IOC Report
Lg3gn9y1Cj.exe

loading gif

Files

File Path
Type
Category
Malicious
Lg3gn9y1Cj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\icsys.icn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\stsys.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\mrsys.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lg3gn9y1cj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System\explorer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System\spoolsv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System\svchost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x8be2707e, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cmsys[1].htm
HTML document, ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\what-happened-to-the-old-zxq-website[1].htm
HTML document, UTF-8 Unicode text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\~DF01383C41703FF854.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF0ED405DEDEDD664C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF5EF9070E9B8F5CB4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF6E4F50B397B92863.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFC593752C91BD8E2F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFD29C7DB29EE1E840.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Logs\waasmedic\waasmedic.20220805_070938_705.etl
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\System\cmsys.cmn
HTML document, UTF-8 Unicode text, with very long lines
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Lg3gn9y1Cj.exe
"C:\Users\user\Desktop\Lg3gn9y1Cj.exe"
malicious
C:\Users\user\Desktop\lg3gn9y1cj.exe
c:\users\user\desktop\lg3gn9y1cj.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
malicious
C:\Users\user\AppData\Local\icsys.icn.exe
C:\Users\user\AppData\Local\icsys.icn.exe
malicious
C:\Windows\System\explorer.exe
c:\windows\system\explorer.exe
malicious
C:\Windows\System\spoolsv.exe
c:\windows\system\spoolsv.exe SE
malicious
C:\Windows\System\svchost.exe
c:\windows\system\svchost.exe
malicious
C:\Windows\System\spoolsv.exe
c:\windows\system\spoolsv.exe PR
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System\explorer.exe
"C:\windows\system\explorer.exe" RO
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System\svchost.exe
"C:\windows\system\svchost.exe" RO
malicious
C:\Windows\SysWOW64\at.exe
at 09:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc stop SharedAccess
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc config Schedule start= auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 45 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://zxq.net/cmsys.gif
51.81.194.202
malicious
https://zxq.net/what-happened-to-the-old-zxq-website/
51.81.194.202
malicious
http://vccmd03.googlecode.com/files/cmsys.gif
142.250.145.82
https://zxq.net/wp-content/uploads/2022/02/ZXQ-FB.png
unknown
https://zxq.net/privacy-policy/
unknown
https://api.telegram.org/bot
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/#breadcrumb
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://zxq.net/these-are-the-injured-you-may-suffer-in-a-bicycle-accident/
unknown
https://zxq.net/wp-content/uploads/2022/07/What-is-the-Best-Way-to-Learn-Golang-450x280.png
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://zxq.net/wp-content/uploads/2022/07/What-is-the-Best-Way-to-Learn-Golang-1024x637.png
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://zxq.net/wp-content/uploads/2022/02/ZXQ.png
unknown
https://github.com/LimerBoy/StormKitty
unknown
https://zxq.net/about-us/
unknown
https://zxq.net/the-future-of-cryptocurrency-is-it-time-to-get-your-crypto-license-in-europe/
unknown
https://zxq.net/#logo
unknown
https://zxq.net/wp-content/uploads/2022/07/Why-You-Should-Seek-An-Uber-Or-Lyft-Accident-Lawyer-01-76
unknown
http://icanhazip.com
unknown
https://zxq.net/news/technology/
unknown
https://zxq.net/wp-content/themes/smart-mag/js/jquery.sticky-sidebar.js?ver=7.1.1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://zxq.net/wp-json/
unknown
http://www.bingmapsportal.com
unknown
https://zxq.net/wp-content/uploads/2022/07/Reasons-to-Hire-a-Truck-Accident-Attorney-01-768x432.jpeg
unknown
https://zxq.net/wp-content/uploads/2022/07/Best-Mothers-Day-Gifts-of-2022-for-Every-Mom-01-450x253.j
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://zxq.net/wp-content/uploads/2022/07/Reasons-to-Hire-a-Truck-Accident-Attorney-01-450x253.jpeg
unknown
https://zxq.net/wp-content/uploads/2022/07/What-is-the-Best-Way-to-Learn-Golang-300x187.png
unknown
https://zxq.net/wp-content/uploads/2022/07/What-is-the-Best-Way-to-Learn-Golang-768x478.png
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://zxq.net/wp-content/uploads/2022/07/How-To-.png
unknown
https://zxq.net/wp-content/plugins/table-of-contents-plus/front.min.js?ver=2106
unknown
http://crl.ver)
unknown
https://zxq.net/wp-content/uploads/2022/07/How-To--1024x609.png
unknown
https://zxq.net/why-you-should-seek-an-uber-or-lyft-accident-lawyer/
unknown
https://schema.org
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://zxq.net/wp-content/uploads/2022/07/Why-You-Should-Seek-An-Uber-Or-Lyft-Accident-Lawyer-01-45
unknown
https://zxq.net/reasons-to-hire-a-truck-accident-attorney/
unknown
https://zxq.net/wp-content/uploads/2022/07/Reasons-to-Hire-a-Truck-Accident-Attorney-01-300x169.jpeg
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://zxq.net/wp-content/uploads/2022/07/Online-Shopping-Tips-During-Covid-01-150x84.jpeg
unknown
https://zxq.net/wp-content/plugins/table-of-contents-plus/screen.min.css?ver=2106
unknown
https://zxq.net/wp-content/uploads/2022/07/What-is-the-Best-Way-to-Learn-Golang-150x93.png
unknown
https://zxq.net/?s=
unknown
https://zxq.net/how-to-find-an-investor-for-your-business/
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/;
unknown
https://zxq.net/wp-content/uploads/2022/07/These-Are-The-Injured-You-May-Suffer-in-a-Bicycle-Acciden
unknown
https://dynamic.t
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/#webpage
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://zxq.net/news/entertainment/
unknown
https://zxq.net/wp-includes/wlwmanifest.xml
unknown
https://zxq.net/wp-content/uploads/2022/03/follow-us-on-google-news-banner-black-300x117.png
unknown
https://zxq.net/wp-content/uploads/2022/07/Best-Mothers-Day-Gifts-of-2022-for-Every-Mom-01-150x84.jp
unknown
https://zxq.net/wp-content/uploads/2022/07/How-To--1200x714.png
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://zxq.net/wp-content/uploads/2022/07/Reasons-to-Hire-a-Truck-Accident-Attorney-01.jpeg
unknown
https://zxq.net/write-for-us/
unknown
https://zxq.net/what-is-the-best-way-to-learn-golang/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
https://zxq.net/#organization
unknown
https://zxq.net/wp-content/themes/smart-mag/css/icons/fonts/ts-icons.woff2?v2.2
unknown
https://zxq.net/wp-content/uploads/2022/03/follow-us-on-google-news-banner-black.png
unknown
https://zxq.net/wp-content/uploads/2022/07/What-is-the-Best-Way-to-Learn-Golang-1200x747.png
unknown
https://zxq.net/news/business/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
http://icanhazip.com4
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://yoast.com/wordpress/plugins/seo/
unknown
https://zxq.net/wp-content/uploads/2022/07/Best-Mothers-Day-Gifts-of-2022-for-Every-Mom-01-300x169.j
unknown
https://zxq.net/wp-content/uploads/2022/07/The-Future-of-Cryptocurrency-Is-it-Time-to-Get-Your-Crypt
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/ne
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/L
unknown
https://zxq.net/wp-content/uploads/2022/07/Online-Shopping-Tips-During-Covid-01-1024x576.jpeg
unknown
http://icanhazip.com/
104.18.114.97
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://zxq.net/xmlrpc.php?rsd
unknown
https://zxq.net/online-shopping-tips-during-covid/
unknown
https://zxq.net/news/
unknown
https://zxq.net/?p=187
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://zxq.net/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fzxq.net%2Fwhat-happened-to-the-old-zxq-we
unknown
https://zxq.net/wp-content/themes/smart-mag/style.css?ver=7.1.1
unknown
https://zxq.net/wp-content/uploads/2022/07/How-To--150x89.png
unknown
https://zxq.net/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
unknown
https://zxq.net/wp-content/uploads/2022/07/Online-Shopping-Tips-During-Covid-01.jpeg
unknown
https://zxq.net/wp-content/uploads/2022/07/Reasons-to-Hire-a-Truck-Accident-Attorney-01-150x84.jpeg
unknown
https://zxq.net/wp-content/uploads/2022/07/How-To--768x457.png
unknown
https://zxq.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
unknown
https://zxq.net/wp-content/uploads/2022/07/Why-You-Should-Seek-An-Uber-Or-Lyft-Accident-Lawyer-01-30
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/n
unknown
https://zxq.net/wp-json/wp/v2/pages/187
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
zxq.net
51.81.194.202
malicious
vccmd01.zxq.net
51.81.194.202
malicious
vccmd03.googlecode.com
unknown
malicious
vccmd01.t35.com
unknown
malicious
vccmd01.googlecode.com
unknown
malicious
vccmd02.googlecode.com
unknown
malicious
icanhazip.com
104.18.114.97
googlecode.l.googleusercontent.com
142.250.145.82
64.89.4.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
51.81.194.202
zxq.net
United States
malicious
192.168.2.1
unknown
unknown
104.18.114.97
icanhazip.com
United States
142.250.145.82
googlecode.l.googleusercontent.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process
LO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Explorer
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Svchost
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon
shell
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess
Start
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5322000
remote allocation
page execute and read and write
malicious
2B42000
direct allocation
page execute and read and write
malicious
6D3000
heap
page read and write
malicious
732B000
trusted library allocation
page read and write
2BD0000
heap
page read and write
2A90000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
D6F000
stack
page read and write
22C0000
heap
page read and write
61F000
heap
page read and write
31F0000
heap
page read and write
440000
trusted library allocation
page read and write
70AE000
stack
page read and write
19B000
stack
page read and write
9B000
stack
page read and write
72E5000
trusted library allocation
page read and write
313D000
stack
page read and write
BEC000
stack
page read and write
62C000
heap
page read and write
771000
heap
page read and write
62754FC000
stack
page read and write
2220000
unkown
page read and write
401000
unkown
page execute read
33A1000
heap
page read and write
1E1CF64C000
heap
page read and write
3B3B000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
81F000
stack
page read and write
61F000
heap
page read and write
571000
heap
page read and write
7F5000
heap
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
3B3D000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
546000
heap
page read and write
620000
heap
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
A0A0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
61F000
heap
page read and write
3F20000
trusted library allocation
page read and write
42E000
unkown
page readonly
33A1000
heap
page read and write
24224900000
heap
page read and write
440000
trusted library allocation
page read and write
7F4000
heap
page read and write
34A0000
trusted library allocation
page read and write
402000
unkown
page execute and write copy
B8E000
stack
page read and write
560000
trusted library allocation
page read and write
1E1CA7F0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
1E1CA918000
heap
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
1E1CB150000
trusted library section
page readonly
E5D000
stack
page read and write
A0C0000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
32D0000
remote allocation
page read and write
3C30000
trusted library allocation
page read and write
42E000
unkown
page readonly
61F000
heap
page read and write
9806000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
EB0000
heap
page read and write
36A0000
remote allocation
page read and write
6FD000
stack
page read and write
9BE0000
trusted library allocation
page read and write
61F000
heap
page read and write
6B1000
heap
page read and write
402000
unkown
page execute and write copy
18339480000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
613000
heap
page read and write
740000
heap
page read and write
3C30000
trusted library allocation
page read and write
4C0000
heap
page read and write
61F000
heap
page read and write
6C0000
heap
page read and write
81E000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
1401B874000
heap
page read and write
440000
trusted library allocation
page read and write
62C000
heap
page read and write
33A1000
heap
page read and write
7AE000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
C2E000
stack
page read and write
62C000
heap
page read and write
5C0000
heap
page read and write
81F000
stack
page read and write
21E9000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
39D0000
remote allocation
page read and write
2F01000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
7014000
trusted library allocation
page read and write
2F0E000
stack
page read and write
3C30000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
867000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
1E1CF4C0000
trusted library allocation
page read and write
A0A0000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
21ED000
stack
page read and write
7AE000
stack
page read and write
2FE0000
remote allocation
page read and write
42C000
unkown
page read and write
3F20000
trusted library allocation
page read and write
1401B84D000
heap
page read and write
34A0000
trusted library allocation
page read and write
61F000
heap
page read and write
83C000
stack
page read and write
18D6C413000
heap
page read and write
61F000
heap
page read and write
FB0000
remote allocation
page read and write
62C000
heap
page read and write
9B000
stack
page read and write
440000
trusted library allocation
page read and write
857000
heap
page read and write
5B0000
heap
page read and write
7E8000
heap
page read and write
9409B7E000
stack
page read and write
560000
trusted library allocation
page read and write
3B36000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2BEF000
stack
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
653000
heap
page read and write
62C000
heap
page read and write
315F000
stack
page read and write
613000
heap
page read and write
33EE000
stack
page read and write
33A1000
heap
page read and write
2219000
heap
page read and write
3C30000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
61F000
heap
page read and write
18338D02000
heap
page read and write
3090000
heap
page read and write
2FE0000
remote allocation
page read and write
BB0000
heap
page read and write
32D0000
remote allocation
page read and write
690000
heap
page read and write
440000
trusted library allocation
page read and write
546000
heap
page read and write
6D0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
1B3C3E02000
heap
page read and write
990000
heap
page read and write
613000
heap
page read and write
1694E854000
heap
page read and write
613000
heap
page read and write
2B56000
direct allocation
page execute and read and write
440000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
61F000
heap
page read and write
50C000
heap
page read and write
344E000
stack
page read and write
2140000
heap
page read and write
A0B0000
trusted library allocation
page read and write
62C000
heap
page read and write
18D6C400000
heap
page read and write
61F000
heap
page read and write
42C000
unkown
page read and write
440000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
77E000
stack
page read and write
6F5000
heap
page read and write
EBE000
stack
page read and write
3C30000
trusted library allocation
page read and write
B80000
heap
page read and write
18D6CF32000
heap
page read and write
59B000
heap
page read and write
62C000
heap
page read and write
37C0000
heap
page read and write
613000
heap
page read and write
61F000
heap
page read and write
39D0000
trusted library allocation
page read and write
400000
unkown
page readonly
A120000
trusted library allocation
page read and write
1401B859000
heap
page read and write
D00000
trusted library allocation
page read and write
63E000
heap
page read and write
440000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
C80000
heap
page read and write
3036000
heap
page read and write
A09E000
stack
page read and write
21D1000
heap
page read and write
33A1000
heap
page read and write
1401B87C000
heap
page read and write
61F000
heap
page read and write
513000
heap
page read and write
3C30000
trusted library allocation
page read and write
5DE000
stack
page read and write
440000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
1E1CA102000
heap
page read and write
3C30000
trusted library allocation
page read and write
59E000
stack
page read and write
61F000
heap
page read and write
836000
trusted library allocation
page read and write
82B000
trusted library allocation
page read and write
62C000
heap
page read and write
2A60000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
2AA0000
heap
page read and write
440000
trusted library allocation
page read and write
33A1000
heap
page read and write
A0C0000
trusted library allocation
page read and write
AFE000
stack
page read and write
31C0000
heap
page read and write
775000
heap
page read and write
33A1000
heap
page read and write
1E1CF63F000
heap
page read and write
A0B0000
trusted library allocation
page read and write
A8D000
stack
page read and write
440000
trusted library allocation
page read and write
1E1CF6ED000
heap
page read and write
33A1000
heap
page read and write
2BC0000
heap
page read and write
783000
heap
page read and write
DD0000
remote allocation
page read and write
61F000
heap
page read and write
39D0000
remote allocation
page read and write
3300000
heap
page read and write
3B42000
trusted library allocation
page read and write
23F97318000
heap
page read and write
D90000
heap
page read and write
613000
heap
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
DC0000
remote allocation
page read and write
613000
heap
page read and write
1E1CB130000
trusted library section
page readonly
D7E000
stack
page read and write
61F000
heap
page read and write
850000
heap
page read and write
9409EFD000
stack
page read and write
35BF000
stack
page read and write
61F000
heap
page read and write
2500000
trusted library allocation
page read and write
DD0000
remote allocation
page read and write
61F000
heap
page read and write
19C000
stack
page read and write
440000
trusted library allocation
page read and write
6A3000
heap
page read and write
613000
heap
page read and write
61F000
heap
page read and write
7AE000
heap
page read and write
613000
heap
page read and write
39D0000
trusted library allocation
page read and write
62C000
heap
page read and write
61F000
heap
page read and write
5E5000
heap
page read and write
600000
trusted library allocation
page execute read
440000
trusted library allocation
page read and write
DD0000
heap
page read and write
39D0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
62C000
heap
page read and write
18338C02000
heap
page read and write
7081FFB000
stack
page read and write
440000
trusted library allocation
page read and write
A9E000
stack
page read and write
A0A0000
trusted library allocation
page read and write
61F000
heap
page read and write
733B000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
23F97213000
heap
page read and write
EDC000
stack
page read and write
3C30000
trusted library allocation
page read and write
400000
unkown
page readonly
440000
heap
page read and write
A0E0000
trusted library allocation
page read and write
33F8000
heap
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
33A1000
heap
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
BA8000
heap
page read and write
A0C0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
320F000
stack
page read and write
61F000
heap
page read and write
3CF0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
1401B83A000
heap
page read and write
400000
unkown
page readonly
1B3C3E00000
heap
page read and write
F6E000
stack
page read and write
440000
trusted library allocation
page read and write
36A947F000
stack
page read and write
440000
trusted library allocation
page read and write
1E1CF908000
trusted library allocation
page read and write
42E000
unkown
page readonly
440000
trusted library allocation
page read and write
F50000
heap
page read and write
B60000
remote allocation
page read and write
64A000
heap
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
DF0000
heap
page read and write
2350000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
62C000
heap
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
91F000
stack
page read and write
CB5000
heap
page read and write
51F000
heap
page read and write
440000
trusted library allocation
page read and write
62C000
heap
page read and write
3F20000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
4CD18FF000
stack
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
1E1CF570000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
F9F000
stack
page read and write
33A1000
heap
page read and write
18D6C390000
heap
page read and write
440000
trusted library allocation
page read and write
613000
heap
page read and write
33D0000
heap
page read and write
691000
heap
page read and write
613000
heap
page read and write
A0B0000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
33A1000
heap
page read and write
400000
unkown
page readonly
3C30000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
62C000
heap
page read and write
39D0000
trusted library allocation
page read and write
670000
heap
page read and write
323F000
stack
page read and write
ECD000
stack
page read and write
33A1000
heap
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
5C0000
heap
page read and write
440000
trusted library allocation
page read and write
2B46000
heap
page read and write
1B3C3DF0000
trusted library allocation
page read and write
FB0000
remote allocation
page read and write
70823FE000
stack
page read and write
9BDDF7C000
stack
page read and write
3040000
remote allocation
page read and write
30000
heap
page read and write
DEE000
stack
page read and write
D00000
remote allocation
page read and write
EC0000
heap
page read and write
D0D000
stack
page read and write
1E1CF590000
trusted library allocation
page read and write
47E000
stack
page read and write
34A0000
trusted library allocation
page read and write
67C000
stack
page read and write
57D000
heap
page read and write
1401B840000
heap
page read and write
440000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
2EEB000
heap
page read and write
530000
heap
page read and write
2D30000
heap
page read and write
7030000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
613000
heap
page read and write
97F0000
trusted library allocation
page read and write
7D0000
remote allocation
page read and write
FAE000
stack
page read and write
33A1000
heap
page read and write
36A0000
heap
page read and write
560000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
61F000
heap
page read and write
AD0000
heap
page read and write
59E000
stack
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
691000
heap
page read and write
7D0000
remote allocation
page read and write
1E1CF550000
trusted library allocation
page read and write
42E000
unkown
page readonly
72E2000
trusted library allocation
page read and write
1401B800000
heap
page read and write
3C30000
trusted library allocation
page read and write
2B00000
heap
page read and write
6275BFE000
stack
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
401000
unkown
page execute read
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
5E0000
heap
page read and write
525000
heap
page read and write
402000
unkown
page execute and write copy
3F20000
trusted library allocation
page read and write
34DE000
stack
page read and write
602000
heap
page read and write
9C000
stack
page read and write
A0B0000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
1B3C3DC0000
heap
page read and write
440000
trusted library allocation
page read and write
E7E000
stack
page read and write
61F000
heap
page read and write
A0B0000
trusted library allocation
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
51E000
heap
page read and write
61F000
heap
page read and write
23F98CE0000
trusted library allocation
page read and write
3310000
heap
page read and write
62C000
heap
page read and write
628000
heap
page read and write
23F98DA0000
remote allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
63A000
heap
page read and write
3C30000
trusted library allocation
page read and write
21B0000
heap
page read and write
700F000
stack
page read and write
3C30000
trusted library allocation
page read and write
18338C5B000
heap
page read and write
440000
trusted library allocation
page read and write
56F000
heap
page read and write
23F9725C000
heap
page read and write
6F5000
heap
page read and write
710000
trusted library allocation
page read and write
1401B842000
heap
page read and write
440000
trusted library allocation
page read and write
62C000
heap
page read and write
3B51000
trusted library allocation
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
3C30000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
55D3000
heap
page read and write
5410000
heap
page read and write
400000
unkown
page readonly
1694E83D000
heap
page read and write
24224868000
heap
page read and write
9C0000
heap
page read and write
578000
heap
page read and write
19C000
stack
page read and write
402000
unkown
page execute and write copy
9D10000
trusted library allocation
page read and write
1E1CF990000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
33A1000
heap
page read and write
C20000
heap
page read and write
440000
trusted library allocation
page read and write
24224802000
heap
page read and write
613000
heap
page read and write
3C30000
trusted library allocation
page read and write
30000
heap
page read and write
24224902000
heap
page read and write
22F0000
trusted library allocation
page read and write
BBA000
heap
page read and write
3C30000
trusted library allocation
page read and write
5520000
heap
page read and write
2BD0000
trusted library allocation
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
578000
heap
page read and write
61F000
heap
page read and write
21B4000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
5553000
heap
page read and write
18D6C440000
heap
page read and write
1E1CAB01000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
9EF000
stack
page read and write
572000
heap
page read and write
57D000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
24225002000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
57D000
heap
page read and write
39D0000
trusted library allocation
page read and write
21C9000
heap
page read and write
61F000
heap
page read and write
8BF000
stack
page read and write
440000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
62C000
heap
page read and write
53DE000
stack
page read and write
3CF0000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
3C0000
heap
page read and write
5C0000
trusted library allocation
page execute read
3255000
heap
page read and write
30000
heap
page read and write
22A0000
heap
page read and write
CB0000
heap
page read and write
440000
trusted library allocation
page read and write
2220000
trusted library allocation
page read and write
93FD000
stack
page read and write
232E000
stack
page read and write
2401000
trusted library allocation
page read and write
E00000
remote allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
39D0000
trusted library allocation
page read and write
33E0000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
23F9724C000
heap
page read and write
440000
trusted library allocation
page read and write
F1E000
stack
page read and write
24224913000
heap
page read and write
610000
heap
page read and write
61F000
heap
page read and write
242245D0000
heap
page read and write
7047000
trusted library allocation
page execute and read and write
A0B0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2E3E000
stack
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
62C000
heap
page read and write
4CD157B000
stack
page read and write
8FE000
stack
page read and write
61F000
heap
page read and write
3098000
heap
page read and write
2200000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
36A927E000
stack
page read and write
3BAE000
stack
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
33A1000
heap
page read and write
62C000
heap
page read and write
59B000
heap
page read and write
62C000
heap
page read and write
401000
unkown
page execute and write copy
34A0000
trusted library allocation
page read and write
6F5000
heap
page read and write
62C000
heap
page read and write
5589000
heap
page read and write
3400000
trusted library allocation
page read and write
872000
trusted library allocation
page read and write
1E1CA815000
heap
page read and write
22D0000
heap
page read and write
3C30000
trusted library allocation
page read and write
C10000
heap
page read and write
224D000
stack
page read and write
E00000
remote allocation
page read and write
62C000
heap
page read and write
2F40000
heap
page read and write
3C30000
trusted library allocation
page read and write
BFF000
stack
page read and write
62C000
heap
page read and write
7081F7D000
stack
page read and write
7AD000
stack
page read and write
1401B856000
heap
page read and write
62C000
heap
page read and write
401000
unkown
page execute and read and write
4CD1A7F000
stack
page read and write
396D000
stack
page read and write
33A1000
heap
page read and write
39D0000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
3C30000
trusted library allocation
page read and write
63E000
heap
page read and write
61F000
heap
page read and write
C38000
heap
page read and write
33A1000
heap
page read and write
CA0000
heap
page read and write
1B3C3E13000
heap
page read and write
61F000
heap
page read and write
5E0000
heap
page read and write
33A1000
heap
page read and write
6F6000
heap
page read and write
61F000
heap
page read and write
2500000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
325D000
stack
page read and write
6F5000
heap
page read and write
2B41000
heap
page read and write
63B000
heap
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
55E9000
heap
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
731F000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
61F000
heap
page read and write
401000
unkown
page execute and write copy
7042000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
6C1000
heap
page read and write
2A97000
trusted library allocation
page read and write
61F000
heap
page read and write
1401B862000
heap
page read and write
560000
trusted library allocation
page read and write
E00000
remote allocation
page read and write
18338C57000
heap
page read and write
62C000
heap
page read and write
61F000
heap
page read and write
3560000
remote allocation
page read and write
300E000
stack
page read and write
777000
heap
page read and write
F20000
heap
page read and write
3F0000
trusted library allocation
page read and write
61F000
heap
page read and write
1B3C3E40000
heap
page read and write
620000
heap
page read and write
3050000
heap
page read and write
440000
trusted library allocation
page read and write
735000
heap
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
340F000
stack
page read and write
B80000
remote allocation
page read and write
575000
heap
page read and write
613000
heap
page read and write
440000
trusted library allocation
page read and write
30000
heap
page read and write
4CD177E000
stack
page read and write
1B3C3E5E000
heap
page read and write
87C000
stack
page read and write
1B3C3D60000
heap
page read and write
5F0000
heap
page read and write
18338C7A000
heap
page read and write
649000
heap
page read and write
62C000
heap
page read and write
3560000
remote allocation
page read and write
440000
trusted library allocation
page read and write
330F000
stack
page read and write
2501000
trusted library allocation
page read and write
42E000
unkown
page readonly
1694E847000
heap
page read and write
2BAE000
stack
page read and write
440000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
620000
heap
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
20D0000
trusted library allocation
page read and write
58B6000
heap
page read and write
84E000
stack
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
1B3C3E57000
heap
page read and write
960000
heap
page read and write
39D0000
trusted library allocation
page read and write
61F000
heap
page read and write
72EE000
trusted library allocation
page read and write
6B8000
heap
page read and write
3CF0000
trusted library allocation
page read and write
84E000
stack
page read and write
9A000
stack
page read and write
39D0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
402000
unkown
page execute and write copy
401000
unkown
page execute and read and write
613000
heap
page read and write
21E0000
heap
page read and write
242245E0000
heap
page read and write
3C30000
trusted library allocation
page read and write
24224740000
trusted library allocation
page read and write
691000
heap
page read and write
BFF000
stack
page read and write
6D5000
heap
page read and write
9A000
stack
page read and write
3440000
heap
page read and write
55E1000
heap
page read and write
82E000
trusted library allocation
page read and write
A80000
remote allocation
page read and write
61F000
heap
page read and write
A3D000
stack
page read and write
995000
heap
page read and write
41F000
unkown
page read and write
34A0000
trusted library allocation
page read and write
1694E802000
heap
page read and write
39D0000
trusted library allocation
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
32D0000
remote allocation
page read and write
1E1CA802000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
2E01000
trusted library allocation
page read and write
1E1CF61F000
heap
page read and write
F2D000
stack
page read and write
18339602000
trusted library allocation
page read and write
98D000
stack
page read and write
4CD19FF000
stack
page read and write
5310000
remote allocation
page read and write
23F97200000
heap
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
3250000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
2B34000
heap
page read and write
1E1CF600000
heap
page read and write
B60000
trusted library allocation
page read and write
2B40000
direct allocation
page execute and read and write
3B3B000
trusted library allocation
page read and write
1E1CF6A1000
heap
page read and write
9810000
heap
page execute and read and write
3B24000
trusted library allocation
page read and write
23F98C90000
trusted library allocation
page read and write
57D000
heap
page read and write
308F000
stack
page read and write
440000
trusted library allocation
page read and write
5D0000
trusted library allocation
page execute read
1401B86E000
heap
page read and write
62C000
heap
page read and write
C8D000
stack
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
73C000
stack
page read and write
42E000
unkown
page readonly
560000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
AD0000
remote allocation
page read and write
2160000
trusted library allocation
page read and write
A7C000
stack
page read and write
1401B855000
heap
page read and write
9740000
heap
page read and write
61F000
heap
page read and write
3F20000
trusted library allocation
page read and write
75A000
heap
page read and write
61F000
heap
page read and write
7221000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
61F000
heap
page read and write
560000
trusted library allocation
page read and write
94099FF000
stack
page read and write
401000
unkown
page execute and read and write
63E000
heap
page read and write
21F0000
heap
page read and write
21D9000
heap
page read and write
7081DFF000
stack
page read and write
B5E000
stack
page read and write
39D0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
9BDDB7F000
stack
page read and write
62C000
heap
page read and write
3CF0000
trusted library allocation
page read and write
613000
heap
page read and write
3B3B000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
1E1C9FD0000
trusted library section
page read and write
401000
unkown
page execute and write copy
9BDD97F000
stack
page read and write
3C30000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
613000
heap
page read and write
568000
heap
page read and write
9800000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
23F98DA0000
remote allocation
page read and write
51E000
heap
page read and write
72F3000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
1401B831000
heap
page read and write
440000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
33A1000
heap
page read and write
3270000
trusted library allocation
page read and write
579000
heap
page read and write
33A1000
heap
page read and write
D25000
heap
page read and write
ACD000
stack
page read and write
7013000
trusted library allocation
page execute and read and write
62C000
heap
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
61F000
heap
page read and write
2EAF000
stack
page read and write
61F000
heap
page read and write
9800000
trusted library allocation
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
4CD167A000
stack
page read and write
B80000
remote allocation
page read and write
1E1D0000000
heap
page read and write
440000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
3B52000
trusted library allocation
page read and write
9BDDC7C000
stack
page read and write
2AB0000
trusted library allocation
page read and write
1E1CF665000
heap
page read and write
1E1CA7D1000
trusted library allocation
page read and write
A55000
heap
page read and write
33A1000
heap
page read and write
A80000
remote allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
1401B85C000
heap
page read and write
DD0000
remote allocation
page read and write
23F98D20000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
A1E0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
546000
heap
page read and write
3B24000
trusted library allocation
page read and write
36A937E000
stack
page read and write
61F000
heap
page read and write
2190000
heap
page read and write
3CF0000
trusted library allocation
page read and write
613000
heap
page read and write
80D000
stack
page read and write
440000
trusted library allocation
page read and write
613000
heap
page read and write
2100000
heap
page read and write
1694F002000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
30000
heap
page read and write
42C000
unkown
page read and write
440000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
61F000
heap
page read and write
1E1CB170000
trusted library section
page readonly
323C000
stack
page read and write
9E5D000
stack
page read and write
440000
trusted library allocation
page read and write
70822FD000
stack
page read and write
2A0000
heap
page read and write
52A000
heap
page read and write
A0F0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
D2E000
stack
page read and write
440000
trusted library allocation
page read and write
C4A000
heap
page read and write
B4E000
stack
page read and write
546000
heap
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
61F000
heap
page read and write
A0B0000
trusted library allocation
page read and write
575000
heap
page read and write
5510000
trusted library allocation
page read and write
7081E7C000
stack
page read and write
2180000
unkown
page read and write
61F000
heap
page read and write
7210000
heap
page read and write
21D0000
trusted library allocation
page read and write
42E000
unkown
page readonly
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
545000
heap
page read and write
6BC000
heap
page read and write
3C30000
trusted library allocation
page read and write
33A1000
heap
page read and write
1E1CF9C0000
remote allocation
page read and write
440000
trusted library allocation
page read and write
6C4000
heap
page read and write
61F000
heap
page read and write
39D0000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
5D0000
heap
page read and write
440000
trusted library allocation
page read and write
565000
heap
page read and write
1401B7C0000
trusted library allocation
page read and write
2210000
heap
page read and write
613000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
613000
heap
page read and write
1401B858000
heap
page read and write
A0B0000
trusted library allocation
page read and write
571F000
stack
page read and write
34A0000
trusted library allocation
page read and write
7314000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
18D6C513000
heap
page read and write
2F20000
heap
page read and write
56E000
stack
page read and write
440000
trusted library allocation
page read and write
D00000
remote allocation
page read and write
303B000
heap
page read and write
9A3567C000
stack
page read and write
B0E000
stack
page read and write
62C000
heap
page read and write
39D0000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page read and write
1E1CF4D0000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
568000
heap
page read and write
567000
heap
page read and write
B7D000
stack
page read and write
61F000
heap
page read and write
4CD1478000
stack
page read and write
389E000
stack
page read and write
5CA40FF000
stack
page read and write
DD0000
heap
page read and write
613000
heap
page read and write
A4E000
stack
page read and write
9F5F000
stack
page read and write
578000
heap
page read and write
304E000
stack
page read and write
F8D000
stack
page read and write
63E000
heap
page read and write
4D1000
heap
page read and write
1E1CB120000
trusted library section
page readonly
A0B0000
trusted library allocation
page read and write
33DF000
stack
page read and write
21C0000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
613000
heap
page read and write
6F5000
heap
page read and write
9409F7E000
stack
page read and write
560000
trusted library allocation
page read and write
98F000
stack
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
1694E852000
heap
page read and write
FB0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
1E1CA08D000
heap
page read and write
3C30000
trusted library allocation
page read and write
22D0000
heap
page read and write
336E000
stack
page read and write
440000
trusted library allocation
page read and write
33D8000
heap
page read and write
1694E81F000
heap
page read and write
ADD000
stack
page read and write
30000
heap
page read and write
CCC000
stack
page read and write
1F0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
18338C55000
heap
page read and write
6F5000
heap
page read and write
62C000
heap
page read and write
7BF000
stack
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
2B49000
heap
page read and write
18D6C502000
heap
page read and write
2280000
heap
page read and write
21A0000
trusted library allocation
page execute read
33A1000
heap
page read and write
699000
heap
page read and write
440000
trusted library allocation
page read and write
A9D000
stack
page read and write
32D0000
heap
page read and write
340A000
heap
page read and write
A100000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
33E1000
heap
page read and write
3485000
heap
page read and write
69A000
heap
page read and write
22E0000
heap
page read and write
1401B902000
heap
page read and write
61F000
heap
page read and write
3B41000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
64E000
heap
page read and write
61F000
heap
page read and write
1401B813000
heap
page read and write
577000
heap
page read and write
440000
trusted library allocation
page read and write
399F000
stack
page read and write
3B21000
trusted library allocation
page read and write
4F80000
trusted library allocation
page readonly
62759FF000
stack
page read and write
440000
trusted library allocation
page read and write
6F0000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
34C000
stack
page read and write
33A1000
heap
page read and write
B90000
heap
page read and write
613000
heap
page read and write
440000
trusted library allocation
page read and write
34BE000
stack
page read and write
440000
trusted library allocation
page read and write
4CD127C000
stack
page read and write
613000
heap
page read and write
1694E6B0000
heap
page read and write
A0B0000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
5FD000
stack
page read and write
9B000
stack
page read and write
33A1000
heap
page read and write
62C000
heap
page read and write
3C30000
trusted library allocation
page read and write
C60000
heap
page read and write
59B000
heap
page read and write
600000
trusted library allocation
page read and write
1E1CB040000
trusted library allocation
page read and write
1E1CF570000
trusted library allocation
page read and write
23F97302000
heap
page read and write
39D0000
trusted library allocation
page read and write
1401B873000
heap
page read and write
3F20000
trusted library allocation
page read and write
18338C76000
heap
page read and write
541000
heap
page read and write
34A0000
trusted library allocation
page read and write
30000
heap
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
613000
heap
page read and write
655000
heap
page read and write
18338C00000
heap
page read and write
42E000
unkown
page readonly
440000
trusted library allocation
page read and write
577000
heap
page read and write
22E0000
trusted library allocation
page read and write
23F97300000
heap
page read and write
565000
heap
page read and write
62C000
heap
page read and write
3C30000
trusted library allocation
page read and write
FB0000
remote allocation
page read and write
B60000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
5D0000
heap
page read and write
440000
trusted library allocation
page read and write
678000
heap
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
3040000
heap
page read and write
FB0000
remote allocation
page read and write
440000
trusted library allocation
page read and write
6C1000
heap
page read and write
1E1CF6DD000
heap
page read and write
3F20000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page read and write
1E1CA900000
heap
page read and write
568000
heap
page read and write
7D0000
heap
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
560000
trusted library allocation
page read and write
33A1000
heap
page read and write
613000
heap
page read and write
DF0000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
783000
heap
page read and write
342E000
stack
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
2B30000
heap
page read and write
440000
trusted library allocation
page read and write
1E1CA057000
heap
page read and write
1401B846000
heap
page read and write
1401B85E000
heap
page read and write
63C000
heap
page read and write
400000
unkown
page readonly
2340000
heap
page read and write
3070000
heap
page read and write
83D000
stack
page read and write
7036000
trusted library allocation
page execute and read and write
8AF000
stack
page read and write
FAD000
stack
page read and write
E9E000
stack
page read and write
C1B000
heap
page read and write
3CF0000
trusted library allocation
page read and write
62C000
heap
page read and write
548000
heap
page read and write
62C000
heap
page read and write
39D0000
trusted library allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
3040000
remote allocation
page read and write
E8D000
stack
page read and write
400000
unkown
page readonly
440000
trusted library allocation
page read and write
1E1CF5D0000
trusted library allocation
page read and write
3240000
heap
page read and write
1401B6C0000
heap
page read and write
440000
trusted library allocation
page read and write
1B3C3D50000
heap
page read and write
19B000
stack
page read and write
2EE9000
heap
page read and write
61F000
heap
page read and write
97DD000
stack
page read and write
655000
heap
page read and write
61F000
heap
page read and write
B75000
heap
page read and write
71C0000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
402000
unkown
page execute and write copy
3B3B000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
7A3000
heap
page read and write
812000
trusted library allocation
page read and write
579000
heap
page read and write
5B0000
heap
page read and write
A50000
heap
page read and write
83D000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
1401B864000
heap
page read and write
3C30000
trusted library allocation
page read and write
63E000
heap
page read and write
6C4000
heap
page read and write
F60000
heap
page read and write
9F9E000
stack
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
E9E000
stack
page read and write
61F000
heap
page read and write
E15000
heap
page read and write
E20000
heap
page read and write
3F20000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
1E1CA078000
heap
page read and write
3C30000
trusted library allocation
page read and write
300E000
stack
page read and write
A0C0000
trusted library allocation
page read and write
FF3B0000
trusted library allocation
page execute and read and write
42E000
unkown
page readonly
2B2E000
stack
page read and write
440000
trusted library allocation
page read and write
A80000
heap
page read and write
568000
heap
page read and write
3CF0000
trusted library allocation
page read and write
E00000
heap
page read and write
5CA3DFE000
stack
page read and write
62C000
heap
page read and write
1E1CF702000
heap
page read and write
1E1CA09F000
heap
page read and write
3B0F000
stack
page read and write
61F000
heap
page read and write
3560000
remote allocation
page read and write
C30000
heap
page read and write
510000
heap
page read and write
730000
heap
page read and write
7D0000
remote allocation
page read and write
92FD000
stack
page read and write
440000
trusted library allocation
page read and write
2516000
trusted library allocation
page read and write
B10000
heap
page read and write
1694E82E000
heap
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
568000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
1E1CB140000
trusted library section
page readonly
21C0000
heap
page read and write
61F000
heap
page read and write
FB0000
remote allocation
page read and write
3C30000
trusted library allocation
page read and write
A80000
remote allocation
page read and write
33F0000
heap
page read and write
440000
trusted library allocation
page read and write
627527B000
stack
page read and write
655000
heap
page read and write
A0E0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2210000
heap
page read and write
3C30000
trusted library allocation
page read and write
709000
heap
page read and write
1E1CF980000
trusted library allocation
page read and write
56C000
heap
page read and write
23F97190000
heap
page read and write
302E000
stack
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
B60000
remote allocation
page read and write
440000
trusted library allocation
page read and write
EC8000
heap
page read and write
CFF000
stack
page read and write
33A1000
heap
page read and write
2290000
unkown
page read and write
18338B80000
heap
page read and write
440000
trusted library allocation
page read and write
55E000
stack
page read and write
7338000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
59A000
heap
page read and write
1E1CF9A0000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
703A000
trusted library allocation
page execute and read and write
440000
trusted library allocation
page read and write
324E000
stack
page read and write
B60000
remote allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
812000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
70820FD000
stack
page read and write
39D0000
trusted library allocation
page read and write
613000
heap
page read and write
33A1000
heap
page read and write
401000
unkown
page execute and read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
1E1CA0A1000
heap
page read and write
440000
trusted library allocation
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
420000
unkown
page readonly
51E000
heap
page read and write
2512000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
613000
heap
page read and write
9D10000
trusted library allocation
page read and write
C2F000
stack
page read and write
61F000
heap
page read and write
23F9723E000
heap
page read and write
613000
heap
page read and write
3B3D000
trusted library allocation
page read and write
655000
heap
page read and write
790000
heap
page read and write
42E000
unkown
page readonly
64E000
heap
page read and write
39D0000
trusted library allocation
page read and write
1E1CF560000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
E00000
remote allocation
page read and write
18D6C330000
heap
page read and write
62C000
heap
page read and write
36A8C8B000
stack
page read and write
61F000
heap
page read and write
613000
heap
page read and write
56A000
heap
page read and write
440000
trusted library allocation
page read and write
546000
heap
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
1E1CF6FD000
heap
page read and write
6EF000
stack
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
829000
trusted library allocation
page read and write
23F98E02000
trusted library allocation
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
3C30000
trusted library allocation
page read and write
24224640000
heap
page read and write
3B35000
trusted library allocation
page read and write
1E1CF700000
heap
page read and write
D95000
heap
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
A1F000
stack
page read and write
440000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
1401C002000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
62C000
heap
page read and write
339B000
stack
page read and write
30A4000
heap
page read and write
18D6C3C0000
trusted library allocation
page read and write
56C000
heap
page read and write
3C30000
trusted library allocation
page read and write
1401B650000
heap
page read and write
850000
heap
page read and write
440000
trusted library allocation
page read and write
1694E84B000
heap
page read and write
1E1CA041000
heap
page read and write
C30000
trusted library allocation
page read and write
36A8D8E000
stack
page read and write
4FED000
stack
page read and write
61F000
heap
page read and write
570000
heap
page read and write
6F5000
heap
page read and write
3C30000
trusted library allocation
page read and write
71E0000
heap
page execute and read and write
1E1CF62D000
heap
page read and write
6F5000
heap
page read and write
613000
heap
page read and write
D60000
heap
page read and write
1E1CA05A000
heap
page read and write
440000
trusted library allocation
page read and write
2AA0000
heap
page read and write
18338BE0000
heap
page read and write
9A35C7E000
stack
page read and write
61F000
heap
page read and write
690000
heap
page read and write
553000
heap
page read and write
34A0000
trusted library allocation
page read and write
61F000
heap
page read and write
55E000
stack
page read and write
61F000
heap
page read and write
7081D7C000
stack
page read and write
63E000
heap
page read and write
9A8E000
stack
page read and write
859000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3F1E000
stack
page read and write
440000
trusted library allocation
page read and write
62758FF000
stack
page read and write
9ACE000
stack
page read and write
2DD0000
unkown
page read and write
2EE0000
heap
page read and write
3F20000
trusted library allocation
page read and write
375E000
stack
page read and write
3AAD000
stack
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
901000
trusted library allocation
page read and write
D20000
heap
page read and write
600000
heap
page read and write
22E0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
5CA41FE000
stack
page read and write
A0B0000
trusted library allocation
page execute and read and write
1E1CF90E000
trusted library allocation
page read and write
B70000
heap
page read and write
2AEE000
stack
page read and write
62C000
heap
page read and write
6B8000
heap
page read and write
1401B863000
heap
page read and write
3F20000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
1401B829000
heap
page read and write
5336000
remote allocation
page execute and read and write
578000
heap
page read and write
A0D0000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
61F000
heap
page read and write
553000
heap
page read and write
199000
stack
page read and write
3C30000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
3560000
heap
page read and write
3C30000
trusted library allocation
page read and write
23F9722A000
heap
page read and write
33A1000
heap
page read and write
1694EFA0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
7BE000
stack
page read and write
21D9000
heap
page read and write
1401B883000
heap
page read and write
440000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
70821FE000
stack
page read and write
39D0000
trusted library allocation
page read and write
30AB000
heap
page read and write
3F20000
trusted library allocation
page read and write
2512000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
7E0000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
2EC0000
heap
page read and write
1E1CF5A0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
6F5000
heap
page read and write
61F000
heap
page read and write
3CF0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
E10000
heap
page read and write
39D0000
remote allocation
page read and write
23F9725D000
heap
page read and write
1694E700000
heap
page read and write
1E1CF9C0000
remote allocation
page read and write
62C000
heap
page read and write
1E1C9E50000
heap
page read and write
23F0000
heap
page read and write
59B000
heap
page read and write
3B26000
trusted library allocation
page read and write
3480000
heap
page read and write
61F000
heap
page read and write
3DE0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
23F9724D000
heap
page read and write
440000
trusted library allocation
page read and write
23A0000
trusted library allocation
page read and write
23B0000
trusted library allocation
page execute read
385F000
stack
page read and write
3C30000
trusted library allocation
page read and write
400000
unkown
page readonly
510000
heap
page read and write
2FD0000
heap
page read and write
33A1000
heap
page read and write
E00000
remote allocation
page read and write
2C8E000
stack
page read and write
800000
trusted library allocation
page read and write
520000
heap
page read and write
CDE000
stack
page read and write
649000
heap
page read and write
59B000
heap
page read and write
1401B85A000
heap
page read and write
61F000
heap
page read and write
440000
heap
page read and write
6275AFE000
stack
page read and write
61F000
heap
page read and write
3580000
heap
page read and write
63B000
heap
page read and write
61F000
heap
page read and write
18338C40000
heap
page read and write
4BE000
stack
page read and write
24224864000
heap
page read and write
CAE000
stack
page read and write
400000
unkown
page readonly
3B35000
trusted library allocation
page read and write
3BEE000
stack
page read and write
A0B0000
trusted library allocation
page read and write
F6E000
stack
page read and write
613000
heap
page read and write
3A6E000
stack
page read and write
837000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
33A1000
heap
page read and write
32D0000
heap
page read and write
3F20000
trusted library allocation
page read and write
61F000
heap
page read and write
BBC000
stack
page read and write
735000
heap
page read and write
19C000
stack
page read and write
440000
trusted library allocation
page read and write
23F97202000
heap
page read and write
61F000
heap
page read and write
A0C0000
trusted library allocation
page read and write
33A1000
heap
page read and write
51E000
heap
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
D1F000
stack
page read and write
440000
trusted library allocation
page read and write
95D000
stack
page read and write
3B36000
trusted library allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
7A3000
heap
page read and write
33A1000
heap
page read and write
1E1CA000000
heap
page read and write
19A000
stack
page read and write
1401B83C000
heap
page read and write
560000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
19C000
stack
page read and write
61F000
heap
page read and write
18338C13000
heap
page read and write
440000
trusted library allocation
page read and write
6AD000
heap
page read and write
440000
trusted library allocation
page read and write
9D10000
trusted library allocation
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
BA0000
heap
page read and write
560000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
3C30000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
62C000
heap
page read and write
1E1CA073000
heap
page read and write
440000
trusted library allocation
page read and write
869000
trusted library allocation
page read and write
576000
heap
page read and write
7A7000
heap
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
23A0000
heap
page read and write
613000
heap
page read and write
7060000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
35FE000
stack
page read and write
708174C000
stack
page read and write
520000
heap
page read and write
42C000
unkown
page read and write
D00000
remote allocation
page read and write
2F8F000
stack
page read and write
2401000
trusted library allocation
page read and write
E00000
heap
page read and write
3F20000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
91F000
stack
page read and write
9A000
stack
page read and write
62C000
heap
page read and write
B3F000
stack
page read and write
3DE0000
trusted library allocation
page read and write
1401B860000
heap
page read and write
9B000
stack
page read and write
18D6C429000
heap
page read and write
6C2000
heap
page read and write
A0C0000
trusted library allocation
page read and write
63E000
heap
page read and write
440000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
9F0000
heap
page read and write
2960000
trusted library allocation
page read and write
4F70000
heap
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
58B0000
heap
page read and write
4CD187B000
stack
page read and write
63A000
heap
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
979D000
stack
page read and write
A0B0000
trusted library allocation
page read and write
4E3000
heap
page read and write
A110000
trusted library allocation
page read and write
33AE000
stack
page read and write
62C000
heap
page read and write
613000
heap
page read and write
2FE0000
trusted library allocation
page read and write
9A000
stack
page read and write
39D0000
trusted library allocation
page read and write
33A1000
heap
page read and write
1401B86A000
heap
page read and write
2180000
unkown
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
1B3C3F02000
heap
page read and write
33A1000
heap
page read and write
63D000
stack
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
DC0000
remote allocation
page read and write
670000
trusted library allocation
page execute read
42C000
unkown
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
9CE000
stack
page read and write
3C30000
trusted library allocation
page read and write
9D0F000
stack
page read and write
39D0000
trusted library allocation
page read and write
62756FD000
stack
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
99C000
stack
page read and write
3300000
trusted library allocation
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
400000
unkown
page readonly
31A5000
heap
page read and write
9A35B7E000
stack
page read and write
440000
trusted library allocation
page read and write
2B09000
heap
page read and write
325F000
stack
page read and write
39D0000
trusted library allocation
page read and write
2422485A000
heap
page read and write
1F0000
heap
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page read and write
24224840000
heap
page read and write
A0B0000
trusted library allocation
page read and write
61F000
heap
page read and write
19B000
stack
page read and write
71F0000
trusted library allocation
page read and write
572000
heap
page read and write
52F9000
stack
page read and write
1E1CA902000
heap
page read and write
3C30000
trusted library allocation
page read and write
7332000
trusted library allocation
page read and write
1694E800000
heap
page read and write
613000
heap
page read and write
2200000
trusted library allocation
page read and write
42C000
unkown
page read and write
51E000
heap
page read and write
6BB000
heap
page read and write
3160000
heap
page read and write
36A0000
remote allocation
page read and write
71AF000
stack
page read and write
440000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
400000
unkown
page readonly
440000
trusted library allocation
page read and write
30D000
stack
page read and write
A0F000
stack
page read and write
61F000
heap
page read and write
3ED000
stack
page read and write
361E000
stack
page read and write
1E1CF9C0000
remote allocation
page read and write
DD8000
heap
page read and write
C00000
heap
page read and write
590000
heap
page read and write
1E1CA913000
heap
page read and write
D4D000
stack
page read and write
2230000
heap
page read and write
62C000
heap
page read and write
70E000
stack
page read and write
704B000
trusted library allocation
page execute and read and write
5400000
heap
page read and write
613000
heap
page read and write
33A1000
heap
page read and write
62C000
heap
page read and write
3B3B000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
77F000
stack
page read and write
9409CFF000
stack
page read and write
E00000
remote allocation
page read and write
23F98DA0000
remote allocation
page read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
901000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
62C000
heap
page read and write
5545000
heap
page read and write
33A1000
heap
page read and write
21D6000
heap
page read and write
3C30000
trusted library allocation
page read and write
18338B70000
heap
page read and write
5D4000
heap
page read and write
440000
trusted library allocation
page read and write
ED5000
heap
page read and write
51E000
heap
page read and write
9800000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
1E1CA800000
heap
page read and write
AD0000
heap
page read and write
33A1000
heap
page read and write
825000
trusted library allocation
page read and write
5CA3EF9000
stack
page read and write
61F000
heap
page read and write
9BDDE7E000
stack
page read and write
1E1CF970000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
8EE000
stack
page read and write
39D0000
trusted library allocation
page read and write
1E1CA7F3000
trusted library allocation
page read and write
2B40000
trusted library section
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
3A0E000
stack
page read and write
A0C0000
trusted library allocation
page read and write
68A000
heap
page read and write
440000
trusted library allocation
page read and write
359E000
stack
page read and write
42E000
unkown
page readonly
3040000
remote allocation
page read and write
1E1CF6C0000
heap
page read and write
5B0000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
5B0000
heap
page read and write
A0C0000
trusted library allocation
page read and write
23F97224000
heap
page read and write
750000
heap
page read and write
68D000
stack
page read and write
613000
heap
page read and write
A0F0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
61F000
heap
page read and write
2BB0000
trusted library allocation
page read and write
9A3597B000
stack
page read and write
AFF000
stack
page read and write
3C30000
trusted library allocation
page read and write
400000
unkown
page readonly
1F0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
30000
heap
page read and write
97E0000
trusted library allocation
page read and write
F55000
heap
page read and write
61F000
heap
page read and write
1F0000
trusted library allocation
page read and write
62C000
heap
page read and write
35DF000
stack
page read and write
3CF0000
trusted library allocation
page read and write
18D6CF00000
heap
page read and write
D3E000
stack
page read and write
33A1000
heap
page read and write
F20000
trusted library allocation
page read and write
24224879000
heap
page read and write
810000
trusted library allocation
page read and write
2209000
heap
page read and write
18D6C4C4000
heap
page read and write
6B8000
heap
page read and write
7A6000
heap
page read and write
1401B861000
heap
page read and write
329C000
stack
page read and write
DC0000
remote allocation
page read and write
62757FE000
stack
page read and write
696000
heap
page read and write
440000
trusted library allocation
page read and write
3CF0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
23F97180000
heap
page read and write
655000
heap
page read and write
18338D13000
heap
page read and write
39D0000
trusted library allocation
page read and write
35A0000
heap
page read and write
62C000
heap
page read and write
1E1CB4C0000
trusted library allocation
page read and write
2DAF000
stack
page read and write
613000
heap
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
56C000
heap
page read and write
1E1CF540000
trusted library allocation
page read and write
635000
heap
page read and write
18D6C470000
heap
page read and write
EDB000
heap
page read and write
655000
heap
page read and write
1401B869000
heap
page read and write
4CD1AFF000
stack
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
5CA3FFC000
stack
page read and write
4B0000
heap
page read and write
1401B660000
heap
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
62755FF000
stack
page read and write
440000
trusted library allocation
page read and write
1694E902000
heap
page read and write
9FF000
stack
page read and write
440000
trusted library allocation
page read and write
32F5000
heap
page read and write
3F20000
trusted library allocation
page read and write
1E1CF560000
trusted library allocation
page read and write
1401B86C000
heap
page read and write
C08000
heap
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
630000
heap
page read and write
3C30000
trusted library allocation
page read and write
858000
heap
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
36A0000
remote allocation
page read and write
36A917F000
stack
page read and write
39D0000
trusted library allocation
page read and write
9409A7E000
stack
page read and write
FB0000
remote allocation
page read and write
62C000
heap
page read and write
440000
trusted library allocation
page read and write
7EC000
stack
page read and write
22D0000
heap
page read and write
82E000
trusted library allocation
page read and write
1401B841000
heap
page read and write
1E1CA0FF000
heap
page read and write
57D000
heap
page read and write
401000
unkown
page execute and write copy
440000
trusted library allocation
page read and write
EA8000
heap
page read and write
7FD000
stack
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
2B50000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
33A1000
heap
page read and write
329B000
stack
page read and write
1E1CF6A6000
heap
page read and write
613000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2210000
heap
page read and write
2190000
heap
page read and write
613000
heap
page read and write
61B000
heap
page read and write
613000
heap
page read and write
39D0000
trusted library allocation
page read and write
24224813000
heap
page read and write
E00000
heap
page read and write
2270000
heap
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
1E1CF924000
trusted library allocation
page read and write
56C000
heap
page read and write
33A0000
heap
page read and write
32F0000
heap
page read and write
23B0000
trusted library allocation
page execute read
42E000
unkown
page readonly
1401B85F000
heap
page read and write
613000
heap
page read and write
9CF000
stack
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
E3E000
stack
page read and write
579000
heap
page read and write
371F000
stack
page read and write
1E1CA0B0000
heap
page read and write
400000
unkown
page readonly
1E1CF612000
heap
page read and write
61F000
heap
page read and write
A20000
heap
page read and write
A110000
trusted library allocation
page read and write
33A1000
heap
page read and write
440000
trusted library allocation
page read and write
23F9724B000
heap
page read and write
2270000
heap
page read and write
A0B0000
trusted library allocation
page read and write
61F000
heap
page read and write
3317000
heap
page read and write
8221000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
A0A0000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
A3D000
stack
page read and write
599000
heap
page read and write
4CD197E000
stack
page read and write
61F000
heap
page read and write
400000
unkown
page readonly
3C30000
trusted library allocation
page read and write
23F0000
heap
page read and write
D10000
heap
page read and write
61F000
heap
page read and write
62C000
heap
page read and write
18D6C4BC000
heap
page read and write
5E0000
heap
page read and write
6A3000
heap
page read and write
440000
trusted library allocation
page read and write
9A35A7F000
stack
page read and write
7200000
trusted library allocation
page read and write
771000
heap
page read and write
1F0000
trusted library allocation
page read and write
18D6CE02000
heap
page read and write
2BA0000
heap
page read and write
9409DFD000
stack
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
BFE000
stack
page read and write
2230000
unkown
page read and write
64F000
heap
page read and write
61F000
heap
page read and write
6F5000
heap
page read and write
2BAE000
stack
page read and write
853000
trusted library allocation
page read and write
504000
heap
page read and write
998D000
stack
page read and write
A0D0000
trusted library allocation
page read and write
5E0000
heap
page read and write
3C30000
trusted library allocation
page read and write
3030000
heap
page read and write
627507B000
stack
page read and write
D70000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
400000
unkown
page readonly
3CF0000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
4A0000
trusted library allocation
page execute read
A0D0000
trusted library allocation
page read and write
1E1CB160000
trusted library section
page readonly
5F0000
heap
page read and write
940952C000
stack
page read and write
440000
trusted library allocation
page read and write
578000
heap
page read and write
61F000
heap
page read and write
C7E000
stack
page read and write
440000
trusted library allocation
page read and write
64A000
heap
page read and write
1B3C4690000
remote allocation
page read and write
9409C7D000
stack
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
1401B87D000
heap
page read and write
33A1000
heap
page read and write
33A1000
heap
page read and write
402000
unkown
page execute and write copy
2214000
heap
page read and write
9D20000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
A0B0000
trusted library allocation
page read and write
6CC000
stack
page read and write
33A1000
heap
page read and write
55E000
stack
page read and write
61F000
heap
page read and write
1B3C4802000
trusted library allocation
page read and write
613000
heap
page read and write
9CD000
stack
page read and write
33A1000
heap
page read and write
4B8000
heap
page read and write
61F000
heap
page read and write
A0B0000
trusted library allocation
page read and write
31A0000
heap
page read and write
613000
heap
page read and write
3CF0000
trusted library allocation
page read and write
7DE000
stack
page read and write
1E1CF921000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
8F0000
heap
page read and write
1B3C4690000
remote allocation
page read and write
3E1D000
stack
page read and write
EA0000
heap
page read and write
56C000
heap
page read and write
A0B0000
trusted library allocation
page read and write
3190000
heap
page read and write
731A000
trusted library allocation
page read and write
56A000
heap
page read and write
39D0000
trusted library allocation
page read and write
613000
heap
page read and write
1B3C4690000
remote allocation
page read and write
61F000
heap
page read and write
655000
heap
page read and write
CED000
stack
page read and write
3400000
trusted library allocation
page read and write
1E1CA013000
heap
page read and write
AFF000
stack
page read and write
2B49000
heap
page read and write
7081B7E000
stack
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
4CD1B7E000
stack
page read and write
39D0000
trusted library allocation
page read and write
6C2000
heap
page read and write
6C4000
heap
page read and write
333E000
stack
page read and write
2FE0000
heap
page read and write
400000
unkown
page readonly
A100000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
A1F0000
trusted library allocation
page read and write
36A8D0E000
stack
page read and write
1E1C9E60000
heap
page read and write
61F000
heap
page read and write
440000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
B10000
heap
page read and write
A30000
heap
page read and write
FB0000
trusted library allocation
page read and write
61F000
heap
page read and write
8229000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
1E1CA093000
heap
page read and write
24224800000
heap
page read and write
AD0000
remote allocation
page read and write
33A1000
heap
page read and write
62753FF000
stack
page read and write
9740000
trusted library allocation
page read and write
1E1CF6F5000
heap
page read and write
33A1000
heap
page read and write
3C30000
trusted library allocation
page read and write
54E000
stack
page read and write
61F000
heap
page read and write
DE5000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
61F000
heap
page read and write
401000
unkown
page execute and write copy
440000
trusted library allocation
page read and write
BA8000
heap
page read and write
2280000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
42E000
unkown
page readonly
42E000
unkown
page readonly
1401B867000
heap
page read and write
613000
heap
page read and write
3C30000
trusted library allocation
page read and write
2B40000
heap
page read and write
61F000
heap
page read and write
9800000
trusted library allocation
page read and write
2E7F000
stack
page read and write
228E000
stack
page read and write
61F000
heap
page read and write
18D6C488000
heap
page read and write
61F000
heap
page read and write
1E1CF900000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2BEF000
stack
page read and write
1694E813000
heap
page read and write
3C30000
trusted library allocation
page read and write
18D6C4E2000
heap
page read and write
59B000
heap
page read and write
61F000
heap
page read and write
627000
heap
page read and write
440000
trusted library allocation
page read and write
38FF000
stack
page read and write
520000
heap
page read and write
24224828000
heap
page read and write
63E000
heap
page read and write
21A0000
trusted library allocation
page execute read
A0E0000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
613000
heap
page read and write
62C000
heap
page read and write
7AE000
heap
page read and write
21D0000
heap
page read and write
23F97269000
heap
page read and write
613000
heap
page read and write
63B000
heap
page read and write
61F000
heap
page read and write
1E1CA029000
heap
page read and write
1E1C9FC0000
trusted library allocation
page read and write
9BCF000
stack
page read and write
730000
heap
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
5415000
heap
page read and write
71D0000
trusted library allocation
page read and write
61F000
heap
page read and write
42E000
unkown
page readonly
34A0000
trusted library allocation
page read and write
5B0000
heap
page read and write
3447000
heap
page read and write
61F000
heap
page read and write
56C000
heap
page read and write
613000
heap
page read and write
5CA398B000
stack
page read and write
440000
trusted library allocation
page read and write
633000
heap
page read and write
A120000
trusted library allocation
page read and write
361E000
stack
page read and write
3F20000
trusted library allocation
page read and write
61F000
heap
page read and write
7F0000
heap
page read and write
66F000
stack
page read and write
94F000
stack
page read and write
541000
heap
page read and write
7AE000
heap
page read and write
1E1CF5A4000
trusted library allocation
page read and write
613000
heap
page read and write
35DE000
stack
page read and write
B80000
remote allocation
page read and write
1401B857000
heap
page read and write
440000
trusted library allocation
page read and write
B7E000
stack
page read and write
FA0000
heap
page read and write
578000
heap
page read and write
1E1C9EC0000
heap
page read and write
440000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
4CD1E7F000
stack
page read and write
18338C29000
heap
page read and write
546000
heap
page read and write
4CD1C7A000
stack
page read and write
61F000
heap
page read and write
59A000
heap
page read and write
62C000
heap
page read and write
1E1CA07B000
heap
page read and write
62C000
heap
page read and write
42E000
unkown
page readonly
560000
trusted library allocation
page read and write
5320000
remote allocation
page execute and read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
400000
unkown
page readonly
613000
heap
page read and write
22BE000
stack
page read and write
62C000
heap
page read and write
515000
heap
page read and write
39D0000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
59B000
heap
page read and write
9C0E000
stack
page read and write
771000
heap
page read and write
2260000
heap
page read and write
337F000
stack
page read and write
3C30000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
18D6C4CD000
heap
page read and write
61F000
heap
page read and write
3C30000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
6F5000
heap
page read and write
39D0000
trusted library allocation
page read and write
1401B87A000
heap
page read and write
30FA000
stack
page read and write
400000
unkown
page readonly
62C000
heap
page read and write
39D0000
trusted library allocation
page read and write
61F000
heap
page read and write
1694E829000
heap
page read and write
1E1CF590000
trusted library allocation
page read and write
42C000
unkown
page read and write
61F000
heap
page read and write
20A0000
trusted library allocation
page read and write
1E1CA113000
heap
page read and write
62C000
heap
page read and write
9BDDD7D000
stack
page read and write
701D000
trusted library allocation
page execute and read and write
440000
trusted library allocation
page read and write
61F000
heap
page read and write
1E1CA918000
heap
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
61F000
heap
page read and write
3CF0000
trusted library allocation
page read and write
62C000
heap
page read and write
DF8000
heap
page read and write
42C000
unkown
page read and write
34A0000
trusted library allocation
page read and write
546000
heap
page read and write
61F000
heap
page read and write
3CF0000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
34A0000
trusted library allocation
page read and write
61F000
heap
page read and write
2FF0000
heap
page read and write
58E000
stack
page read and write
7A9000
heap
page read and write
3F20000
trusted library allocation
page read and write
AD0000
remote allocation
page read and write
560000
trusted library allocation
page read and write
1694E6A0000
heap
page read and write
33A1000
heap
page read and write
579000
heap
page read and write
3B26000
trusted library allocation
page read and write
18D6C320000
heap
page read and write
1E1CF658000
heap
page read and write
613000
heap
page read and write
602000
heap
page read and write
7E0000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
6AE000
heap
page read and write
61F000
heap
page read and write
33A1000
heap
page read and write
3160000
heap
page read and write
BBE000
stack
page read and write
23F97313000
heap
page read and write
3C30000
trusted library allocation
page read and write
23F971F0000
heap
page read and write
D6E000
stack
page read and write
402000
unkown
page execute and write copy
440000
trusted library allocation
page read and write
62C000
heap
page read and write
23F98CB0000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
1F0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
2FE0000
remote allocation
page read and write
2FD0000
heap
page read and write
575000
heap
page read and write
6F0D000
stack
page read and write
3C30000
trusted library allocation
page read and write
599000
heap
page read and write
61F000
heap
page read and write
613000
heap
page read and write
3000000
trusted library section
page read and write
A0D0000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
3170000
trusted library section
page readonly
23F9725B000
heap
page read and write
3CEF000
stack
page read and write
33A1000
heap
page read and write
3F20000
trusted library allocation
page read and write
61F000
heap
page read and write
39D0000
trusted library allocation
page read and write
1E1CA07D000
heap
page read and write
1E1CF6E4000
heap
page read and write
BAD000
stack
page read and write
61F000
heap
page read and write
3B3B000
trusted library allocation
page read and write
EFE000
stack
page read and write
30000
heap
page read and write
9BDD3FB000
stack
page read and write
841000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
420000
unkown
page readonly
440000
trusted library allocation
page read and write
1B3C3E29000
heap
page read and write
62C000
heap
page read and write
2250000
heap
page read and write
1F0000
heap
page read and write
62C000
heap
page read and write
67E000
stack
page read and write
9BDDA7E000
stack
page read and write
2AB0000
trusted library allocation
page read and write
61F000
heap
page read and write
BEE000
stack
page read and write
653000
heap
page read and write
61F000
heap
page read and write
61F000
heap
page read and write
C65000
heap
page read and write
9C8000
heap
page read and write
A0E000
stack
page read and write
440000
trusted library allocation
page read and write
1E1CF6BE000
heap
page read and write
There are 2274 hidden memdumps, click here to show them.