IOC Report
PSI-CONF_Setup_v2.76.exe

loading gif

Files

File Path
Type
Category
Malicious
PSI-CONF_Setup_v2.76.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PSI-CONF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\rqco3gp6.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (596), with no line terminators
dropped
malicious
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\DriverUninstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\slabvcp.cat
data
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\slabvcp.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\x64\WdfCoInstaller01009.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\x64\silabenm.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\x64\silabser.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\x86\WdfCoInstaller01009.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\x86\silabenm.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\Drivers\USB to UART Interface\x86\silabser.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\BugReportGenerator\BugReportCreator.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\BugReportGenerator\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\BugReportGenerator\de\BugReportCreator.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID1081818\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID1081818\PCID1081818.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID1081818\PhoenixResourceManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID1081818\de\PCID1081818.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID1081818\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313106\Firmware\Device\psiprog-1.57.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313106\Firmware\Telit\Xfp1.9.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313106\Firmware\Telit\streamGE864_7_02_005.BIN
data
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313106\PCID2313106.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313106\de\PCID2313106.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313106\zh-CHS\PCID2313106.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313449\PCID2313449.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313449\de\PCID2313449.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313449\zh-CHS\PCID2313449.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313533\PCID2313533.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313533\de\PCID2313533.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313533\zh-CHS\PCID2313533.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313559\FactoryDefinedConnectionSets.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313559\PCID2313559.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313559\de\PCID2313559.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313559\zh-CHS\PCID2313559.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313643\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313643\PCID2313643.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313643\de\PCID2313643.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313643\zh-CHS\PCID2313643.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC0A8C.gsd
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_00F0.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_0656.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_066A.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_067F.gsd
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_06BD.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_06CC.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_06FD.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_07E9.GSD
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_096B.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\PXC_196B_DPV0.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\Pxc_066b.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\Pxc_066c.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\GSD\Pxc_06FB.gsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\SlottimeHelp_de.htm
HTML document, ISO-8859 text, with very long lines (323), with CRLF, NEL line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\SlottimeHelp_en.htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\header.gif
GIF image data, version 89a, 430 x 57
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\logo.gif
GIF image data, version 89a, 111 x 29
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\step1.PNG
PNG image data, 588 x 181, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\step2.PNG
PNG image data, 588 x 235, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\step3.PNG
PNG image data, 589 x 437, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\step4.PNG
PNG image data, 589 x 536, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\Help\step5.PNG
PNG image data, 588 x 235, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\PCID2313656.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\de\PCID2313656.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313656\zh-CHS\PCID2313656.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313669\FactoryDefinedConnectionSets.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313669\PCID2313669.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313669\de\PCID2313669.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2313669\zh-CHS\PCID2313669.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702184\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702184\PCID2702184.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702184\de\PCID2702184.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702184\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702184\zh-CHS\PCID2702184.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\PCID2702863.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\PhoenixResourceManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\de\PCID2702863.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\ru\PCID2702863.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702863\zh-CHS\PCID2702863.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702878\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702878\PCID2702878.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702878\de\PCID2702878.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702878\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2702878\zh-CHS\PCID2702878.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2708517\FactoryDefinedConnectionSets.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2708517\Manuals\ResetEscapeCharacter_DE_00.pdf
PDF document, version 1.5, 4 pages
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2708517\Manuals\ResetEscapeCharacter_EN_00.pdf
PDF document, version 1.5, 4 pages
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2708517\PCID2708517.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2708517\de\PCID2708517.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2708517\zh-CHS\PCID2708517.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901540\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901540\PCID2901540.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901540\de\PCID2901540.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901540\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901540\zh-CHS\PCID2901540.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\PCID2901541.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\PCID2901541_HG.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\de\PCID2901541.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\ru\PCID2901541.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2901541\zh-CHS\PCID2901541.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2904909\ModbusLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2904909\PCID2904909.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2904909\de\PCID2904909.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2904909\modbconf.xml
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Devices\PCID2904909\zh-CHS\PCID2904909.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\GetActiveProxy.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PSI-CONF AutoUpdate.dat
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PSI-CONF AutoUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PSI-CONF.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PhoenixResourceManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\IRIMG1.BMP
PC bitmap, Windows 3.x format, 497 x 63 x 24, image size 93996, cbSize 94050, bits offset 54
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\IRIMG1.JPG
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS2 Windows, datetime=2008:07:08 14:20:15], baseline, precision 8, 166x312, components 3
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\IRIMG2.BMP
PC bitmap, Windows 3.x format, 497 x 63 x 24, image size 93996, cbSize 94050, bits offset 54
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\IRIMG2.JPG
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS2 Windows, datetime=2008:07:08 14:20:15], baseline, precision 8, 166x312, components 3
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\IRIMG3.BMP
PC bitmap, Windows 3.x format, 497 x 362 x 24, image size 540104, cbSize 540158, bits offset 54
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\IRZip.lmd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\uni5359.tmp
data
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\uninstall.dat
data
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\Uninstall\uninstall.xml
XML 1.0 document, ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\de\PSI-CONF.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\ru\PSI-CONF.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\zh-CHS\PSI-CONF.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Phoenix Contact\PSI-CONF\PSI-CONF Update Client.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue May 12 05:25:19 2020, mtime=Tue May 12 05:25:19 2020, atime=Tue Apr 7 04:21:48 2020, length=1240440, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Phoenix Contact\PSI-CONF\PSI-CONF.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue May 12 09:17:13 2020, mtime=Fri Jan 8 11:41:52 2021, atime=Fri Jan 8 11:39:11 2021, length=5014064, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Phoenix Contact\PSI-CONF\Uninstall PSI-CONF.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 8 06:46:20 2024, mtime=Tue Oct 8 06:46:20 2024, atime=Tue Oct 8 06:46:20 2024, length=580096, window=hide
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\FactoryDefinedConnectionSets1081818.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\FactoryDefinedConnectionSets2901540.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\FactoryDefinedConnectionSets2901541.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\FactoryDefinedConnectionSets2904909.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\PSI-CONF_Update.SAV
Generic INItialization configuration [Server]
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\ProjectData.SAV
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Phoenix Contact\PSIConfSoftware\SetupLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\PSI-CONF.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Icon number=0, Archive, ctime=Tue May 12 09:17:13 2020, mtime=Tue Oct 8 06:46:52 2024, atime=Fri Jan 8 11:39:11 2021, length=5014064, window=hide
dropped
C:\Users\user\AppData\Local\Temp\CSCF17D.tmp
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESF17E.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x40e, 9 symbols, created Tue Oct 8 07:47:00 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\IRIMG1.BMP
PC bitmap, Windows 3.x format, 497 x 63 x 24, image size 93996, cbSize 94050, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\IRIMG1.JPG
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS2 Windows, datetime=2008:07:08 14:20:15], baseline, precision 8, 166x312, components 3
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\IRIMG2.BMP
PC bitmap, Windows 3.x format, 497 x 63 x 24, image size 93996, cbSize 94050, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\IRIMG2.JPG
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS2 Windows, datetime=2008:07:08 14:20:15], baseline, precision 8, 166x312, components 3
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\IRIMG3.BMP
PC bitmap, Windows 3.x format, 497 x 362 x 24, image size 540104, cbSize 540158, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\IRZip.lmd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\PXC_USB-Driver.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\Phoenix Contact VCPInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\irsetup.dat
data
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\setup.ini
Generic INItialization configuration [Driver Version]
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\setup.iss (copy)
Generic INItialization configuration [File Transfer]
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\setupWin2K.iss
Generic INItialization configuration [File Transfer]
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\setupWin7.iss
Generic INItialization configuration [File Transfer]
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\slabvcp.cat
data
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\slabvcp.inf
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\x64\WdfCoInstaller01009.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\x64\silabenm.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\x64\silabser.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\x86\WdfCoInstaller01009.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\x86\silabenm.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\x86\silabser.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\rqco3gp6.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rqco3gp6.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\rqco3gp6.out
Unicode text, UTF-8 (with BOM) text, with very long lines (679), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\SET152A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\SET154A.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\slabvcp.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\slabvcp.inf (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\x64\SET14D9.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\x64\SET14EA.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\x64\SET14FA.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\x64\WdfCoinstaller01009.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\x64\silabenm.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\x64\silabser.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\INF\oem0.PNF
Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1158 "Signature", at 0x68 WinDirPath, LanguageID 809
dropped
C:\Windows\INF\oem1.PNF
Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1100 "Signature", at 0x68 WinDirPath, LanguageID 809
dropped
C:\Windows\INF\oem3.PNF
Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1210 "Signature", at 0x68 WinDirPath, LanguageID 809
dropped
C:\Windows\INF\oem4.inf
Windows setup INFormation
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\SET18A5.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\SET18B5.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\slabvcp.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\slabvcp.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\x64\SET17E6.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\x64\SET1845.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\x64\SET1865.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\x64\WdfCoinstaller01009.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\x64\silabenm.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\x64\silabser.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\assembly\Desktop.ini
Windows desktop.ini
dropped
There are 183 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{86984c43-8b67-194b-9c7f-ab018d349ed2}\slabvcp.inf" "9" "4f7b0f4b7" "0000000000000148" "WinSta0\Default" "0000000000000168" "208" "C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0"
malicious
C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PSI-CONF.exe
"C:\Program Files (x86)\Phoenix Contact\PSI-CONF\PSI-CONF.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rqco3gp6.cmdline"
malicious
C:\Users\user\Desktop\PSI-CONF_Setup_v2.76.exe
"C:\Users\user\Desktop\PSI-CONF_Setup_v2.76.exe"
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
"C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:666146 "__IRAFN:C:\Users\user\Desktop\PSI-CONF_Setup_v2.76.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-2246122658-3693405117-2476756634-1003"
C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\Phoenix Contact VCPInstaller.exe
"C:\Users\user\AppData\Local\Temp\_ir_sf_temp_0\Phoenix Contact VCPInstaller.exe"
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{c7f7ce19-85e2-2b4e-af72-83044df6dea6} Global\{7407c8d9-0d94-0b41-8543-eb54da946896} C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\slabvcp.inf C:\Windows\System32\DriverStore\Temp\{2980290e-e66e-1341-aacb-9a72a3cc8330}\slabvcp.cat
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\System32\icacls.exe" "C:\ProgramData\Phoenix Contact\PSIConfSoftware" /grant *S-1-1-0:(OI)M /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF17E.tmp" "c:\Users\user\AppData\Local\Temp\CSCF17D.tmp"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.indigorose.comERROR:
unknown
http://www.phoenixcontact.com/
unknown
https://select.phoenixcontact.com/phoenix/dwl/dwl01.jsp?from=psiconf&file=
unknown
http://www.indigorose.com
unknown
http://www.phoenixcontact.com/EditField)_0
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\BE36A4562FB2EE05DBB3D32323ADF445084ED656
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PSI-CONF
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.dat
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PSI-CONF-Project
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PSI-CONF-Project\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\PrivCheck
PrivCheckValue
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
CompanyName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
DeviceHardwareID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
DriverVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
VidPidUninstallList
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
QuietUninstallMode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
RemoveDriversOnUninstall
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
InfUninstallList
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
CopiedFilesUninstallList
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
DriverInstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
DriverUninstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
InstallDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Silicon Laboratories, Inc.\Silicon Laboratories Driver Installations\VCP CP210x Cardinal\SLABCOMM&10C4&EA60
InstallSubdirectories
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SLABCOMM&10C4&EA60
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SLABCOMM&10C4&EA60
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SLABCOMM&10C4&EA60
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SLABCOMM&10C4&EA60
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SLABCOMM&10C4&EA60
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\46B8D8F38741CD4E839F1F6B874F58B0A87C1937
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Blob
There are 28 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4CFA000
heap
page read and write
50B000
heap
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
6B3000
heap
page read and write
565000
heap
page read and write
2781000
heap
page read and write
2770000
heap
page read and write
46B7000
heap
page read and write
27D10000
trusted library allocation
page read and write
1A27B640000
heap
page read and write
2763000
heap
page read and write
4CFA000
heap
page read and write
469D000
heap
page read and write
F1F000
unkown
page readonly
B99000
heap
page read and write
258CB000
unkown
page readonly
E10000
unkown
page readonly
2B39000
heap
page read and write
2802000
heap
page read and write
247E6000
unkown
page readonly
27B2000
heap
page read and write
4630000
heap
page read and write
1D286000
unkown
page readonly
1A27B67E000
heap
page read and write
46F6000
heap
page read and write
4667000
heap
page read and write
1D4AD000
unkown
page readonly
1A27B68F000
heap
page read and write
2741000
heap
page read and write
586000
heap
page read and write
1EC20000
unkown
page readonly
6C2000
heap
page read and write
24480000
unkown
page readonly
241E9300000
heap
page read and write
50B000
heap
page read and write
2A0F000
heap
page read and write
1A27B675000
heap
page read and write
4441000
heap
page read and write
50B000
heap
page read and write
471A000
heap
page read and write
4CF4000
heap
page read and write
1F37F000
unkown
page readonly
573000
heap
page read and write
2830000
heap
page read and write
59C000
heap
page read and write
1A27B67E000
heap
page read and write
46E5000
heap
page read and write
29D0000
heap
page read and write
544000
heap
page read and write
2638E000
unkown
page readonly
467C000
heap
page read and write
4678000
heap
page read and write
22C5E000
unkown
page readonly
1EA21000
unkown
page readonly
7FF8490DB000
trusted library allocation
page read and write
584000
heap
page read and write
4658000
heap
page read and write
1A27BB0C000
heap
page read and write
1A27B676000
heap
page read and write
1D489000
unkown
page readonly
20BC0000
unkown
page readonly
1A27B663000
heap
page read and write
52F0000
trusted library allocation
page read and write
2A70000
heap
page read and write
4184000
trusted library allocation
page read and write
1A27B672000
heap
page read and write
4686000
heap
page read and write
50B000
heap
page read and write
27C7000
heap
page read and write
4698000
heap
page read and write
297AC000
trusted library allocation
page read and write
4650000
heap
page read and write
467B000
heap
page read and write
46F8000
heap
page read and write
4694000
heap
page read and write
69C000
heap
page read and write
4694000
heap
page read and write
4667000
heap
page read and write
4401000
heap
page read and write
1CC56000
unkown
page readonly
46B7000
heap
page read and write
1BD4000
heap
page read and write
4693000
heap
page read and write
50B000
heap
page read and write
4655000
heap
page read and write
3BB5000
trusted library allocation
page read and write
241E8E0A000
heap
page read and write
2A56000
heap
page read and write
4682000
heap
page read and write
1C740000
heap
page read and write
46E4000
heap
page read and write
29B6000
heap
page read and write
1CA76000
unkown
page readonly
6A5000
heap
page read and write
4667000
heap
page read and write
592000
heap
page read and write
43F4000
heap
page read and write
4693000
heap
page read and write
2B04000
heap
page read and write
1CB25000
unkown
page readonly
59C000
heap
page read and write
241E8D8C000
heap
page read and write
22DEE000
unkown
page readonly
4D2E000
heap
page read and write
59C000
heap
page read and write
1CCB9000
unkown
page readonly
50B000
heap
page read and write
545000
heap
page read and write
545000
heap
page read and write
27F6000
heap
page read and write
43EE000
heap
page read and write
2024B000
unkown
page readonly
241E6F78000
heap
page read and write
4419000
heap
page read and write
4CF1000
heap
page read and write
27F6000
heap
page read and write
2BA2000
heap
page read and write
46E5000
heap
page read and write
4667000
heap
page read and write
2B03000
heap
page read and write
1F1C3000
unkown
page readonly
23ACF000
unkown
page readonly
4D0C000
heap
page read and write
4CF1000
heap
page read and write
4753000
heap
page read and write
564000
heap
page read and write
27E3000
heap
page read and write
1F00E000
unkown
page readonly
27DA000
heap
page read and write
8E0000
heap
page read and write
58C000
heap
page read and write
20CAD000
unkown
page readonly
46CE000
heap
page read and write
50B000
heap
page read and write
50B000
heap
page read and write
27A0000
heap
page read and write
1938000
heap
page read and write
6E8000
heap
page read and write
524000
heap
page read and write
1F3DE000
unkown
page readonly
29DC000
heap
page read and write
241E6F48000
heap
page read and write
4650000
heap
page read and write
46B7000
heap
page read and write
46F6000
heap
page read and write
200A6000
unkown
page readonly
43FA000
heap
page read and write
1D08C000
unkown
page readonly
46FC000
heap
page read and write
46CE000
heap
page read and write
1CAFF000
unkown
page readonly
50B000
heap
page read and write
2400000
heap
page read and write
46FC000
heap
page read and write
7FF8491B0000
trusted library allocation
page execute and read and write
2434000
heap
page read and write
6E8000
heap
page read and write
2A70000
heap
page read and write
4611000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
4D05000
heap
page read and write
1A27B6B2000
heap
page read and write
50B000
heap
page read and write
2A37000
heap
page read and write
446A000
heap
page read and write
544000
heap
page read and write
2483A000
unkown
page readonly
27E5000
heap
page read and write
40E000
unkown
page readonly
46FA000
heap
page read and write
46F7000
heap
page read and write
23D09000
unkown
page readonly
29E1000
heap
page read and write
4CF7000
heap
page read and write
2A65000
heap
page read and write
592000
heap
page read and write
444D000
heap
page read and write
4AEE000
heap
page read and write
6F0000
heap
page read and write
2A70000
heap
page read and write
2749000
heap
page read and write
4611000
heap
page read and write
1FD92000
unkown
page readonly
5A0000
heap
page read and write
282C000
heap
page read and write
6A2000
heap
page read and write
26150000
unkown
page readonly
569000
unkown
page execute and read and write
29C5000
heap
page read and write
584000
heap
page read and write
27B7000
heap
page read and write
90F000
stack
page read and write
4718000
heap
page read and write
4642000
heap
page read and write
26232000
unkown
page readonly
4416000
heap
page read and write
2AF4000
heap
page read and write
13A2C000
trusted library allocation
page read and write
669000
heap
page read and write
21883000
unkown
page readonly
4FF000
heap
page read and write
568000
heap
page read and write
7FF849012000
trusted library allocation
page read and write
222A0000
unkown
page readonly
241E8DFD000
heap
page read and write
7FF848E1A000
trusted library allocation
page execute and read and write
1A27BB15000
heap
page read and write
4661000
heap
page read and write
564000
heap
page read and write
1350000
heap
page read and write
592000
heap
page read and write
46FB000
heap
page read and write
565000
heap
page read and write
46F6000
heap
page read and write
29641000
trusted library allocation
page read and write
1F08A000
unkown
page readonly
545000
heap
page read and write
50B000
heap
page read and write
20E4C000
unkown
page readonly
2AF3000
heap
page read and write
4667000
heap
page read and write
23C5E000
unkown
page readonly
26F66000
unkown
page readonly
449C000
heap
page read and write
1F399000
unkown
page readonly
223BF000
unkown
page readonly
1A27B6A5000
heap
page read and write
544000
heap
page read and write
29F4000
heap
page read and write
1A27B681000
heap
page read and write
22678000
unkown
page readonly
241E8DCE000
heap
page read and write
565000
heap
page read and write
473C000
heap
page read and write
29B1000
heap
page read and write
46E5000
heap
page read and write
6B6000
heap
page read and write
471E000
heap
page read and write
4667000
heap
page read and write
4678000
heap
page read and write
4BAA000
heap
page read and write
4474000
heap
page read and write
8CF000
stack
page read and write
2A46000
heap
page read and write
27B74000
trusted library allocation
page read and write
13A24000
trusted library allocation
page read and write
21B80000
unkown
page readonly
1E8F9000
unkown
page readonly
4CFA000
heap
page read and write
51F000
heap
page read and write
2B97000
heap
page read and write
1F420000
unkown
page readonly
1A27B68C000
heap
page read and write
241E8E07000
heap
page read and write
46F6000
heap
page read and write
4682000
heap
page read and write
4686000
heap
page read and write
219F0000
unkown
page readonly
50B000
heap
page read and write
4658000
heap
page read and write
1E3B2000
unkown
page readonly
22519000
unkown
page readonly
545000
heap
page read and write
209E5000
unkown
page readonly
6E6000
heap
page read and write
59C000
heap
page read and write
43F2000
heap
page read and write
27A0000
heap
page read and write
4425000
heap
page read and write
4659000
heap
page read and write
551000
heap
page read and write
2386F000
unkown
page readonly
1EB80000
unkown
page readonly
4CFA000
heap
page read and write
22E89000
unkown
page readonly
20AE3000
unkown
page readonly
4488000
heap
page read and write
241EA6F9000
heap
page read and write
280B000
heap
page read and write
24819000
unkown
page readonly
55C000
heap
page read and write
2839000
heap
page read and write
2741000
heap
page read and write
241E8D67000
heap
page read and write
1DF81000
heap
page read and write
24AD9000
unkown
page readonly
448C000
heap
page read and write
1A27B6AB000
heap
page read and write
20E2F000
unkown
page readonly
6A4000
heap
page read and write
565000
heap
page read and write
6F0000
heap
page read and write
21A65000
unkown
page readonly
239C2000
unkown
page readonly
1D032000
unkown
page readonly
46CE000
heap
page read and write
2A65000
heap
page read and write
592000
heap
page read and write
52F000
heap
page read and write
9FE000
stack
page read and write
283D000
heap
page read and write
27DA000
heap
page read and write
2A30000
heap
page read and write
1A27B696000
heap
page read and write
4468000
heap
page read and write
4611000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
1A27B560000
heap
page read and write
1A27B68C000
heap
page read and write
4621000
heap
page read and write
5A0000
heap
page read and write
4426000
heap
page read and write
6E8000
heap
page read and write
22B22000
unkown
page readonly
1E2FE000
unkown
page readonly
59C000
heap
page read and write
2A11000
heap
page read and write
471E000
heap
page read and write
2829000
heap
page read and write
545000
heap
page read and write
401000
unkown
page execute read
44C8000
heap
page read and write
584000
heap
page read and write
281C000
heap
page read and write
2710E000
unkown
page readonly
7FF849050000
trusted library allocation
page read and write
1A27B677000
heap
page read and write
241E6F7D000
heap
page read and write
4F0000
heap
page read and write
545000
heap
page read and write
2A05000
heap
page read and write
46E5000
heap
page read and write
60E000
heap
page read and write
46CE000
heap
page read and write
6F6000
heap
page read and write
1E002000
heap
page read and write
1EBA9000
unkown
page readonly
4695000
heap
page read and write
68E000
heap
page read and write
2B42000
heap
page read and write
50B000
heap
page read and write
4693000
heap
page read and write
46CE000
heap
page read and write
469D000
heap
page read and write
6A2000
heap
page read and write
1A27B6A5000
heap
page read and write
1D01F000
unkown
page readonly
401000
unkown
page execute read
2778000
heap
page read and write
1A27B672000
heap
page read and write
1A27B67E000
heap
page read and write
4678000
heap
page read and write
469E000
heap
page read and write
283E000
heap
page read and write
200E9000
unkown
page readonly
2B22000
heap
page read and write
1A27B681000
heap
page read and write
3B82000
trusted library allocation
page read and write
4693000
heap
page read and write
1380000
heap
page read and write
1A27B66C000
heap
page read and write
534000
heap
page read and write
18FC000
heap
page read and write
1360000
heap
page read and write
445F000
heap
page read and write
4611000
heap
page read and write
46F6000
heap
page read and write
4686000
heap
page read and write
46E5000
heap
page read and write
4678000
heap
page read and write
2741000
heap
page read and write
248F2000
unkown
page readonly
470E000
heap
page read and write
545000
heap
page read and write
241E8DD5000
heap
page read and write
4686000
heap
page read and write
2781000
heap
page read and write
27D3000
heap
page read and write
1FDFC000
unkown
page readonly
443D000
heap
page read and write
4D05000
heap
page read and write
27A0000
heap
page read and write
283E000
heap
page read and write
4661000
heap
page read and write
471B000
heap
page read and write
46B7000
heap
page read and write
545000
heap
page read and write
46F6000
heap
page read and write
565000
heap
page read and write
1F48C000
unkown
page readonly
1E3D7000
unkown
page readonly
2761000
heap
page read and write
46E5000
heap
page read and write
544000
heap
page read and write
467A000
heap
page read and write
1A27B683000
heap
page read and write
4693000
heap
page read and write
555000
heap
page read and write
21538000
unkown
page readonly
1E8C2000
unkown
page readonly
2814000
heap
page read and write
2B56000
heap
page read and write
280B000
heap
page read and write
592000
heap
page read and write
4611000
heap
page read and write
40C000
unkown
page read and write
7FF848EE0000
trusted library allocation
page read and write
50B000
heap
page read and write
2760000
heap
page read and write
1A27B696000
heap
page read and write
4709000
heap
page read and write
564000
heap
page read and write
50B000
heap
page read and write
1CD47000
unkown
page readonly
4694000
heap
page read and write
4658000
heap
page read and write
542000
heap
page read and write
444B000
heap
page read and write
2A30000
heap
page read and write
46B7000
heap
page read and write
6F1000
heap
page read and write
4686000
heap
page read and write
4725000
heap
page read and write
27DA000
heap
page read and write
6F7000
heap
page read and write
4658000
heap
page read and write
19D000
stack
page read and write
1D13E000
unkown
page readonly
575000
unkown
page execute and read and write
22D9C000
unkown
page readonly
464D000
heap
page read and write
4AD4000
heap
page read and write
46F6000
heap
page read and write
1D425000
unkown
page readonly
2B43000
heap
page read and write
27D6000
heap
page read and write
22548000
unkown
page readonly
69A000
heap
page read and write
4F3000
unkown
page execute and write copy
216BD000
unkown
page readonly
2741000
heap
page read and write
43FB000
heap
page read and write
20B28000
unkown
page readonly
52D000
heap
page read and write
1F11D000
unkown
page readonly
442F000
heap
page read and write
2814000
heap
page read and write
241E8E1D000
heap
page read and write
4D12000
heap
page read and write
4658000
heap
page read and write
241E90EC000
heap
page read and write
4694000
heap
page read and write
46FD000
heap
page read and write
4611000
heap
page read and write
545000
heap
page read and write
27138000
unkown
page readonly
2760000
heap
page read and write
290B000
heap
page read and write
241E6F8B000
heap
page read and write
4AC7000
heap
page read and write
29D1000
heap
page read and write
1A27B691000
heap
page read and write
27A6000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
1CB09000
unkown
page readonly
2B56000
heap
page read and write
281B000
heap
page read and write
1F473000
unkown
page readonly
52D000
heap
page read and write
446C000
heap
page read and write
1A27B69C000
heap
page read and write
4693000
heap
page read and write
1F17C000
unkown
page readonly
46F6000
heap
page read and write
1E980000
unkown
page readonly
46FB000
heap
page read and write
551000
heap
page read and write
50B000
heap
page read and write
4658000
heap
page read and write
565000
heap
page read and write
1EBC7000
unkown
page readonly
20A89000
unkown
page readonly
7FF848E43000
trusted library allocation
page execute and read and write
27700000
heap
page read and write
46CE000
heap
page read and write
50B000
heap
page read and write
50B000
heap
page read and write
1A27B68F000
heap
page read and write
52D000
heap
page read and write
46B7000
heap
page read and write
27DA000
heap
page read and write
23762000
unkown
page readonly
6FA000
heap
page read and write
29E1000
heap
page read and write
7FF849060000
trusted library allocation
page execute and read and write
44B9000
heap
page read and write
23083000
unkown
page readonly
262BD000
unkown
page readonly
578000
unkown
page execute and write copy
574000
heap
page read and write
20A36000
unkown
page readonly
565000
heap
page read and write
25F3000
heap
page read and write
2151D000
unkown
page readonly
2749000
heap
page read and write
2B42000
heap
page read and write
6F9000
heap
page read and write
449E000
heap
page read and write
50B000
heap
page read and write
1A27B68F000
heap
page read and write
567000
heap
page read and write
46F6000
heap
page read and write
2B12000
heap
page read and write
46B7000
heap
page read and write
46F6000
heap
page read and write
214FD000
unkown
page readonly
4468000
heap
page read and write
693000
heap
page read and write
46C6000
heap
page read and write
1CA29000
unkown
page readonly
21876000
unkown
page readonly
9E2E6FE000
stack
page read and write
27F6000
heap
page read and write
241EC0F0000
trusted library allocation
page read and write
4686000
heap
page read and write
22CBA000
unkown
page readonly
4667000
heap
page read and write
469E000
heap
page read and write
2741000
heap
page read and write
4D0D000
heap
page read and write
2B04000
heap
page read and write
2749000
heap
page read and write
4D0A000
heap
page read and write
1BA0000
heap
page read and write
29DC000
heap
page read and write
241E8DA9000
heap
page read and write
29DC000
heap
page read and write
29B1000
heap
page read and write
6A4000
heap
page read and write
4682000
heap
page read and write
46CE000
heap
page read and write
29B1000
heap
page read and write
4CF4000
heap
page read and write
7FF849145000
trusted library allocation
page read and write
46E5000
heap
page read and write
2A65000
heap
page read and write
6E8000
heap
page read and write
6E8000
heap
page read and write
2BA2000
heap
page read and write
1A27B691000
heap
page read and write
43FF000
heap
page read and write
4D11000
heap
page read and write
58D000
heap
page read and write
241E8E02000
heap
page read and write
59C000
heap
page read and write
46CE000
heap
page read and write
568000
heap
page read and write
592000
heap
page read and write
21726000
unkown
page readonly
1A27B692000
heap
page read and write
2781000
heap
page read and write
473C000
heap
page read and write
280B000
heap
page read and write
218DD000
unkown
page readonly
46F6000
heap
page read and write
4682000
heap
page read and write
282C000
heap
page read and write
53C000
heap
page read and write
6F9000
heap
page read and write
241E8DD3000
heap
page read and write
2B87000
heap
page read and write
1DF79000
heap
page read and write
2712E000
unkown
page readonly
1A27B6AB000
heap
page read and write
15316000
trusted library allocation
page read and write
6AA000
heap
page read and write
23A15000
unkown
page readonly
471D000
heap
page read and write
52D000
heap
page read and write
1FC42000
unkown
page readonly
46E5000
heap
page read and write
241E8DD1000
heap
page read and write
4D08000
heap
page read and write
46EC000
heap
page read and write
2A50000
heap
page read and write
50B000
heap
page read and write
2A30000
heap
page read and write
568000
heap
page read and write
46F6000
heap
page read and write
280B000
heap
page read and write
4682000
heap
page read and write
1E50B000
unkown
page readonly
7FF8490B0000
trusted library allocation
page read and write
400000
unkown
page readonly
241E6F00000
heap
page read and write
46A8000
heap
page read and write
22C8F000
unkown
page readonly
50B000
heap
page read and write
46B7000
heap
page read and write
43F6000
heap
page read and write
2741000
heap
page read and write
6E8000
heap
page read and write
2A13000
heap
page read and write
1E281000
unkown
page readonly
1F297000
unkown
page readonly
4682000
heap
page read and write
4D2E000
heap
page read and write
4682000
heap
page read and write
25868000
unkown
page readonly
50B000
heap
page read and write
473C000
heap
page read and write
2706E000
unkown
page readonly
44B9000
heap
page read and write
4D0E000
heap
page read and write
283D000
heap
page read and write
1A27B68F000
heap
page read and write
4709000
heap
page read and write
752000
heap
page read and write
20B76000
unkown
page readonly
46F9000
heap
page read and write
4693000
heap
page read and write
282D000
heap
page read and write
2814000
heap
page read and write
1D493000
unkown
page readonly
1F24A000
unkown
page readonly
46F6000
heap
page read and write
46B7000
heap
page read and write
2749000
heap
page read and write
46F7000
heap
page read and write
6F0000
heap
page read and write
464D000
heap
page read and write
50B000
heap
page read and write
1FD88000
unkown
page readonly
1A27B691000
heap
page read and write
6C9000
heap
page read and write
1F0CF000
unkown
page readonly
1EF82000
unkown
page readonly
1D1AD000
unkown
page readonly
21513000
unkown
page readonly
544000
heap
page read and write
1C73E000
stack
page read and write
1A27B6B1000
heap
page read and write
4682000
heap
page read and write
46CE000
heap
page read and write
46F6000
heap
page read and write
50B000
heap
page read and write
513000
heap
page read and write
1F28D000
unkown
page readonly
564000
heap
page read and write
50B000
heap
page read and write
44B5000
heap
page read and write
2741000
heap
page read and write
46F6000
heap
page read and write
467A000
heap
page read and write
1A27B6B2000
heap
page read and write
4686000
heap
page read and write
1B90000
trusted library allocation
page read and write
50B000
heap
page read and write
4658000
heap
page read and write
6E8000
heap
page read and write
44B9000
heap
page read and write
29FF000
heap
page read and write
559000
heap
page read and write
44AC000
heap
page read and write
46F6000
heap
page read and write
46CE000
heap
page read and write
283E000
heap
page read and write
4CFA000
heap
page read and write
46A4000
heap
page read and write
2814000
heap
page read and write
1E1FD000
stack
page read and write
20000
trusted library allocation
page read and write
1A27B66C000
heap
page read and write
1A27B6D3000
heap
page read and write
27DA000
heap
page read and write
27151000
unkown
page readonly
241E7095000
heap
page read and write
6F0000
heap
page read and write
4753000
heap
page read and write
4679000
heap
page read and write
2741000
heap
page read and write
471E000
heap
page read and write
46F6000
heap
page read and write
6A3000
heap
page read and write
20CB7000
unkown
page readonly
4658000
heap
page read and write
4695000
heap
page read and write
6DA000
heap
page read and write
241E8E0E000
heap
page read and write
50B000
heap
page read and write
20CFA000
unkown
page readonly
2B12000
heap
page read and write
50B000
heap
page read and write
2480F000
unkown
page readonly
2B22000
heap
page read and write
1DF1B000
heap
page read and write
1A27B68F000
heap
page read and write
565000
heap
page read and write
282C000
heap
page read and write
693000
heap
page read and write
1E402000
unkown
page readonly
1A27B6A5000
heap
page read and write
59D000
heap
page read and write
1DF00000
heap
page read and write
216DB000
unkown
page readonly
20A2C000
unkown
page readonly
241E8DDE000
heap
page read and write
564000
heap
page read and write
26591000
unkown
page readonly
1A27B66D000
heap
page read and write
244A5000
unkown
page readonly
46B7000
heap
page read and write
551000
heap
page read and write
241E8DDF000
heap
page read and write
E10000
unkown
page readonly
4693000
heap
page read and write
4645000
heap
page read and write
27DA000
heap
page read and write
29646000
trusted library allocation
page read and write
2838000
heap
page read and write
46F6000
heap
page read and write
7FF414F80000
trusted library allocation
page execute and read and write
2656B000
unkown
page readonly
4419000
heap
page read and write
46E5000
heap
page read and write
567000
heap
page read and write
49F1000
heap
page read and write
2B56000
heap
page read and write
4686000
heap
page read and write
590000
heap
page read and write
46F6000
heap
page read and write
1A27B691000
heap
page read and write
4686000
heap
page read and write
1A27B696000
heap
page read and write
1CA1F000
unkown
page readonly
46FD000
heap
page read and write
2B28000
heap
page read and write
241E6F79000
heap
page read and write
20A93000
unkown
page readonly
545000
heap
page read and write
29EF000
heap
page read and write
1A27B67E000
heap
page read and write
1E9BD000
unkown
page readonly
464E000
heap
page read and write
2760000
heap
page read and write
2B47000
heap
page read and write
4686000
heap
page read and write
545000
heap
page read and write
2741000
heap
page read and write
1FDD4000
unkown
page readonly
7FF849110000
trusted library allocation
page read and write
46CE000
heap
page read and write
241E6F40000
heap
page read and write
2A50000
heap
page read and write
46F7000
heap
page read and write
444D000
heap
page read and write
2A70000
heap
page read and write
43E7000
heap
page read and write
4693000
heap
page read and write
46B7000
heap
page read and write
2963C000
trusted library allocation
page read and write
22E93000
unkown
page readonly
470A000
heap
page read and write
27E2000
heap
page read and write
444D000
heap
page read and write
4682000
heap
page read and write
1E41E000
unkown
page readonly
75B000
heap
page read and write
4465000
heap
page read and write
1A27B67E000
heap
page read and write
2B42000
heap
page read and write
46E5000
heap
page read and write
4CF1000
heap
page read and write
1F52D000
unkown
page readonly
44B5000
heap
page read and write
6C2000
heap
page read and write
21573000
unkown
page readonly
1F4B4000
unkown
page readonly
27AB000
heap
page read and write
59C000
heap
page read and write
7FF849180000
trusted library allocation
page execute and read and write
16F1000
stack
page read and write
1A27B68C000
heap
page read and write
22CF7000
unkown
page readonly
27A0000
heap
page read and write
1A27B68C000
heap
page read and write
4611000
heap
page read and write
23CCC000
unkown
page readonly
4678000
heap
page read and write
2A50000
heap
page read and write
4667000
heap
page read and write
50B000
heap
page read and write
1CB55000
unkown
page readonly
46B7000
heap
page read and write
4ADC000
heap
page read and write
46B7000
heap
page read and write
230F1000
unkown
page readonly
46B7000
heap
page read and write
409000
unkown
page readonly
4717000
heap
page read and write
46F7000
heap
page read and write
1A27B683000
heap
page read and write
6BD000
stack
page read and write
2B0C000
heap
page read and write
471B000
heap
page read and write
574000
heap
page read and write
4661000
heap
page read and write
50B000
heap
page read and write
4686000
heap
page read and write
50B000
heap
page read and write
2B22000
heap
page read and write
1F523000
unkown
page readonly
574000
heap
page read and write
281C000
heap
page read and write
4650000
heap
page read and write
43F2000
heap
page read and write
280B000
heap
page read and write
22552000
unkown
page readonly
281F000
heap
page read and write
471E000
heap
page read and write
4693000
heap
page read and write
29637000
trusted library allocation
page read and write
910000
heap
page read and write
1CD3D000
unkown
page readonly
241E8D88000
heap
page read and write
4468000
heap
page read and write
29B1000
heap
page read and write
4686000
heap
page read and write
2749000
heap
page read and write
4650000
heap
page read and write
533000
heap
page read and write
258D5000
unkown
page readonly
4CFA000
heap
page read and write
1A27B681000
heap
page read and write
2A10000
heap
page read and write
1E44D000
unkown
page readonly
6A2000
heap
page read and write
1D463000
unkown
page readonly
46B7000
heap
page read and write
4CFA000
heap
page read and write
1A27B696000
heap
page read and write
1E225000
trusted library allocation
page read and write
241E6F6F000
heap
page read and write
467A000
heap
page read and write
50B000
heap
page read and write
1A27B683000
heap
page read and write
4682000
heap
page read and write
4D3F000
heap
page read and write
22682000
unkown
page readonly
B9E000
heap
page read and write
241E8DFD000
heap
page read and write
46E5000
heap
page read and write
46F6000
heap
page read and write
7FF849022000
trusted library allocation
page read and write
4405000
heap
page read and write
2789000
heap
page read and write
73E000
stack
page read and write
29B1000
heap
page read and write
545000
heap
page read and write
46A8000
heap
page read and write
2A71000
heap
page read and write
50B000
heap
page read and write
544000
heap
page read and write
2130000
heap
page read and write
46E5000
heap
page read and write
46B7000
heap
page read and write
209DB000
unkown
page readonly
1A27BB14000
heap
page read and write
50B000
heap
page read and write
29B1000
heap
page read and write
27AB000
heap
page read and write
1E234000
trusted library allocation
page read and write
46CE000
heap
page read and write
1A27B5E0000
heap
page read and write
51CC000
stack
page read and write
20BDE000
unkown
page readonly
4D09000
heap
page read and write
1A27B6A0000
heap
page read and write
4686000
heap
page read and write
24596000
unkown
page readonly
43D1000
heap
page read and write
2A43000
heap
page read and write
2A8F000
heap
page read and write
2B22000
heap
page read and write
4678000
heap
page read and write
219B3000
unkown
page readonly
551000
heap
page read and write
565000
heap
page read and write
2B8C000
heap
page read and write
545000
heap
page read and write
4D0E000
heap
page read and write
1CE90000
trusted library section
page read and write
1A27B681000
heap
page read and write
6E8000
heap
page read and write
50B000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
1E414000
unkown
page readonly
582000
heap
page read and write
43FC000
heap
page read and write
2A18000
heap
page read and write
470A000
heap
page read and write
46CE000
heap
page read and write
241E8E10000
heap
page read and write
1FF4D000
unkown
page readonly
50B000
heap
page read and write
2B97000
heap
page read and write
464D000
heap
page read and write
2430000
heap
page read and write
25729000
unkown
page readonly
4686000
heap
page read and write
4447000
heap
page read and write
27AC000
heap
page read and write
694000
heap
page read and write
44B9000
heap
page read and write
1F40C000
unkown
page readonly
241E8DA9000
heap
page read and write
1E9FD000
unkown
page readonly
225F8000
unkown
page readonly
4658000
heap
page read and write
46B7000
heap
page read and write
59C000
heap
page read and write
1FE44000
unkown
page readonly
50B000
heap
page read and write
2A90000
heap
page read and write
2B87000
heap
page read and write
4484000
heap
page read and write
59C000
heap
page read and write
46B7000
heap
page read and write
244EB000
unkown
page readonly
467B000
heap
page read and write
4717000
heap
page read and write
2B03000
heap
page read and write
1F144000
unkown
page readonly
446A000
heap
page read and write
651000
heap
page read and write
4686000
heap
page read and write
1EA2B000
unkown
page readonly
4686000
heap
page read and write
4678000
heap
page read and write
6E8000
heap
page read and write
2612F000
unkown
page readonly
4496000
heap
page read and write
27B71000
trusted library allocation
page read and write
1F4DE000
unkown
page readonly
255B8000
unkown
page readonly
4CFA000
heap
page read and write
27E5000
heap
page read and write
50B000
heap
page read and write
544000
heap
page read and write
3FF3000
trusted library allocation
page read and write
1F054000
unkown
page readonly
1A27BB18000
heap
page read and write
241EA708000
heap
page read and write
46E5000
heap
page read and write
46B7000
heap
page read and write
46F6000
heap
page read and write
4694000
heap
page read and write
2B04000
heap
page read and write
46F6000
heap
page read and write
46CE000
heap
page read and write
4CFA000
heap
page read and write
513000
heap
page read and write
4667000
heap
page read and write
20283000
unkown
page readonly
7FF849016000
trusted library allocation
page read and write
27180000
unkown
page readonly
26E94000
unkown
page readonly
24509000
unkown
page readonly
27AA000
heap
page read and write
277B5000
heap
page read and write
545000
heap
page read and write
1EA6B000
unkown
page readonly
1D162000
unkown
page readonly
4FF000
heap
page read and write
46B7000
heap
page read and write
282C000
heap
page read and write
46F6000
heap
page read and write
467A000
heap
page read and write
6F5000
heap
page read and write
1A27B6A5000
heap
page read and write
400000
unkown
page readonly
2781000
heap
page read and write
4D0D000
heap
page read and write
248A1000
unkown
page readonly
1E976000
unkown
page readonly
260FE000
unkown
page readonly
4686000
heap
page read and write
21A5B000
unkown
page readonly
1F441000
unkown
page readonly
1A27B68C000
heap
page read and write
4753000
heap
page read and write
282C000
heap
page read and write
248E8000
unkown
page readonly
4693000
heap
page read and write
551000
heap
page read and write
50B000
heap
page read and write
4AED000
heap
page read and write
574000
heap
page read and write
1EAFA000
unkown
page readonly
447D000
heap
page read and write
1FF8F000
unkown
page readonly
238CB000
unkown
page readonly
4753000
heap
page read and write
46A4000
heap
page read and write
1DF0B000
heap
page read and write
1A27B68C000
heap
page read and write
46E5000
heap
page read and write
20A76000
unkown
page readonly
44B9000
heap
page read and write
2814000
heap
page read and write
1A27B68C000
heap
page read and write
27DB000
heap
page read and write
22696000
unkown
page readonly
44A8000
heap
page read and write
46F6000
heap
page read and write
4611000
heap
page read and write
4693000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
4753000
heap
page read and write
24A19000
unkown
page readonly
4667000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
4420000
heap
page read and write
46F6000
heap
page read and write
52D000
heap
page read and write
46B7000
heap
page read and write
1A27B66D000
heap
page read and write
1F14E000
unkown
page readonly
13B04000
trusted library allocation
page read and write
6EA000
heap
page read and write
3EE3000
trusted library allocation
page read and write
13E5000
heap
page read and write
27AA000
heap
page read and write
1FE58000
unkown
page readonly
592000
heap
page read and write
2749000
heap
page read and write
2B76000
heap
page read and write
4650000
heap
page read and write
2B97000
heap
page read and write
473C000
heap
page read and write
4614000
heap
page read and write
573000
heap
page read and write
50B000
heap
page read and write
4413000
heap
page read and write
20A6C000
unkown
page readonly
50B000
heap
page read and write
583000
heap
page read and write
469D000
heap
page read and write
4667000
heap
page read and write
20A0F000
unkown
page readonly
BB0000
heap
page read and write
53C000
heap
page read and write
4753000
heap
page read and write
27C6000
heap
page read and write
50B000
heap
page read and write
243C0000
unkown
page readonly
43EE000
heap
page read and write
43F2000
heap
page read and write
6A7000
heap
page read and write
2380000
heap
page execute and read and write
471E000
heap
page read and write
1A27B6B2000
heap
page read and write
44B9000
heap
page read and write
1F3A3000
unkown
page readonly
1988000
heap
page read and write
4659000
heap
page read and write
4ACD000
heap
page read and write
2B86000
heap
page read and write
46B7000
heap
page read and write
46F6000
heap
page read and write
44B6000
heap
page read and write
534000
heap
page read and write
70E000
stack
page read and write
4BA3000
heap
page read and write
2B97000
heap
page read and write
2B23000
heap
page read and write
46E5000
heap
page read and write
1CA6C000
unkown
page readonly
2741000
heap
page read and write
449E000
heap
page read and write
23D60000
unkown
page readonly
1E3E1000
unkown
page readonly
59C000
heap
page read and write
44B5000
heap
page read and write
27A6000
heap
page read and write
27DA000
heap
page read and write
565000
heap
page read and write
219FA000
unkown
page readonly
1A27B691000
heap
page read and write
1A27B68F000
heap
page read and write
448D000
heap
page read and write
4718000
heap
page read and write
4678000
heap
page read and write
4658000
heap
page read and write
44A8000
heap
page read and write
46F8000
heap
page read and write
25931000
unkown
page readonly
4419000
heap
page read and write
29DC000
heap
page read and write
50B000
heap
page read and write
2476D000
unkown
page readonly
F9A000
unkown
page readonly
4611000
heap
page read and write
46CE000
heap
page read and write
21679000
unkown
page readonly
1BA10000
trusted library allocation
page read and write
1E3BC000
unkown
page readonly
23B29000
unkown
page readonly
52D000
heap
page read and write
26E47000
unkown
page readonly
1D4E0000
unkown
page readonly
46F7000
heap
page read and write
50B000
heap
page read and write
6A2000
heap
page read and write
1A27B662000
heap
page read and write
2B12000
heap
page read and write
6E8000
heap
page read and write
50B000
heap
page read and write
20EE0000
unkown
page readonly
427B000
trusted library allocation
page read and write
29DC000
heap
page read and write
2B86000
heap
page read and write
50B000
heap
page read and write
50B000
heap
page read and write
27DA000
heap
page read and write
46E5000
heap
page read and write
584000
heap
page read and write
4CFA000
heap
page read and write
6A4000
heap
page read and write
470E000
heap
page read and write
545000
heap
page read and write
E40000
unkown
page readonly
4720000
heap
page read and write
3C49000
trusted library allocation
page read and write
545000
heap
page read and write
52D000
heap
page read and write
50B000
heap
page read and write
46E5000
heap
page read and write
24A06000
unkown
page readonly
2A01000
heap
page read and write
1C7D4000
heap
page read and write
1A27B6AB000
heap
page read and write
4027000
trusted library allocation
page read and write
445B000
heap
page read and write
2AF3000
heap
page read and write
46F8000
heap
page read and write
241E6F84000
heap
page read and write
6F1000
heap
page read and write
2537F000
unkown
page readonly
46F6000
heap
page read and write
1A27B67E000
heap
page read and write
2BA2000
heap
page read and write
200F6000
unkown
page readonly
43F0000
heap
page read and write
4D0E000
heap
page read and write
545000
heap
page read and write
4CFC000
heap
page read and write
592000
heap
page read and write
241E6FEC000
heap
page read and write
1A27B6A2000
heap
page read and write
2A0F000
stack
page read and write
4658000
heap
page read and write
46CE000
heap
page read and write
26197000
unkown
page readonly
1A27B691000
heap
page read and write
4D02000
heap
page read and write
55C000
heap
page read and write
46CE000
heap
page read and write
2741000
heap
page read and write
4693000
heap
page read and write
50B000
heap
page read and write
46F6000
heap
page read and write
46B7000
heap
page read and write
473C000
heap
page read and write
46F6000
heap
page read and write
2A50000
heap
page read and write
27F6000
heap
page read and write
2B89000
heap
page read and write
20A4C000
unkown
page readonly
2802000
heap
page read and write
27777000
heap
page read and write
4CF1000
heap
page read and write
95000
stack
page read and write
7FF848EEA000
trusted library allocation
page execute and read and write
1F3E8000
unkown
page readonly
50B000
heap
page read and write
46E5000
heap
page read and write
564000
heap
page read and write
2B47000
heap
page read and write
1E4BD000
unkown
page readonly
4463000
heap
page read and write
50B000
heap
page read and write
2780000
heap
page read and write
4422000
heap
page read and write
20DEE000
unkown
page readonly
4667000
heap
page read and write
1F269000
unkown
page readonly
25635000
unkown
page readonly
2802000
heap
page read and write
277A0000
heap
page read and write
517000
heap
page read and write
244BF000
unkown
page readonly
224E2000
unkown
page readonly
1A27B66F000
heap
page read and write
445D000
heap
page read and write
1E277000
unkown
page readonly
444D000
heap
page read and write
46E5000
heap
page read and write
25615000
unkown
page readonly
4499000
heap
page read and write
2B42000
heap
page read and write
46FD000
heap
page read and write
24628000
unkown
page readonly
46F6000
heap
page read and write
2A30000
heap
page read and write
1CA09000
unkown
page readonly
4D01000
heap
page read and write
7FF849130000
trusted library allocation
page execute and read and write
2A10000
heap
page read and write
94F000
stack
page read and write
241E8D52000
heap
page read and write
2749000
heap
page read and write
2830000
heap
page read and write
2B86000
heap
page read and write
241E8D92000
heap
page read and write
50B000
heap
page read and write
400000
unkown
page readonly
27F5000
heap
page read and write
241E7099000
heap
page read and write
46E5000
heap
page read and write
2831000
heap
page read and write
565000
heap
page read and write
525000
heap
page read and write
46F6000
heap
page read and write
13A2A000
trusted library allocation
page read and write
2A70000
heap
page read and write
544000
heap
page read and write
2B0C000
heap
page read and write
545000
heap
page read and write
2A4E000
stack
page read and write
13A11000
trusted library allocation
page read and write
1EA61000
unkown
page readonly
1A27B679000
heap
page read and write
420000
heap
page read and write
541000
heap
page read and write
9C000
stack
page read and write
1A27B66B000
heap
page read and write
46B7000
heap
page read and write
3A11000
trusted library allocation
page read and write
2839000
heap
page read and write
584000
heap
page read and write
2829000
heap
page read and write
430E000
trusted library allocation
page read and write
46CE000
heap
page read and write
46B7000
heap
page read and write
4CF4000
heap
page read and write
64B000
heap
page read and write
277CD000
heap
page read and write
46CE000
heap
page read and write
265E0000
unkown
page readonly
248C2000
unkown
page readonly
46F6000
heap
page read and write
4CF7000
heap
page read and write
4CF1000
heap
page read and write
4B1C000
heap
page read and write
13A15000
trusted library allocation
page read and write
2A56000
heap
page read and write
2B86000
heap
page read and write
565000
heap
page read and write
27E5000
heap
page read and write
565000
heap
page read and write
2B31000
heap
page read and write
2741000
heap
page read and write
1A27B6AB000
heap
page read and write
50B000
heap
page read and write
4D06000
heap
page read and write
403E000
trusted library allocation
page read and write
46B7000
heap
page read and write
29DC000
heap
page read and write
545000
heap
page read and write
46CE000
heap
page read and write
46F7000
heap
page read and write
4695000
heap
page read and write
740000
heap
page read and write
551000
heap
page read and write
4693000
heap
page read and write
469D000
heap
page read and write
4611000
heap
page read and write
241E6E20000
heap
page read and write
1A27B68C000
heap
page read and write
4D25000
heap
page read and write
4693000
heap
page read and write
4699000
heap
page read and write
4678000
heap
page read and write
238FC000
unkown
page readonly
14B000
stack
page read and write
446A000
heap
page read and write
4716000
heap
page read and write
46E5000
heap
page read and write
7CF000
stack
page read and write
2741000
heap
page read and write
44A5000
heap
page read and write
1A27B68C000
heap
page read and write
69E000
heap
page read and write
46E5000
heap
page read and write
4BA2000
heap
page read and write
247A1000
unkown
page readonly
1E314000
unkown
page readonly
1CB2F000
unkown
page readonly
2741000
heap
page read and write
50B000
heap
page read and write
1A27B66B000
heap
page read and write
46E5000
heap
page read and write
448A000
heap
page read and write
46A8000
heap
page read and write
470C000
heap
page read and write
4CFA000
heap
page read and write
44A6000
heap
page read and write
46B7000
heap
page read and write
22EEE000
unkown
page readonly
46E5000
heap
page read and write
26E63000
unkown
page readonly
2835000
heap
page read and write
22653000
unkown
page readonly
F0C000
unkown
page readonly
43DA000
heap
page read and write
2A89000
heap
page read and write
46F6000
heap
page read and write
4693000
heap
page read and write
46E5000
heap
page read and write
4686000
heap
page read and write
46E5000
heap
page read and write
1A0000
heap
page read and write
1A27B67E000
heap
page read and write
686000
heap
page read and write
214F3000
unkown
page readonly
4693000
heap
page read and write
50B000
heap
page read and write
2AD3000
heap
page read and write
471E000
heap
page read and write
21A9D000
unkown
page readonly
551000
heap
page read and write
1F22A000
unkown
page readonly
50B000
heap
page read and write
29B1000
heap
page read and write
1C20000
heap
page execute and read and write
4682000
heap
page read and write
1A27B68F000
heap
page read and write
29B1000
heap
page read and write
20BD4000
unkown
page readonly
23D3B000
unkown
page readonly
46FD000
heap
page read and write
46B7000
heap
page read and write
44B9000
heap
page read and write
471E000
heap
page read and write
568000
heap
page read and write
46B7000
heap
page read and write
584000
heap
page read and write
409000
unkown
page readonly
59D000
heap
page read and write
46FF000
heap
page read and write
592000
heap
page read and write
1DA0000
heap
page execute and read and write
4442000
heap
page read and write
4694000
heap
page read and write
46E5000
heap
page read and write
7FF848FD5000
trusted library allocation
page read and write
44B9000
heap
page read and write
1D22B000
unkown
page readonly
567000
heap
page read and write
1E9F0000
unkown
page readonly
46F7000
heap
page read and write
241E8DCF000
heap
page read and write
4693000
heap
page read and write
1CAB6000
unkown
page readonly
46B7000
heap
page read and write
1A27B6B1000
heap
page read and write
2741000
heap
page read and write
2B97000
heap
page read and write
565000
heap
page read and write
53E000
heap
page read and write
2B8C000
heap
page read and write
2A89000
heap
page read and write
43FC000
heap
page read and write
B9E000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
BB9000
heap
page read and write
26384000
unkown
page readonly
6A2000
heap
page read and write
1FDAD000
unkown
page readonly
46F6000
heap
page read and write
470E000
heap
page read and write
13A20000
trusted library allocation
page read and write
46F6000
heap
page read and write
469D000
heap
page read and write
4CFA000
heap
page read and write
25990000
unkown
page readonly
1F05E000
unkown
page readonly
4667000
heap
page read and write
4CFB000
heap
page read and write
441C000
heap
page read and write
59C000
heap
page read and write
1FF85000
unkown
page readonly
1F50C000
unkown
page readonly
1C9FC000
unkown
page readonly
564000
heap
page read and write
1A27B68F000
heap
page read and write
2A18000
heap
page read and write
22B20000
unkown
page readonly
1EA9D000
unkown
page readonly
4679000
heap
page read and write
507000
heap
page read and write
1F54B000
unkown
page readonly
226E0000
unkown
page readonly
1F07A000
unkown
page readonly
470E000
heap
page read and write
226D6000
unkown
page readonly
2749000
heap
page read and write
1A27B680000
heap
page read and write
46E5000
heap
page read and write
2B22000
heap
page read and write
281C000
heap
page read and write
1A55000
heap
page read and write
59C000
heap
page read and write
43EC000
heap
page read and write
50B000
heap
page read and write
2741000
heap
page read and write
21AF0000
unkown
page readonly
6A2000
heap
page read and write
9E2E3FE000
stack
page read and write
2A11000
heap
page read and write
1C63E000
stack
page read and write
565000
heap
page read and write
2B8C000
heap
page read and write
50B000
heap
page read and write
1A27B66B000
heap
page read and write
544000
heap
page read and write
27C6000
heap
page read and write
1F0C5000
unkown
page readonly
544000
heap
page read and write
4678000
heap
page read and write
6E8000
heap
page read and write
27A2000
heap
page read and write
46F6000
heap
page read and write
25360000
unkown
page readonly
50B000
heap
page read and write
4403000
heap
page read and write
1A27B691000
heap
page read and write
4693000
heap
page read and write
4686000
heap
page read and write
4CFA000
heap
page read and write
4CF1000
heap
page read and write
440B000
heap
page read and write
249A4000
unkown
page readonly
4637000
heap
page read and write
473C000
heap
page read and write
565000
heap
page read and write
567000
heap
page read and write
6E8000
heap
page read and write
44C8000
heap
page read and write
4D01000
heap
page read and write
1E9E3000
unkown
page readonly
46F7000
heap
page read and write
1FE80000
unkown
page readonly
46B7000
heap
page read and write
43CF000
stack
page read and write
4682000
heap
page read and write
2749000
heap
page read and write
27B7000
heap
page read and write
441E000
heap
page read and write
26561000
unkown
page readonly
4655000
heap
page read and write
24B30000
unkown
page readonly
1A27B683000
heap
page read and write
445F000
heap
page read and write
573000
heap
page read and write
1A27B67D000
heap
page read and write
50B000
heap
page read and write
1F234000
unkown
page readonly
21656000
unkown
page readonly
544000
heap
page read and write
1F186000
unkown
page readonly
1A27B691000
heap
page read and write
217CA000
unkown
page readonly
4AD3000
heap
page read and write
1F316000
unkown
page readonly
545000
heap
page read and write
4AA6000
heap
page read and write
7FF848E74000
trusted library allocation
page execute and read and write
B10000
heap
page read and write
4611000
heap
page read and write
46F8000
heap
page read and write
24B90000
unkown
page readonly
26E13000
unkown
page readonly
13E0000
heap
page read and write
6E8000
heap
page read and write
1EA42000
unkown
page readonly
2780000
heap
page read and write
2AF9000
heap
page read and write
46E5000
heap
page read and write
46CE000
heap
page read and write
21598000
unkown
page readonly
4CF0000
heap
page read and write
6F0000
heap
page read and write
6F1000
heap
page read and write
4699000
heap
page read and write
1DF06000
heap
page read and write
4420000
heap
page read and write
A50000
heap
page read and write
4682000
heap
page read and write
1E443000
unkown
page readonly
4667000
heap
page read and write
4413000
heap
page read and write
24B02000
unkown
page readonly
2B12000
heap
page read and write
46E5000
heap
page read and write
51F000
heap
page read and write
239B8000
unkown
page readonly
1A27B676000
heap
page read and write
1E961000
unkown
page readonly
574000
heap
page read and write
46F6000
heap
page read and write
1E012000
heap
page read and write
244E1000
unkown
page readonly
2B86000
heap
page read and write
565000
heap
page read and write
2BA2000
heap
page read and write
1A27BAEC000
heap
page read and write
43FA000
heap
page read and write
2A90000
heap
page read and write
241E6F20000
heap
page read and write
1F586000
unkown
page readonly
26D05000
unkown
page readonly
46CE000
heap
page read and write
244C9000
unkown
page readonly
1FF01000
unkown
page readonly
22469000
unkown
page readonly
1FE62000
unkown
page readonly
27D3000
heap
page read and write
4658000
heap
page read and write
4497000
heap
page read and write
584000
heap
page read and write
4CF9000
heap
page read and write
46CE000
heap
page read and write
46CE000
heap
page read and write
1A27B652000
heap
page read and write
564000
heap
page read and write
27C6000
heap
page read and write
50B000
heap
page read and write
447A000
heap
page read and write
4650000
heap
page read and write
2780000
heap
page read and write
46CE000
heap
page read and write
4707000
heap
page read and write
4625000
heap
page read and write
1A27B673000
heap
page read and write
46E5000
heap
page read and write
473C000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2B56000
heap
page read and write
46E5000
heap
page read and write
46F6000
heap
page read and write
46B7000
heap
page read and write
2A50000
heap
page read and write
4709000
heap
page read and write
44C8000
heap
page read and write
1E240000
unkown
page readonly
22392000
unkown
page readonly
29D1000
heap
page read and write
13F40000
trusted library allocation
page read and write
20227000
unkown
page readonly
50B000
heap
page read and write
584000
heap
page read and write
545000
heap
page read and write
2A37000
heap
page read and write
238A0000
unkown
page readonly
1A27BB1D000
heap
page read and write
46CE000
heap
page read and write
584000
heap
page read and write
582000
heap
page read and write
6A6000
heap
page read and write
4611000
heap
page read and write
1A27B675000
heap
page read and write
216E5000
unkown
page readonly
2749000
heap
page read and write
1D290000
unkown
page readonly
551000
heap
page read and write
592000
heap
page read and write
241E88E0000
heap
page read and write
4419000
heap
page read and write
46B7000
heap
page read and write
50B000
heap
page read and write
50B000
heap
page read and write
1D1C0000
unkown
page readonly
9707CFF000
stack
page read and write
510000
heap
page read and write
241E8D89000
heap
page read and write
24AA2000
unkown
page readonly
4611000
heap
page read and write
F0E000
unkown
page readonly
1E26000
heap
page read and write
1F303000
unkown
page readonly
4611000
heap
page read and write
1A27B5E5000
heap
page read and write
245D3000
unkown
page readonly
1E20000
heap
page read and write
46B7000
heap
page read and write
20BB6000
unkown
page readonly
2A11000
heap
page read and write
46F6000
heap
page read and write
28CE000
stack
page read and write
20279000
unkown
page readonly
1A27BAE4000
heap
page read and write
574000
heap
page read and write
222A2000
unkown
page readonly
4678000
heap
page read and write
1BD0000
heap
page read and write
46E5000
heap
page read and write
4693000
heap
page read and write
2546F000
unkown
page readonly
46B7000
heap
page read and write
6E8000
heap
page read and write
584000
heap
page read and write
29B1000
heap
page read and write
46F9000
heap
page read and write
21815000
unkown
page readonly
2741000
heap
page read and write
223EE000
unkown
page readonly
147D6000
trusted library allocation
page read and write
281F000
heap
page read and write
241E8D88000
heap
page read and write
1A27B691000
heap
page read and write
4CF7000
heap
page read and write
44B9000
heap
page read and write
46CE000
heap
page read and write
2B97000
heap
page read and write
4D12000
heap
page read and write
2B31000
heap
page read and write
44B5000
heap
page read and write
26282000
unkown
page readonly
4712000
heap
page read and write
1E380000
unkown
page readonly
2778000
heap
page read and write
565000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
474F000
heap
page read and write
4D0000
heap
page read and write
50B000
heap
page read and write
545000
heap
page read and write
2B9F000
heap
page read and write
4611000
heap
page read and write
6A2000
heap
page read and write
29DF000
heap
page read and write
4693000
heap
page read and write
46F6000
heap
page read and write
215B4000
unkown
page readonly
66D000
heap
page read and write
440F000
heap
page read and write
27DA000
heap
page read and write
545000
heap
page read and write
565000
heap
page read and write
2741000
heap
page read and write
6A2000
heap
page read and write
470E000
heap
page read and write
592000
heap
page read and write
1F15E000
unkown
page readonly
2310B000
unkown
page readonly
1F3BA000
unkown
page readonly
469E000
heap
page read and write
21697000
unkown
page readonly
2B86000
heap
page read and write
4678000
heap
page read and write
4499000
heap
page read and write
4CFA000
heap
page read and write
1A27B67E000
heap
page read and write
4CFC000
heap
page read and write
249D4000
unkown
page readonly
66D000
heap
page read and write
1E4E2000
unkown
page readonly
1A27B699000
heap
page read and write
46B7000
heap
page read and write
448F000
heap
page read and write
4D22000
heap
page read and write
777000
heap
page read and write
50B000
heap
page read and write
2749000
heap
page read and write
4667000
heap
page read and write
24A23000
unkown
page readonly
1EB5B000
unkown
page readonly
46B7000
heap
page read and write
4682000
heap
page read and write
1E54E000
unkown
page readonly
2A43000
heap
page read and write
4CF7000
heap
page read and write
2829000
heap
page read and write
275B000
heap
page read and write
2B77000
heap
page read and write
4678000
heap
page read and write
697000
heap
page read and write
44A8000
heap
page read and write
2A01000
heap
page read and write
46CE000
heap
page read and write
1D3A4000
unkown
page readonly
1A27B696000
heap
page read and write
21712000
unkown
page readonly
2770000
heap
page read and write
281F000
heap
page read and write
2749000
heap
page read and write
4658000
heap
page read and write
4480000
heap
page read and write
1E501000
unkown
page readonly
1E558000
unkown
page readonly
4682000
heap
page read and write
1A27B66B000
heap
page read and write
2A70000
heap
page read and write
1F44B000
unkown
page readonly
4CF3000
heap
page read and write
551000
heap
page read and write
4CF9000
heap
page read and write
13A8C000
trusted library allocation
page read and write
551000
heap
page read and write
27DF000
heap
page read and write
27A0000
heap
page read and write
44B9000
heap
page read and write
2B28000
heap
page read and write
2863000
heap
page read and write
4718000
heap
page read and write
4CF1000
heap
page read and write
46E5000
heap
page read and write
568000
heap
page read and write
565000
heap
page read and write
283A000
heap
page read and write
26C02000
unkown
page readonly
400000
unkown
page readonly
46F6000
heap
page read and write
43F7000
heap
page read and write
BB5000
heap
page read and write
50B000
heap
page read and write
9707884000
stack
page read and write
7FF849150000
trusted library allocation
page read and write
58C000
heap
page read and write
59C000
heap
page read and write
46CE000
heap
page read and write
4678000
heap
page read and write
24A72000
unkown
page readonly
1F3C4000
unkown
page readonly
270E2000
unkown
page readonly
4CFA000
heap
page read and write
27C6000
heap
page read and write
564000
heap
page read and write
4678000
heap
page read and write
1D4D6000
unkown
page readonly
7FF8490D3000
trusted library allocation
page read and write
50B000
heap
page read and write
4686000
heap
page read and write
4686000
heap
page read and write
4686000
heap
page read and write
27A6000
heap
page read and write
46FC000
heap
page read and write
447A000
heap
page read and write
4693000
heap
page read and write
2749000
heap
page read and write
4753000
heap
page read and write
A60000
heap
page read and write
1A27BA80000
heap
page read and write
22EE4000
unkown
page readonly
46B7000
heap
page read and write
4667000
heap
page read and write
29E1000
heap
page read and write
1A27B678000
heap
page read and write
22CB0000
unkown
page readonly
748000
heap
page read and write
565000
heap
page read and write
470E000
heap
page read and write
545000
heap
page read and write
2766000
heap
page read and write
4693000
heap
page read and write
A4F000
stack
page read and write
2749000
heap
page read and write
46A8000
heap
page read and write
2780000
heap
page read and write
7FF414F90000
trusted library allocation
page execute and read and write
4AA1000
heap
page read and write
241E8E0A000
heap
page read and write
2741000
heap
page read and write
565000
heap
page read and write
50B000
heap
page read and write
7FF84914D000
trusted library allocation
page read and write
4682000
heap
page read and write
4D0E000
heap
page read and write
4710000
heap
page read and write
4436000
heap
page read and write
27EF000
heap
page read and write
1A27B689000
heap
page read and write
4695000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
2A50000
heap
page read and write
46F6000
heap
page read and write
24585000
unkown
page readonly
470E000
heap
page read and write
2B9F000
heap
page read and write
1E957000
unkown
page readonly
46CE000
heap
page read and write
1D3AE000
unkown
page readonly
1F402000
unkown
page readonly
24AAC000
unkown
page readonly
4693000
heap
page read and write
1C9A2000
unkown
page readonly
46B7000
heap
page read and write
9E2E37F000
stack
page read and write
1E9A7000
unkown
page readonly
1E498000
unkown
page readonly
50B000
heap
page read and write
24A43000
unkown
page readonly
A3F000
stack
page read and write
6AC000
heap
page read and write
2B22000
heap
page read and write
20E67000
unkown
page readonly
59C000
heap
page read and write
226C2000
unkown
page readonly
44B7000
heap
page read and write
2B4F000
stack
page read and write
50B000
heap
page read and write
46CE000
heap
page read and write
2B56000
heap
page read and write
B70000
heap
page read and write
4682000
heap
page read and write
25362000
unkown
page readonly
27755000
heap
page read and write
13AD2000
trusted library allocation
page read and write
225EE000
unkown
page readonly
449E000
heap
page read and write
4682000
heap
page read and write
20D39000
unkown
page readonly
7FF849095000
trusted library allocation
page read and write
24763000
unkown
page readonly
2741000
heap
page read and write
50B000
heap
page read and write
2783000
heap
page read and write
544000
heap
page read and write
46B7000
heap
page read and write
46CE000
heap
page read and write
2A89000
heap
page read and write
244AF000
unkown
page readonly
4658000
heap
page read and write
20DB7000
unkown
page readonly
283A000
heap
page read and write
4D42000
heap
page read and write
1A27B671000
heap
page read and write
264A2000
unkown
page readonly
4426000
heap
page read and write
4D0A000
heap
page read and write
1C9F9000
unkown
page readonly
4D0C000
heap
page read and write
2839000
heap
page read and write
46FF000
heap
page read and write
50B000
heap
page read and write
4CF8000
heap
page read and write
281B000
heap
page read and write
6E8000
heap
page read and write
1DF43000
heap
page read and write
469E000
heap
page read and write
2758000
heap
page read and write
2749000
heap
page read and write
46B7000
heap
page read and write
27E4000
heap
page read and write
1E23000
heap
page read and write
2741000
heap
page read and write
4753000
heap
page read and write
2A30000
heap
page read and write
2A70000
heap
page read and write
582000
heap
page read and write
58D000
heap
page read and write
2B42000
heap
page read and write
241E8E1D000
heap
page read and write
47A2000
heap
page read and write
4695000
heap
page read and write
51B000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
6F0000
heap
page read and write
1A27B66F000
heap
page read and write
2B42000
heap
page read and write
20C0C000
unkown
page readonly
26D07000
unkown
page readonly
26329000
unkown
page readonly
9E2E77E000
stack
page read and write
46FC000
heap
page read and write
2839000
heap
page read and write
50B000
heap
page read and write
1F10B000
unkown
page readonly
4427000
heap
page read and write
4707000
heap
page read and write
2781F000
heap
page read and write
52D000
heap
page read and write
551000
heap
page read and write
43F3000
heap
page read and write
541000
heap
page read and write
473C000
heap
page read and write
59C000
heap
page read and write
2749000
heap
page read and write
545000
heap
page read and write
2741000
heap
page read and write
55C000
heap
page read and write
24655000
unkown
page readonly
230E7000
unkown
page readonly
4700000
heap
page read and write
1A27B68C000
heap
page read and write
4658000
heap
page read and write
1A27B68F000
heap
page read and write
6A8000
heap
page read and write
473C000
heap
page read and write
24915000
unkown
page readonly
4753000
heap
page read and write
4AC8000
heap
page read and write
579000
unkown
page write copy
50B000
heap
page read and write
27A0000
heap
page read and write
1FEDE000
unkown
page readonly
7FF849120000
trusted library allocation
page read and write
740000
heap
page read and write
202D0000
unkown
page readonly
6A4000
heap
page read and write
27859000
heap
page read and write
6E8000
heap
page read and write
27CF000
heap
page read and write
13A5A000
trusted library allocation
page read and write
27E4000
heap
page read and write
27D6000
heap
page read and write
1A27B683000
heap
page read and write
256CE000
unkown
page readonly
4D0A000
heap
page read and write
20BA0000
unkown
page readonly
44B5000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
1CC16000
unkown
page readonly
46E5000
heap
page read and write
4682000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
2497E000
unkown
page readonly
551000
heap
page read and write
55B000
unkown
page execute and read and write
6EE000
heap
page read and write
241E8E08000
heap
page read and write
21607000
unkown
page readonly
46E5000
heap
page read and write
1D052000
unkown
page readonly
46CE000
heap
page read and write
280B000
heap
page read and write
20AED000
unkown
page readonly
4658000
heap
page read and write
442D000
heap
page read and write
1FE06000
unkown
page readonly
46E5000
heap
page read and write
545000
heap
page read and write
2741000
heap
page read and write
59C000
heap
page read and write
6E8000
heap
page read and write
1BA70000
trusted library allocation
page read and write
584000
heap
page read and write
4418000
heap
page read and write
447A000
heap
page read and write
281B000
heap
page read and write
6E8000
heap
page read and write
280D000
heap
page read and write
1D42F000
unkown
page readonly
3BB2000
trusted library allocation
page read and write
2A37000
heap
page read and write
2814000
heap
page read and write
50B000
heap
page read and write
545000
heap
page read and write
4453000
heap
page read and write
2963F000
trusted library allocation
page read and write
46F6000
heap
page read and write
52D000
heap
page read and write
46CE000
heap
page read and write
59D000
heap
page read and write
1E903000
unkown
page readonly
241EA709000
heap
page read and write
46B7000
heap
page read and write
201B6000
unkown
page readonly
1A27B65A000
heap
page read and write
218CF000
unkown
page readonly
1FEE8000
unkown
page readonly
27CA000
heap
page read and write
4693000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
59C000
heap
page read and write
20960000
unkown
page readonly
18C000
stack
page read and write
280D000
heap
page read and write
2749000
heap
page read and write
4686000
heap
page read and write
23CD6000
unkown
page readonly
22A0000
heap
page read and write
446000
unkown
page write copy
1522F000
trusted library allocation
page read and write
241E6F75000
heap
page read and write
2B28000
heap
page read and write
21848000
unkown
page readonly
2461E000
unkown
page readonly
4443000
heap
page read and write
4CFA000
heap
page read and write
46B7000
heap
page read and write
24988000
unkown
page readonly
29B1000
heap
page read and write
50B000
heap
page read and write
2A30000
heap
page read and write
2A50000
heap
page read and write
1F101000
unkown
page readonly
264AC000
unkown
page readonly
544000
heap
page read and write
545000
heap
page read and write
50B000
heap
page read and write
1E9ED000
unkown
page readonly
59C000
heap
page read and write
522000
heap
page read and write
12E000
stack
page read and write
44C8000
heap
page read and write
4678000
heap
page read and write
46A4000
heap
page read and write
50B000
heap
page read and write
21462000
unkown
page readonly
1A27B68C000
heap
page read and write
23D56000
unkown
page readonly
9707C7F000
stack
page read and write
2B8C000
heap
page read and write
46F6000
heap
page read and write
463C000
heap
page read and write
4679000
heap
page read and write
27118000
unkown
page readonly
50B000
heap
page read and write
7FF849115000
trusted library allocation
page read and write
4AD1000
heap
page read and write
67D000
stack
page read and write
46CE000
heap
page read and write
1A27B683000
heap
page read and write
6CB000
heap
page read and write
571000
unkown
page execute and read and write
50B000
heap
page read and write
564000
heap
page read and write
245DD000
unkown
page readonly
4682000
heap
page read and write
1A27BCC1000
heap
page read and write
6A2000
heap
page read and write
1E392000
unkown
page readonly
1C99E000
stack
page read and write
6E8000
heap
page read and write
2870000
trusted library allocation
page read and write
2741000
heap
page read and write
4650000
heap
page read and write
46E5000
heap
page read and write
46FD000
heap
page read and write
46E5000
heap
page read and write
46E5000
heap
page read and write
7FF8490B5000
trusted library allocation
page read and write
2171C000
unkown
page readonly
20079000
unkown
page readonly
22E1D000
unkown
page readonly
50B000
heap
page read and write
46F6000
heap
page read and write
27CA000
heap
page read and write
4F4000
heap
page read and write
592000
heap
page read and write
4497000
heap
page read and write
46E5000
heap
page read and write
584000
heap
page read and write
216C7000
unkown
page readonly
50B000
heap
page read and write
1D0000
heap
page read and write
1A27B663000
heap
page read and write
26333000
unkown
page readonly
24583000
unkown
page readonly
2B56000
heap
page read and write
2749000
heap
page read and write
1A27B667000
heap
page read and write
24830000
unkown
page readonly
46E5000
heap
page read and write
44C8000
heap
page read and write
46B7000
heap
page read and write
6D9000
heap
page read and write
46B7000
heap
page read and write
471E000
heap
page read and write
282C000
heap
page read and write
56D000
heap
page read and write
241E6F84000
heap
page read and write
46E5000
heap
page read and write
46E5000
heap
page read and write
2780A000
heap
page read and write
25FC2000
unkown
page readonly
46B7000
heap
page read and write
4686000
heap
page read and write
2780000
heap
page read and write
27AA000
heap
page read and write
6E8000
heap
page read and write
270D8000
unkown
page readonly
46F6000
heap
page read and write
1F541000
unkown
page readonly
970798F000
stack
page read and write
2749000
heap
page read and write
471E000
heap
page read and write
40B2000
trusted library allocation
page read and write
46CE000
heap
page read and write
584000
heap
page read and write
444D000
heap
page read and write
50B000
heap
page read and write
4693000
heap
page read and write
4611000
heap
page read and write
5EE000
stack
page read and write
80D000
stack
page read and write
545000
heap
page read and write
1A27B68C000
heap
page read and write
2A30000
heap
page read and write
4682000
heap
page read and write
46CE000
heap
page read and write
4753000
heap
page read and write
1A27B66B000
heap
page read and write
24B26000
unkown
page readonly
2A71000
heap
page read and write
567000
heap
page read and write
87E000
stack
page read and write
4682000
heap
page read and write
241E8D5F000
heap
page read and write
4658000
heap
page read and write
50B000
heap
page read and write
2741000
heap
page read and write
50B000
heap
page read and write
4667000
heap
page read and write
4678000
heap
page read and write
1D05C000
unkown
page readonly
1FDDE000
unkown
page readonly
23B1F000
unkown
page readonly
4695000
heap
page read and write
46F6000
heap
page read and write
640000
heap
page read and write
1DF57000
heap
page read and write
25909000
unkown
page readonly
1A27B68C000
heap
page read and write
46F7000
heap
page read and write
438B000
trusted library allocation
page read and write
545000
heap
page read and write
4682000
heap
page read and write
544000
heap
page read and write
1EF80000
unkown
page readonly
69C000
heap
page read and write
1E3F8000
unkown
page readonly
2B12000
heap
page read and write
2B0C000
heap
page read and write
281C000
heap
page read and write
25913000
unkown
page readonly
470F000
heap
page read and write
52D000
heap
page read and write
1C3F0000
trusted library section
page read and write
551000
heap
page read and write
7FF849158000
trusted library allocation
page read and write
50B000
heap
page read and write
46A4000
heap
page read and write
4476000
heap
page read and write
46E5000
heap
page read and write
246AC000
unkown
page readonly
1CD1D000
unkown
page readonly
592000
heap
page read and write
1A27B667000
heap
page read and write
471E000
heap
page read and write
2A70000
heap
page read and write
4686000
heap
page read and write
52D000
heap
page read and write
444E000
heap
page read and write
2749000
heap
page read and write
241E8DE2000
heap
page read and write
20130000
unkown
page readonly
241EA719000
heap
page read and write
2A70000
heap
page read and write
1F0D4000
unkown
page readonly
21733000
unkown
page readonly
1F5E0000
unkown
page readonly
693000
heap
page read and write
2B97000
heap
page read and write
50B000
heap
page read and write
4717000
heap
page read and write
1E23A000
trusted library allocation
page read and write
1D235000
unkown
page readonly
248CC000
unkown
page readonly
549000
heap
page read and write
1986000
heap
page read and write
241E7090000
heap
page read and write
241E8E1D000
heap
page read and write
20C95000
unkown
page readonly
584000
heap
page read and write
4491000
heap
page read and write
2741000
heap
page read and write
50B000
heap
page read and write
13C3B000
trusted library allocation
page read and write
2A05000
heap
page read and write
4658000
heap
page read and write
2839000
heap
page read and write
4D03000
heap
page read and write
46F6000
heap
page read and write
4451000
heap
page read and write
4693000
heap
page read and write
46E5000
heap
page read and write
4AF0000
heap
page read and write
2835000
heap
page read and write
4695000
heap
page read and write
46B7000
heap
page read and write
50B000
heap
page read and write
52D000
heap
page read and write
6BA000
heap
page read and write
1FF0B000
unkown
page readonly
7FF84907C000
trusted library allocation
page read and write
20255000
unkown
page readonly
59C000
heap
page read and write
693000
heap
page read and write
46F6000
heap
page read and write
1C0000
heap
page read and write
59C000
heap
page read and write
27CF000
heap
page read and write
4438000
heap
page read and write
6A3000
heap
page read and write
26CE7000
unkown
page readonly
50B000
heap
page read and write
4731000
heap
page read and write
4753000
heap
page read and write
52D000
heap
page read and write
46F6000
heap
page read and write
25376000
unkown
page readonly
2BA2000
heap
page read and write
29C6000
heap
page read and write
720000
heap
page read and write
430000
heap
page read and write
2495A000
unkown
page readonly
27B7000
heap
page read and write
23D13000
unkown
page readonly
50B000
heap
page read and write
545000
heap
page read and write
276E000
heap
page read and write
2A03000
heap
page read and write
50B000
heap
page read and write
241E8D55000
heap
page read and write
241E6F5F000
heap
page read and write
2839000
heap
page read and write
567000
heap
page read and write
43E1000
heap
page read and write
21542000
unkown
page readonly
29E1000
heap
page read and write
1E580000
unkown
page readonly
551000
heap
page read and write
50B000
heap
page read and write
46F6000
heap
page read and write
46B7000
heap
page read and write
1C53E000
stack
page read and write
584000
heap
page read and write
4431000
heap
page read and write
4CF1000
heap
page read and write
1FC40000
unkown
page readonly
471E000
heap
page read and write
13BC5000
trusted library allocation
page read and write
46CE000
heap
page read and write
249FC000
unkown
page readonly
21866000
unkown
page readonly
6E8000
heap
page read and write
2A56000
heap
page read and write
4CF1000
heap
page read and write
27CF000
heap
page read and write
226B8000
unkown
page readonly
4682000
heap
page read and write
215BE000
unkown
page readonly
2761000
heap
page read and write
2290000
heap
page read and write
4658000
heap
page read and write
1CD13000
unkown
page readonly
4B1C000
heap
page read and write
1A27B691000
heap
page read and write
46E5000
heap
page read and write
1FFCD000
unkown
page readonly
2AD3000
heap
page read and write
1EB65000
unkown
page readonly
27D3000
heap
page read and write
534000
heap
page read and write
565000
heap
page read and write
1A27B696000
heap
page read and write
4D3F000
heap
page read and write
1C23000
heap
page execute and read and write
1A27B66F000
heap
page read and write
6F0000
heap
page read and write
473C000
heap
page read and write
282C000
heap
page read and write
513000
heap
page read and write
21ADB000
unkown
page readonly
2749000
heap
page read and write
1A27B680000
heap
page read and write
693000
heap
page read and write
2B42000
heap
page read and write
4686000
heap
page read and write
1E46B000
unkown
page readonly
1E9C7000
unkown
page readonly
442A000
heap
page read and write
1A27B696000
heap
page read and write
2B56000
heap
page read and write
7FF848F12000
trusted library allocation
page execute and read and write
241E8E1A000
heap
page read and write
29D0000
heap
page read and write
46B7000
heap
page read and write
2741000
heap
page read and write
27078000
unkown
page readonly
29E4000
heap
page read and write
1A27B691000
heap
page read and write
3FA4000
trusted library allocation
page read and write
2C840000
heap
page read and write
241E8E0A000
heap
page read and write
46B7000
heap
page read and write
2B39000
heap
page read and write
7FF848ED2000
trusted library allocation
page execute and read and write
24741000
unkown
page readonly
4658000
heap
page read and write
254FC000
unkown
page readonly
7FF848E3F000
trusted library allocation
page execute and read and write
46B7000
heap
page read and write
4682000
heap
page read and write
650000
heap
page read and write
42E4000
trusted library allocation
page read and write
50B000
heap
page read and write
2790000
heap
page read and write
545000
heap
page read and write
A63000
heap
page read and write
464E000
heap
page read and write
6E8000
heap
page read and write
2749000
heap
page read and write
4678000
heap
page read and write
4682000
heap
page read and write
27CB000
heap
page read and write
1EAA7000
unkown
page readonly
27E5000
heap
page read and write
B90000
heap
page read and write
46E5000
heap
page read and write
2B39000
heap
page read and write
2B86000
heap
page read and write
46FD000
heap
page read and write
4693000
heap
page read and write
549000
heap
page read and write
7FF849037000
trusted library allocation
page read and write
2741000
heap
page read and write
46F6000
heap
page read and write
50B000
heap
page read and write
1FE26000
unkown
page readonly
7FF849170000
trusted library allocation
page execute and read and write
2741000
heap
page read and write
9E2E67F000
stack
page read and write
46E5000
heap
page read and write
4661000
heap
page read and write
275B000
heap
page read and write
2A50000
heap
page read and write
46CE000
heap
page read and write
565000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
4112000
trusted library allocation
page read and write
241EA719000
heap
page read and write
50B000
heap
page read and write
1DFC8000
heap
page read and write
46B7000
heap
page read and write
4426000
heap
page read and write
653000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
12B2000
unkown
page readonly
1F273000
unkown
page readonly
564000
heap
page read and write
4611000
heap
page read and write
22649000
unkown
page readonly
584000
heap
page read and write
50B000
heap
page read and write
24787000
unkown
page readonly
1A27B540000
heap
page read and write
544000
heap
page read and write
1A27B691000
heap
page read and write
46B7000
heap
page read and write
46F7000
heap
page read and write
216F4000
unkown
page readonly
584000
heap
page read and write
1F570000
unkown
page readonly
1A27B66F000
heap
page read and write
518F000
stack
page read and write
564000
heap
page read and write
20B1E000
unkown
page readonly
46CE000
heap
page read and write
4426000
heap
page read and write
6F0000
heap
page read and write
201A3000
unkown
page readonly
4686000
heap
page read and write
4630000
heap
page read and write
21626000
unkown
page readonly
4682000
heap
page read and write
4650000
heap
page read and write
27AB000
heap
page read and write
43D5000
heap
page read and write
4427000
heap
page read and write
467B000
heap
page read and write
1DB00000
unkown
page readonly
2771000
heap
page read and write
4699000
heap
page read and write
645000
heap
page read and write
4667000
heap
page read and write
567000
heap
page read and write
1EB18000
unkown
page readonly
46E5000
heap
page read and write
1E4B3000
unkown
page readonly
4D09000
heap
page read and write
4686000
heap
page read and write
4610000
heap
page read and write
2A70000
heap
page read and write
22CEA000
unkown
page readonly
1D4B7000
unkown
page readonly
4D3F000
heap
page read and write
565000
heap
page read and write
241E8D8D000
heap
page read and write
4B1B000
heap
page read and write
1EB4E000
unkown
page readonly
20C16000
unkown
page readonly
46CE000
heap
page read and write
4CFA000
heap
page read and write
50B000
heap
page read and write
2715B000
unkown
page readonly
26E09000
unkown
page readonly
27A0000
heap
page read and write
584000
heap
page read and write
6F0000
heap
page read and write
4D03000
heap
page read and write
4FF000
heap
page read and write
46E5000
heap
page read and write
5AB000
heap
page read and write
1A50000
heap
page read and write
1A27B683000
heap
page read and write
2A43000
heap
page read and write
1EB2A000
unkown
page readonly
46F6000
heap
page read and write
46F7000
heap
page read and write
46CE000
heap
page read and write
2B56000
heap
page read and write
9E2E2F8000
stack
page read and write
50B000
heap
page read and write
4682000
heap
page read and write
4659000
heap
page read and write
2652D000
unkown
page readonly
44C8000
heap
page read and write
6CA000
heap
page read and write
4439000
heap
page read and write
2B86000
heap
page read and write
24A4D000
unkown
page readonly
21AD1000
unkown
page readonly
565000
heap
page read and write
44B2000
heap
page read and write
592000
heap
page read and write
20D2F000
unkown
page readonly
2B01000
heap
page read and write
545000
heap
page read and write
22C60000
unkown
page readonly
40E8000
trusted library allocation
page read and write
20A56000
unkown
page readonly
584000
heap
page read and write
50B000
heap
page read and write
50B000
heap
page read and write
44B7000
heap
page read and write
770000
heap
page read and write
684000
heap
page read and write
565000
heap
page read and write
1A27B667000
heap
page read and write
1EA8A000
unkown
page readonly
1A27B460000
heap
page read and write
7FF849084000
trusted library allocation
page read and write
46E5000
heap
page read and write
B6E000
stack
page read and write
20CD3000
unkown
page readonly
59C000
heap
page read and write
1E220000
trusted library allocation
page read and write
564000
heap
page read and write
53C000
heap
page read and write
50B000
heap
page read and write
44C3000
heap
page read and write
1F4AA000
unkown
page readonly
7FF848FFA000
trusted library allocation
page read and write
6E8000
heap
page read and write
4413000
heap
page read and write
4D0C000
heap
page read and write
20B53000
unkown
page readonly
544000
heap
page read and write
2838000
heap
page read and write
50B000
heap
page read and write
43D0000
heap
page read and write
46F6000
heap
page read and write
2817000
heap
page read and write
2749000
heap
page read and write
21460000
unkown
page readonly
20E1C000
unkown
page readonly
544000
heap
page read and write
282C000
heap
page read and write
B00000
heap
page read and write
579000
unkown
page read and write
217E1000
unkown
page readonly
46CE000
heap
page read and write
8BF000
stack
page read and write
27A5000
heap
page read and write
4699000
heap
page read and write
2448A000
unkown
page readonly
545000
heap
page read and write
1C3EE000
stack
page read and write
46CE000
heap
page read and write
44C8000
heap
page read and write
2814000
heap
page read and write
27AB000
heap
page read and write
4444000
heap
page read and write
4650000
heap
page read and write
18CE000
stack
page read and write
4686000
heap
page read and write
241E8D88000
heap
page read and write
59C000
heap
page read and write
29BB000
heap
page read and write
50B000
heap
page read and write
6A2000
heap
page read and write
20E39000
unkown
page readonly
693000
heap
page read and write
59C000
heap
page read and write
1EA80000
unkown
page readonly
6E8000
heap
page read and write
400000
unkown
page readonly
20DF8000
unkown
page readonly
2761000
heap
page read and write
2B77000
heap
page read and write
1FE3A000
unkown
page readonly
50B000
heap
page read and write
22361000
unkown
page readonly
1CCCA000
unkown
page readonly
230C1000
unkown
page readonly
4457000
heap
page read and write
25960000
unkown
page readonly
584000
heap
page read and write
A53000
heap
page read and write
43E3000
heap
page read and write
2B97000
heap
page read and write
246DD000
unkown
page readonly
4682000
heap
page read and write
29E1000
heap
page read and write
26F5C000
unkown
page readonly
449E000
heap
page read and write
2AF1000
heap
page read and write
2AD3000
heap
page read and write
669000
heap
page read and write
294F000
heap
page read and write
4CF3000
heap
page read and write
217ED000
unkown
page readonly
1531A000
trusted library allocation
page read and write
2749000
heap
page read and write
20095000
unkown
page readonly
1E924000
unkown
page readonly
1A27B69C000
heap
page read and write
46F6000
heap
page read and write
2A12000
heap
page read and write
44C8000
heap
page read and write
4693000
heap
page read and write
241E8D67000
heap
page read and write
1D134000
unkown
page readonly
29643000
trusted library allocation
page read and write
471A000
heap
page read and write
27E4000
heap
page read and write
2474B000
unkown
page readonly
21A93000
unkown
page readonly
2A51000
heap
page read and write
21569000
unkown
page readonly
23D90000
unkown
page readonly
584000
heap
page read and write
442B000
heap
page read and write
4AD5000
heap
page read and write
473C000
heap
page read and write
199C000
heap
page read and write
43E4000
heap
page read and write
669000
heap
page read and write
7FF849054000
trusted library allocation
page read and write
226A0000
unkown
page readonly
B96000
heap
page read and write
1F204000
unkown
page readonly
469D000
heap
page read and write
4699000
heap
page read and write
23AC5000
unkown
page readonly
551000
heap
page read and write
46E5000
heap
page read and write
1A27B679000
heap
page read and write
4698000
heap
page read and write
22C7D000
unkown
page readonly
241E8DFD000
heap
page read and write
24873000
unkown
page readonly
2AF9000
heap
page read and write
471D000
heap
page read and write
241E8E1D000
heap
page read and write
46CE000
heap
page read and write
7FF849160000
trusted library allocation
page execute and read and write
682000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
22523000
unkown
page readonly
46DE000
heap
page read and write
26F05000
unkown
page readonly
43DB000
heap
page read and write
4682000
heap
page read and write
447E000
heap
page read and write
470C000
heap
page read and write
545000
heap
page read and write
46CE000
heap
page read and write
4637000
heap
page read and write
559000
heap
page read and write
27F6000
heap
page read and write
2006F000
unkown
page readonly
565000
heap
page read and write
4BF0000
heap
page read and write
1F018000
unkown
page readonly
190000
heap
page read and write
4D0C000
heap
page read and write
4482000
heap
page read and write
4650000
heap
page read and write
46E5000
heap
page read and write
190000
heap
page read and write
469D000
heap
page read and write
545000
heap
page read and write
24791000
unkown
page readonly
2593B000
unkown
page readonly
22DEC000
unkown
page readonly
27B2000
heap
page read and write
4D0A000
heap
page read and write
4611000
heap
page read and write
43D6000
heap
page read and write
46B7000
heap
page read and write
2B12000
heap
page read and write
523000
heap
page read and write
46CE000
heap
page read and write
2758000
heap
page read and write
26523000
unkown
page readonly
49DE000
stack
page read and write
18F0000
heap
page read and write
2A90000
heap
page read and write
4CFD000
heap
page read and write
46CE000
heap
page read and write
2B57000
heap
page read and write
21660000
unkown
page readonly
1A27B683000
heap
page read and write
45CE000
stack
page read and write
29F6000
heap
page read and write
6E8000
heap
page read and write
29E1000
heap
page read and write
1A27B679000
heap
page read and write
1A27B6AB000
heap
page read and write
2B39000
heap
page read and write
241EA6F0000
heap
page read and write
1F168000
unkown
page readonly
1A27B691000
heap
page read and write
282C000
heap
page read and write
46B7000
heap
page read and write
4719000
heap
page read and write
50B000
heap
page read and write
401000
unkown
page execute and read and write
1CAAC000
unkown
page readonly
1E8C0000
unkown
page readonly
1FF31000
unkown
page readonly
4694000
heap
page read and write
2837000
heap
page read and write
1A27B691000
heap
page read and write
46B7000
heap
page read and write
282C000
heap
page read and write
1A27B681000
heap
page read and write
1FE76000
unkown
page readonly
26D3B000
unkown
page readonly
13A26000
trusted library allocation
page read and write
4AD1000
heap
page read and write
1D18F000
unkown
page readonly
545000
heap
page read and write
2AF3000
heap
page read and write
2490B000
unkown
page readonly
4682000
heap
page read and write
46E5000
heap
page read and write
2838000
heap
page read and write
4468000
heap
page read and write
54E000
heap
page read and write
24897000
unkown
page readonly
50B000
heap
page read and write
1D099000
unkown
page readonly
18D0000
heap
page read and write
469D000
heap
page read and write
46F7000
heap
page read and write
20B80000
unkown
page readonly
24B0C000
unkown
page readonly
4650000
heap
page read and write
545000
heap
page read and write
473C000
heap
page read and write
4693000
heap
page read and write
545000
heap
page read and write
20E12000
unkown
page readonly
469D000
heap
page read and write
50B000
heap
page read and write
46F6000
heap
page read and write
44B5000
heap
page read and write
241E8D8F000
heap
page read and write
4658000
heap
page read and write
50B000
heap
page read and write
51E000
heap
page read and write
2B86000
heap
page read and write
467A000
heap
page read and write
46CE000
heap
page read and write
46E5000
heap
page read and write
2741000
heap
page read and write
1E4DC000
unkown
page readonly
265B5000
unkown
page readonly
B00000
heap
page read and write
2814000
heap
page read and write
1CB5F000
unkown
page readonly
4AEA000
heap
page read and write
1CEC0000
unkown
page readonly
4694000
heap
page read and write
50B000
heap
page read and write
584000
heap
page read and write
469D000
heap
page read and write
50B000
heap
page read and write
24A7C000
unkown
page readonly
4686000
heap
page read and write
525000
heap
page read and write
7FF849088000
trusted library allocation
page read and write
20231000
unkown
page readonly
6A2000
heap
page read and write
4611000
heap
page read and write
50B000
heap
page read and write
2A0E000
heap
page read and write
46B7000
heap
page read and write
241E8D20000
heap
page read and write
2A30000
heap
page read and write
582000
heap
page read and write
564000
heap
page read and write
563000
heap
page read and write
1DD0000
heap
page read and write
4686000
heap
page read and write
1B5E000
stack
page read and write
50B000
heap
page read and write
50B000
heap
page read and write
1A27B6A5000
heap
page read and write
50B000
heap
page read and write
4611000
heap
page read and write
4682000
heap
page read and write
4667000
heap
page read and write
1E48E000
unkown
page readonly
1A27B696000
heap
page read and write
1A27B66F000
heap
page read and write
4CFB000
heap
page read and write
241E6F97000
heap
page read and write
46CE000
heap
page read and write
551000
heap
page read and write
2499A000
unkown
page readonly
2B78000
heap
page read and write
218C0000
unkown
page readonly
4718000
heap
page read and write
525000
heap
page read and write
230CB000
unkown
page readonly
2B56000
heap
page read and write
29DC000
heap
page read and write
50B000
heap
page read and write
2749000
heap
page read and write
27A0000
heap
page read and write
46CE000
heap
page read and write
4678000
heap
page read and write
1F496000
unkown
page readonly
467B000
heap
page read and write
4D06000
heap
page read and write
46F6000
heap
page read and write
279D000
heap
page read and write
7FF848E36000
trusted library allocation
page read and write
46F6000
heap
page read and write
46E5000
heap
page read and write
46F6000
heap
page read and write
469D000
heap
page read and write
277CA000
heap
page read and write
46FC000
heap
page read and write
2618A000
unkown
page readonly
46B7000
heap
page read and write
50B000
heap
page read and write
2B56000
heap
page read and write
567000
heap
page read and write
50B000
heap
page read and write
2537B000
unkown
page readonly
2835000
heap
page read and write
282C000
heap
page read and write
25956000
unkown
page readonly
1A27B6A5000
heap
page read and write
473C000
heap
page read and write
545000
heap
page read and write
46CE000
heap
page read and write
6D5000
heap
page read and write
4682000
heap
page read and write
6A2000
heap
page read and write
44B5000
heap
page read and write
280D000
heap
page read and write
1F47D000
unkown
page readonly
20E71000
unkown
page readonly
4709000
heap
page read and write
59C000
heap
page read and write
2192B000
unkown
page readonly
146000
stack
page read and write
46CE000
heap
page read and write
50B000
heap
page read and write
2741000
heap
page read and write
2B86000
heap
page read and write
4472000
heap
page read and write
565000
heap
page read and write
4667000
heap
page read and write
4694000
heap
page read and write
1B80000
trusted library section
page readonly
46B7000
heap
page read and write
46B7000
heap
page read and write
1FFA2000
unkown
page readonly
50B000
heap
page read and write
29E1000
heap
page read and write
46F6000
heap
page read and write
50B000
heap
page read and write
22D92000
unkown
page readonly
52CC000
stack
page read and write
46E5000
heap
page read and write
2741000
heap
page read and write
241E6F76000
heap
page read and write
27CE000
stack
page read and write
4472000
heap
page read and write
25458000
unkown
page readonly
27D7000
heap
page read and write
27C6000
heap
page read and write
4678000
heap
page read and write
2A70000
heap
page read and write
40C000
unkown
page write copy
1EBC9000
unkown
page readonly
6FA000
heap
page read and write
4694000
heap
page read and write
1A27B69C000
heap
page read and write
690000
heap
page read and write
44B5000
heap
page read and write
2835000
heap
page read and write
241E88E3000
heap
page read and write
4678000
heap
page read and write
46CE000
heap
page read and write
1F566000
unkown
page readonly
20CED000
unkown
page readonly
2AF9000
heap
page read and write
217D6000
unkown
page readonly
23002000
unkown
page readonly
4686000
heap
page read and write
46E5000
heap
page read and write
1FDB7000
unkown
page readonly
525000
heap
page read and write
4417000
heap
page read and write
1A27B64B000
heap
page read and write
7FF84908B000
trusted library allocation
page read and write
4694000
heap
page read and write
7FF84905C000
trusted library allocation
page read and write
20E56000
unkown
page readonly
4B17000
heap
page read and write
20C84000
unkown
page readonly
46B7000
heap
page read and write
29B1000
heap
page read and write
44C8000
heap
page read and write
27DF000
heap
page read and write
418F000
trusted library allocation
page read and write
27AA000
heap
page read and write
46F6000
heap
page read and write
573000
heap
page read and write
4AD9000
heap
page read and write
241E8E09000
heap
page read and write
776000
heap
page read and write
441F000
heap
page read and write
1DF4F000
heap
page read and write
2245F000
unkown
page readonly
4AD4000
heap
page read and write
241E6FB2000
heap
page read and write
282C000
heap
page read and write
27CF000
heap
page read and write
44B5000
heap
page read and write
470E000
heap
page read and write
59C000
heap
page read and write
2B43000
heap
page read and write
522000
heap
page read and write
2830000
heap
page read and write
59C000
heap
page read and write
7FF8490E5000
trusted library allocation
page read and write
2951D000
trusted library allocation
page read and write
2B89000
heap
page read and write
59C000
heap
page read and write
564000
heap
page read and write
E12000
unkown
page readonly
46A4000
heap
page read and write
1A27B696000
heap
page read and write
29DC000
heap
page read and write
1D2E000
stack
page read and write
1A27B6A5000
heap
page read and write
4693000
heap
page read and write
265AB000
unkown
page readonly
1A27B6A5000
heap
page read and write
46F7000
heap
page read and write
1C825000
heap
page read and write
2829000
heap
page read and write
27B7000
heap
page read and write
50B000
heap
page read and write
255C2000
unkown
page readonly
470E000
heap
page read and write
50B000
heap
page read and write
43EE000
heap
page read and write
2C7E0000
heap
page read and write
239E000
stack
page read and write
1C9A0000
unkown
page readonly
29E7000
heap
page read and write
1E99D000
unkown
page readonly
50B000
heap
page read and write
1A27B696000
heap
page read and write
1E31E000
unkown
page readonly
2A50000
heap
page read and write
241E8DED000
heap
page read and write
4423000
heap
page read and write
2749000
heap
page read and write
281C000
heap
page read and write
44B9000
heap
page read and write
59C000
heap
page read and write
2830000
heap
page read and write
277C2000
heap
page read and write
567000
heap
page read and write
4431000
heap
page read and write
2465F000
unkown
page readonly
1F375000
unkown
page readonly
27A0000
heap
page read and write
50B000
heap
page read and write
21AFA000
unkown
page readonly
200B0000
unkown
page readonly
241E6FB2000
heap
page read and write
1E242000
unkown
page readonly
50B000
heap
page read and write
525000
heap
page read and write
2831000
heap
page read and write
4D05000
heap
page read and write
53C000
heap
page read and write
6CB000
heap
page read and write
27798000
heap
page read and write
4693000
heap
page read and write
243C2000
unkown
page readonly
46E5000
heap
page read and write
46FB000
heap
page read and write
281F000
heap
page read and write
27F5000
heap
page read and write
56D000
heap
page read and write
46F6000
heap
page read and write
4667000
heap
page read and write
7FF849190000
trusted library allocation
page execute and read and write
69C000
heap
page read and write
4CF1000
heap
page read and write
44A0000
heap
page read and write
1A27B676000
heap
page read and write
1A27B66B000
heap
page read and write
4686000
heap
page read and write
980000
heap
page read and write
241E90E0000
heap
page read and write
4BA2000
heap
page read and write
69C000
heap
page read and write
4693000
heap
page read and write
247DC000
unkown
page readonly
1C430000
heap
page read and write
44D000
unkown
page readonly
7FF849100000
trusted library allocation
page execute and read and write
4686000
heap
page read and write
4406000
heap
page read and write
36CE000
stack
page read and write
573000
heap
page read and write
4655000
heap
page read and write
525000
heap
page read and write
282C000
heap
page read and write
46CE000
heap
page read and write
19A000
stack
page read and write
545000
heap
page read and write
23134000
unkown
page readonly
1A0000
heap
page read and write
4411000
heap
page read and write
4ACF000
heap
page read and write
23760000
unkown
page readonly
46E5000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
4693000
heap
page read and write
27BD4000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page execute and read and write
2814000
heap
page read and write
214D1000
unkown
page readonly
4CF1000
heap
page read and write
1DFC1000
heap
page read and write
7FF848EDA000
trusted library allocation
page execute and read and write
1F07D000
unkown
page readonly
50B000
heap
page read and write
13A0000
heap
page read and write
44B9000
heap
page read and write
46E5000
heap
page read and write
53D000
heap
page read and write
50B000
heap
page read and write
147DA000
trusted library allocation
page read and write
6E6000
heap
page read and write
43F1000
heap
page read and write
46F6000
heap
page read and write
7FF848EED000
trusted library allocation
page execute and read and write
1F254000
unkown
page readonly
27E4000
heap
page read and write
551000
heap
page read and write
27DA000
heap
page read and write
1A27B678000
heap
page read and write
4D09000
heap
page read and write
46CE000
heap
page read and write
4AE5000
heap
page read and write
561000
heap
page read and write
4693000
heap
page read and write
1A27B65A000
heap
page read and write
2B12000
heap
page read and write
24565000
unkown
page readonly
4658000
heap
page read and write
2300C000
unkown
page readonly
2B86000
heap
page read and write
216FE000
unkown
page readonly
6F1000
heap
page read and write
4613000
heap
page read and write
46CE000
heap
page read and write
24513000
unkown
page readonly
6F5000
heap
page read and write
2817000
heap
page read and write
471E000
heap
page read and write
1A27B66F000
heap
page read and write
241E8DD5000
heap
page read and write
50B000
heap
page read and write
214DB000
unkown
page readonly
4430000
heap
page read and write
6A2000
heap
page read and write
50B000
heap
page read and write
66D000
heap
page read and write
46E5000
heap
page read and write
46B7000
heap
page read and write
9E2E7FF000
stack
page read and write
241E8E04000
heap
page read and write
4AAE000
heap
page read and write
4678000
heap
page read and write
2790000
heap
page read and write
545000
heap
page read and write
44C8000
heap
page read and write
2A50000
heap
page read and write
46CE000
heap
page read and write
4AA9000
heap
page read and write
40E000
unkown
page readonly
2835000
heap
page read and write
216A1000
unkown
page readonly
20CDE000
unkown
page readonly
582000
heap
page read and write
46F6000
heap
page read and write
58C000
heap
page read and write
2AD3000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
2013A000
unkown
page readonly
2615A000
unkown
page readonly
564000
heap
page read and write
4679000
heap
page read and write
447B000
heap
page read and write
584000
heap
page read and write
24794000
unkown
page readonly
46CE000
heap
page read and write
4466000
heap
page read and write
46B7000
heap
page read and write
20C62000
unkown
page readonly
46B7000
heap
page read and write
241E8DE3000
heap
page read and write
24964000
unkown
page readonly
4667000
heap
page read and write
564000
heap
page read and write
4667000
heap
page read and write
20962000
unkown
page readonly
4AE4000
heap
page read and write
471C000
heap
page read and write
46E5000
heap
page read and write
46CE000
heap
page read and write
447A000
heap
page read and write
59C000
heap
page read and write
4753000
heap
page read and write
215A2000
unkown
page readonly
46CE000
heap
page read and write
146000
stack
page read and write
B9C000
heap
page read and write
58D000
heap
page read and write
29634000
trusted library allocation
page read and write
600000
heap
page read and write
192B000
heap
page read and write
290E000
stack
page read and write
1CEC2000
unkown
page readonly
27D6000
heap
page read and write
4693000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
26D18000
unkown
page readonly
1A27B678000
heap
page read and write
6E8000
heap
page read and write
46F6000
heap
page read and write
1A27B66D000
heap
page read and write
470F000
heap
page read and write
2830000
heap
page read and write
241E8E1D000
heap
page read and write
471E000
heap
page read and write
2781000
heap
page read and write
46CE000
heap
page read and write
26EFB000
unkown
page readonly
1F127000
unkown
page readonly
6A2000
heap
page read and write
4678000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
49F0000
heap
page read and write
27D6000
heap
page read and write
29B12000
trusted library allocation
page read and write
50B000
heap
page read and write
20055000
unkown
page readonly
4678000
heap
page read and write
2AF1000
heap
page read and write
1D001000
unkown
page readonly
1E4D2000
unkown
page readonly
50B000
heap
page read and write
59C000
heap
page read and write
2B89000
heap
page read and write
46E5000
heap
page read and write
2B23000
heap
page read and write
27FD000
heap
page read and write
46B7000
heap
page read and write
2308D000
unkown
page readonly
4650000
heap
page read and write
23831000
unkown
page readonly
46B7000
heap
page read and write
1CBF1000
unkown
page readonly
4611000
heap
page read and write
2611D000
unkown
page readonly
2452E000
unkown
page readonly
2741000
heap
page read and write
2A11000
heap
page read and write
1F4E8000
unkown
page readonly
4686000
heap
page read and write
1FF27000
unkown
page readonly
4693000
heap
page read and write
449E000
heap
page read and write
461A000
heap
page read and write
1A27B69D000
heap
page read and write
4678000
heap
page read and write
AF0000
heap
page read and write
513000
heap
page read and write
471E000
heap
page read and write
4682000
heap
page read and write
1F502000
unkown
page readonly
218ED000
unkown
page readonly
46F6000
heap
page read and write
281C000
heap
page read and write
25FC0000
unkown
page readonly
43FC000
heap
page read and write
254CB000
unkown
page readonly
1A27B69B000
heap
page read and write
567000
heap
page read and write
1A27B66C000
heap
page read and write
4AE9000
heap
page read and write
471E000
heap
page read and write
4426000
heap
page read and write
27A2000
heap
page read and write
2B97000
heap
page read and write
46F6000
heap
page read and write
50B000
heap
page read and write
544000
heap
page read and write
50B000
heap
page read and write
4682000
heap
page read and write
29D0000
heap
page read and write
1D46D000
unkown
page readonly
223B5000
unkown
page readonly
B9A000
heap
page read and write
584000
heap
page read and write
1E0000
heap
page read and write
46CE000
heap
page read and write
7FF848EE5000
trusted library allocation
page read and write
46CE000
heap
page read and write
4682000
heap
page read and write
1F590000
unkown
page readonly
69C000
heap
page read and write
26D45000
unkown
page readonly
27FD000
heap
page read and write
471E000
heap
page read and write
241E6F64000
heap
page read and write
50B000
heap
page read and write
254C1000
unkown
page readonly
2492E000
unkown
page readonly
21638000
unkown
page readonly
217BF000
unkown
page readonly
2487D000
unkown
page readonly
1CC20000
unkown
page readonly
4AE8000
heap
page read and write
4714000
heap
page read and write
7FF84902A000
trusted library allocation
page read and write
46E5000
heap
page read and write
46F6000
heap
page read and write
4187000
trusted library allocation
page read and write
1A27B691000
heap
page read and write
4711000
heap
page read and write
552000
heap
page read and write
23140000
unkown
page readonly
401000
unkown
page execute read
20B5D000
unkown
page readonly
1E230000
trusted library allocation
page read and write
1FF43000
unkown
page readonly
5D0000
heap
page read and write
50B000
heap
page read and write
438000
unkown
page readonly
4667000
heap
page read and write
2830000
heap
page read and write
690000
heap
page read and write
2B89000
heap
page read and write
21B78000
unkown
page readonly
27F6000
heap
page read and write
440A000
heap
page read and write
2A89000
heap
page read and write
7FF848E12000
trusted library allocation
page execute and read and write
4D0E000
heap
page read and write
693000
heap
page read and write
2810000
heap
page read and write
2964B000
trusted library allocation
page read and write
27B7000
heap
page read and write
277C5000
heap
page read and write
6E8000
heap
page read and write
249DE000
unkown
page readonly
463C000
heap
page read and write
564000
heap
page read and write
1FFAC000
unkown
page readonly
4686000
heap
page read and write
544000
heap
page read and write
27800000
heap
page read and write
1FE1C000
unkown
page readonly
4699000
heap
page read and write
564000
heap
page read and write
1F42A000
unkown
page readonly
44B9000
heap
page read and write
2741000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
4682000
heap
page read and write
46CE000
heap
page read and write
50B000
heap
page read and write
6F1000
heap
page read and write
25379000
unkown
page readonly
6F1000
heap
page read and write
4650000
heap
page read and write
241E8E04000
heap
page read and write
4429000
heap
page read and write
23909000
unkown
page readonly
46CE000
heap
page read and write
29BC000
heap
page read and write
44C8000
heap
page read and write
2814000
heap
page read and write
43F7000
heap
page read and write
58A000
heap
page read and write
6E8000
heap
page read and write
21683000
unkown
page readonly
2741000
heap
page read and write
283E000
heap
page read and write
1FFD7000
unkown
page readonly
50B000
heap
page read and write
4682000
heap
page read and write
1CDE0000
heap
page read and write
1F070000
unkown
page readonly
24938000
unkown
page readonly
6A4000
heap
page read and write
43DA000
heap
page read and write
6F0000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1C2ED000
stack
page read and write
B9E000
heap
page read and write
46CE000
heap
page read and write
27A0000
heap
page read and write
2749000
heap
page read and write
447E000
heap
page read and write
46F6000
heap
page read and write
4678000
heap
page read and write
27DA000
heap
page read and write
2B86000
heap
page read and write
564000
heap
page read and write
20043000
unkown
page readonly
46CE000
heap
page read and write
4667000
heap
page read and write
544000
heap
page read and write
26C00000
unkown
page readonly
43ED000
heap
page read and write
4693000
heap
page read and write
55D000
heap
page read and write
1A27B68F000
heap
page read and write
52D000
heap
page read and write
46F6000
heap
page read and write
27B7000
heap
page read and write
552000
heap
page read and write
470E000
heap
page read and write
46A8000
heap
page read and write
471D000
heap
page read and write
20ED0000
unkown
page readonly
2814000
heap
page read and write
2623C000
unkown
page readonly
1A27B663000
heap
page read and write
50B000
heap
page read and write
55D000
heap
page read and write
4CFA000
heap
page read and write
4485000
heap
page read and write
5D9000
heap
page read and write
59C000
heap
page read and write
27F2000
heap
page read and write
25646000
unkown
page readonly
59C000
heap
page read and write
241E8DDC000
heap
page read and write
4686000
heap
page read and write
46E5000
heap
page read and write
21AB2000
unkown
page readonly
4631000
heap
page read and write
970790F000
stack
page read and write
26587000
unkown
page readonly
46B7000
heap
page read and write
564000
heap
page read and write
6F5000
heap
page read and write
52F000
heap
page read and write
29DC000
heap
page read and write
23D31000
unkown
page readonly
29E1000
heap
page read and write
574000
heap
page read and write
23A46000
unkown
page readonly
4CF1000
heap
page read and write
53E000
heap
page read and write
46E5000
heap
page read and write
27C6000
heap
page read and write
1E461000
unkown
page readonly
46B7000
heap
page read and write
46E5000
heap
page read and write
2B97000
heap
page read and write
4CFB000
heap
page read and write
4650000
heap
page read and write
6F1000
heap
page read and write
282C000
heap
page read and write
1A27BB0D000
heap
page read and write
241E8D67000
heap
page read and write
730000
heap
page read and write
2791000
heap
page read and write
4693000
heap
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
21ABC000
unkown
page readonly
1A27BCC0000
heap
page read and write
7FF848FE7000
trusted library allocation
page read and write
24ACF000
unkown
page readonly
1946000
heap
page read and write
551000
heap
page read and write
4645000
heap
page read and write
6F1000
heap
page read and write
2B03000
heap
page read and write
4D0E000
heap
page read and write
59C000
heap
page read and write
6A4000
heap
page read and write
1C9EF000
unkown
page readonly
21935000
unkown
page readonly
254A0000
unkown
page readonly
1A27B66B000
heap
page read and write
46CE000
heap
page read and write
23115000
unkown
page readonly
592000
heap
page read and write
584000
heap
page read and write
4611000
heap
page read and write
4413000
heap
page read and write
441B000
heap
page read and write
4686000
heap
page read and write
46E5000
heap
page read and write
23C68000
unkown
page readonly
4414000
heap
page read and write
4D24000
heap
page read and write
1EBDA000
unkown
page readonly
4650000
heap
page read and write
2B42000
heap
page read and write
1CC4C000
unkown
page readonly
29B1000
heap
page read and write
6A4000
heap
page read and write
29632000
trusted library allocation
page read and write
4661000
heap
page read and write
There are 3362 hidden memdumps, click here to show them.