IOC Report
DouWan-Video-Setup-En-4.3.0.3-x64.exe

loading gif

Files

File Path
Type
Category
Malicious
DouWan-Video-Setup-En-4.3.0.3-x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files\douwan\DouWan.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\douwan\AdbWinApi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\douwan\AdbWinUsbApi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\douwan\AirPlayInput.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\EndUserLicenseAgreement.rtf
Rich Text Format data, version 1, ANSI, code page 936, default middle east language ID 1025
dropped
C:\Program Files\douwan\Qt5Core.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\Qt5Gui.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\Qt5Network.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\Qt5Svg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\Qt5Widgets.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\SDL2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Program Files\douwan\SoftwareLicence.txt
ISO-8859 text, with very long lines (489), with CRLF line terminators
dropped
C:\Program Files\douwan\VCam\default.png
PNG image data, 1920 x 1080, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\VCam\default_p.png
PNG image data, 1080 x 1920, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\VCam\douwan-virtualaud32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\douwan\VCam\douwan-virtualaud64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\VCam\douwan-virtualcam32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files\douwan\VCam\douwan-virtualcam64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\adb.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-private-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\avcodec-58.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\avformat-58.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\avutil-56.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\bearer\qgenericbearer.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\concrt140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\d3dx9_43.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\dashboard\dashboard.css
ASCII text, with CRLF line terminators
dropped
C:\Program Files\douwan\dashboard\dashboard.html
HTML document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files\douwan\dashboard\icon\details.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files\douwan\dashboard\icon\edit.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files\douwan\dashboard\icon\group.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files\douwan\dashboard\js\DlgDeviceGroupEditor.min.js
C++ source, Unicode text, UTF-8 text, with very long lines (643), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\DlgDevicePreview.min.js
C++ source, Unicode text, UTF-8 text, with very long lines (1189), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\DlgGroupEditor.min.js
C++ source, ASCII text, with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\api.min.js
ASCII text, with very long lines (2438), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\app.min.js
Unicode text, UTF-8 text, with very long lines (6597), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\deviceGrid.min.js
ASCII text, with very long lines (5548), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\deviceGridItem.min.js
Unicode text, UTF-8 text, with very long lines (4801), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\deviceGroupServ.min.js
C++ source, Unicode text, UTF-8 text, with very long lines (2365), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\deviceServ.min.js
C++ source, ASCII text, with very long lines (416), with no line terminators
dropped
C:\Program Files\douwan\dashboard\js\ws.min.js
Unicode text, UTF-8 text, with very long lines (2446), with no line terminators
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\CORS
very short file (no magic)
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\css\icon.css
ASCII text, with CRLF line terminators
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\eleTree.js
Unicode text, UTF-8 text, with very long lines (48612), with CRLF, NEL line terminators
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.eot
Embedded OpenType (EOT), icomoon family
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.ttf
TrueType Font data, 11 tables, 1st "OS/2", 14 names, Macintosh, type 1 string, icomoon
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\fonts\eletree_icon.woff
Web Open Font Format, TrueType, length 7120, version 0.0
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\checkFull.png
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\checkHalf.png
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\checkNone.png
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\dropdownOff.png
PNG image data, 29 x 29, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\dropdownOn.png
PNG image data, 29 x 29, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\fold.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x16, components 3
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\fold.png
PNG image data, 13 x 16, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\leaf.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 13x16, components 3
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\leaf.png
PNG image data, 13 x 16, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\radioCheck.png
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\dashboard\vendors\eleTree\images\radioCheckNone.png
PNG image data, 18 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files\douwan\douwan.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\douwanaudio.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\iconengines\qsvgicon.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qgif.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qicns.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qico.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qjpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qpdf.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qsvg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qtga.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qtiff.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qwbmp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\imageformats\qwebp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\libEGL.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\libGLESv2.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\libairplay.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\libcrypto-1_1-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\libssl-1_1-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\libyuv.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\mDNSResponder.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcp120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcp140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcp140_2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcp140_atomic_wait.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcp140_codecvt_ids.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcr120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\msvcrt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\opengl32sw.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\platforms\qwindows.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\plugins\64bit\win-wasapi.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\plugins\64bit\xindawn-audio.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\plugins\64bit\xindawn-output.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\restful\api.html
HTML document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files\douwan\restful\api.js
ASCII text, with CRLF line terminators
dropped
C:\Program Files\douwan\restful\help.html
HTML document, Unicode text, UTF-8 text, with very long lines (549), with CRLF line terminators
dropped
C:\Program Files\douwan\styles\qwindowsvistastyle.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\swresample-3.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\swscale-5.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\translations\qt_ar.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_bg.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_ca.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_cs.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_da.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_de.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_en.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_es.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_fi.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_fr.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_gd.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_he.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_hu.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_it.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_ja.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_ko.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_lv.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_pl.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_ru.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_sk.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_tr.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_uk.qm
Qt Translation file
dropped
C:\Program Files\douwan\translations\qt_zh_TW.qm
Qt Translation file
dropped
C:\Program Files\douwan\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\uninst.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Program Files\douwan\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\douwan\vcam.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\vccorlib140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\w32-pthreads.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\douwan\zlib.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DouWan.exe_67477162ff25c5ce03785a08b739eb36875429_b90f673a_e36fff6b-09c9-41d3-9ef3-8044ffc3c43d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC3A.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Jul 3 16:01:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE3F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE7E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\DouWan\groups.conf (copy)
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\DouWan\groups.conf.RafUQu
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\DouWan\groups.conf.lock
ASCII text
dropped
C:\Users\user\AppData\Local\DouWan\userdefaults.conf (copy)
JSON data
dropped
C:\Users\user\AppData\Local\DouWan\userdefaults.conf.QUKaGC
JSON data
dropped
C:\Users\user\AppData\Local\DouWan\userdefaults.conf.lock
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\libusb0.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libusbK.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\FindProcDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\ioSpecial.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
dropped
C:\Users\user\AppData\Local\Temp\nsaFD81.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\winusbcoinstaller2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\xindawn_list.log
ASCII text, with very long lines (376), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DouWan\DouWan.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Apr 28 02:59:08 2024, mtime=Wed Jul 3 15:00:48 2024, atime=Sun Apr 28 02:59:08 2024, length=19631720, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DouWan\Uninstall DouWan.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\Desktop\DouWan.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Apr 28 02:59:08 2024, mtime=Wed Jul 3 15:01:05 2024, atime=Sun Apr 28 02:59:08 2024, length=19631720, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 185 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DouWan-Video-Setup-En-4.3.0.3-x64.exe
"C:\Users\user\Desktop\DouWan-Video-Setup-En-4.3.0.3-x64.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="DouWan" dir=in action=allow program="C:\Program Files\douwan\DouWan.exe"
malicious
C:\Program Files\douwan\DouWan.exe
"C:\Program Files\douwan\DouWan.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualcam32.dll"
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualaud32.dll"
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualcam64.dll"
C:\Windows\System32\regsvr32.exe
/i /s "C:\Program Files\douwan\VCam\douwan-virtualcam64.dll"
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /i /s "C:\Program Files\douwan\VCam\douwan-virtualaud64.dll"
C:\Windows\System32\regsvr32.exe
/i /s "C:\Program Files\douwan\VCam\douwan-virtualaud64.dll"
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 488 -p 6016 -ip 6016
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6016 -s 3156
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://secure.globalsign.net/cacert/ObjectSign.crt09
unknown
https://www.douwan.video/https://www.douwan.video
unknown
http://www.phreedom.org/md5)08:27
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
https://cdn.staticfile.org/axios/1.4.0/axios.min.js
unknown
http://developer.android.com/tools/device.htmlinsufficient
unknown
https://douwan.videoPublisher
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.plutinosoft.com/blog/projects/platinumDMR-1.50urn:schemas-upnp-org:metadata-1-0/AVT/urn:u
unknown
http://libwdi.akeo.ie1.3.6.1.5.5.7.2.1http://libwdi-cps.akeo.ieCryptEncodeObjectCreateSelfSignedCert
unknown
https://douwan.video/compatibility
unknown
http://bugreports.qt.io/
unknown
http://www.globalsign.net/repository/0
unknown
http://www.plutinosoft.com/blog/projects/platinum
unknown
https://github.com/hsiangleev/eleTree.git
unknown
https://www.douwan.video
unknown
https://xindawn.douwan.video/0000000012345678TEST
unknown
http://libusb-win32.sourceforge.net
unknown
https://cdn.staticfile.org/layui/2.8.3/layui.js
unknown
https://douwan.video/compatibility.html
unknown
http://schemas.xmlsoap.org/soap/encoding/encodingStyle(res
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://cdn.staticfile.org/layui/2.8.11/css/layui.min.css
unknown
https://streams.videolan.org/upload/
unknown
https://api.douwan.video/v1/app/getMessage?uuid=w61f0b7401cce31b61af8ef16887023fb&softversion=4.3.0.3&limituse=1&language=en-us&lang=en
101.200.59.29
http://qt-project.org/
unknown
http://subca.ocsp-certum.com01
unknown
https://cdn.staticfile.org/layui/2.8.3/css/layui.min.css
unknown
http://www.globalsign.net/repository09
unknown
http://sensics.com/osvr
unknown
http://developer.android.com/tools/device.html
unknown
http://www.certum.pl/CPS0
unknown
https://community.freescale.com/message/493287#493287
unknown
https://www.douwan.video/
unknown
http://www.gnu.org/licenses/
unknown
https://xindawn.douwan.video/
unknown
http://www.phreedom.org/md5)
unknown
http://repository.certum.pl/ctnca.cer09
unknown
https://www.openssl.org/docs/faq.html
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
http://www.gnu.org/philosophy/why-not-lgpl.html
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
https://bugs.freedesktop.org/enter_bug.cgi?product=Mesa
unknown
http://qt.io/licensing/
unknown
http://ocsp.thawte.com0
unknown
http://www.plutinosoft.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.certum.pl/CPS0
unknown
http://www.color.org)
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
http://libusb.info
unknown
http://cscasha2.ocsp-certum.com04
unknown
http://llvm.org/):
unknown
http://secure.globalsign.net/cacert/PrimObject.crt0
unknown
http://libusb-win32.sourceforge.netd
unknown
http://www.dns-sd.org/ServiceTypes.html
unknown
https://api.douwan.video/v1/app/checkVersion?uuid=w61f0b7401cce31b61af8ef16887023fb&softversion=4.3.0.3&limituse=1&language=en-us&lang=en
101.200.59.29
http://www.zlib.net/D
unknown
http://www.plutinosoft.comDevice
unknown
http://libusb-win32.sourceforge.netb
unknown
https://www.openssl.org/H
unknown
http://libwdi-cps.akeo.ie
unknown
http://qt.io/
unknown
http://fsf.org/
unknown
http://schemas.xmlsoap.org/soap/envelope/(res
unknown
http://bugreports.qt.io/_q_receiveReplyensureClientPrefaceSentMicrosoft-IIS/4.Microsoft-IIS/5.Netsca
unknown
http://libusb-win32.sourceforge.netN
unknown
http://www.globalsign.net/repository/03
unknown
https://cdn.staticfile.org/layui/2.8.11/layui.js
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
usbserver.douwan.video
47.104.158.224
api.douwan.video
101.200.59.29

IPs

IP
Domain
Country
Malicious
47.104.158.224
usbserver.douwan.video
China
239.255.255.250
unknown
Reserved
101.200.59.29
api.douwan.video
China
192.168.2.4
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
DelFwRulePort
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DouWan
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC203}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC204}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC205}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC206}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC207}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC208}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC209}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC203}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC204}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC205}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC206}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC207}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC208}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC209}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20A}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FilterData
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FriendlyName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33D9A762-90C8-11d0-BD43-00A0C911CE86}\Instance\{A3FCE0EE-3493-419F-988A-ABA0230EC20B}
FilterData
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
ProgramId
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
FileId
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
LowerCaseLongPath
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
LongPathHash
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
Name
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
OriginalFileName
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
Publisher
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
Version
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
BinFileVersion
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
BinaryType
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
ProductName
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
ProductVersion
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
LinkDate
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
BinProductVersion
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
AppxPackageFullName
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
AppxPackageRelativeId
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
Size
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
Language
\REGISTRY\A\{3b72bcff-8122-aeb6-ece7-2907b74aa2f6}\Root\InventoryApplicationFile\douwan.exe|fc68614fe029d7df
Usn
There are 130 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
612000
heap
page read and write
4EB000
heap
page read and write
26FEC0B4000
heap
page read and write
2172AA79000
heap
page read and write
26FEA5C2000
heap
page read and write
2172AAF1000
heap
page read and write
7FFDF8C60000
unkown
page readonly
21728C95000
heap
page read and write
2172A25D000
heap
page read and write
217224D4000
heap
page read and write
5CD000
heap
page read and write
3650000
trusted library allocation
page read and write
21728DA9000
heap
page read and write
26FEA028000
heap
page read and write
2768000
heap
page read and write
612000
heap
page read and write
217294AB000
heap
page read and write
26FEA5C7000
heap
page read and write
2172B38F000
heap
page read and write
2172A7BE000
heap
page read and write
21729182000
heap
page read and write
21724686000
heap
page read and write
3650000
trusted library allocation
page read and write
276D000
heap
page read and write
7FFE1321D000
unkown
page readonly
217290E3000
heap
page read and write
2172A149000
heap
page read and write
7FFE115C5000
unkown
page readonly
26FEA738000
heap
page read and write
2172A381000
heap
page read and write
2172A81C000
heap
page read and write
217245FB000
heap
page read and write
2172B3FA000
heap
page read and write
2172AB35000
heap
page read and write
7FFDF91C8000
unkown
page read and write
3230000
trusted library allocation
page read and write
2172A821000
heap
page read and write
2172A73D000
heap
page read and write
2172859C000
heap
page read and write
21724634000
heap
page read and write
2172A4DE000
heap
page read and write
5EC000
heap
page read and write
26FEA020000
heap
page read and write
7FFDFB738000
unkown
page read and write
5CD000
heap
page read and write
2172A130000
heap
page read and write
5BC000
heap
page read and write
2172AB37000
heap
page read and write
5C8000
heap
page read and write
21728B64000
heap
page read and write
5C8000
heap
page read and write
7FFE115C3000
unkown
page readonly
21728DB1000
heap
page read and write
2172B443000
heap
page read and write
2172AC84000
heap
page read and write
21728AF4000
heap
page read and write
21724677000
heap
page read and write
21728526000
heap
page read and write
5C8000
heap
page read and write
43B000
unkown
page read and write
7FFDFAF68000
unkown
page read and write
3230000
trusted library allocation
page read and write
2172A723000
heap
page read and write
2172AC6A000
heap
page read and write
7FFE13381000
unkown
page execute read
21729327000
heap
page read and write
217224F1000
heap
page read and write
2768000
heap
page read and write
3650000
trusted library allocation
page read and write
217294BD000
heap
page read and write
7FFE115B7000
unkown
page readonly
217294BB000
heap
page read and write
7FFDF9164000
unkown
page readonly
2769000
heap
page read and write
2172A2A6000
heap
page read and write
2172AC0C000
heap
page read and write
2172B38A000
heap
page read and write
26FE9FF6000
heap
page read and write
2172A71E000
heap
page read and write
5D4000
heap
page read and write
6EB1DFB000
stack
page read and write
276C000
heap
page read and write
276E000
heap
page read and write
21728B82000
heap
page read and write
5C8000
heap
page read and write
2172A9EA000
heap
page read and write
7FFDFF140000
unkown
page readonly
21722450000
heap
page read and write
26FEC0A3000
heap
page read and write
9C0000
heap
page read and write
2172AA98000
heap
page read and write
3650000
trusted library allocation
page read and write
21728E6F000
heap
page read and write
2172A92A000
heap
page read and write
2172A167000
heap
page read and write
21728D2C000
heap
page read and write
2172B3EB000
heap
page read and write
21728F23000
heap
page read and write
2172A927000
heap
page read and write
217244E0000
trusted library allocation
page read and write
3550000
heap
page read and write
2172A6FC000
heap
page read and write
2172A265000
heap
page read and write
7FFDF9F04000
unkown
page read and write
5CD000
heap
page read and write
2970000
heap
page read and write
21728E6A000
heap
page read and write
5BC000
heap
page read and write
21728B5B000
heap
page read and write
26FE9FD7000
heap
page read and write
2172B394000
heap
page read and write
2172A7D8000
heap
page read and write
2172A0F3000
heap
page read and write
5C8000
heap
page read and write
400000
unkown
page readonly
26FEC0B4000
heap
page read and write
217244C3000
heap
page read and write
2172250B000
heap
page read and write
2172A367000
heap
page read and write
6EB38FE000
stack
page read and write
21729266000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A716000
heap
page read and write
2172A92C000
heap
page read and write
2172AAB7000
heap
page read and write
2E16000
heap
page read and write
2172AA81000
heap
page read and write
21724987000
heap
page read and write
21728E21000
heap
page read and write
4B8F000
stack
page read and write
217248BC000
heap
page read and write
2769000
heap
page read and write
2172B3A7000
heap
page read and write
217290F8000
heap
page read and write
2769000
heap
page read and write
21728EDA000
heap
page read and write
7FFE0E131000
unkown
page execute read
2172AADF000
heap
page read and write
2172A14E000
heap
page read and write
2172A8F4000
heap
page read and write
217292AF000
heap
page read and write
2172A96E000
heap
page read and write
6EB1743000
stack
page read and write
7FFE115D5000
unkown
page read and write
217292A2000
heap
page read and write
2767000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A2C0000
heap
page read and write
2172A814000
heap
page read and write
21728CDE000
heap
page read and write
217245E8000
heap
page read and write
21728BA9000
heap
page read and write
2172A959000
heap
page read and write
2172B465000
heap
page read and write
2172A8DA000
heap
page read and write
2172460E000
heap
page read and write
40A000
heap
page read and write
3650000
trusted library allocation
page read and write
619000
heap
page read and write
217290C9000
heap
page read and write
7FFDF9DD0000
unkown
page readonly
217243D4000
heap
page read and write
591000
heap
page read and write
7FF625514000
unkown
page readonly
2172A843000
heap
page read and write
591000
heap
page read and write
7FF6268E4000
unkown
page readonly
4B0000
heap
page read and write
21724616000
heap
page read and write
217248A7000
heap
page read and write
9BD000
unkown
page read and write
2BE0000
heap
page read and write
2172949E000
heap
page read and write
21729362000
heap
page read and write
276A000
heap
page read and write
3650000
trusted library allocation
page read and write
217292F8000
heap
page read and write
21729168000
heap
page read and write
21724987000
heap
page read and write
26FEA024000
heap
page read and write
217292FD000
heap
page read and write
2172442B000
heap
page read and write
2172A1F5000
heap
page read and write
F90000
heap
page read and write
5BC000
heap
page read and write
5BC000
heap
page read and write
E70000
heap
page read and write
26FEC0A4000
heap
page read and write
7FFE0EB31000
unkown
page execute read
612000
heap
page read and write
6EB3BFE000
stack
page read and write
2172A2AE000
heap
page read and write
7FFDF91E0000
unkown
page readonly
5BC000
heap
page read and write
539F000
heap
page read and write
21729112000
heap
page read and write
7FFE115D3000
unkown
page readonly
7FFE014CE000
unkown
page readonly
21724987000
heap
page read and write
2760000
heap
page read and write
21728F0E000
heap
page read and write
5C8000
heap
page read and write
2172A250000
heap
page read and write
2172A872000
heap
page read and write
21724457000
heap
page read and write
B20000
heap
page read and write
21729339000
heap
page read and write
5CD000
heap
page read and write
31A0000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
2172A447000
heap
page read and write
6EB32FE000
stack
page read and write
2769000
heap
page read and write
2768000
heap
page read and write
3650000
trusted library allocation
page read and write
2172AACC000
heap
page read and write
2172713A000
heap
page read and write
7FFE148B5000
unkown
page read and write
7FFDFAF69000
unkown
page write copy
5BC000
heap
page read and write
7FFE11500000
unkown
page readonly
FB0000
heap
page read and write
2172A3B5000
heap
page read and write
21728FAD000
heap
page read and write
21728C88000
heap
page read and write
2172B36D000
heap
page read and write
5C8000
heap
page read and write
2172A944000
heap
page read and write
7FFE115B1000
unkown
page read and write
7FFDFA599000
unkown
page readonly
2172A50D000
heap
page read and write
21728E62000
heap
page read and write
21724657000
heap
page read and write
5C8000
heap
page read and write
5BC000
heap
page read and write
21724BA2000
heap
page read and write
21728BAD000
heap
page read and write
539F000
heap
page read and write
539F000
heap
page read and write
7FFDFB011000
unkown
page execute read
2767000
heap
page read and write
276B000
heap
page read and write
3650000
trusted library allocation
page read and write
2172929A000
heap
page read and write
7FFE014B9000
unkown
page readonly
2172AAF9000
heap
page read and write
7FFDF9D4E000
unkown
page read and write
2172A145000
heap
page read and write
21728D39000
heap
page read and write
63D000
heap
page read and write
2172A3C2000
heap
page read and write
6EB30FE000
stack
page read and write
3650000
trusted library allocation
page read and write
21728D75000
heap
page read and write
5CD000
heap
page read and write
7FFE101D9000
unkown
page readonly
217290AF000
heap
page read and write
217292C5000
heap
page read and write
2172A891000
heap
page read and write
26FEA02F000
heap
page read and write
21728B9C000
heap
page read and write
21728D5B000
heap
page read and write
21729355000
heap
page read and write
7FFE11BD0000
unkown
page readonly
2172A7E5000
heap
page read and write
21728D68000
heap
page read and write
26FE9F20000
trusted library allocation
page read and write
2172A8C8000
heap
page read and write
21728E14000
heap
page read and write
7FFDF9800000
unkown
page readonly
5BC000
heap
page read and write
21724AE0000
trusted library section
page readonly
2172A5D3000
heap
page read and write
7FFE0EA70000
unkown
page readonly
1430000
heap
page read and write
5C8000
heap
page read and write
2172B3E5000
heap
page read and write
217224F9000
heap
page read and write
5CD000
heap
page read and write
26FEA022000
heap
page read and write
7FFDF9D48000
unkown
page write copy
5C8000
heap
page read and write
276D000
heap
page read and write
21722515000
heap
page read and write
2172AC55000
heap
page read and write
2172AB08000
heap
page read and write
5C8000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A87F000
heap
page read and write
7FF625F14000
unkown
page readonly
7FFE0E130000
unkown
page readonly
276D000
heap
page read and write
7FFE101D8000
unkown
page read and write
7FFDF8C54000
unkown
page write copy
2172461A000
heap
page read and write
21728B57000
heap
page read and write
3230000
trusted library allocation
page read and write
2172AA7E000
heap
page read and write
2172B39A000
heap
page read and write
5CD000
heap
page read and write
5BC000
heap
page read and write
5CD000
heap
page read and write
5BC000
heap
page read and write
21729259000
heap
page read and write
2172B3E0000
heap
page read and write
7FFDFFCDF000
unkown
page readonly
2172A7AC000
heap
page read and write
2172B368000
heap
page read and write
21723D7F000
direct allocation
page execute and read and write
7FFE130C5000
unkown
page readonly
5BC000
heap
page read and write
21727241000
heap
page read and write
2172A8FC000
heap
page read and write
2172A67F000
heap
page read and write
7FFDFAAD8000
unkown
page read and write
3650000
trusted library allocation
page read and write
2172A7FA000
heap
page read and write
3650000
trusted library allocation
page read and write
2172AB78000
heap
page read and write
2172AB3A000
heap
page read and write
276D000
heap
page read and write
5CD000
heap
page read and write
21728576000
heap
page read and write
21728CC9000
heap
page read and write
612000
heap
page read and write
2172A0E2000
heap
page read and write
7FFDF9C76000
unkown
page readonly
5CD000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A9DD000
heap
page read and write
2172499E000
heap
page read and write
5BC000
heap
page read and write
21728FC7000
heap
page read and write
21724C10000
heap
page read and write
3650000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
21724BF7000
heap
page read and write
2172713E000
heap
page read and write
21724CA7000
heap
page read and write
21724D41000
heap
page read and write
26FEA724000
heap
page read and write
5C8000
heap
page read and write
5C8000
heap
page read and write
2172939B000
heap
page read and write
2172B429000
heap
page read and write
3230000
trusted library allocation
page read and write
6EB24FC000
stack
page read and write
217291DC000
heap
page read and write
5CD000
heap
page read and write
5C8000
heap
page read and write
21727427000
heap
page read and write
26FEA723000
heap
page read and write
31AF000
heap
page read and write
5BC000
heap
page read and write
5CD000
heap
page read and write
5C8000
heap
page read and write
2172450C000
heap
page read and write
21726990000
heap
page read and write
2768000
heap
page read and write
2172926B000
heap
page read and write
26FE9FC0000
heap
page read and write
2172B3DB000
heap
page read and write
217291BE000
heap
page read and write
5BC000
heap
page read and write
217291C7000
heap
page read and write
2DDF000
stack
page read and write
21729288000
heap
page read and write
3230000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
7FFDFF250000
unkown
page read and write
7FFE115B3000
unkown
page read and write
2172A91D000
heap
page read and write
2172B375000
heap
page read and write
3650000
trusted library allocation
page read and write
21728B30000
heap
page read and write
21728CF8000
heap
page read and write
2172464C000
heap
page read and write
21722514000
heap
page read and write
21724D41000
heap
page read and write
2A8B000
stack
page read and write
5C8000
heap
page read and write
26FEA012000
heap
page read and write
2172A7DC000
heap
page read and write
26FEA5C0000
heap
page read and write
2760000
heap
page read and write
217292AB000
heap
page read and write
2172459C000
heap
page read and write
612000
heap
page read and write
276E000
heap
page read and write
2172AADC000
heap
page read and write
440000
unkown
page readonly
2172A10D000
heap
page read and write
85F000
stack
page read and write
21728B4A000
heap
page read and write
5BC000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFDF8C58000
unkown
page read and write
3650000
trusted library allocation
page read and write
5C8000
heap
page read and write
2172B460000
heap
page read and write
21728B1A000
heap
page read and write
2172A895000
heap
page read and write
21728EC0000
heap
page read and write
3230000
trusted library allocation
page read and write
26FEC0A1000
heap
page read and write
2172AA86000
heap
page read and write
A8DC727000
stack
page read and write
7FFE11BE7000
unkown
page readonly
7FFE01471000
unkown
page execute read
2172A96B000
heap
page read and write
3230000
trusted library allocation
page read and write
21728B6C000
heap
page read and write
2172A15A000
heap
page read and write
63E000
heap
page read and write
5CD000
heap
page read and write
3551000
heap
page read and write
2172A163000
heap
page read and write
2768000
heap
page read and write
21724667000
heap
page read and write
2172B3B6000
heap
page read and write
5BC000
heap
page read and write
2172A947000
heap
page read and write
2172450E000
heap
page read and write
2172A483000
heap
page read and write
500000
heap
page read and write
2172A738000
heap
page read and write
21727258000
heap
page read and write
2172A8EF000
heap
page read and write
217244F2000
heap
page read and write
26FEC0AD000
heap
page read and write
2769000
heap
page read and write
5BC000
heap
page read and write
2172AB06000
heap
page read and write
2172B35B000
heap
page read and write
21725130000
heap
page read and write
21728E3B000
heap
page read and write
5C8000
heap
page read and write
2763000
heap
page read and write
2172AB2A000
heap
page read and write
276D000
heap
page read and write
3650000
trusted library allocation
page read and write
21728E55000
heap
page read and write
5BC000
heap
page read and write
2172AA8E000
heap
page read and write
2172A0FC000
heap
page read and write
5BC000
heap
page read and write
2172904C000
heap
page read and write
6EB29FB000
stack
page read and write
2172B46D000
heap
page read and write
2765000
heap
page read and write
612000
heap
page read and write
2172A0B7000
heap
page read and write
21729280000
heap
page read and write
5CD000
heap
page read and write
3650000
trusted library allocation
page read and write
7FF626654000
unkown
page read and write
5CD000
heap
page read and write
7FF626617000
unkown
page read and write
2762000
heap
page read and write
21728655000
heap
page read and write
21729203000
heap
page read and write
21729208000
heap
page read and write
2EA0000
heap
page read and write
2172A925000
heap
page read and write
410000
heap
page read and write
2172B3C6000
heap
page read and write
2172A94E000
heap
page read and write
5C8000
heap
page read and write
217248BC000
heap
page read and write
5CD000
heap
page read and write
21728F71000
heap
page read and write
5CD000
heap
page read and write
21729175000
heap
page read and write
5C8000
heap
page read and write
217244FD000
heap
page read and write
2765000
heap
page read and write
21729305000
heap
page read and write
26FEA02E000
heap
page read and write
7FF6268E3000
unkown
page read and write
26FE9FF6000
heap
page read and write
2172A2D5000
heap
page read and write
66705000
unkown
page readonly
2172A884000
heap
page read and write
21724689000
heap
page read and write
2172B37A000
heap
page read and write
2172AAB2000
heap
page read and write
2172A899000
heap
page read and write
5C8000
heap
page read and write
21728E2E000
heap
page read and write
611000
heap
page read and write
3230000
trusted library allocation
page read and write
2172AAAF000
heap
page read and write
2172B402000
heap
page read and write
7FFDFFCEE000
unkown
page readonly
217290A7000
heap
page read and write
2172A7CF000
heap
page read and write
21728D9C000
heap
page read and write
217224A9000
heap
page read and write
2172B327000
heap
page read and write
5C8000
heap
page read and write
7FFDF83DC000
unkown
page read and write
6EB37FE000
stack
page read and write
3650000
trusted library allocation
page read and write
591000
heap
page read and write
440000
unkown
page readonly
2172A93A000
heap
page read and write
2172A95B000
heap
page read and write
21728F1B000
heap
page read and write
21728601000
heap
page read and write
7FFE0EB20000
unkown
page readonly
276B000
heap
page read and write
2172B3BE000
heap
page read and write
2172A490000
heap
page read and write
21728B01000
heap
page read and write
5CD000
heap
page read and write
7FFDF9051000
unkown
page read and write
26FEA5CA000
heap
page read and write
7FFE0EB58000
unkown
page read and write
970000
heap
page read and write
3650000
trusted library allocation
page read and write
21722502000
heap
page read and write
21728AE3000
heap
page read and write
2172A116000
heap
page read and write
2172A825000
heap
page read and write
7FFE115B5000
unkown
page read and write
7FFDFF25C000
unkown
page readonly
DBA000
stack
page read and write
2172B439000
heap
page read and write
2172A8A6000
heap
page read and write
6EB3CFE000
stack
page read and write
7FFDFA582000
unkown
page read and write
6EB28FD000
stack
page read and write
2172AB15000
heap
page read and write
7FFDFAF7C000
unkown
page write copy
2172A4F3000
heap
page read and write
2172A877000
heap
page read and write
2DFE000
stack
page read and write
21722508000
heap
page read and write
21728FE9000
heap
page read and write
21724614000
heap
page read and write
217294B0000
heap
page read and write
26FEC0AE000
heap
page read and write
26FEA5C3000
heap
page read and write
27C9000
heap
page read and write
3650000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
7FFE00129000
unkown
page readonly
2767000
heap
page read and write
5CD000
heap
page read and write
7FFE12E11000
unkown
page execute read
2172A7D3000
heap
page read and write
2172A9C8000
heap
page read and write
217292C1000
heap
page read and write
5BC000
heap
page read and write
2172AC02000
heap
page read and write
2172B3AC000
heap
page read and write
21728AE7000
heap
page read and write
2290000
heap
page read and write
21728C3F000
heap
page read and write
217244F8000
heap
page read and write
217290A2000
heap
page read and write
2172250B000
heap
page read and write
2E22000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A123000
heap
page read and write
2172933E000
heap
page read and write
227F000
stack
page read and write
2766000
heap
page read and write
5C8000
heap
page read and write
5C8000
heap
page read and write
21724689000
heap
page read and write
530000
heap
page read and write
2763000
heap
page read and write
2172B44E000
heap
page read and write
2172AC50000
heap
page read and write
2172A91A000
heap
page read and write
217267F4000
heap
page read and write
2172A3FE000
heap
page read and write
21724CA9000
heap
page read and write
109B000
heap
page read and write
3190000
heap
page read and write
26FEA71C000
heap
page read and write
2172B34E000
heap
page read and write
21724CAA000
heap
page read and write
5BC000
heap
page read and write
2172B317000
heap
page read and write
7FFE101D0000
unkown
page readonly
632000
heap
page read and write
2172B3C3000
heap
page read and write
2172A8B3000
heap
page read and write
21729384000
heap
page read and write
5CD000
heap
page read and write
3650000
trusted library allocation
page read and write
2172AAA7000
heap
page read and write
2172A963000
heap
page read and write
2172A973000
heap
page read and write
21724611000
heap
page read and write
2ACB000
stack
page read and write
5C8000
heap
page read and write
2172A86A000
heap
page read and write
7FFE0EB6A000
unkown
page read and write
5BC000
heap
page read and write
21724BF5000
heap
page read and write
7FFE14630000
unkown
page readonly
2763000
heap
page read and write
1000000
heap
page read and write
5CD000
heap
page read and write
2172499E000
heap
page read and write
7FFE0EB27000
unkown
page readonly
2172B449000
heap
page read and write
26FEA19A000
heap
page read and write
3650000
trusted library allocation
page read and write
2C20000
heap
page read and write
3230000
trusted library allocation
page read and write
5CD000
heap
page read and write
2172AC72000
heap
page read and write
680000
heap
page read and write
21728EB8000
heap
page read and write
2764000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A2B3000
heap
page read and write
3650000
trusted library allocation
page read and write
21724D41000
heap
page read and write
5BC000
heap
page read and write
7FFE12E15000
unkown
page read and write
217248CF000
heap
page read and write
7FFDFF252000
unkown
page readonly
2172B468000
heap
page read and write
5BC000
heap
page read and write
3650000
trusted library allocation
page read and write
2761000
heap
page read and write
550000
heap
page read and write
5C8000
heap
page read and write
5CD000
heap
page read and write
7FFE0EB21000
unkown
page execute read
217244F0000
heap
page read and write
7FFE0EB40000
unkown
page readonly
26FEA720000
heap
page read and write
7FFDF8C59000
unkown
page readonly
2172938E000
heap
page read and write
2172A61C000
heap
page read and write
2766000
heap
page read and write
7FFDF9071000
unkown
page execute read
21728B79000
heap
page read and write
217290FD000
heap
page read and write
21724677000
heap
page read and write
6AD23000
unkown
page write copy
2172A4E6000
heap
page read and write
26FE9FF9000
heap
page read and write
6EB26FC000
stack
page read and write
2172A2C8000
heap
page read and write
2172AB2F000
heap
page read and write
5E7000
heap
page read and write
7FFE0EA71000
unkown
page execute read
21728E0C000
heap
page read and write
21729037000
heap
page read and write
5CD000
heap
page read and write
41A000
heap
page read and write
21724637000
heap
page read and write
7FFE130C8000
unkown
page read and write
687000
heap
page read and write
3230000
trusted library allocation
page read and write
5CD000
heap
page read and write
21728490000
heap
page read and write
2172A72B000
heap
page read and write
2764000
heap
page read and write
612000
heap
page read and write
5CD000
heap
page read and write
2172AAF4000
heap
page read and write
217292CE000
heap
page read and write
2172A32B000
heap
page read and write
2CA0000
heap
page read and write
217224FD000
heap
page read and write
2172923F000
heap
page read and write
217223E0000
heap
page read and write
276D000
heap
page read and write
21728B34000
heap
page read and write
21723D96000
heap
page read and write
5C8000
heap
page read and write
217248CD000
heap
page read and write
2763000
heap
page read and write
5CD000
heap
page read and write
21724443000
heap
page read and write
2172A7ED000
heap
page read and write
2172AAD1000
heap
page read and write
7FFDF9D45000
unkown
page read and write
21729003000
heap
page read and write
276C000
heap
page read and write
7FF626617000
unkown
page write copy
606000
heap
page read and write
2172A95E000
heap
page read and write
217291D4000
heap
page read and write
3650000
trusted library allocation
page read and write
2763000
heap
page read and write
7FFDFA588000
unkown
page write copy
5C8000
heap
page read and write
7FFDF9EAD000
unkown
page readonly
7FFDF93C1000
unkown
page execute read
7FFE0E17C000
unkown
page read and write
2172AAF6000
heap
page read and write
5BC000
heap
page read and write
7FFE1A479000
unkown
page read and write
21728FE1000
heap
page read and write
21724433000
heap
page read and write
217292B8000
heap
page read and write
6670A000
unkown
page read and write
4770000
heap
page read and write
5C8000
heap
page read and write
2172B3F8000
heap
page read and write
6EB2FFE000
stack
page read and write
26FEA73B000
heap
page read and write
2761000
heap
page read and write
7FFE0EB61000
unkown
page execute read
5C8000
heap
page read and write
7FFDFAAE3000
unkown
page readonly
2172AB32000
heap
page read and write
21722519000
heap
page read and write
5CD000
heap
page read and write
2172449B000
heap
page read and write
1F0000
heap
page read and write
2172AC5D000
heap
page read and write
217243C0000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
2172A786000
heap
page read and write
2172B2C1000
heap
page read and write
5CD000
heap
page read and write
21728C8D000
heap
page read and write
217244FB000
heap
page read and write
5CD000
heap
page read and write
2172A46E000
heap
page read and write
6670F000
unkown
page write copy
7FFDFA5E1000
unkown
page execute read
2172499E000
heap
page read and write
7FFE11BD1000
unkown
page execute read
21728E9E000
heap
page read and write
53FF000
stack
page read and write
5BC000
heap
page read and write
5BC000
heap
page read and write
7FFE0EB50000
unkown
page readonly
2767000
heap
page read and write
2172A0C4000
heap
page read and write
276B000
heap
page read and write
5BC000
heap
page read and write
305A000
heap
page read and write
217292C9000
heap
page read and write
2769000
heap
page read and write
2172A730000
heap
page read and write
21728BF6000
heap
page read and write
217244E0000
trusted library allocation
page read and write
21729153000
heap
page read and write
2172B431000
heap
page read and write
6EB39FD000
stack
page read and write
2763000
heap
page read and write
2172B434000
heap
page read and write
2172A94C000
heap
page read and write
3650000
trusted library allocation
page read and write
26FEA5CB000
heap
page read and write
95F000
stack
page read and write
2172B453000
heap
page read and write
3650000
trusted library allocation
page read and write
5C8000
heap
page read and write
435000
unkown
page read and write
7FFDF8F80000
unkown
page readonly
5BC000
heap
page read and write
7FFE014D6000
unkown
page readonly
CFB000
stack
page read and write
612000
heap
page read and write
2172A3CA000
heap
page read and write
2172B414000
heap
page read and write
2763000
heap
page read and write
5CD000
heap
page read and write
408000
unkown
page readonly
2768000
heap
page read and write
3230000
trusted library allocation
page read and write
21728CD6000
heap
page read and write
217292EB000
heap
page read and write
2172B3BB000
heap
page read and write
21728B97000
heap
page read and write
7FFE13200000
unkown
page readonly
612000
heap
page read and write
5BC000
heap
page read and write
7FFE148B3000
unkown
page readonly
609000
heap
page read and write
5C8000
heap
page read and write
7FFDF9F09000
unkown
page readonly
401000
unkown
page execute read
3230000
trusted library allocation
page read and write
21728FA0000
heap
page read and write
3650000
trusted library allocation
page read and write
21724CA9000
heap
page read and write
2B30000
heap
page read and write
2172903F000
heap
page read and write
2765000
heap
page read and write
2765000
heap
page read and write
FB0000
heap
page read and write
7FFE11BF1000
unkown
page read and write
21724689000
heap
page read and write
539F000
heap
page read and write
5C8000
heap
page read and write
5CD000
heap
page read and write
96000
stack
page read and write
5CD000
heap
page read and write
7FFDFAFCA000
unkown
page read and write
5CD000
heap
page read and write
2172AACE000
heap
page read and write
6EB31FE000
stack
page read and write
42B000
unkown
page read and write
7FFDF88A0000
unkown
page readonly
2172AA89000
heap
page read and write
6EB34FE000
stack
page read and write
5CD000
heap
page read and write
A8DCA7F000
stack
page read and write
7FFE13391000
unkown
page readonly
26FE9E00000
heap
page read and write
60F000
heap
page read and write
2172AAE6000
heap
page read and write
21729073000
heap
page read and write
2172B3E8000
heap
page read and write
5C8000
heap
page read and write
685000
heap
page read and write
427000
unkown
page read and write
3230000
trusted library allocation
page read and write
2172A978000
heap
page read and write
2E08000
heap
page read and write
6EB2EFF000
stack
page read and write
5C8000
heap
page read and write
40A000
unkown
page write copy
2172A0DA000
heap
page read and write
26FEA023000
heap
page read and write
3650000
trusted library allocation
page read and write
7FF625411000
unkown
page execute read
2172B312000
heap
page read and write
40FF000
stack
page read and write
2172250C000
heap
page read and write
2172B339000
heap
page read and write
217294AE000
heap
page read and write
5BC000
heap
page read and write
3230000
trusted library allocation
page read and write
2172918F000
heap
page read and write
2172864D000
heap
page read and write
2172463C000
heap
page read and write
5CD000
heap
page read and write
2172A58A000
heap
page read and write
2172B346000
heap
page read and write
2172A13C000
heap
page read and write
5CD000
heap
page read and write
2172AB20000
heap
page read and write
2767000
heap
page read and write
21728F93000
heap
page read and write
26FEA727000
heap
page read and write
26FEA73D000
heap
page read and write
5C8000
heap
page read and write
21728DCB000
heap
page read and write
7FFE115C7000
unkown
page readonly
580000
heap
page read and write
26FEA5CE000
heap
page read and write
2172B341000
heap
page read and write
2172AAFE000
heap
page read and write
2CCB000
stack
page read and write
2172648A000
heap
page read and write
2172A3CF000
heap
page read and write
27B4000
heap
page read and write
7FFDFB280000
unkown
page readonly
666BA000
unkown
page write copy
5BC000
heap
page read and write
21729160000
heap
page read and write
21728AEB000
heap
page read and write
666B7000
unkown
page read and write
3650000
trusted library allocation
page read and write
2172A3E9000
heap
page read and write
5BC000
heap
page read and write
3650000
trusted library allocation
page read and write
2172252D000
heap
page read and write
3650000
trusted library allocation
page read and write
21724647000
heap
page read and write
217244C6000
heap
page read and write
217248CD000
heap
page read and write
7FFE0EB6B000
unkown
page readonly
2172A85D000
heap
page read and write
2172AC48000
heap
page read and write
2172A311000
heap
page read and write
21728DA4000
heap
page read and write
2E1E000
heap
page read and write
2172924C000
heap
page read and write
26FE9FF7000
heap
page read and write
2172A8C0000
heap
page read and write
217E000
stack
page read and write
21728BCF000
heap
page read and write
7FFDFAF7B000
unkown
page read and write
4E0000
heap
page read and write
7FFDFAF55000
unkown
page read and write
7FFE130C9000
unkown
page readonly
217293AB000
heap
page read and write
3230000
trusted library allocation
page read and write
26FE9FD2000
heap
page read and write
5CD000
heap
page read and write
5CD000
heap
page read and write
2172467C000
heap
page read and write
5C8000
heap
page read and write
5CD000
heap
page read and write
276E000
heap
page read and write
5CD000
heap
page read and write
2172AB2D000
heap
page read and write
2172A66A000
heap
page read and write
3650000
trusted library allocation
page read and write
52E000
stack
page read and write
52FE000
stack
page read and write
2172A0DE000
heap
page read and write
5BC000
heap
page read and write
2BD0000
heap
page read and write
2ADE000
heap
page read and write
6AD00000
unkown
page readonly
3230000
trusted library allocation
page read and write
21729080000
heap
page read and write
21724667000
heap
page read and write
7FFE0EA7A000
unkown
page readonly
422000
unkown
page read and write
3230000
trusted library allocation
page read and write
2172936C000
heap
page read and write
2172AA9A000
heap
page read and write
21728F86000
heap
page read and write
7FFDFF1C7000
unkown
page readonly
217291A9000
heap
page read and write
2172A7CB000
heap
page read and write
2172A0D1000
heap
page read and write
5BC000
heap
page read and write
B2A000
heap
page read and write
2769000
heap
page read and write
276A000
heap
page read and write
6EB33FE000
stack
page read and write
21729386000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFDFFC81000
unkown
page execute read
21724D53000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A272000
heap
page read and write
217291E9000
heap
page read and write
2172B41A000
heap
page read and write
2172B3FD000
heap
page read and write
5BC000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A8CD000
heap
page read and write
3CC000
stack
page read and write
2767000
heap
page read and write
26FEA738000
heap
page read and write
2172A1FA000
heap
page read and write
21728BBE000
heap
page read and write
7FFDFF1C3000
unkown
page read and write
21729044000
heap
page read and write
21729348000
heap
page read and write
2172B370000
heap
page read and write
5C8000
heap
page read and write
7FFDFB281000
unkown
page execute read
7FFDF9020000
unkown
page readonly
57D000
heap
page read and write
2172A8B7000
heap
page read and write
217291CF000
heap
page read and write
2172A3A8000
heap
page read and write
4A8E000
stack
page read and write
2172B424000
heap
page read and write
2172463A000
heap
page read and write
2762000
heap
page read and write
217284DE000
heap
page read and write
21729352000
heap
page read and write
2172921D000
heap
page read and write
3230000
trusted library allocation
page read and write
5BC000
heap
page read and write
3230000
trusted library allocation
page read and write
4E80000
heap
page read and write
217224BB000
heap
page read and write
2172A5FA000
heap
page read and write
7FFDF8356000
unkown
page readonly
7FFE0EB44000
unkown
page readonly
276B000
heap
page read and write
2172AC9E000
heap
page read and write
276D000
heap
page read and write
2769000
heap
page read and write
3650000
trusted library allocation
page read and write
7FFE115A9000
unkown
page read and write
21722456000
heap
page read and write
2E00000
heap
page read and write
2172A174000
heap
page read and write
3650000
trusted library allocation
page read and write
5CD000
heap
page read and write
5C8000
heap
page read and write
2766000
heap
page read and write
21728ECD000
heap
page read and write
2776000
heap
page read and write
217293A8000
heap
page read and write
2765000
heap
page read and write
2764000
heap
page read and write
2172448F000
heap
page read and write
7FFE11BF2000
unkown
page readonly
2172A684000
heap
page read and write
2172B38C000
heap
page read and write
2172AAEE000
heap
page read and write
217224F4000
heap
page read and write
21727363000
heap
page read and write
5C8000
heap
page read and write
26FEA72F000
heap
page read and write
2172A5BE000
heap
page read and write
2172A258000
heap
page read and write
7FF625410000
unkown
page readonly
2172A386000
heap
page read and write
5BC000
heap
page read and write
5CD000
heap
page read and write
21728D12000
heap
page read and write
2172B2E3000
heap
page read and write
2172B2C4000
heap
page read and write
21728B41000
heap
page read and write
7FFE11EAD000
unkown
page read and write
5CD000
heap
page read and write
2172B41C000
heap
page read and write
6EB1EF9000
stack
page read and write
21729295000
heap
page read and write
2172A699000
heap
page read and write
2D0C000
stack
page read and write
400000
unkown
page readonly
5CD000
heap
page read and write
3230000
trusted library allocation
page read and write
40BE000
stack
page read and write
2172A488000
heap
page read and write
2172A7F1000
heap
page read and write
35B000
stack
page read and write
21722300000
heap
page read and write
3650000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
2760000
heap
page read and write
217224F9000
heap
page read and write
2172A49D000
heap
page read and write
7FF625411000
unkown
page execute read
5CD000
heap
page read and write
66701000
unkown
page read and write
21728B53000
heap
page read and write
2766000
heap
page read and write
612000
heap
page read and write
7FFDFAF95000
unkown
page write copy
2172A850000
heap
page read and write
5C8000
heap
page read and write
5BC000
heap
page read and write
217290BC000
heap
page read and write
425000
unkown
page read and write
3650000
trusted library allocation
page read and write
21725120000
heap
page read and write
276A000
heap
page read and write
2172A338000
heap
page read and write
5F7000
heap
page read and write
217292E8000
heap
page read and write
2172A7B1000
heap
page read and write
276A000
heap
page read and write
2172AAD9000
heap
page read and write
21728C73000
heap
page read and write
5BC000
heap
page read and write
2172B3B4000
heap
page read and write
5C8000
heap
page read and write
2172AA90000
heap
page read and write
5BC000
heap
page read and write
2172B387000
heap
page read and write
2172A9D0000
heap
page read and write
21728B7D000
heap
page read and write
19A000
stack
page read and write
276D000
heap
page read and write
2172AB10000
heap
page read and write
26FEA738000
heap
page read and write
2172A243000
heap
page read and write
6EB3DFE000
stack
page read and write
2172B382000
heap
page read and write
2172A970000
heap
page read and write
5C8000
heap
page read and write
5C8000
heap
page read and write
2172B3F0000
heap
page read and write
5CD000
heap
page read and write
7FFE0EB47000
unkown
page read and write
5CD000
heap
page read and write
31A0000
heap
page read and write
21724901000
heap
page read and write
5CD000
heap
page read and write
6EB2AFD000
stack
page read and write
21728BC2000
heap
page read and write
2172A181000
heap
page read and write
7FFE11586000
unkown
page read and write
5CD000
heap
page read and write
21728E07000
heap
page read and write
FA5000
heap
page read and write
2BE0000
heap
page read and write
5C8000
heap
page read and write
3650000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
217244D0000
direct allocation
page read and write
3650000
trusted library allocation
page read and write
2172A6C0000
heap
page read and write
7FFE0EB30000
unkown
page readonly
7FFE115C1000
unkown
page execute read
21724667000
heap
page read and write
2172A42D000
heap
page read and write
2766000
heap
page read and write
2172934D000
heap
page read and write
2172A5AC000
heap
page read and write
5C8000
heap
page read and write
3050000
heap
page read and write
2172A7A4000
heap
page read and write
7FF626626000
unkown
page write copy
2172AAEC000
heap
page read and write
21724594000
heap
page read and write
2172A932000
heap
page read and write
2172B2EB000
heap
page read and write
2763000
heap
page read and write
90B000
stack
page read and write
217272C1000
heap
page read and write
217224F9000
heap
page read and write
21729312000
heap
page read and write
5C8000
heap
page read and write
2172930A000
heap
page read and write
2172A614000
heap
page read and write
5BC000
heap
page read and write
612000
heap
page read and write
7FFE0015E000
unkown
page read and write
7FF626625000
unkown
page write copy
26FEA028000
heap
page read and write
73E000
stack
page read and write
7FF625514000
unkown
page readonly
5BC000
heap
page read and write
2172AAAA000
heap
page read and write
482000
unkown
page readonly
2767000
heap
page read and write
2172A6E2000
heap
page read and write
665A1000
unkown
page execute read
3230000
trusted library allocation
page read and write
217245AA000
heap
page read and write
2768000
heap
page read and write
5BC000
heap
page read and write
7FFDFAF9B000
unkown
page read and write
2172A0EF000
heap
page read and write
6EB1AFE000
stack
page read and write
CFE000
stack
page read and write
21727452000
heap
page read and write
2172250B000
heap
page read and write
2C9E000
stack
page read and write
217271FF000
heap
page read and write
2172B41F000
heap
page read and write
5C8000
heap
page read and write
7FFE148B0000
unkown
page readonly
2172B405000
heap
page read and write
2172499E000
heap
page read and write
2172A0AF000
heap
page read and write
2172714A000
heap
page read and write
2172A152000
heap
page read and write
2172A5C6000
heap
page read and write
26FEA01F000
heap
page read and write
21728DE5000
heap
page read and write
21729499000
heap
page read and write
21728FD4000
heap
page read and write
2762000
heap
page read and write
3230000
trusted library allocation
page read and write
276E000
heap
page read and write
7FFE1321B000
unkown
page read and write
21728B8F000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A156000
heap
page read and write
21728D82000
heap
page read and write
47A000
stack
page read and write
3650000
trusted library allocation
page read and write
7FFDFAADB000
unkown
page write copy
21724612000
heap
page read and write
21728B60000
heap
page read and write
7FFDFA91A000
unkown
page readonly
2172A752000
heap
page read and write
5CD000
heap
page read and write
6EB36FE000
stack
page read and write
5C8000
heap
page read and write
5CD000
heap
page read and write
5BC000
heap
page read and write
2172B46A000
heap
page read and write
2172A643000
heap
page read and write
2172B331000
heap
page read and write
26FEA743000
heap
page read and write
2172462C000
heap
page read and write
5C8000
heap
page read and write
2172245C000
heap
page read and write
A8DC7AE000
stack
page read and write
217260A4000
heap
page read and write
2172A19B000
heap
page read and write
217292A7000
heap
page read and write
2172AA6C000
heap
page read and write
21729317000
heap
page read and write
2172A6C8000
heap
page read and write
2761000
heap
page read and write
21729324000
heap
page read and write
3230000
trusted library allocation
page read and write
1435000
heap
page read and write
612000
heap
page read and write
21724532000
heap
page read and write
5C8000
heap
page read and write
3230000
trusted library allocation
page read and write
2766000
heap
page read and write
7FFE0E160000
unkown
page readonly
401000
unkown
page execute read
2172908D000
heap
page read and write
2172A629000
heap
page read and write
2172A9B6000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A4B7000
heap
page read and write
7FFE1155C000
unkown
page readonly
5C8000
heap
page read and write
2172A4AA000
heap
page read and write
5BC000
heap
page read and write
2172B324000
heap
page read and write
2172A38E000
heap
page read and write
7FF625F14000
unkown
page readonly
2172A1E0000
heap
page read and write
7FFE115D0000
unkown
page readonly
276D000
heap
page read and write
2172A78E000
heap
page read and write
6EB23FE000
stack
page read and write
2172A6A6000
heap
page read and write
26FEA033000
heap
page read and write
2172A934000
heap
page read and write
7FFE148B6000
unkown
page readonly
2172901D000
heap
page read and write
7FFDFAF4C000
unkown
page write copy
2172B353000
heap
page read and write
60E000
heap
page read and write
5CD000
heap
page read and write
5C8000
heap
page read and write
2172B3F2000
heap
page read and write
7FFDF9AF1000
unkown
page readonly
3650000
trusted library allocation
page read and write
21723F40000
heap
page read and write
7FFE12220000
unkown
page readonly
6EB2CFF000
stack
page read and write
5CD000
heap
page read and write
217245C4000
heap
page read and write
26FEC0AE000
heap
page read and write
21728AF0000
heap
page read and write
7FFE101D5000
unkown
page readonly
7FFE148B8000
unkown
page readonly
2766000
heap
page read and write
612000
heap
page read and write
276A000
heap
page read and write
21724993000
heap
page read and write
6EB23F7000
stack
page read and write
2172AA96000
heap
page read and write
2172A8AF000
heap
page read and write
2E1E000
stack
page read and write
2172A6D5000
heap
page read and write
666BC000
unkown
page readonly
5CD000
heap
page read and write
2172A0C0000
heap
page read and write
2172AB1B000
heap
page read and write
5BC000
heap
page read and write
26FEA19E000
heap
page read and write
7FFDF8F55000
unkown
page read and write
2172B39F000
heap
page read and write
2172937C000
heap
page read and write
26FEA710000
heap
page read and write
2172A374000
heap
page read and write
7FFE000C1000
unkown
page execute read
3650000
trusted library allocation
page read and write
276B000
heap
page read and write
3650000
trusted library allocation
page read and write
217294A3000
heap
page read and write
7FFE11EAE000
unkown
page readonly
276B000
heap
page read and write
9D0000
heap
page read and write
5BC000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFE014D5000
unkown
page read and write
217224FC000
heap
page read and write
2172A15F000
heap
page read and write
21728C03000
heap
page read and write
2763000
heap
page read and write
6EB25FE000
stack
page read and write
7FFDFB67A000
unkown
page readonly
2172B463000
heap
page read and write
2760000
heap
page read and write
7FFDF88A1000
unkown
page execute read
7FFE0EB51000
unkown
page execute read
5CD000
heap
page read and write
2172A941000
heap
page read and write
2172AA6F000
heap
page read and write
21728E5D000
heap
page read and write
2172A100000
heap
page read and write
21729273000
heap
page read and write
2765000
heap
page read and write
21724686000
heap
page read and write
5BC000
heap
page read and write
3650000
trusted library allocation
page read and write
26FEA012000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFDFB067000
unkown
page read and write
2172A951000
heap
page read and write
2172AAA2000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A8AA000
heap
page read and write
26FEA024000
heap
page read and write
21724496000
heap
page read and write
2172AB44000
heap
page read and write
26FEA717000
heap
page read and write
2DC1000
heap
page read and write
2172AA83000
heap
page read and write
3650000
trusted library allocation
page read and write
2172AAE9000
heap
page read and write
2172AA8B000
heap
page read and write
7FFDF8E8F000
unkown
page readonly
26FEA71C000
heap
page read and write
2762000
heap
page read and write
217292DA000
heap
page read and write
26FE9F20000
trusted library allocation
page read and write
2172B45D000
heap
page read and write
2762000
heap
page read and write
7FFDFB71E000
unkown
page readonly
2172A0BB000
heap
page read and write
2172AA93000
heap
page read and write
5BC000
heap
page read and write
3650000
trusted library allocation
page read and write
2172B3ED000
heap
page read and write
2769000
heap
page read and write
7FFDF9F07000
unkown
page read and write
21725352000
trusted library allocation
page read and write
21724C99000
heap
page read and write
7FFE115C0000
unkown
page readonly
21728504000
heap
page read and write
21724465000
heap
page read and write
2762000
heap
page read and write
7FFE1464B000
unkown
page readonly
21724993000
heap
page read and write
5CD000
heap
page read and write
2172AAB4000
heap
page read and write
2172A6EF000
heap
page read and write
612000
heap
page read and write
21728E91000
heap
page read and write
6EB1CF9000
stack
page read and write
3230000
trusted library allocation
page read and write
5CD000
heap
page read and write
26FEA5CA000
heap
page read and write
21728C32000
heap
page read and write
26FEA741000
heap
page read and write
4D70000
heap
page read and write
5BC000
heap
page read and write
2172A956000
heap
page read and write
5CD000
heap
page read and write
2172725C000
heap
page read and write
2172499E000
heap
page read and write
32F0000
trusted library allocation
page read and write
7FF626618000
unkown
page write copy
26FEA738000
heap
page read and write
21728554000
heap
page read and write
21724CA7000
heap
page read and write
5CD000
heap
page read and write
217291BA000
heap
page read and write
26FEA738000
heap
page read and write
2172A379000
heap
page read and write
2172A82E000
heap
page read and write
217245B4000
heap
page read and write
2172A89E000
heap
page read and write
26FE9F00000
heap
page read and write
A8DCB7F000
stack
page read and write
2172448F000
heap
page read and write
359A000
heap
page read and write
2172A781000
heap
page read and write
7FFE0EB66000
unkown
page readonly
2172A75F000
heap
page read and write
2172B2F0000
heap
page read and write
2172B427000
heap
page read and write
5C8000
heap
page read and write
5BC000
heap
page read and write
2172A779000
heap
page read and write
21729066000
heap
page read and write
FC7000
heap
page read and write
2172A797000
heap
page read and write
276E000
heap
page read and write
5BC000
heap
page read and write
2172A6BB000
heap
page read and write
2172AA9D000
heap
page read and write
217244E0000
trusted library allocation
page read and write
2172909A000
heap
page read and write
5CD000
heap
page read and write
21724C9B000
heap
page read and write
7FFDF91C4000
unkown
page read and write
CF5000
stack
page read and write
5FD000
heap
page read and write
32F0000
trusted library allocation
page read and write
2172ABED000
heap
page read and write
3650000
trusted library allocation
page read and write
2172714E000
heap
page read and write
2172925E000
heap
page read and write
2764000
heap
page read and write
5CD000
heap
page read and write
26FEA72F000
heap
page read and write
5BC000
heap
page read and write
26FE9F50000
heap
page read and write
2172A8E2000
heap
page read and write
21723D50000
heap
page read and write
3230000
trusted library allocation
page read and write
2172B2F8000
heap
page read and write
276B000
heap
page read and write
2E18000
heap
page read and write
7FFE01470000
unkown
page readonly
2172A0F8000
heap
page read and write
7FF6268E4000
unkown
page readonly
26FEA03A000
heap
page read and write
2172A5E0000
heap
page read and write
2764000
heap
page read and write
2172910A000
heap
page read and write
26FEA190000
heap
page read and write
2172B40A000
heap
page read and write
2172AA67000
heap
page read and write
2172A20F000
heap
page read and write
2172911F000
heap
page read and write
2172B378000
heap
page read and write
5BC000
heap
page read and write
26FEA741000
heap
page read and write
2172A7E9000
heap
page read and write
3650000
trusted library allocation
page read and write
5CD000
heap
page read and write
4C00000
heap
page read and write
5BC000
heap
page read and write
26FEC090000
heap
page read and write
2172B3CB000
heap
page read and write
2768000
heap
page read and write
2172A57D000
heap
page read and write
5C8000
heap
page read and write
7FFE11EAA000
unkown
page readonly
2172A829000
heap
page read and write
2172B3DD000
heap
page read and write
7FFDF9801000
unkown
page execute read
2172931F000
heap
page read and write
2172B3CE000
heap
page read and write
2172A55B000
heap
page read and write
2760000
heap
page read and write
5BC000
heap
page read and write
217294C0000
heap
page read and write
21724449000
heap
page read and write
2172B305000
heap
page read and write
217292E3000
heap
page read and write
5BC000
heap
page read and write
21722512000
heap
page read and write
6EB175B000
stack
page read and write
26FE9EE0000
heap
page read and write
21728C1D000
heap
page read and write
271F000
stack
page read and write
2172A858000
heap
page read and write
5C8000
heap
page read and write
5CD000
heap
page read and write
11A6000
heap
page read and write
400000
heap
page read and write
5C8000
heap
page read and write
FCA000
heap
page read and write
2762000
heap
page read and write
276A000
heap
page read and write
5BC000
heap
page read and write
612000
heap
page read and write
2172A854000
heap
page read and write
26FE9FF6000
heap
page read and write
2172A8A2000
heap
page read and write
2172B385000
heap
page read and write
21728CE3000
heap
page read and write
2172A11E000
heap
page read and write
21729389000
heap
page read and write
7FFE13210000
unkown
page readonly
2172AC36000
heap
page read and write
21727170000
heap
page read and write
612000
heap
page read and write
2B40000
heap
page read and write
2765000
heap
page read and write
21728B68000
heap
page read and write
6EB1FFF000
stack
page read and write
5BC000
heap
page read and write
21728BB1000
heap
page read and write
276E000
heap
page read and write
7FFE0EB34000
unkown
page readonly
21724CA3000
heap
page read and write
2172915B000
heap
page read and write
2172A2EF000
heap
page read and write
2172AAC4000
heap
page read and write
5BC000
heap
page read and write
26FEA72F000
heap
page read and write
2172A51A000
heap
page read and write
2764000
heap
page read and write
7FFDF91E1000
unkown
page execute read
3230000
trusted library allocation
page read and write
217292F0000
heap
page read and write
7FFE12226000
unkown
page readonly
21728B12000
heap
page read and write
5C8000
heap
page read and write
7FFDF9280000
unkown
page readonly
21724613000
heap
page read and write
2172936F000
heap
page read and write
21724987000
heap
page read and write
5BC000
heap
page read and write
7FFDFAF94000
unkown
page read and write
2172B446000
heap
page read and write
2172AAA5000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFDFFC80000
unkown
page readonly
276A000
heap
page read and write
2172AAE4000
heap
page read and write
7FFE014A8000
unkown
page readonly
217273D4000
heap
page read and write
612000
heap
page read and write
21729334000
heap
page read and write
6EB35FE000
stack
page read and write
217224AE000
heap
page read and write
2172A88C000
heap
page read and write
2761000
heap
page read and write
3230000
trusted library allocation
page read and write
5BC000
heap
page read and write
2172B37D000
heap
page read and write
3230000
trusted library allocation
page read and write
2172AB92000
heap
page read and write
2172A1A4000
heap
page read and write
5CD000
heap
page read and write
2172B2D1000
heap
page read and write
2172912C000
heap
page read and write
7FFDF9272000
unkown
page read and write
2764000
heap
page read and write
7FFDF9614000
unkown
page readonly
2172442E000
heap
page read and write
276D000
heap
page read and write
2172A43A000
heap
page read and write
2172B3D3000
heap
page read and write
5BC000
heap
page read and write
7FFDFA598000
unkown
page read and write
5C8000
heap
page read and write
3650000
trusted library allocation
page read and write
2172499E000
heap
page read and write
21724993000
heap
page read and write
539F000
heap
page read and write
7FFE12E10000
unkown
page readonly
7FFE12E13000
unkown
page readonly
2172932C000
heap
page read and write
610000
heap
page read and write
26FEA02C000
heap
page read and write
2172A505000
heap
page read and write
21724449000
heap
page read and write
7FFE1157E000
unkown
page read and write
2172A9BB000
heap
page read and write
2172A170000
heap
page read and write
2172B3AE000
heap
page read and write
4A0000
heap
page read and write
21728B71000
heap
page read and write
3650000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
26FEA749000
heap
page read and write
2172A17D000
heap
page read and write
2172A677000
heap
page read and write
612000
heap
page read and write
5CD000
heap
page read and write
7FFDF91C7000
unkown
page write copy
FA2000
heap
page read and write
21729010000
heap
page read and write
3230000
trusted library allocation
page read and write
21728BC7000
heap
page read and write
2172A4D1000
heap
page read and write
5CD000
heap
page read and write
21728F3D000
heap
page read and write
2172492F000
heap
page read and write
2760000
heap
page read and write
217224D8000
heap
page read and write
21729237000
heap
page read and write
21728D4E000
heap
page read and write
2172A0B3000
heap
page read and write
2172467C000
heap
page read and write
21724511000
heap
page read and write
2768000
heap
page read and write
7FFE148B1000
unkown
page execute read
21728B27000
heap
page read and write
26FEA03B000
heap
page read and write
7FFDFF1D0000
unkown
page readonly
3230000
trusted library allocation
page read and write
2172B417000
heap
page read and write
21727146000
heap
page read and write
217224C4000
heap
page read and write
217243D0000
heap
page read and write
665A0000
unkown
page readonly
2172B37F000
heap
page read and write
276E000
heap
page read and write
2172A11A000
heap
page read and write
2172935A000
heap
page read and write
7FFDF836B000
unkown
page readonly
3073000
heap
page read and write
7FFE0EA79000
unkown
page read and write
1FD0000
heap
page read and write
2172A127000
heap
page read and write
666BB000
unkown
page read and write
2172B3B1000
heap
page read and write
5BC000
heap
page read and write
2172A665000
heap
page read and write
7FFE1222C000
unkown
page readonly
21728C66000
heap
page read and write
5F6000
heap
page read and write
21729374000
heap
page read and write
26FEA5C4000
heap
page read and write
5BC000
heap
page read and write
2172A141000
heap
page read and write
2172AC29000
heap
page read and write
3650000
trusted library allocation
page read and write
21728AFD000
heap
page read and write
21729367000
heap
page read and write
2764000
heap
page read and write
26FEA040000
heap
page read and write
5BC000
heap
page read and write
5BC000
heap
page read and write
26FE9F20000
trusted library allocation
page read and write
217272AD000
heap
page read and write
26FE9FF6000
heap
page read and write
217294C8000
heap
page read and write
21729105000
heap
page read and write
2172A92F000
heap
page read and write
2172A35F000
heap
page read and write
1010000
heap
page read and write
2172B42E000
heap
page read and write
2172499E000
heap
page read and write
2172AA7C000
heap
page read and write
7FFDFAB30000
unkown
page readonly
7FFE1A471000
unkown
page execute read
3650000
trusted library allocation
page read and write
21724500000
heap
page read and write
7FFE1A47C000
unkown
page readonly
7FFDFAE2F000
unkown
page readonly
2172ABFF000
heap
page read and write
7FFDF9601000
unkown
page read and write
5BC000
heap
page read and write
641000
heap
page read and write
276E000
heap
page read and write
5CD000
heap
page read and write
6AD24000
unkown
page readonly
2172B3D0000
heap
page read and write
7FFDF95FB000
unkown
page read and write
2172A0C8000
heap
page read and write
21728B24000
heap
page read and write
2172AAC1000
heap
page read and write
7FFDF91CA000
unkown
page read and write
7F0000
heap
page read and write
5C8000
heap
page read and write
7FFE0EB23000
unkown
page readonly
2837000
heap
page read and write
217291E1000
heap
page read and write
7CF000
stack
page read and write
3650000
trusted library allocation
page read and write
2172A345000
heap
page read and write
5CD000
heap
page read and write
2172A3DC000
heap
page read and write
2172A918000
heap
page read and write
217292BC000
heap
page read and write
21728AF8000
heap
page read and write
2172A6CD000
heap
page read and write
21728B46000
heap
page read and write
2DEE000
heap
page read and write
7FF625410000
unkown
page readonly
3650000
trusted library allocation
page read and write
21728F8B000
heap
page read and write
2172A922000
heap
page read and write
2172A93F000
heap
page read and write
2172A36C000
heap
page read and write
7FFDFBABA000
unkown
page readonly
7FFE115D8000
unkown
page readonly
21729379000
heap
page read and write
2172B2C9000
heap
page read and write
2172A59F000
heap
page read and write
6670C000
unkown
page write copy
5CD000
heap
page read and write
2172A83B000
heap
page read and write
10D0000
heap
page read and write
5C8000
heap
page read and write
26FE9F20000
trusted library allocation
page read and write
7FFDF8381000
unkown
page execute read
217224F1000
heap
page read and write
2172B2DE000
heap
page read and write
5BC000
heap
page read and write
21724677000
heap
page read and write
7FFE0E17E000
unkown
page readonly
2172AC3B000
heap
page read and write
2172A4EB000
heap
page read and write
21724653000
heap
page read and write
5CD000
heap
page read and write
2172A0CD000
heap
page read and write
42B0000
heap
page read and write
21724686000
heap
page read and write
2172AA69000
heap
page read and write
2172A0E6000
heap
page read and write
2172B32C000
heap
page read and write
2172B39C000
heap
page read and write
217291EE000
heap
page read and write
21729059000
heap
page read and write
5C8000
heap
page read and write
3650000
trusted library allocation
page read and write
21728B39000
heap
page read and write
2172B40F000
heap
page read and write
21724610000
heap
page read and write
21724667000
heap
page read and write
2172A3F1000
heap
page read and write
276D000
heap
page read and write
217224D5000
heap
page read and write
217244B8000
heap
page read and write
5C8000
heap
page read and write
6EB2DFE000
stack
page read and write
2172B456000
heap
page read and write
5CD000
heap
page read and write
2172AB1D000
heap
page read and write
2172445B000
heap
page read and write
2172A352000
heap
page read and write
7FFDFAFC3000
unkown
page read and write
21728C4C000
heap
page read and write
3650000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
2172A1E8000
heap
page read and write
2E5F000
stack
page read and write
3230000
trusted library allocation
page read and write
612000
heap
page read and write
7FFDFF259000
unkown
page readonly
26FEA72F000
heap
page read and write
2172A18E000
heap
page read and write
2E02000
heap
page read and write
7FFE0EB37000
unkown
page read and write
2172B3F5000
heap
page read and write
26FEA726000
heap
page read and write
7FFE1A47A000
unkown
page readonly
3230000
trusted library allocation
page read and write
2172A8E7000
heap
page read and write
5BC000
heap
page read and write
21729381000
heap
page read and write
2172A818000
heap
page read and write
7FFDF95EE000
unkown
page read and write
2172B3D5000
heap
page read and write
2172A0D5000
heap
page read and write
5CD000
heap
page read and write
21723F43000
heap
page read and write
2768000
heap
page read and write
7FFDF82F0000
unkown
page readonly
2172A495000
heap
page read and write
2B4F000
stack
page read and write
217292B4000
heap
page read and write
217244E0000
trusted library allocation
page read and write
2172A807000
heap
page read and write
2172A90D000
heap
page read and write
26FEA741000
heap
page read and write
7FFE0EB59000
unkown
page readonly
2172445A000
heap
page read and write
217290F0000
heap
page read and write
5CD000
heap
page read and write
21727070000
heap
page read and write
6EB1BFD000
stack
page read and write
2766000
heap
page read and write
3650000
trusted library allocation
page read and write
2766000
heap
page read and write
7FFDF91CB000
unkown
page readonly
5BC000
heap
page read and write
7FFDFAFD0000
unkown
page readonly
5BC000
heap
page read and write
21729139000
heap
page read and write
2172A65D000
heap
page read and write
2172B421000
heap
page read and write
276C000
heap
page read and write
6EB3FFF000
stack
page read and write
2172A97B000
heap
page read and write
7FFDF9F21000
unkown
page execute read
5C8000
heap
page read and write
F9A000
heap
page read and write
26FEA5C5000
heap
page read and write
2172B407000
heap
page read and write
217292D6000
heap
page read and write
5BC000
heap
page read and write
2172B412000
heap
page read and write
2172A888000
heap
page read and write
276C000
heap
page read and write
61A000
heap
page read and write
7FFDF9F06000
unkown
page write copy
21728ADF000
heap
page read and write
2172A563000
heap
page read and write
2172ACA6000
heap
page read and write
2762000
heap
page read and write
2172A418000
heap
page read and write
21724CA9000
heap
page read and write
5BC000
heap
page read and write
5CD000
heap
page read and write
217294B8000
heap
page read and write
4A50000
trusted library allocation
page read and write
2172A5B9000
heap
page read and write
26FEA012000
heap
page read and write
21728FDC000
heap
page read and write
2172B3A1000
heap
page read and write
2172A915000
heap
page read and write
2768000
heap
page read and write
3650000
trusted library allocation
page read and write
21728CEB000
heap
page read and write
630000
heap
page read and write
2172AB3C000
heap
page read and write
3450000
heap
page read and write
E75000
heap
page read and write
21724C06000
heap
page read and write
2172A420000
heap
page read and write
5CD000
heap
page read and write
2172939E000
heap
page read and write
113E000
stack
page read and write
2DD6000
heap
page read and write
276B000
heap
page read and write
2172A949000
heap
page read and write
2172A323000
heap
page read and write
21724993000
heap
page read and write
5C8000
heap
page read and write
217245FD000
heap
page read and write
2763000
heap
page read and write
2172A1AC000
heap
page read and write
21728F28000
heap
page read and write
2760000
heap
page read and write
21723F00000
heap
page read and write
539F000
heap
page read and write
612000
heap
page read and write
2172AC77000
heap
page read and write
7FFE1222B000
unkown
page read and write
21728F57000
heap
page read and write
217285A8000
heap
page read and write
2769000
heap
page read and write
5BC000
heap
page read and write
2172A901000
heap
page read and write
2172A4F8000
heap
page read and write
26FEC0AE000
heap
page read and write
5C8000
heap
page read and write
217248B4000
heap
page read and write
3650000
trusted library allocation
page read and write
482000
unkown
page readonly
2172A527000
heap
page read and write
217244CA000
heap
page read and write
2172B334000
heap
page read and write
7FFDFF1D1000
unkown
page execute read
7FFE0015F000
unkown
page readonly
540000
heap
page read and write
26FEA749000
heap
page read and write
2F81000
heap
page read and write
7FFDFF241000
unkown
page readonly
5BC000
heap
page read and write
26FEA744000
heap
page read and write
31A0000
trusted library allocation
page read and write
7FFDF8C53000
unkown
page read and write
1090000
heap
page read and write
5C8000
heap
page read and write
2172A7C6000
heap
page read and write
2172A425000
heap
page read and write
31F0000
heap
page read and write
480000
heap
page read and write
276C000
heap
page read and write
21724B76000
heap
page read and write
7FFDF8C47000
unkown
page readonly
21728C59000
heap
page read and write
5CD000
heap
page read and write
2172463F000
heap
page read and write
3230000
trusted library allocation
page read and write
5CD000
heap
page read and write
2172AC43000
heap
page read and write
2172251C000
heap
page read and write
2172461D000
heap
page read and write
2767000
heap
page read and write
7FFE1A476000
unkown
page readonly
CEE000
stack
page read and write
408000
unkown
page readonly
217244E0000
trusted library allocation
page read and write
21724689000
heap
page read and write
217294C5000
heap
page read and write
21729331000
heap
page read and write
2294000
heap
page read and write
3230000
trusted library allocation
page read and write
217224FD000
heap
page read and write
2172B44B000
heap
page read and write
612000
heap
page read and write
5C8000
heap
page read and write
7FFDFB002000
unkown
page readonly
276A000
heap
page read and write
2172ABFA000
heap
page read and write
7FFDF93C0000
unkown
page readonly
7FFE0EB38000
unkown
page readonly
7FFDF9D4A000
unkown
page read and write
2765000
heap
page read and write
2172A4A2000
heap
page read and write
2768000
heap
page read and write
5C8000
heap
page read and write
A8DCBFE000
stack
page read and write
2172A8D5000
heap
page read and write
2172ABEB000
heap
page read and write
560000
heap
page read and write
21724686000
heap
page read and write
21724645000
heap
page read and write
2172A1B9000
heap
page read and write
21724D70000
heap
page read and write
21728E77000
heap
page read and write
2765000
heap
page read and write
217224AC000
heap
page read and write
2172AABF000
heap
page read and write
3650000
trusted library allocation
page read and write
612000
heap
page read and write
40A000
unkown
page read and write
2172A16C000
heap
page read and write
5CE000
stack
page read and write
3650000
trusted library allocation
page read and write
530000
heap
page read and write
21724677000
heap
page read and write
5BC000
heap
page read and write
2763000
heap
page read and write
21729210000
heap
page read and write
3650000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
2172A968000
heap
page read and write
21724642000
heap
page read and write
2172B372000
heap
page read and write
7FFE0EB55000
unkown
page readonly
2172AB03000
heap
page read and write
21728EC5000
heap
page read and write
2172B441000
heap
page read and write
2762000
heap
page read and write
217244F5000
heap
page read and write
5DF000
stack
page read and write
3650000
trusted library allocation
page read and write
7FFE13396000
unkown
page read and write
21728B93000
heap
page read and write
2172ABF2000
heap
page read and write
2172A40B000
heap
page read and write
217273C7000
heap
page read and write
3230000
trusted library allocation
page read and write
276A000
heap
page read and write
7FFDF9070000
unkown
page readonly
276C000
heap
page read and write
539F000
heap
page read and write
2172A27F000
heap
page read and write
7FFDFB72A000
unkown
page write copy
290F000
stack
page read and write
2172AAD7000
heap
page read and write
2172919C000
heap
page read and write
AF0000
heap
page read and write
2172A179000
heap
page read and write
2172A80F000
heap
page read and write
2172A0EB000
heap
page read and write
7FFDF8F81000
unkown
page execute read
7FFDF924F000
unkown
page readonly
2172A207000
heap
page read and write
2172A7FE000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A7E0000
heap
page read and write
5C8000
heap
page read and write
7FFDF8F4F000
unkown
page read and write
2172A109000
heap
page read and write
2172A636000
heap
page read and write
2766000
heap
page read and write
2172B360000
heap
page read and write
510000
heap
page read and write
217271E9000
heap
page read and write
7FFE115D1000
unkown
page execute read
2172499E000
heap
page read and write
2172A9F7000
heap
page read and write
2172AB01000
heap
page read and write
276C000
heap
page read and write
217291F6000
heap
page read and write
6EB22FE000
stack
page read and write
5C8000
heap
page read and write
7FFDFB270000
unkown
page readonly
2172B43E000
heap
page read and write
6AD01000
unkown
page execute read
7FFE101D1000
unkown
page execute read
2172A12B000
heap
page read and write
5CA000
heap
page read and write
217224F9000
heap
page read and write
21727152000
heap
page read and write
2172AB3F000
heap
page read and write
2172922A000
heap
page read and write
5BC000
heap
page read and write
2172A2E2000
heap
page read and write
21728BD4000
heap
page read and write
276E000
heap
page read and write
2767000
heap
page read and write
2172A541000
heap
page read and write
2172A78A000
heap
page read and write
7FFE0015B000
unkown
page write copy
276C000
heap
page read and write
2762000
heap
page read and write
6AD17000
unkown
page readonly
2172A43F000
heap
page read and write
2766000
heap
page read and write
2172A650000
heap
page read and write
2172935F000
heap
page read and write
2172B42C000
heap
page read and write
21728F64000
heap
page read and write
539F000
heap
page read and write
21724689000
heap
page read and write
7FFE12E16000
unkown
page readonly
2172A31E000
heap
page read and write
2172466A000
heap
page read and write
FB1000
heap
page read and write
7FFDF8F58000
unkown
page readonly
A8DCAFE000
stack
page read and write
2E1A000
heap
page read and write
7FFE14631000
unkown
page execute read
21728C80000
heap
page read and write
21728652000
heap
page read and write
21728D05000
heap
page read and write
2172ABF5000
heap
page read and write
21724993000
heap
page read and write
2172AB85000
heap
page read and write
217248B5000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFE11501000
unkown
page execute read
6AD20000
unkown
page read and write
21728D46000
heap
page read and write
217291B6000
heap
page read and write
7FFDF9057000
unkown
page readonly
7FFE0EB41000
unkown
page execute read
26FEA19D000
heap
page read and write
21724677000
heap
page read and write
4EE000
stack
page read and write
2172AB0B000
heap
page read and write
7FFDF9275000
unkown
page readonly
217248BC000
heap
page read and write
7FFE1A470000
unkown
page readonly
26FEA012000
heap
page read and write
26FEA739000
heap
page read and write
612000
heap
page read and write
3650000
trusted library allocation
page read and write
217224FD000
heap
page read and write
2172A621000
heap
page read and write
26FEC0A2000
heap
page read and write
2172AC8C000
heap
page read and write
7FFE0EB48000
unkown
page readonly
21724C94000
heap
page read and write
5BC000
heap
page read and write
5C8000
heap
page read and write
60D000
heap
page read and write
217245FD000
heap
page read and write
217293A3000
heap
page read and write
2172A461000
heap
page read and write
2172A93C000
heap
page read and write
2172B458000
heap
page read and write
2172467C000
heap
page read and write
7FFE11EB0000
unkown
page readonly
303F000
stack
page read and write
21728C10000
heap
page read and write
7FFDF9DD1000
unkown
page execute read
3650000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
2172A570000
heap
page read and write
21729496000
heap
page read and write
2172448F000
heap
page read and write
7FFDFAF57000
unkown
page write copy
2768000
heap
page read and write
6EB1EFE000
stack
page read and write
21728BB6000
heap
page read and write
2172A8BB000
heap
page read and write
3230000
trusted library allocation
page read and write
26FEA718000
heap
page read and write
5CD000
heap
page read and write
2765000
heap
page read and write
7FF408030000
trusted library allocation
page read and write
5CD000
heap
page read and write
2172A9FF000
heap
page read and write
217294A6000
heap
page read and write
2172A47B000
heap
page read and write
5C8000
heap
page read and write
21728CF0000
heap
page read and write
21728E84000
heap
page read and write
417E000
stack
page read and write
2172B397000
heap
page read and write
217245E8000
heap
page read and write
2E7B000
heap
page read and write
276E000
heap
page read and write
7FFDFAAE1000
unkown
page read and write
2769000
heap
page read and write
3230000
trusted library allocation
page read and write
2172AC21000
heap
page read and write
F7E000
unkown
page read and write
2172B392000
heap
page read and write
2172AB22000
heap
page read and write
7FFE13397000
unkown
page readonly
21722515000
heap
page read and write
2172448F000
heap
page read and write
21728CBC000
heap
page read and write
7FFE0EB60000
unkown
page readonly
7FFDFB048000
unkown
page readonly
39B000
stack
page read and write
5CD000
heap
page read and write
1040000
heap
page read and write
2172AA74000
heap
page read and write
21728F79000
heap
page read and write
217244B8000
heap
page read and write
21728BA0000
heap
page read and write
35B5000
heap
page read and write
21728DD8000
heap
page read and write
2172A602000
heap
page read and write
7FFE115AD000
unkown
page read and write
2172A39B000
heap
page read and write
21728B0E000
heap
page read and write
2172A909000
heap
page read and write
7FFE0EB26000
unkown
page read and write
2172A802000
heap
page read and write
5C8000
heap
page read and write
3650000
trusted library allocation
page read and write
21728CAF000
heap
page read and write
59E000
stack
page read and write
2172A80B000
heap
page read and write
5C8000
heap
page read and write
2172A2FC000
heap
page read and write
26FEC0B4000
heap
page read and write
3650000
trusted library allocation
page read and write
6AD3A000
unkown
page readonly
7FFDF9D50000
unkown
page readonly
2172B3D8000
heap
page read and write
21728EAB000
heap
page read and write
5C8000
heap
page read and write
21728B8A000
heap
page read and write
32F0000
trusted library allocation
page read and write
5CD000
heap
page read and write
3650000
trusted library allocation
page read and write
5CD000
heap
page read and write
2172A79B000
heap
page read and write
612000
heap
page read and write
26FEA195000
heap
page read and write
7FFDFF141000
unkown
page execute read
2172B3A9000
heap
page read and write
7FFDF9B57000
unkown
page readonly
21728F01000
heap
page read and write
580000
heap
page read and write
2172712E000
heap
page read and write
6EB27FE000
stack
page read and write
276B000
heap
page read and write
7FFDFA31A000
unkown
page readonly
820000
heap
page read and write
2172A937000
heap
page read and write
7FFE000C0000
unkown
page readonly
2172A966000
heap
page read and write
2172B2D6000
heap
page read and write
2172A454000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A68C000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A9C0000
heap
page read and write
21728F7E000
heap
page read and write
2761000
heap
page read and write
21728DF2000
heap
page read and write
5C8000
heap
page read and write
66710000
unkown
page readonly
612000
heap
page read and write
2172A111000
heap
page read and write
2172A961000
heap
page read and write
26FE9FD7000
heap
page read and write
5C8000
heap
page read and write
5C8000
heap
page read and write
21724506000
heap
page read and write
2172B450000
heap
page read and write
21724993000
heap
page read and write
825000
heap
page read and write
21724D40000
heap
page read and write
2769000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A202000
heap
page read and write
3650000
trusted library allocation
page read and write
2172B3C1000
heap
page read and write
5BC000
heap
page read and write
217294B3000
heap
page read and write
2172A954000
heap
page read and write
7FFDFAF98000
unkown
page read and write
2172AC99000
heap
page read and write
297F000
heap
page read and write
2172A597000
heap
page read and write
7FFE14644000
unkown
page readonly
7FFE11EA1000
unkown
page execute read
2172AC2E000
heap
page read and write
2172A2BB000
heap
page read and write
276E000
heap
page read and write
2769000
heap
page read and write
2172A1ED000
heap
page read and write
5CD000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A104000
heap
page read and write
3230000
trusted library allocation
page read and write
2172A28C000
heap
page read and write
217291FB000
heap
page read and write
21728D1F000
heap
page read and write
5C8000
heap
page read and write
433000
heap
page read and write
21728B1F000
heap
page read and write
2172A745000
heap
page read and write
21729251000
heap
page read and write
38B000
stack
page read and write
5CD000
heap
page read and write
5C8000
heap
page read and write
2172A91F000
heap
page read and write
2768000
heap
page read and write
5CD000
heap
page read and write
5BC000
heap
page read and write
21724D53000
heap
page read and write
2172A60F000
heap
page read and write
5CD000
heap
page read and write
2172AB18000
heap
page read and write
21729244000
heap
page read and write
5C8000
heap
page read and write
7FFE130C1000
unkown
page execute read
6EB3AFF000
stack
page read and write
2766000
heap
page read and write
21724983000
heap
page read and write
21728F30000
heap
page read and write
26FEC0A6000
heap
page read and write
3230000
trusted library allocation
page read and write
21728593000
heap
page read and write
7FFE11EA0000
unkown
page readonly
217246CD000
heap
page read and write
276B000
heap
page read and write
2172A87B000
heap
page read and write
2762000
heap
page read and write
2172B436000
heap
page read and write
2172AC0F000
heap
page read and write
2172AC62000
heap
page read and write
6EB21FE000
stack
page read and write
2172A138000
heap
page read and write
2172251A000
heap
page read and write
2172A534000
heap
page read and write
7FF626625000
unkown
page read and write
2172928D000
heap
page read and write
2760000
heap
page read and write
21724513000
heap
page read and write
5CD000
heap
page read and write
6EB3EFF000
stack
page read and write
3230000
trusted library allocation
page read and write
5BC000
heap
page read and write
612000
heap
page read and write
21729396000
heap
page read and write
21728DBE000
heap
page read and write
2172B3E3000
heap
page read and write
5C8000
heap
page read and write
21728EE7000
heap
page read and write
276E000
heap
page read and write
5BC000
heap
page read and write
2767000
heap
page read and write
276C000
heap
page read and write
2172B43B000
heap
page read and write
2CAA000
heap
page read and write
21724686000
heap
page read and write
7FF62661B000
unkown
page read and write
217243FF000
heap
page read and write
5C8000
heap
page read and write
21728E48000
heap
page read and write
2172AC91000
heap
page read and write
2172A1C6000
heap
page read and write
2172A229000
heap
page read and write
2172A500000
heap
page read and write
5BC000
heap
page read and write
2172A236000
heap
page read and write
2F80000
heap
page read and write
3230000
trusted library allocation
page read and write
5BC000
heap
page read and write
11A0000
heap
page read and write
2172A316000
heap
page read and write
5BC000
heap
page read and write
26FEA5CE000
heap
page read and write
2172A26A000
heap
page read and write
21724490000
heap
page read and write
217248A0000
heap
page read and write
612000
heap
page read and write
2172467C000
heap
page read and write
21724B40000
heap
page read and write
3230000
trusted library allocation
page read and write
276A000
heap
page read and write
2172A192000
heap
page read and write
2172A6DA000
heap
page read and write
5BC000
heap
page read and write
5CD000
heap
page read and write
5CD000
heap
page read and write
21724689000
heap
page read and write
276A000
heap
page read and write
21724452000
heap
page read and write
2172B400000
heap
page read and write
21724993000
heap
page read and write
2172A5A4000
heap
page read and write
217224BB000
heap
page read and write
21724D41000
heap
page read and write
21728CA2000
heap
page read and write
3230000
trusted library allocation
page read and write
21723D90000
heap
page read and write
3230000
trusted library allocation
page read and write
21728BE9000
heap
page read and write
2172A76C000
heap
page read and write
21727383000
heap
page read and write
2172AC6F000
heap
page read and write
3650000
trusted library allocation
page read and write
2172B40D000
heap
page read and write
62F000
heap
page read and write
2BFD000
heap
page read and write
2172A3D7000
heap
page read and write
21728B3D000
heap
page read and write
2172AC14000
heap
page read and write
7FFDF9F20000
unkown
page readonly
612000
heap
page read and write
21729146000
heap
page read and write
612000
heap
page read and write
21729215000
heap
page read and write
3650000
trusted library allocation
page read and write
7FFE13380000
unkown
page readonly
2172A18A000
heap
page read and write
5BC000
heap
page read and write
5BC000
heap
page read and write
3650000
trusted library allocation
page read and write
2172AB28000
heap
page read and write
5C8000
heap
page read and write
217243F3000
heap
page read and write
2172A19F000
heap
page read and write
2172AC19000
heap
page read and write
5BC000
heap
page read and write
5BC000
heap
page read and write
6EB20FE000
stack
page read and write
21728BBA000
heap
page read and write
2172A5B1000
heap
page read and write
261E000
stack
page read and write
217290D6000
heap
page read and write
2D70000
heap
page read and write
5C8000
heap
page read and write
2172A54E000
heap
page read and write
6EB2BFE000
stack
page read and write
2172A309000
heap
page read and write
21727136000
heap
page read and write
7FFE115D6000
unkown
page readonly
5CD000
heap
page read and write
21724BF9000
heap
page read and write
2172467C000
heap
page read and write
21729345000
heap
page read and write
26FEA01B000
heap
page read and write
5C8000
heap
page read and write
2ED0000
heap
page read and write
2172B45B000
heap
page read and write
26FEA71E000
heap
page read and write
5C8000
heap
page read and write
21728FBA000
heap
page read and write
21728B05000
heap
page read and write
5C8000
heap
page read and write
7FF626655000
unkown
page write copy
5C8000
heap
page read and write
7FFDF83B4000
unkown
page readonly
2172AAC9000
heap
page read and write
21729232000
heap
page read and write
217244E0000
trusted library allocation
page read and write
217244C6000
heap
page read and write
5C8000
heap
page read and write
7FFDFA58D000
unkown
page read and write
21728BDC000
heap
page read and write
26FEA040000
heap
page read and write
2172A21C000
heap
page read and write
2172902A000
heap
page read and write
21724677000
heap
page read and write
21724496000
heap
page read and write
3230000
trusted library allocation
page read and write
2768000
heap
page read and write
2172A709000
heap
page read and write
21724503000
heap
page read and write
2172A134000
heap
page read and write
2172467C000
heap
page read and write
21728B75000
heap
page read and write
7FFE12221000
unkown
page execute read
5E0000
heap
page read and write
5BC000
heap
page read and write
6AD1F000
unkown
page readonly
2762000
heap
page read and write
413D000
stack
page read and write
5C8000
heap
page read and write
612000
heap
page read and write
2172AC1C000
heap
page read and write
217244D6000
heap
page read and write
2172B31F000
heap
page read and write
5CD000
heap
page read and write
21728BCB000
heap
page read and write
7FFDFAFCD000
unkown
page read and write
5CD000
heap
page read and write
26FEA72F000
heap
page read and write
2172AC07000
heap
page read and write
21728C25000
heap
page read and write
2172A432000
heap
page read and write
5CD000
heap
page read and write
5CD000
heap
page read and write
2766000
heap
page read and write
5C8000
heap
page read and write
7FFE0EA75000
unkown
page readonly
21728BA4000
heap
page read and write
7FFE130C0000
unkown
page readonly
5BC000
heap
page read and write
21728B4E000
heap
page read and write
7FFDFB010000
unkown
page readonly
5C8000
heap
page read and write
2172A186000
heap
page read and write
2172A556000
heap
page read and write
21724564000
heap
page read and write
7FFDF83DD000
unkown
page readonly
2172A1D3000
heap
page read and write
21724C04000
heap
page read and write
7FFDF95EF000
unkown
page write copy
217244C3000
heap
page read and write
5BC000
heap
page read and write
5CD000
heap
page read and write
21728B0A000
heap
page read and write
3650000
trusted library allocation
page read and write
2172AABC000
heap
page read and write
26FEA5C7000
heap
page read and write
5BC000
heap
page read and write
2172AAFB000
heap
page read and write
4220000
heap
page read and write
5CD000
heap
page read and write
5CD000
heap
page read and write
7FFDF8380000
unkown
page readonly
21728FF6000
heap
page read and write
21728F4A000
heap
page read and write
7FFDF82F1000
unkown
page execute read
7FF626657000
unkown
page read and write
7FFDF8C61000
unkown
page execute read
5E9000
heap
page read and write
5C8000
heap
page read and write
2172250E000
heap
page read and write
3650000
trusted library allocation
page read and write
217243FB000
heap
page read and write
2172A24B000
heap
page read and write
7FFE13201000
unkown
page execute read
2172A299000
heap
page read and write
26FEA5CA000
heap
page read and write
21728DFF000
heap
page read and write
26FE9FF6000
heap
page read and write
2172B30A000
heap
page read and write
3230000
trusted library allocation
page read and write
2760000
heap
page read and write
21728EF4000
heap
page read and write
2172A197000
heap
page read and write
2172B3B9000
heap
page read and write
2172AB25000
heap
page read and write
21724993000
heap
page read and write
6EB3AFD000
stack
page read and write
2172AC7F000
heap
page read and write
2769000
heap
page read and write
5BC000
heap
page read and write
33C0000
heap
page read and write
2A15000
heap
page read and write
2172A5ED000
heap
page read and write
2172B3C8000
heap
page read and write
5C8000
heap
page read and write
217272EF000
heap
page read and write
2172A304000
heap
page read and write
21728B17000
heap
page read and write
3650000
trusted library allocation
page read and write
2ACF000
stack
page read and write
5CD000
heap
page read and write
5CD000
heap
page read and write
2D80000
heap
page read and write
2172A836000
heap
page read and write
7FFDFAB31000
unkown
page execute read
2172AB0E000
heap
page read and write
606000
heap
page read and write
2761000
heap
page read and write
5CD000
heap
page read and write
21727207000
heap
page read and write
26FEC0A0000
heap
page read and write
2172AA76000
heap
page read and write
276D000
heap
page read and write
2767000
heap
page read and write
33D0000
heap
page read and write
2172B2CE000
heap
page read and write
2172A865000
heap
page read and write
605000
heap
page read and write
2172A607000
heap
page read and write
2172AB13000
heap
page read and write
2172A549000
heap
page read and write
21728D41000
heap
page read and write
539F000
heap
page read and write
26FEA720000
heap
page read and write
217245BC000
heap
page read and write
26FEA033000
heap
page read and write
2768000
heap
page read and write
5C8000
heap
page read and write
2172462E000
heap
page read and write
21722532000
heap
page read and write
10CD000
stack
page read and write
540000
heap
page read and write
2BD8000
heap
page read and write
2172A4C4000
heap
page read and write
2823000
heap
page read and write
26FEA028000
heap
page read and write
21724BE8000
heap
page read and write
21729391000
heap
page read and write
2172A9C3000
heap
page read and write
5BC000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A7B9000
heap
page read and write
3650000
trusted library allocation
page read and write
2172A3E4000
heap
page read and write
B25000
heap
page read and write
21728B86000
heap
page read and write
2766000
heap
page read and write
21728B2C000
heap
page read and write
21728C2A000
heap
page read and write
21728D8F000
heap
page read and write
26FEA02B000
heap
page read and write
7FFDF8368000
unkown
page read and write
217292F5000
heap
page read and write
2172AA71000
heap
page read and write
2172A79F000
heap
page read and write
568000
heap
page read and write
26FEC0B6000
heap
page read and write
2172A672000
heap
page read and write
21724631000
heap
page read and write
3650000
trusted library allocation
page read and write
5C8000
heap
page read and write
21724686000
heap
page read and write
2172ABE8000
heap
page read and write
2172B3A4000
heap
page read and write
5BC000
heap
page read and write
21722500000
heap
page read and write
2172B2FD000
heap
page read and write
3230000
trusted library allocation
page read and write
7FFDFA5E0000
unkown
page readonly
21724CAA000
heap
page read and write
7FFDFF195000
unkown
page readonly
5C8000
heap
page read and write
2764000
heap
page read and write
2172AAE1000
heap
page read and write
2172A6B3000
heap
page read and write
2172446E000
heap
page read and write
21728597000
heap
page read and write
There are 2506 hidden memdumps, click here to show them.