heap
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2041E5F0000
trusted library allocation
page read and write
20419077000
heap
page read and write
1DE5AD00000
heap
page read and write
2930000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
2F5B5A52000
heap
page read and write
2850000
trusted library allocation
page read and write
2041A170000
trusted library section
page readonly
1B28D000
unkown
page write copy
2850000
trusted library allocation
page read and write
1D6AC9E0000
heap
page read and write
6DC000
heap
page read and write
23B0000
heap
page read and write
3320000
trusted library allocation
page read and write
FF7C87F000
stack
page read and write
7FF9EE4DB000
trusted library allocation
page execute and read and write
285A000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
31C4000
unkown
page read and write
2041EA20000
remote allocation
page read and write
3310000
trusted library allocation
page read and write
7FF9EE4B3000
trusted library allocation
page execute and read and write
3310000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
BFA000
heap
page read and write
7FF9EE670000
trusted library allocation
page execute and read and write
1B5F8000
heap
page read and write
7FF9EE66A000
unkown
page read and write
2928000
trusted library allocation
page read and write
2041E5A0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2041EA20000
remote allocation
page read and write
7FF9EE4D0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
129FD000
trusted library allocation
page read and write
204190FD000
heap
page read and write
1C91E584000
heap
page read and write
265E000
stack
page read and write
31D0000
trusted library allocation
page read and write
6E2000
heap
page read and write
20418EB0000
heap
page read and write
2924000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1C91E587000
heap
page read and write
2920000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
20419126000
heap
page read and write
BB4000
heap
page read and write
2930000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FF9EE6B0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
22079048000
heap
page read and write
2106000
heap
page read and write
2920000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
7FFA66851000
unkown
page execute read
22078F30000
heap
page read and write
525000
heap
page read and write
1D6ACA4F000
heap
page read and write
9B2000
heap
page read and write
2920000
trusted library allocation
page read and write
27E0000
unkown
page readonly
3320000
trusted library allocation
page read and write
6E3000
heap
page read and write
31D0000
trusted library allocation
page read and write
16A5C7F000
stack
page read and write
1B700000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1B472000
trusted library allocation
page read and write
1B7A0000
trusted library allocation
page read and write
1B0CA000
unkown
page read and write
1B29B000
unkown
page execute read
1B770000
trusted library allocation
page read and write
1C91DB10000
heap
page read and write
2920000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
128A1000
trusted library allocation
page read and write
7FF9EE5D0000
unkown
page read and write
A599E7B000
stack
page read and write
8D0000
heap
page read and write
2940000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
AC37E7F000
stack
page read and write
7FF9EE596000
trusted library allocation
page execute and read and write
2F5B5B02000
heap
page read and write
2850000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
27F0000
heap
page readonly
10000000
unkown
page readonly
7FF9EE4DD000
trusted library allocation
page execute and read and write
2920000
trusted library allocation
page read and write
2041A4F1000
trusted library allocation
page read and write
7FF9EE680000
trusted library allocation
page execute and read and write
28C1000
trusted library allocation
page read and write
2820000
heap
page execute and read and write
1B7B0000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
97000
stack
page read and write
2950000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
2207902A000
heap
page read and write
2920000
trusted library allocation
page read and write
1B295000
unkown
page readonly
2850000
trusted library allocation
page read and write
166DEFD000
stack
page read and write
2850000
trusted library allocation
page read and write
27A4027D000
heap
page read and write
2850000
trusted library allocation
page read and write
1B420000
stack
page readonly
2924000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
128A9000
trusted library allocation
page read and write
2934000
trusted library allocation
page read and write
1F0D4C50000
trusted library allocation
page read and write
2853000
trusted library allocation
page read and write
7FFA668D0000
unkown
page readonly
6F6000
heap
page read and write
AC37DFF000
stack
page read and write
1F0D4A1E000
heap
page read and write
450000
heap
page read and write
2850000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1B26D000
unkown
page readonly
27A40313000
heap
page read and write
1B730000
trusted library allocation
page read and write
2041908D000
heap
page read and write
2940000
trusted library allocation
page read and write
1D6ACA3C000
heap
page read and write
26DF000
stack
page read and write
2920000
trusted library allocation
page read and write
2875000
heap
page read and write
1B790000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
2F5B5A13000
heap
page read and write
7FF9EE4B4000
trusted library allocation
page read and write
970000
heap
page read and write
27A400B0000
heap
page read and write
B60000
heap
page read and write
B8C000
heap
page read and write
482CC7E000
stack
page read and write
2924000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
166DE79000
stack
page read and write
7FF9EE4C3000
trusted library allocation
page read and write
AC37EFF000
stack
page read and write
10001000
unkown
page execute read
2950000
trusted library allocation
page read and write
27A401B0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2F5B5A7A000
heap
page read and write
292D000
trusted library allocation
page read and write
985000
heap
page read and write
1AF50000
unkown
page read and write
1D6ACA00000
heap
page read and write
1B760000
trusted library allocation
page read and write
7FFA668FC000
unkown
page readonly
2920000
trusted library allocation
page read and write
128A3000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1F0D49D0000
heap
page read and write
20419918000
heap
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
20D4000
heap
page read and write
2930000
trusted library allocation
page read and write
1B770000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
10CA000
heap
page read and write
1B470000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2207906F000
heap
page read and write
2920000
trusted library allocation
page read and write
27A40288000
heap
page read and write
2931000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
938000
heap
page read and write
16A6078000
stack
page read and write
2930000
trusted library allocation
page read and write
2F5B5840000
heap
page read and write
1B77C000
trusted library allocation
page read and write
1D6ACA4B000
heap
page read and write
28B3000
trusted library allocation
page read and write
2041E63D000
heap
page read and write
400000
unkown
page readonly
2920000
trusted library allocation
page read and write
22079102000
heap
page read and write
1C91E541000
heap
page read and write
1B779000
trusted library allocation
page read and write
540000
heap
page read and write
FDC000
stack
page read and write
22CE000
stack
page read and write
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
7DF41ABD0000
trusted library allocation
page execute and read and write
3320000
trusted library allocation
page read and write
1D6ACB00000
heap
page read and write
1F0D49C8000
heap
page read and write
1B470000
trusted library allocation
page read and write
7FF9EE570000
trusted library allocation
page execute and read and write
1D6ACA47000
heap
page read and write
F70000
heap
page read and write
2940000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2726000
unkown
page readonly
27A4024C000
heap
page read and write
31D0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
1B6F0000
trusted library allocation
page read and write
204190A0000
heap
page read and write
2F5B5B13000
heap
page read and write
31D0000
trusted library allocation
page read and write
10003000
unkown
page readonly
20419918000
heap
page read and write
2F5B5B00000
heap
page read and write
292C000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
20419802000
heap
page read and write
3310000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
32EC000
unkown
page read and write
2929000
trusted library allocation
page read and write
1DE5AC52000
heap
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FF9EE69D000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1C91DC6C000
heap
page read and write
7FF9EE4DB000
trusted library allocation
page execute and read and write
31D0000
trusted library allocation
page read and write
482CB7E000
stack
page read and write
1D6ACA48000
heap
page read and write
3310000
trusted library allocation
page read and write
2F5B57D0000
heap
page read and write
2920000
trusted library allocation
page read and write
A59A17E000
stack
page read and write
400000
unkown
page readonly
1B480000
trusted library allocation
page read and write
401000
unkown
page execute read
2924000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
A9D7FFF000
stack
page read and write
2930000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
A599CFE000
stack
page read and write
2850000
trusted library allocation
page read and write
1C91E514000
heap
page read and write
129F1000
trusted library allocation
page read and write
7FF9EE690000
unkown
page execute and read and write
2940000
trusted library allocation
page read and write
295A000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
B5D000
heap
page read and write
DB0000
heap
page read and write
7FF9EE6C0000
unkown
page read and write
A599F7B000
stack
page read and write
2920000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
27A40252000
heap
page read and write
2920000
trusted library allocation
page read and write
1C91E592000
heap
page read and write
1B5F0000
trusted library allocation
page read and write
7FF9EE6A3000
unkown
page read and write
1B6F2000
trusted library allocation
page read and write
482C6FE000
stack
page read and write
2960000
heap
page execute and read and write
2850000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
1C91E9B0000
remote allocation
page read and write
2920000
trusted library allocation
page read and write
2041903D000
heap
page read and write
AC37B7B000
stack
page read and write
1C91DCEE000
heap
page read and write
2921000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1B422000
stack
page readonly
2920000
trusted library allocation
page read and write
29DC000
trusted library allocation
page read and write
1F0D4A1E000
heap
page read and write
3320000
trusted library allocation
page read and write
22079002000
heap
page read and write
7FF9EE4B4000
trusted library allocation
page read and write
1C91E563000
heap
page read and write
31D0000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2041E9E0000
trusted library allocation
page read and write
292A000
trusted library allocation
page read and write
1B75A000
stack
page read and write
A26000
heap
page read and write
1C91DCC5000
heap
page read and write
335D000
stack
page read and write
7E0000
heap
page read and write
2850000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
482CA77000
stack
page read and write
2929000
trusted library allocation
page read and write
2041E6B3000
heap
page read and write
3320000
trusted library allocation
page read and write
1C91DCE2000
heap
page read and write
27A40308000
heap
page read and write
BF5000
heap
page read and write
2207907E000
heap
page read and write
31C0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2041E5C0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
1F0D59C0000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
520000
heap
page read and write
2820000
trusted library allocation
page read and write
1F0D59F0000
trusted library allocation
page read and write
2041EA00000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
1C91DC3C000
heap
page read and write
CDC000
stack
page read and write
3320000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
20419B01000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
1B7C0000
trusted library allocation
page read and write
27A4026F000
heap
page read and write
9EE000
heap
page read and write
2804000
trusted library allocation
page read and write
1F0D4C40000
heap
page read and write
26E4000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
1F0D59D0000
heap
page readonly
2207908E000
heap
page read and write
31D0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
27A40255000
heap
page read and write
2041E6DB000
heap
page read and write
128A6000
trusted library allocation
page read and write
25CE000
stack
page read and write
3310000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
1F0D4C49000
heap
page read and write
2F5B5A28000
heap
page read and write
D40000
heap
page read and write
2AC4000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1B28E000
unkown
page read and write
1F0D4C20000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
12A01000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
1DE5AB30000
heap
page read and write
2850000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1C91DCA9000
heap
page read and write
1B5A0000
unkown
page readonly
2920000
trusted library allocation
page read and write
2041E990000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2928000
trusted library allocation
page read and write
1B493000
heap
page read and write
2850000
trusted library allocation
page read and write
D1B000
stack
page read and write
2930000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
20419815000
heap
page read and write
2920000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2041E5B0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
22079013000
heap
page read and write
3310000
trusted library allocation
page read and write
1D6ACA13000
heap
page read and write
A9D7AFD000
stack
page read and write
2860000
trusted library allocation
page read and write
29E0000
heap
page read and write
A8B000
stack
page read and write
20419013000
heap
page read and write
A599C7B000
stack
page read and write
27A40200000
heap
page read and write
1DE5AC00000
heap
page read and write
BF7000
heap
page read and write
7FF9EE4BD000
trusted library allocation
page execute and read and write
FF7C77B000
stack
page read and write
2900000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2698000
stack
page read and write
2924000
trusted library allocation
page read and write
20D0000
heap
page read and write
1D6AC980000
heap
page read and write
1F0D49C0000
heap
page read and write
29D0000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
26A5000
heap
page read and write
2929000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
407000
unkown
page readonly
31D0000
trusted library allocation
page read and write
2041E924000
trusted library allocation
page read and write
2041906F000
heap
page read and write
1B470000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1B5E0000
heap
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1B7A0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
10005000
unkown
page readonly
2920000
trusted library allocation
page read and write
2041E90E000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
1F0D4A16000
heap
page read and write
1C91DCB3000
heap
page read and write
2920000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
1B760000
trusted library allocation
page read and write
2710000
unkown
page readonly
129F6000
trusted library allocation
page read and write
32A1000
unkown
page execute read
2929000
trusted library allocation
page read and write
AC37A7E000
stack
page read and write
29D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
31C0000
unkown
page readonly
7FF9EE570000
trusted library allocation
page execute and read and write
285A000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
2041E6F4000
heap
page read and write
27E2000
unkown
page readonly
1DE5ABC0000
trusted library allocation
page read and write
3490000
heap
page read and write
2940000
trusted library allocation
page read and write
25D2000
unkown
page readonly
A9D7D7B000
stack
page read and write
7FF9EE5DC000
unkown
page read and write
3320000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2F5B6202000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
22079A02000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
27A4023C000
heap
page read and write
2851000
trusted library allocation
page read and write
7FF9EE4BD000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
422000
unkown
page read and write
982000
heap
page read and write
6DC000
heap
page read and write
7FFA668C1000
unkown
page execute read
3310000
trusted library allocation
page read and write
2041A513000
trusted library allocation
page read and write
2F5B5A40000
heap
page read and write
2924000
trusted library allocation
page read and write
DB5000
heap
page read and write
7FF9EE566000
trusted library allocation
page read and write
32F0000
heap
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
20419074000
heap
page read and write
3320000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
AC3787A000
stack
page read and write
2930000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
16A5E77000
stack
page read and write
2940000
trusted library allocation
page read and write
1B28C000
unkown
page read and write
1B5E0000
trusted library allocation
page read and write
700000
heap
page read and write
166DF7F000
stack
page read and write
32DC000
unkown
page readonly
2041E5D0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
B84000
heap
page read and write
2930000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
2041EA20000
remote allocation
page read and write
482C87F000
stack
page read and write
20419959000
heap
page read and write
2920000
trusted library allocation
page read and write
95F000
heap
page read and write
2850000
trusted library allocation
page read and write
7FF9EE6A0000
unkown
page read and write
2711000
unkown
page execute read
31D0000
trusted library allocation
page read and write
1B710000
trusted library allocation
page read and write
7FF9EE5D0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
7FFA66897000
unkown
page read and write
3310000
trusted library allocation
page read and write
1F0D5790000
trusted library allocation
page read and write
930000
heap
page read and write
20419902000
heap
page read and write
2921000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
3330000
direct allocation
page read and write
BDE000
heap
page read and write
20419958000
heap
page read and write
AC3732B000
stack
page read and write
3130000
trusted library allocation
page read and write
2041E5C0000
trusted library allocation
page read and write
32F3000
unkown
page read and write
9B6000
heap
page read and write
1D6ACA4D000
heap
page read and write
1C91DC00000
heap
page read and write
2930000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
22078FC0000
trusted library allocation
page read and write
AC37777000
stack
page read and write
2920000
trusted library allocation
page read and write
129F3000
trusted library allocation
page read and write
1C91E54F000
heap
page read and write
1B800000
trusted library allocation
page read and write
22079000000
heap
page read and write
2930000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
25DF000
stack
page read and write
2934000
trusted library allocation
page read and write
2041E9D0000
trusted library allocation
page read and write
1D6ACA29000
heap
page read and write
20419029000
heap
page read and write
2920000
trusted library allocation
page read and write
1B4A0000
heap
page read and write
2041E6F4000
heap
page read and write
7FFA66866000
unkown
page readonly
22078F20000
heap
page read and write
3310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
2830000
heap
page read and write
2041A1A0000
trusted library section
page readonly
2920000
trusted library allocation
page read and write
2207904C000
heap
page read and write
166DFF9000
stack
page read and write
2929000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2041E618000
heap
page read and write
429000
unkown
page read and write
3320000
trusted library allocation
page read and write
27A40256000
heap
page read and write
1C91E572000
heap
page read and write
BF5000
heap
page read and write
1AA20000
trusted library allocation
page read and write
2041E908000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
7FF9EE660000
unkown
page read and write
1D6ACA4C000
heap
page read and write
AC382FF000
stack
page read and write
3310000
trusted library allocation
page read and write
1B490000
heap
page read and write
6BF000
heap
page read and write
3320000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
DD0000
heap
page read and write
3410000
heap
page read and write
1D6AD280000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
166E079000
stack
page read and write
7FF9EE50C000
trusted library allocation
page execute and read and write
BEB000
heap
page read and write
224E000
stack
page read and write
1DE5AC7B000
heap
page read and write
407000
unkown
page readonly
2F5B5940000
trusted library allocation
page read and write
7FF9EE5DA000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1DE5AC70000
heap
page read and write
2870000
heap
page read and write
2920000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
1F0D4A42000
heap
page read and write
7FF9EE669000
trusted library allocation
page read and write
1B609000
heap
page read and write
1B460000
trusted library allocation
page read and write
27A4028E000
heap
page read and write
16A57EC000
stack
page read and write
2940000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
2041E6E1000
heap
page read and write
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
27A40040000
heap
page read and write
2920000
trusted library allocation
page read and write
7FF9EE680000
unkown
page execute and read and write
31D0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1B770000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
20419102000
heap
page read and write
2920000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2932000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
AC37C7E000
stack
page read and write
1B755000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
2041E900000
trusted library allocation
page read and write
16A5F7E000
stack
page read and write
2921000
trusted library allocation
page read and write
1D6AD402000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2041A180000
trusted library section
page readonly
31C3000
unkown
page readonly
2041E64A000
heap
page read and write
2041E702000
heap
page read and write
7FF9EE50C000
trusted library allocation
page execute and read and write
920000
trusted library allocation
page read and write
1D6ACA02000
heap
page read and write
1F0D4C00000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
AC37BFF000
stack
page read and write
3320000
trusted library allocation
page read and write
1B780000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1D6ACA49000
heap
page read and write
2920000
trusted library allocation
page read and write
22079053000
heap
page read and write
2921000
trusted library allocation
page read and write
1D6ACA7B000
heap
page read and write
1F0D4A38000
heap
page read and write
B87000
heap
page read and write
293D000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
401000
unkown
page execute read
3320000
trusted library allocation
page read and write
22079100000
heap
page read and write
28FD000
stack
page read and write
1B760000
trusted library allocation
page read and write
22079113000
heap
page read and write
1D6ACA6F000
heap
page read and write
2933000
trusted library allocation
page read and write
1C91DCAB000
heap
page read and write
2930000
trusted library allocation
page read and write
20419913000
heap
page read and write
1C91E402000
heap
page read and write
2A74000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1B7FF000
trusted library allocation
page read and write
7FF9EE4DD000
trusted library allocation
page execute and read and write
3320000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
7FFA668F7000
unkown
page read and write
1F0D4A3D000
heap
page read and write
2920000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
AF0000
heap
page read and write
3320000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
29AC000
unkown
page readonly
1DE5AC88000
heap
page read and write
2920000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2041E9F0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1F0D4B90000
heap
page read and write
FF7C97B000
stack
page read and write
2940000
trusted library allocation
page read and write
7FF9EE690000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
27A4024F000
heap
page read and write
1B7E0000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1DE5AD08000
heap
page read and write
2850000
trusted library allocation
page read and write
1F0D49FC000
heap
page read and write
20418EC0000
heap
page read and write
31D0000
trusted library allocation
page read and write
AD790FF000
stack
page read and write
2920000
trusted library allocation
page read and write
AC380FA000
stack
page read and write
AD795FE000
stack
page read and write
FF7C67B000
stack
page read and write
1B5E6000
heap
page read and write
2930000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
123B000
stack
page read and write
1B7D0000
trusted library allocation
page read and write
234D000
stack
page read and write
2041A160000
trusted library section
page readonly
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
29A7000
unkown
page write copy
2041E6EB000
heap
page read and write
3310000
trusted library allocation
page read and write
2922000
trusted library allocation
page read and write
2041E6E5000
heap
page read and write
31D0000
trusted library allocation
page read and write
1C91DAB0000
heap
page read and write
3320000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2041A150000
trusted library section
page readonly
1DE5AC13000
heap
page read and write
3320000
trusted library allocation
page read and write
2854000
trusted library allocation
page read and write
1B23A000
unkown
page execute read
2930000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
2F5B5A83000
heap
page read and write
2950000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
1D6ACB13000
heap
page read and write
2041E700000
heap
page read and write
2041E61E000
heap
page read and write
3310000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
16A5AFE000
stack
page read and write
3320000
trusted library allocation
page read and write
A9D7DFF000
stack
page read and write
3620000
heap
page read and write
1DE5AC4C000
heap
page read and write
7FF9EE6B0000
unkown
page read and write
2921000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FF9EE560000
trusted library allocation
page read and write
BE5000
heap
page read and write
16A61FF000
unkown
page read and write
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1C91DCA2000
heap
page read and write
1F0D49A0000
heap
page read and write
2850000
trusted library allocation
page read and write
1F0D4A07000
heap
page read and write
2810000
heap
page execute and read and write
2850000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
204197D0000
trusted library section
page read and write
31D0000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
AD792FF000
stack
page read and write
7FFA6689D000
unkown
page readonly
1B460000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
10E1000
heap
page read and write
6C4000
heap
page read and write
27A40248000
heap
page read and write
1B6E0000
trusted library allocation
page read and write
20419092000
heap
page read and write
1C91DC29000
heap
page read and write
3320000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
FF7C57F000
stack
page read and write
30000
heap
page read and write
204197C0000
trusted library allocation
page read and write
1C91E9B0000
remote allocation
page read and write
31C6000
unkown
page read and write
1F0D4C45000
heap
page read and write
2850000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2757000
unkown
page write copy
1C91DCF4000
heap
page read and write
2850000
trusted library allocation
page read and write
27A40249000
heap
page read and write
16A5A7E000
stack
page read and write
32A0000
unkown
page readonly
1C91E57E000
heap
page read and write
1C91E53F000
heap
page read and write
1B820000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
7FF9EE670000
unkown
page read and write
B38000
heap
page read and write
AD0000
heap
page read and write
25D0000
unkown
page readonly
2207904E000
heap
page read and write
210A000
heap
page read and write
2041E900000
trusted library allocation
page read and write
2F5B5A00000
heap
page read and write
1F0D5A40000
trusted library allocation
page read and write
2207903C000
heap
page read and write
3310000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1C91DC57000
heap
page read and write
4EE0000
trusted library allocation
page read and write
20419079000
heap
page read and write
2860000
trusted library allocation
page read and write
32FA000
heap
page read and write
1D6ACA87000
heap
page read and write
2852000
trusted library allocation
page read and write
42C000
unkown
page read and write
2950000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2100000
heap
page read and write
5F0000
trusted library section
page read and write
2971000
unkown
page execute read
2921000
trusted library allocation
page read and write
1B7C0000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
67A000
heap
page read and write
2921000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
430000
unkown
page readonly
27A40300000
heap
page read and write
31D0000
trusted library allocation
page read and write
128AD000
trusted library allocation
page read and write
22078F90000
heap
page read and write
31D0000
trusted library allocation
page read and write
AC37CFF000
stack
page read and write
2041A510000
trusted library allocation
page read and write
1C91DD13000
heap
page read and write
7FF9EE4CD000
trusted library allocation
page execute and read and write
900000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
A87000
stack
page read and write
AD794F7000
stack
page read and write
FF7C11B000
stack
page read and write
2927000
trusted library allocation
page read and write
10C0000
heap
page read and write
2926000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
966000
heap
page read and write
2041E921000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
32F4000
unkown
page readonly
2940000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
7FFA668F1000
unkown
page readonly
2860000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
27A40229000
heap
page read and write
2041E5F0000
trusted library allocation
page read and write
26A0000
heap
page read and write
19A000
stack
page read and write
2920000
trusted library allocation
page read and write
1DE5AD02000
heap
page read and write
A59A077000
stack
page read and write
2851000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
AC37FFB000
stack
page read and write
1C91DC65000
heap
page read and write
3320000
trusted library allocation
page read and write
7FF9EE4B0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
6D7000
heap
page read and write
1D6AC970000
heap
page read and write
129F9000
trusted library allocation
page read and write
292E000
trusted library allocation
page read and write
20419800000
heap
page read and write
There are 1253 hidden memdumps, click here to show them.