IOC Report
ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exe

loading gif

Files

File Path
Type
Category
Malicious
ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\icsys.icn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\stsys.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\mrsys.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System\explorer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System\spoolsv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System\svchost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x3f0d0717, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\adsp-21593bbpz10 analog devices, inc. 5000.exe .log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cmsys[1].htm
HTML document, ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cmsys[1].htm
HTML document, ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\what-happened-to-the-old-zxq-website[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (8047)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_myrqqk3p.ihb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sww4vmne.q04.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vyu2w104.20m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylxj0vzq.4ul.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\~DF0ED62A5703D6E8FB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF64BBBF01BE24C3EA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFAA9CF918C46031A3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFB20A1E73CCD4104E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFD22C3A7A8079A9E3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFDA6FAD41E43579C3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFFB2FA207E099A40B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\System\cmsys.cmn
HTML document, Unicode text, UTF-8 text, with very long lines (8047)
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exe
"C:\Users\user\Desktop\ADSP-21593BBPZ10 Analog Devices, Inc. 5000.exe"
malicious
C:\Users\user\Desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe
"c:\users\user\desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe "
malicious
C:\Users\user\AppData\Local\icsys.icn.exe
C:\Users\user\AppData\Local\icsys.icn.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System\explorer.exe
c:\windows\system\explorer.exe
malicious
C:\Windows\System\spoolsv.exe
c:\windows\system\spoolsv.exe SE
malicious
C:\Windows\System\svchost.exe
c:\windows\system\svchost.exe
malicious
C:\Windows\System\spoolsv.exe
c:\windows\system\spoolsv.exe PR
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "c:\users\user\desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe "
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Users\user\Desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe
"c:\users\user\desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe "
malicious
C:\Users\user\Desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe
"c:\users\user\desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe "
malicious
C:\Users\user\Desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe
"c:\users\user\desktop\adsp-21593bbpz10 analog devices, inc. 5000.exe "
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System\explorer.exe
"C:\windows\system\explorer.exe" RO
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\SysWOW64\at.exe
at 04:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc stop SharedAccess
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc config Schedule start= auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
sc start Schedule
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 58 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://zxq.net/cmsys.gif
51.81.194.202
malicious
https://zxq.net/what-happened-to-the-old-zxq-website/
51.81.194.202
malicious
http://vccmd03.googlecode.com/files/cmsys.gif
173.194.76.82
https://zxq.net/wp-content/uploads/2022/02/ZXQ-FB.png
unknown
https://zxq.net/privacy-policy/
unknown
https://api.telegram.org/bot
unknown
https://zxq.net/cmsys.gifn
unknown
https://zxq.net/wp-content/uploads/2024/10/Snoring-and-Sleep-Apnea.png
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/#breadcrumb
unknown
https://www.office.com/lB
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.fontbureau.com/designers
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://vccmd01.zxq.netst.exe
unknown
https://zxq.net/cmsys.gife
unknown
http://www.sajatypeworks.com
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://checkip.dyndns.org/
132.226.247.73
https://zxq.net/wp-content/uploads/2022/02/ZXQ.png
unknown
https://zxq.net/wp-content/uploads/2024/09/Essential-Renovation-Tips-for-Singapore-Homes-Sidestep-Th
unknown
https://zxq.net/about-us/
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://zxq.net/#logo
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://zxq.net/cmsys.gifB
unknown
https://zxq.net/wp-content/uploads/2024/09/Top-Modern-Security-Devices-to-Install-in-Your-Home-150x8
unknown
http://vccmd01.zxq.net/cmsys.gifbbpz10
unknown
https://zxq.net/news/technology/
unknown
https://zxq.net/wp-content/themes/smart-mag/js/jquery.sticky-sidebar.js?ver=7.1.1
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://zxq.net/wp-json/
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://www.sakkal.comY
unknown
https://zxq.net/wp-content/uploads/2024/10/Snoring-and-Sleep-Apnea-1024x576.png
unknown
https://reallyfreegeoip.org/xml/
unknown
http://vccmd01.zxq.net/cmsys.gif3bbpz10
unknown
https://www.office.com/
unknown
http://vccmd02.googlecode.com/files/cmsys.gif6
unknown
https://zxq.net/wp-content/uploads/2024/10/Snoring-and-Sleep-Apnea-150x84.png
unknown
https://zxq.net/wp-content/uploads/2024/10/How-to-Handle-Quick-Home-Repairs-Without-Professional-Hel
unknown
https://zxq.net/wp-content/plugins/table-of-contents-plus/front.min.js?ver=2106
unknown
http://crl.ver)
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
https://zxq.net/wp-content/plugins/table-of-contents-plus/screen.min.css?ver=2106
unknown
http://www.carterandcone.coml
unknown
http://vccmd02.googlecode.com/files/cmsys.gif#
unknown
http://aborters.duckdns.org:8081
unknown
https://zxq.net/?s=
unknown
https://zxq.net/wp-content/uploads/2024/09/Finance-Phantom-Review-
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/WC:
unknown
http://anotherarmy.dns.army:8081
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/#webpage
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/qqC:
unknown
http://vccmd03.googlecode.com/files/cmsys.gif7
unknown
https://zxq.net/news/entertainment/
unknown
https://zxq.net/wp-includes/wlwmanifest.xml
unknown
https://reallyfreegeoip.org
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/0
unknown
https://zxq.net/wp-content/uploads/2022/03/follow-us-on-google-news-banner-black-300x117.png
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/2
unknown
https://zxq.net/wp-content/uploads/2024/10/Snoring-and-Sleep-Apnea-768x432.png
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:358075%0D%0ADate%20and%20Time:%2010/10/2024%20/%2016:46:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20358075%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://zxq.net/snoring-and-sleep-apnea/
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/1
unknown
https://zxq.net/wp-content/uploads/2024/09/Top-Modern-Security-Devices-to-Install-in-Your-Home-300x1
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://vccmd03.googlecode.com/files/cmsys.gif#
unknown
https://zxq.net/write-for-us/
unknown
http://vccmd03.googlecode.com/files/cmsys.gif(
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/#
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://zxq.net/#organization
unknown
https://zxq.net/wp-content/themes/smart-mag/css/icons/fonts/ts-icons.woff2?v2.2
unknown
https://zxq.net/wp-content/uploads/2022/03/follow-us-on-google-news-banner-black.png
unknown
http://www.fontbureau.com/designersG
unknown
https://zxq.net/news/business/
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org
unknown
https://yoast.com/wordpress/plugins/seo/
unknown
http://www.fontbureau.com/designers?
unknown
https://zxq.net/top-modern-security-devices-to-install-in-your-home/
unknown
https://zxq.net/mastering-renovations-key-ideas-to-prevent-common-mistakes-in-singapore-homes/
unknown
https://zxq.net/wp-content/uploads/2024/09/Essential-Renovation
unknown
https://zxq.net/wp-content/uploads/2024/10/Snoring-and-Sleep-Apnea-450x253.png
unknown
http://www.tiro.com
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/Q
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://zxq.net/essential-renovation-tips-for-singapore-homes-sidestep-these-common-mistakes/
unknown
http://www.goodfont.co.kr
unknown
https://zxq.net/what-happened-to-the-old-zxq-website/H
unknown
https://zxq.net/xmlrpc.php?rsd
unknown
https://zxq.net/news/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
zxq.net
51.81.194.202
malicious
vccmd01.zxq.net
51.81.194.202
malicious
vccmd03.googlecode.com
unknown
malicious
vccmd01.t35.com
unknown
malicious
vccmd01.googlecode.com
unknown
malicious
checkip.dyndns.org
unknown
malicious
vccmd02.googlecode.com
unknown
malicious
206.23.85.13.in-addr.arpa
unknown
malicious
googlecode.l.googleusercontent.com
64.233.184.82
checkip.dyndns.com
132.226.247.73
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
51.81.194.202
zxq.net
United States
malicious
173.194.76.82
unknown
United States
64.233.184.82
googlecode.l.googleusercontent.com
United States
192.168.2.4
unknown
unknown
127.0.0.1
unknown
unknown
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon
shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}
StubPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
StubPath
malicious
HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
LO
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Explorer
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Svchost
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess
Start
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\adsp-21593bbpz10 analog devices, inc_RASMANCS
FileDirectory
There are 147 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
36FC000
trusted library allocation
page read and write
malicious
33A1000
trusted library allocation
page read and write
malicious
31F0000
remote allocation
page read and write
B7AD000
stack
page read and write
6CE0000
trusted library section
page read and write
643000
heap
page read and write
3C90000
trusted library allocation
page read and write
72E000
stack
page read and write
3D10000
trusted library allocation
page read and write
66F000
stack
page read and write
2890000
heap
page read and write
1F0000
heap
page read and write
549E000
stack
page read and write
7B39000
trusted library allocation
page read and write
62C000
heap
page read and write
4F40000
trusted library allocation
page read and write
6C13000
heap
page read and write
3281000
heap
page read and write
3180000
heap
page read and write
7060000
trusted library allocation
page execute and read and write
205224B1000
heap
page read and write
731E000
stack
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
5060000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
C47000
trusted library allocation
page execute and read and write
3C90000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
3281000
heap
page read and write
C20000
trusted library allocation
page read and write
29A0000
heap
page read and write
289E000
stack
page read and write
3281000
heap
page read and write
613000
heap
page read and write
4626000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
8F8E000
stack
page read and write
3281000
heap
page read and write
2800000
remote allocation
page read and write
61B000
heap
page read and write
205223E0000
heap
page read and write
173D000
trusted library allocation
page execute and read and write
2099000
heap
page read and write
570000
trusted library allocation
page read and write
20527AF1000
heap
page read and write
32F0000
heap
page read and write
23D0000
remote allocation
page read and write
2F20000
heap
page read and write
37DE000
trusted library allocation
page read and write
6F6A000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
C4B000
trusted library allocation
page execute and read and write
62C000
heap
page read and write
62C000
heap
page read and write
27FE000
stack
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
3A30000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
20522513000
heap
page read and write
3A30000
trusted library allocation
page read and write
2A70000
heap
page read and write
70F0000
trusted library allocation
page read and write
15FE000
stack
page read and write
2765000
heap
page read and write
2A7F000
stack
page read and write
3C90000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
2243000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
2F10000
heap
page read and write
3559000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
3010000
heap
page read and write
2C4E000
stack
page read and write
75C000
heap
page read and write
570000
trusted library allocation
page read and write
177E000
heap
page read and write
28BF000
stack
page read and write
270E000
stack
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
2BE000
stack
page read and write
3281000
heap
page read and write
4B40000
trusted library allocation
page read and write
613000
heap
page read and write
509C000
heap
page read and write
2BE0000
heap
page read and write
2190000
heap
page read and write
3F90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
613000
heap
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
20522440000
heap
page read and write
3601000
trusted library allocation
page read and write
61C000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
472B000
trusted library allocation
page read and write
6D90000
trusted library section
page read and write
93720FE000
unkown
page readonly
2ED0000
heap
page read and write
C32000
trusted library allocation
page read and write
76C000
heap
page read and write
62C000
heap
page read and write
2AC0000
heap
page read and write
3D10000
trusted library allocation
page read and write
3188000
heap
page read and write
274F000
stack
page read and write
3ABC000
stack
page read and write
2E00000
heap
page read and write
9D000
stack
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
3050000
heap
page read and write
3A30000
trusted library allocation
page read and write
20527AC0000
heap
page read and write
3281000
heap
page read and write
4674000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3281000
heap
page read and write
2AF8000
heap
page read and write
520000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
2E90000
heap
page read and write
402000
unkown
page execute and write copy
3B87000
heap
page read and write
2AAD000
stack
page read and write
267D000
stack
page read and write
6DD000
heap
page read and write
3281000
heap
page read and write
401000
unkown
page execute and read and write
3281000
heap
page read and write
61B000
heap
page read and write
62C000
heap
page read and write
4B01000
trusted library allocation
page read and write
2710000
heap
page read and write
7130000
trusted library allocation
page execute and read and write
17D000
stack
page read and write
3A30000
trusted library allocation
page read and write
940000
heap
page read and write
3C90000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
2220000
heap
page read and write
C42000
trusted library allocation
page read and write
29B0000
remote allocation
page read and write
2F30000
heap
page read and write
19A000
stack
page read and write
2224000
heap
page read and write
3281000
heap
page read and write
C60000
trusted library allocation
page read and write
20522D1A000
heap
page read and write
3281000
heap
page read and write
42E000
unkown
page readonly
3B86000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
6FD000
heap
page read and write
3281000
heap
page read and write
3A30000
trusted library allocation
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
613000
heap
page read and write
ED000
stack
page read and write
3C90000
trusted library allocation
page read and write
668F000
stack
page read and write
4639000
trusted library allocation
page read and write
20523940000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
613000
heap
page read and write
6ED000
stack
page read and write
3281000
heap
page read and write
30E0000
heap
page read and write
3380000
trusted library allocation
page read and write
318E000
stack
page read and write
3C90000
trusted library allocation
page read and write
937237E000
stack
page read and write
29E8000
heap
page read and write
76C000
heap
page read and write
3C90000
trusted library allocation
page read and write
1857000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
2CFF000
stack
page read and write
57FA000
trusted library allocation
page read and write
190000
heap
page read and write
61C000
heap
page read and write
2828000
heap
page read and write
93726FE000
unkown
page readonly
4550000
trusted library allocation
page read and write
9371DFC000
stack
page read and write
3C90000
trusted library allocation
page read and write
4538000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
20522502000
heap
page read and write
20522D02000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
1F0000
heap
page read and write
42E000
unkown
page readonly
613000
heap
page read and write
61B000
heap
page read and write
61B000
heap
page read and write
61B000
heap
page read and write
20527C0E000
trusted library allocation
page read and write
657000
heap
page read and write
2C60000
heap
page read and write
213E000
stack
page read and write
3C90000
trusted library allocation
page read and write
470000
heap
page read and write
3281000
heap
page read and write
282F000
stack
page read and write
3281000
heap
page read and write
613000
heap
page read and write
6C40000
heap
page read and write
613000
heap
page read and write
786000
heap
page read and write
303F000
stack
page read and write
71C000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
603000
heap
page read and write
4559000
trusted library allocation
page read and write
2D4F000
stack
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
76D000
heap
page read and write
3C90000
trusted library allocation
page read and write
7030000
trusted library allocation
page execute and read and write
3281000
heap
page read and write
1720000
trusted library allocation
page read and write
4618000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
1B5000
heap
page read and write
2980000
remote allocation
page read and write
4487000
trusted library allocation
page read and write
29AE000
stack
page read and write
6F0E000
stack
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
205279B0000
trusted library allocation
page read and write
6D3000
heap
page read and write
99E000
stack
page read and write
178A000
heap
page read and write
61B000
heap
page read and write
4E40000
heap
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
29D000
stack
page read and write
205233A1000
trusted library allocation
page read and write
47C000
heap
page read and write
613000
heap
page read and write
3F90000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
3F90000
trusted library allocation
page read and write
88E000
heap
page read and write
3A30000
trusted library allocation
page read and write
402000
unkown
page execute and write copy
613000
heap
page read and write
61B000
heap
page read and write
22C0000
heap
page read and write
401000
unkown
page execute and write copy
C13000
trusted library allocation
page execute and read and write
42C000
unkown
page read and write
20527B00000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
20C0000
heap
page read and write
61B000
heap
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
50C8000
heap
page read and write
3A30000
trusted library allocation
page read and write
20522B70000
trusted library allocation
page read and write
3281000
heap
page read and write
8AE000
stack
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
400000
unkown
page readonly
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
3380000
trusted library allocation
page read and write
61B000
heap
page read and write
7040000
trusted library allocation
page execute and read and write
3BBF000
stack
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
61B000
heap
page read and write
28BD000
stack
page read and write
2C10000
heap
page read and write
263D000
stack
page read and write
5E6E000
stack
page read and write
722000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3B87000
heap
page read and write
6C26000
heap
page read and write
4D70000
trusted library allocation
page execute and read and write
2600000
trusted library allocation
page read and write
5A0000
heap
page read and write
2C7D000
stack
page read and write
270E000
stack
page read and write
2EF0000
heap
page read and write
3C90000
trusted library allocation
page read and write
C36000
trusted library allocation
page execute and read and write
2B5E000
stack
page read and write
2240000
heap
page read and write
9371FFB000
stack
page read and write
2968000
heap
page read and write
20527C6C000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
450000
heap
page read and write
613000
heap
page read and write
2953000
heap
page read and write
3C90000
trusted library allocation
page read and write
2EE0000
heap
page read and write
4DE0000
heap
page read and write
23E0000
heap
page read and write
6DB0000
trusted library allocation
page read and write
3281000
heap
page read and write
2BD0000
heap
page read and write
3B87000
heap
page read and write
2FE0000
heap
page read and write
46D5000
trusted library allocation
page read and write
6AD000
stack
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3BA4000
heap
page read and write
2AA0000
heap
page read and write
762000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
2850000
heap
page read and write
2F7E000
stack
page read and write
3281000
heap
page read and write
1768000
heap
page read and write
93728F9000
stack
page read and write
2BD0000
remote allocation
page read and write
3281000
heap
page read and write
286E000
stack
page read and write
3C90000
trusted library allocation
page read and write
27B5000
heap
page read and write
320000
remote allocation
page read and write
1A00000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
205235D0000
trusted library section
page readonly
3F90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3100000
heap
page read and write
2F01000
heap
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
20527CA0000
trusted library allocation
page read and write
29E0000
heap
page read and write
200000
heap
page read and write
520000
trusted library allocation
page read and write
3118000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3281000
heap
page read and write
4606000
trusted library allocation
page read and write
445E000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
2052248F000
heap
page read and write
61B000
heap
page read and write
58D0000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
4698000
trusted library allocation
page read and write
263D000
stack
page read and write
46C8000
trusted library allocation
page read and write
44E9000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
4E0000
heap
page read and write
3B86000
heap
page read and write
3D10000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
5FD000
heap
page read and write
61B000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
510000
heap
page read and write
2CDD000
stack
page read and write
2FE0000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
326E000
stack
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
2052248D000
heap
page read and write
469A000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
239E000
stack
page read and write
93F000
stack
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
70D000
heap
page read and write
570000
trusted library allocation
page read and write
2FA0000
heap
page read and write
870000
heap
page read and write
2B50000
heap
page read and write
570000
trusted library allocation
page read and write
3108000
heap
page read and write
3C90000
trusted library allocation
page read and write
84D000
heap
page read and write
4657000
trusted library allocation
page read and write
400000
unkown
page readonly
3F90000
trusted library allocation
page read and write
32F0000
heap
page read and write
62C000
heap
page read and write
3A30000
trusted library allocation
page read and write
20527A4E000
heap
page read and write
3C90000
trusted library allocation
page read and write
29B0000
heap
page read and write
2980000
remote allocation
page read and write
3281000
heap
page read and write
798000
heap
page read and write
2A79000
heap
page read and write
19C000
stack
page read and write
3B87000
heap
page read and write
570000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
23DF000
stack
page read and write
570000
trusted library allocation
page read and write
613000
heap
page read and write
62C000
heap
page read and write
2CCD000
stack
page read and write
2D40000
heap
page read and write
91F000
stack
page read and write
2A06000
heap
page read and write
174A000
trusted library allocation
page execute and read and write
34B0000
remote allocation
page read and write
2BF5000
heap
page read and write
3281000
heap
page read and write
43AB000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
3120000
heap
page read and write
83C000
heap
page read and write
570000
trusted library allocation
page read and write
3165000
heap
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
368C000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
1854000
heap
page read and write
3C90000
trusted library allocation
page read and write
2C65000
heap
page read and write
2D0E000
stack
page read and write
163E000
stack
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
62C000
heap
page read and write
23E0000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
20527C18000
trusted library allocation
page read and write
61B000
heap
page read and write
683000
heap
page read and write
3C90000
trusted library allocation
page read and write
93722FE000
unkown
page readonly
D40000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
62C000
heap
page read and write
489000
heap
page read and write
402000
unkown
page execute and write copy
330C000
heap
page read and write
20527A2E000
heap
page read and write
3A30000
trusted library allocation
page read and write
468F000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
70C000
heap
page read and write
9371EFE000
unkown
page readonly
4705000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
1746000
trusted library allocation
page execute and read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
782D000
stack
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
340A000
trusted library allocation
page read and write
62C000
heap
page read and write
3A30000
trusted library allocation
page read and write
B7B0000
heap
page read and write
61B000
heap
page read and write
781000
heap
page read and write
5830000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2DB0000
heap
page read and write
613000
heap
page read and write
2E70000
heap
page read and write
28F0000
heap
page read and write
3C90000
trusted library allocation
page read and write
237E000
stack
page read and write
3C90000
trusted library allocation
page read and write
5E80000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
61B000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
77E000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
10FA000
stack
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
3281000
heap
page read and write
20527940000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
5990000
heap
page read and write
8EF000
stack
page read and write
2BF0000
heap
page read and write
3C90000
trusted library allocation
page read and write
710000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
2B9D000
stack
page read and write
23E0000
heap
page read and write
2FEF000
stack
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
46DC000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
35BC000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3380000
remote allocation
page read and write
C14000
trusted library allocation
page read and write
28FD000
stack
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
23D0000
heap
page read and write
3F90000
trusted library allocation
page read and write
3281000
heap
page read and write
2052242B000
heap
page read and write
205226E0000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
BBAE000
stack
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
3281000
heap
page read and write
397E000
stack
page read and write
61B000
heap
page read and write
3281000
heap
page read and write
42C000
unkown
page read and write
140000
heap
page read and write
61B000
heap
page read and write
32A0000
heap
page read and write
3281000
heap
page read and write
23E0000
remote allocation
page read and write
61B000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
2200000
heap
page read and write
20527AC9000
heap
page read and write
61B000
heap
page read and write
AD000
stack
page read and write
3C90000
trusted library allocation
page read and write
3090000
heap
page read and write
3281000
heap
page read and write
55E000
stack
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
489000
heap
page read and write
275E000
stack
page read and write
62C000
heap
page read and write
31C0000
heap
page read and write
3281000
heap
page read and write
3E50000
trusted library allocation
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
400000
unkown
page readonly
20527D60000
remote allocation
page read and write
613000
heap
page read and write
3BA4000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
3281000
heap
page read and write
3588000
trusted library allocation
page read and write
2750000
heap
page read and write
5806000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
26D0000
heap
page read and write
270E000
trusted library allocation
page read and write
20527A94000
heap
page read and write
23D0000
heap
page read and write
61B000
heap
page read and write
76D000
heap
page read and write
3F90000
trusted library allocation
page read and write
B9AE000
stack
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2AC5000
heap
page read and write
3897000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
23CF000
stack
page read and write
20522C00000
heap
page read and write
2052247C000
heap
page read and write
2750000
heap
page read and write
26D0000
heap
page read and write
3D10000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
933000
heap
page read and write
613000
heap
page read and write
3E50000
trusted library allocation
page read and write
613000
heap
page read and write
2B60000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
3A30000
trusted library allocation
page read and write
7AB000
heap
page read and write
3281000
heap
page read and write
2D20000
heap
page read and write
3281000
heap
page read and write
29B0000
remote allocation
page read and write
3281000
heap
page read and write
33F2000
trusted library allocation
page read and write
613000
heap
page read and write
6A4E000
stack
page read and write
79F000
stack
page read and write
76D000
heap
page read and write
3F90000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
205234C0000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
20527AFA000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
2E10000
remote allocation
page read and write
270000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
613000
heap
page read and write
20523240000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3391000
heap
page read and write
306E000
stack
page read and write
613000
heap
page read and write
2170000
heap
page read and write
23BE000
stack
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
4495000
trusted library allocation
page read and write
2820000
heap
page read and write
313F000
stack
page read and write
2370000
heap
page read and write
4595000
trusted library allocation
page read and write
205279D0000
trusted library allocation
page read and write
287E000
stack
page read and write
3C90000
trusted library allocation
page read and write
605000
heap
page read and write
3180000
heap
page read and write
48E000
stack
page read and write
570000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
20522422000
heap
page read and write
5D6E000
stack
page read and write
61B000
heap
page read and write
2ECE000
stack
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
2795000
heap
page read and write
613000
heap
page read and write
354000
unkown
page readonly
458000
heap
page read and write
20522600000
heap
page read and write
4E3B000
stack
page read and write
3C90000
trusted library allocation
page read and write
20522428000
heap
page read and write
86E000
heap
page read and write
3C90000
trusted library allocation
page read and write
6FD000
heap
page read and write
401000
unkown
page execute and read and write
4677000
trusted library allocation
page read and write
400000
unkown
page readonly
613000
heap
page read and write
28E0000
remote allocation
page read and write
62C000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
4B5000
heap
page read and write
1B0000
heap
page read and write
3281000
heap
page read and write
67CE000
stack
page read and write
3A30000
trusted library allocation
page read and write
62C000
heap
page read and write
1F0000
heap
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
20527C56000
trusted library allocation
page read and write
4632000
trusted library allocation
page read and write
62C000
heap
page read and write
6CC000
heap
page read and write
3281000
heap
page read and write
2AFD000
stack
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
58E000
stack
page read and write
3C90000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
3C90000
trusted library allocation
page read and write
27EE000
stack
page read and write
62C000
heap
page read and write
3B7F000
heap
page read and write
3A30000
trusted library allocation
page read and write
2950000
heap
page read and write
570000
trusted library allocation
page read and write
62C000
heap
page read and write
666000
heap
page read and write
4B06000
trusted library allocation
page read and write
613000
heap
page read and write
8FE000
stack
page read and write
3281000
heap
page read and write
355F000
trusted library allocation
page read and write
5CD000
heap
page read and write
640000
heap
page read and write
3281000
heap
page read and write
2BD0000
remote allocation
page read and write
2A7D000
stack
page read and write
402000
unkown
page execute and write copy
238E000
stack
page read and write
5C3000
heap
page read and write
3C90000
trusted library allocation
page read and write
2F00000
remote allocation
page read and write
28F0000
heap
page read and write
2500000
heap
page read and write
18E000
stack
page read and write
3281000
heap
page read and write
150000
heap
page read and write
3C90000
trusted library allocation
page read and write
3B84000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
2F5E000
stack
page read and write
93718FE000
unkown
page readonly
7100000
trusted library allocation
page read and write
3782000
trusted library allocation
page read and write
6AE000
stack
page read and write
66CE000
stack
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
63C000
heap
page read and write
62C000
heap
page read and write
545000
heap
page read and write
61B000
heap
page read and write
2980000
remote allocation
page read and write
20527B02000
heap
page read and write
570000
trusted library allocation
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
2E8E000
stack
page read and write
3C90000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
2B9E000
stack
page read and write
3C90000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
613000
heap
page read and write
1540000
heap
page read and write
3281000
heap
page read and write
351F000
stack
page read and write
29C0000
heap
page read and write
62C000
heap
page read and write
937317E000
stack
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
205279F0000
trusted library allocation
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3056000
heap
page read and write
520000
trusted library allocation
page read and write
CDE000
stack
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
6C01000
heap
page read and write
61B000
heap
page read and write
2401000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3B87000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
610000
heap
page read and write
3C90000
trusted library allocation
page read and write
54E000
stack
page read and write
3C90000
trusted library allocation
page read and write
31F0000
remote allocation
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
2B1E000
stack
page read and write
3281000
heap
page read and write
3380000
trusted library allocation
page read and write
67B000
heap
page read and write
4464000
trusted library allocation
page read and write
2EAD000
stack
page read and write
613000
heap
page read and write
740000
heap
page read and write
34B0000
heap
page read and write
28D0000
heap
page read and write
4602000
trusted library allocation
page read and write
34E0000
heap
page read and write
4742000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
20527CBA000
trusted library allocation
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
2FFE000
stack
page read and write
3A30000
trusted library allocation
page read and write
2E01000
heap
page read and write
5BC000
heap
page read and write
3C90000
trusted library allocation
page read and write
2F1F000
stack
page read and write
613000
heap
page read and write
C3A000
trusted library allocation
page execute and read and write
2E4F000
stack
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
3B87000
heap
page read and write
61B000
heap
page read and write
3281000
heap
page read and write
3D10000
trusted library allocation
page read and write
3551000
trusted library allocation
page read and write
613000
heap
page read and write
2B90000
heap
page read and write
205279F0000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
2ABE000
stack
page read and write
6D3000
heap
page read and write
3C90000
trusted library allocation
page read and write
2E3E000
stack
page read and write
3C90000
trusted library allocation
page read and write
2F00000
heap
page read and write
3C90000
trusted library allocation
page read and write
D50000
heap
page read and write
613000
heap
page read and write
4F8000
heap
page read and write
6B90000
heap
page read and write
81F000
stack
page read and write
3281000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
20527A58000
heap
page read and write
3281000
heap
page read and write
273D000
stack
page read and write
7AB000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
C80000
trusted library allocation
page read and write
61B000
heap
page read and write
61B000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3B86000
heap
page read and write
2C14000
heap
page read and write
3A30000
trusted library allocation
page read and write
7DF000
stack
page read and write
3281000
heap
page read and write
2790000
heap
page read and write
3C90000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
284F000
stack
page read and write
2820000
heap
page read and write
20527CA3000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
33D0000
heap
page read and write
42E000
unkown
page readonly
8F0000
heap
page read and write
401000
unkown
page execute and write copy
3281000
heap
page read and write
1E0000
heap
page read and write
3B87000
heap
page read and write
70C0000
trusted library allocation
page execute and read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
755E000
stack
page read and write
613000
heap
page read and write
3281000
heap
page read and write
462B000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
3281000
heap
page read and write
786000
heap
page read and write
32F8000
heap
page read and write
23B0000
heap
page read and write
3281000
heap
page read and write
918000
heap
page read and write
61B000
heap
page read and write
570000
trusted library allocation
page read and write
7C1E000
stack
page read and write
3A30000
remote allocation
page read and write
570000
trusted library allocation
page read and write
61B000
heap
page read and write
3F90000
trusted library allocation
page read and write
62C000
heap
page read and write
1723000
trusted library allocation
page execute and read and write
3F90000
trusted library allocation
page read and write
4F20000
trusted library allocation
page execute and read and write
22D0000
trusted library allocation
page read and write
62C000
heap
page read and write
930000
heap
page read and write
2FF000
stack
page read and write
31E000
stack
page read and write
3281000
heap
page read and write
820000
heap
page read and write
3555000
trusted library allocation
page read and write
20527D1A000
trusted library allocation
page read and write
3018000
heap
page read and write
31C0000
remote allocation
page read and write
613000
heap
page read and write
7010000
trusted library allocation
page execute and read and write
61B000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
1730000
trusted library allocation
page read and write
20527CF4000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2D80000
heap
page read and write
400000
unkown
page readonly
613000
heap
page read and write
2830000
heap
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
5CE000
stack
page read and write
207F000
stack
page read and write
2BD000
stack
page read and write
62C000
heap
page read and write
2E10000
heap
page read and write
20527C8E000
trusted library allocation
page read and write
3100000
heap
page read and write
77E000
heap
page read and write
20528000000
heap
page read and write
2A70000
remote allocation
page read and write
4729000
trusted library allocation
page read and write
2720000
heap
page read and write
3281000
heap
page read and write
20B0000
heap
page read and write
7B8E000
stack
page read and write
2052247A000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
57EB000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
400000
unkown
page readonly
62C000
heap
page read and write
750000
heap
page read and write
3C90000
trusted library allocation
page read and write
2BE0000
heap
page read and write
20527D60000
remote allocation
page read and write
42E000
unkown
page readonly
401000
unkown
page execute and write copy
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
342F000
stack
page read and write
62C000
heap
page read and write
205279A0000
trusted library allocation
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
3020000
remote allocation
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
302F000
stack
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
4474000
trusted library allocation
page read and write
281F000
stack
page read and write
2247000
heap
page read and write
61B000
heap
page read and write
7AB000
heap
page read and write
1752000
trusted library allocation
page read and write
3281000
heap
page read and write
489000
heap
page read and write
57E0000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
62C000
heap
page read and write
30E0000
remote allocation
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
265D000
stack
page read and write
3A30000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
3281000
heap
page read and write
20527A00000
heap
page read and write
3281000
heap
page read and write
3488000
trusted library allocation
page read and write
937217E000
stack
page read and write
2DD000
stack
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
4B0000
heap
page read and write
3D10000
trusted library allocation
page read and write
2900000
remote allocation
page read and write
5ACE000
stack
page read and write
3C90000
trusted library allocation
page read and write
31F0000
heap
page read and write
5B1A000
trusted library allocation
page read and write
600000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
570000
trusted library allocation
page read and write
3281000
heap
page read and write
2E9E000
stack
page read and write
660000
heap
page read and write
2EF8000
heap
page read and write
6802000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
72DE000
stack
page read and write
570000
trusted library allocation
page read and write
23DE000
stack
page read and write
1740000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
570000
trusted library allocation
page read and write
5AA000
heap
page read and write
3F90000
trusted library allocation
page read and write
613000
heap
page read and write
520000
trusted library allocation
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
1CD000
stack
page read and write
62C000
heap
page read and write
643000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
605000
heap
page read and write
61B000
heap
page read and write
61B000
heap
page read and write
2A3D000
stack
page read and write
2E80000
heap
page read and write
570000
trusted library allocation
page read and write
2F06000
heap
page read and write
3C90000
trusted library allocation
page read and write
754000
heap
page read and write
7AB000
heap
page read and write
754000
heap
page read and write
62C000
heap
page read and write
27E0000
heap
page read and write
3BA3000
heap
page read and write
43C9000
trusted library allocation
page read and write
3B87000
heap
page read and write
3380000
remote allocation
page read and write
5820000
trusted library allocation
page read and write
61B000
heap
page read and write
28AF000
stack
page read and write
2199000
heap
page read and write
3A30000
trusted library allocation
page read and write
2F38000
heap
page read and write
2241000
heap
page read and write
20527C08000
trusted library allocation
page read and write
489000
heap
page read and write
780000
heap
page read and write
31C0000
remote allocation
page read and write
20527CF0000
trusted library allocation
page read and write
479D000
stack
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
6E5E000
stack
page read and write
873000
heap
page read and write
20527C90000
trusted library allocation
page read and write
3281000
heap
page read and write
205224AD000
heap
page read and write
3C90000
trusted library allocation
page read and write
706000
heap
page read and write
23C0000
trusted library allocation
page execute read
265D000
trusted library allocation
page read and write
3390000
heap
page read and write
5E90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
28DE000
stack
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
2680000
heap
page read and write
613000
heap
page read and write
7DE000
stack
page read and write
46C000
heap
page read and write
3281000
heap
page read and write
20522D5A000
heap
page read and write
2EF5000
heap
page read and write
20C0000
heap
page read and write
2B9F000
stack
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3418000
trusted library allocation
page read and write
1E8000
heap
page read and write
61B000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
937277E000
stack
page read and write
613000
heap
page read and write
62C000
heap
page read and write
2D1D000
stack
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
2A70000
remote allocation
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
30BD000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
58E000
stack
page read and write
736000
heap
page read and write
1757000
trusted library allocation
page execute and read and write
665000
heap
page read and write
7AB000
heap
page read and write
267D000
stack
page read and write
613000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
269D000
stack
page read and write
3C90000
trusted library allocation
page read and write
463B000
trusted library allocation
page read and write
320000
remote allocation
page read and write
1A10000
trusted library allocation
page execute and read and write
238E000
stack
page read and write
15BE000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
64A000
heap
page read and write
85E000
heap
page read and write
43A1000
trusted library allocation
page read and write
2260000
heap
page read and write
3C90000
trusted library allocation
page read and write
23F5000
heap
page read and write
4725000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
1450000
heap
page read and write
6FA8000
heap
page read and write
8ED000
stack
page read and write
2FE0000
remote allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
23E0000
heap
page read and write
2800000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
62C000
heap
page read and write
2D00000
heap
page read and write
520000
trusted library allocation
page read and write
3281000
heap
page read and write
6B0000
heap
page read and write
36B9000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2290000
heap
page read and write
4637000
trusted library allocation
page read and write
471E000
trusted library allocation
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
20522B80000
trusted library section
page read and write
31FE000
stack
page read and write
8FB000
heap
page read and write
3F90000
trusted library allocation
page read and write
62C000
heap
page read and write
729000
heap
page read and write
2249000
heap
page read and write
62C000
heap
page read and write
3F90000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
400000
unkown
page readonly
320000
remote allocation
page read and write
4C70000
heap
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
654E000
stack
page read and write
3C90000
trusted library allocation
page read and write
20527AE4000
heap
page read and write
305D000
stack
page read and write
447B000
trusted library allocation
page read and write
5B0D000
stack
page read and write
309D000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
358A000
trusted library allocation
page read and write
7EE000
stack
page read and write
2240000
heap
page read and write
3755000
trusted library allocation
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
3F90000
trusted library allocation
page read and write
2E40000
remote allocation
page read and write
3281000
heap
page read and write
2AF0000
heap
page read and write
3380000
trusted library allocation
page read and write
61B000
heap
page read and write
613000
heap
page read and write
3A30000
trusted library allocation
page read and write
440000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
205233D0000
trusted library allocation
page read and write
20C3000
heap
page read and write
762000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
2F50000
heap
page read and write
700F000
stack
page read and write
34B0000
remote allocation
page read and write
1C0000
heap
page read and write
2E40000
remote allocation
page read and write
570000
trusted library allocation
page read and write
4F0000
heap
page read and write
327F000
stack
page read and write
570000
trusted library allocation
page read and write
61B000
heap
page read and write
93731FE000
unkown
page readonly
5F0000
heap
page read and write
46F7000
trusted library allocation
page read and write
3280000
heap
page read and write
3281000
heap
page read and write
44C1000
trusted library allocation
page read and write
3281000
heap
page read and write
46D7000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
61B000
heap
page read and write
27B0000
heap
page read and write
380C000
trusted library allocation
page read and write
307D000
stack
page read and write
61B000
heap
page read and write
61B000
heap
page read and write
2840000
heap
page read and write
9A000
stack
page read and write
3A30000
trusted library allocation
page read and write
31F000
stack
page read and write
345F000
stack
page read and write
3281000
heap
page read and write
6CCE000
stack
page read and write
2800000
remote allocation
page read and write
61B000
heap
page read and write
77E000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
6BE0000
heap
page read and write
2210000
trusted library allocation
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
2F00000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
3028000
heap
page read and write
301F000
stack
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
4E45000
heap
page read and write
3A30000
trusted library allocation
page read and write
45AD000
trusted library allocation
page read and write
2E5B000
heap
page read and write
613000
heap
page read and write
520000
trusted library allocation
page read and write
2AED000
stack
page read and write
2F30000
heap
page read and write
61B000
heap
page read and write
2BE4000
heap
page read and write
613000
heap
page read and write
3020000
remote allocation
page read and write
3281000
heap
page read and write
23F0000
heap
page read and write
2A10000
heap
page read and write
20527C6F000
trusted library allocation
page read and write
20527CE5000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
2F0E000
stack
page read and write
20527A54000
heap
page read and write
1755000
trusted library allocation
page execute and read and write
62C000
heap
page read and write
3A30000
trusted library allocation
page read and write
20527CFF000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
46ED000
trusted library allocation
page read and write
2110000
heap
page read and write
2688000
heap
page read and write
3C90000
trusted library allocation
page read and write
328C000
stack
page read and write
3270000
heap
page read and write
2758000
heap
page read and write
1710000
trusted library allocation
page read and write
3281000
heap
page read and write
613000
heap
page read and write
9371CFE000
unkown
page readonly
2E40000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
3B7F000
heap
page read and write
3281000
heap
page read and write
657000
heap
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
20F0000
heap
page read and write
42C000
unkown
page read and write
3CFF000
stack
page read and write
3281000
heap
page read and write
4B70000
heap
page execute and read and write
3C90000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
520000
trusted library allocation
page read and write
8DE000
stack
page read and write
4AFE000
trusted library allocation
page read and write
613000
heap
page read and write
56E000
stack
page read and write
3C90000
trusted library allocation
page read and write
5FC000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
2755000
heap
page read and write
62C000
heap
page read and write
1F0000
heap
page read and write
319F000
stack
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
20527C64000
trusted library allocation
page read and write
3281000
heap
page read and write
2BAE000
stack
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
613000
heap
page read and write
3D10000
trusted library allocation
page read and write
613000
heap
page read and write
205235A0000
trusted library section
page readonly
3461000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
925000
heap
page read and write
2FD0000
heap
page read and write
3C90000
trusted library allocation
page read and write
9D0000
heap
page read and write
42E000
unkown
page readonly
440D000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
736000
heap
page read and write
3C90000
trusted library allocation
page read and write
341E000
stack
page read and write
3A30000
trusted library allocation
page read and write
2D40000
heap
page read and write
1E0000
heap
page read and write
3A30000
trusted library allocation
page read and write
3BFC000
stack
page read and write
613000
heap
page read and write
20527D60000
remote allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
2512000
heap
page read and write
570000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
13D000
stack
page read and write
93717F7000
stack
page read and write
2960000
heap
page read and write
61B000
heap
page read and write
2F46000
heap
page read and write
3C90000
trusted library allocation
page read and write
440000
heap
page read and write
1DF000
stack
page read and write
2AE0000
heap
page read and write
3281000
heap
page read and write
1724000
trusted library allocation
page read and write
7B40000
trusted library allocation
page execute and read and write
3C90000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
30F5000
heap
page read and write
3281000
heap
page read and write
482000
heap
page read and write
205224FF000
heap
page read and write
62C000
heap
page read and write
5D8000
heap
page read and write
3C90000
trusted library allocation
page read and write
2B5D000
stack
page read and write
785000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
7A90000
trusted library section
page read and write
3380000
trusted library allocation
page read and write
2DBE000
stack
page read and write
3A30000
trusted library allocation
page read and write
62C000
heap
page read and write
2D55000
heap
page read and write
32BE000
stack
page read and write
32BF000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
30F0000
heap
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
23E0000
remote allocation
page read and write
20527B0A000
heap
page read and write
239E000
stack
page read and write
3C90000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
9372AFC000
stack
page read and write
68F000
stack
page read and write
3D10000
trusted library allocation
page read and write
937147B000
stack
page read and write
489000
heap
page read and write
3C90000
trusted library allocation
page read and write
9EF000
stack
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
46FA000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
86E000
stack
page read and write
3281000
heap
page read and write
613000
heap
page read and write
4DD0000
heap
page read and write
181F000
heap
page read and write
520000
trusted library allocation
page read and write
6F8000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
470000
heap
page read and write
DD000
stack
page read and write
3C90000
trusted library allocation
page read and write
2D90000
remote allocation
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2928000
heap
page read and write
28CE000
stack
page read and write
3E50000
trusted library allocation
page read and write
613000
heap
page read and write
3A30000
trusted library allocation
page read and write
61B000
heap
page read and write
2DCE000
stack
page read and write
30D0000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
20527D00000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
4B90000
trusted library allocation
page read and write
504D000
stack
page read and write
282000
unkown
page readonly
2EF0000
heap
page read and write
93727FE000
unkown
page readonly
613000
heap
page read and write
605000
heap
page read and write
20A0000
heap
page read and write
338F000
stack
page read and write
22F0000
heap
page read and write
31F0000
remote allocation
page read and write
462D000
trusted library allocation
page read and write
58E3000
heap
page read and write
62C000
heap
page read and write
2FE0000
remote allocation
page read and write
570000
trusted library allocation
page read and write
34E0000
remote allocation
page read and write
C2D000
trusted library allocation
page execute and read and write
613000
heap
page read and write
4BC0000
heap
page read and write
3281000
heap
page read and write
7050000
trusted library allocation
page execute and read and write
3F90000
trusted library allocation
page read and write
20522D00000
heap
page read and write
C10000
trusted library allocation
page read and write
62C000
heap
page read and write
520000
trusted library allocation
page read and write
3020000
heap
page read and write
20522472000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
28F8000
heap
page read and write
61B000
heap
page read and write
205279C0000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
2715000
heap
page read and write
613000
heap
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
745E000
stack
page read and write
4482000
trusted library allocation
page read and write
613000
heap
page read and write
2900000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
2DB8000
heap
page read and write
AEE000
stack
page read and write
3A30000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
46C000
heap
page read and write
3E50000
trusted library allocation
page read and write
2CBD000
stack
page read and write
67B000
heap
page read and write
570000
trusted library allocation
page read and write
455B000
trusted library allocation
page read and write
61B000
heap
page read and write
62C000
heap
page read and write
287E000
stack
page read and write
61B000
heap
page read and write
520000
trusted library allocation
page read and write
42E000
unkown
page readonly
3281000
heap
page read and write
3281000
heap
page read and write
3A30000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
613000
heap
page read and write
613000
heap
page read and write
780000
heap
page read and write
2FAF000
stack
page read and write
3380000
remote allocation
page read and write
3F90000
trusted library allocation
page read and write
3020000
heap
page read and write
3281000
heap
page read and write
23D0000
remote allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
570000
trusted library allocation
page read and write
2B9D000
stack
page read and write
7110000
trusted library allocation
page read and write
3281000
heap
page read and write
6F7C000
heap
page read and write
2240000
heap
page read and write
710000
heap
page read and write
3E50000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3285000
heap
page read and write
5C0000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
32FF000
stack
page read and write
613000
heap
page read and write
6F8000
stack
page read and write
46FD000
trusted library allocation
page read and write
3340000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
590000
heap
page read and write
1798000
heap
page read and write
1742000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
D2B000
stack
page read and write
2A70000
remote allocation
page read and write
2A79000
heap
page read and write
3A30000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
62C000
heap
page read and write
27F0000
heap
page read and write
42E000
unkown
page readonly
27B0000
heap
page read and write
613000
heap
page read and write
3F90000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
93721FE000
unkown
page readonly
BF7E000
stack
page read and write
3A30000
trusted library allocation
page read and write
61B000
heap
page read and write
3E50000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
2BF0000
heap
page read and write
613000
heap
page read and write
2A76000
heap
page read and write
3281000
heap
page read and write
67E000
heap
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
305E000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
3281000
heap
page read and write
238F000
stack
page read and write
61B000
heap
page read and write
5E7D000
trusted library allocation
page read and write
29B0000
remote allocation
page read and write
4B50000
trusted library allocation
page read and write
2A30000
heap
page read and write
70E0000
trusted library allocation
page execute and read and write
3C90000
trusted library allocation
page read and write
23A0000
heap
page read and write
205235B0000
trusted library section
page readonly
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
46D000
heap
page read and write
62C000
heap
page read and write
570000
trusted library allocation
page read and write
3449000
trusted library allocation
page read and write
400000
unkown
page readonly
754000
heap
page read and write
600000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
6B0000
heap
page read and write
2960000
heap
page read and write
93725FE000
unkown
page readonly
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
6ED000
stack
page read and write
613000
heap
page read and write
6A8E000
stack
page read and write
2052249F000
heap
page read and write
175B000
trusted library allocation
page execute and read and write
6F5E000
stack
page read and write
3281000
heap
page read and write
2FB0000
heap
page read and write
6D3000
heap
page read and write
36FA000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
603000
heap
page read and write
6E7000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
277D000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
5F0000
heap
page read and write
2A3E000
stack
page read and write
61B000
heap
page read and write
43C3000
trusted library allocation
page read and write
2601000
trusted library allocation
page read and write
205279C0000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
31B8000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
20522494000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
613000
heap
page read and write
520000
trusted library allocation
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
2DD000
stack
page read and write
2900000
remote allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
307E000
stack
page read and write
20522C02000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
2900000
heap
page read and write
3C90000
trusted library allocation
page read and write
1570000
heap
page read and write
20527C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
30E0000
remote allocation
page read and write
3281000
heap
page read and write
3590000
heap
page read and write
3C90000
trusted library allocation
page read and write
4489000
trusted library allocation
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
62C000
heap
page read and write
20527CA0000
trusted library allocation
page read and write
2D90000
heap
page read and write
3C90000
trusted library allocation
page read and write
2F00000
remote allocation
page read and write
20527CE8000
trusted library allocation
page read and write
62C000
heap
page read and write
271E000
stack
page read and write
3281000
heap
page read and write
9A000
stack
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
46E2000
trusted library allocation
page read and write
729000
heap
page read and write
62C000
heap
page read and write
302B000
heap
page read and write
5CA000
heap
page read and write
690000
trusted library allocation
page execute read
61B000
heap
page read and write
3A30000
trusted library allocation
page read and write
2D90000
remote allocation
page read and write
20527C4D000
trusted library allocation
page read and write
3048000
heap
page read and write
3586000
trusted library allocation
page read and write
61B000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
7107000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
BAAE000
stack
page read and write
729000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
901000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3455000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2E5E000
stack
page read and write
3281000
heap
page read and write
6BAB000
heap
page read and write
401000
unkown
page execute and write copy
2678000
heap
page read and write
3F8F000
stack
page read and write
4C73000
heap
page read and write
3C90000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
21F0000
heap
page read and write
339E000
stack
page read and write
19C000
stack
page read and write
393F000
stack
page read and write
613000
heap
page read and write
2170000
heap
page read and write
47C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2350000
heap
page read and write
8EF000
stack
page read and write
26F0000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
5D8000
heap
page read and write
61B000
heap
page read and write
613000
heap
page read and write
2440000
trusted library allocation
page read and write
3B87000
heap
page read and write
3451000
trusted library allocation
page read and write
2230000
heap
page read and write
42E000
unkown
page readonly
20527C00000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
AFF000
stack
page read and write
93723FE000
unkown
page readonly
723000
heap
page read and write
20527AE9000
heap
page read and write
28E0000
remote allocation
page read and write
2FDE000
stack
page read and write
782000
heap
page read and write
19B000
stack
page read and write
C0E000
stack
page read and write
70D0000
trusted library allocation
page read and write
2696000
heap
page read and write
3380000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
3281000
heap
page read and write
23CF000
stack
page read and write
3C90000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
3281000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
3E50000
trusted library allocation
page read and write
6FA6000
heap
page read and write
61B000
heap
page read and write
400000
unkown
page readonly
6FD7000
heap
page read and write
4493000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
35ED000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
845000
heap
page read and write
570000
trusted library allocation
page read and write
783000
heap
page read and write
570000
trusted library allocation
page read and write
62C000
heap
page read and write
67C000
heap
page read and write
62C000
heap
page read and write
3020000
remote allocation
page read and write
2980000
heap
page read and write
62C000
heap
page read and write
26B0000
heap
page read and write
683000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
6FF000
heap
page read and write
3C90000
trusted library allocation
page read and write
6E4E000
stack
page read and write
20527D10000
trusted library allocation
page read and write
C70000
trusted library allocation
page execute and read and write
448E000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
8DF000
stack
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
4589000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
61B000
heap
page read and write
20527AF5000
heap
page read and write
3281000
heap
page read and write
341C000
trusted library allocation
page read and write
20522413000
heap
page read and write
570000
trusted library allocation
page read and write
20527C15000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
875000
heap
page read and write
5D0000
trusted library allocation
page execute read
20527AC2000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3380000
heap
page read and write
2DC8000
heap
page read and write
3281000
heap
page read and write
950000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
3BA3000
heap
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
737000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3E50000
trusted library allocation
page read and write
2D05000
heap
page read and write
3E50000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
21D0000
heap
page read and write
33FE000
trusted library allocation
page read and write
3281000
heap
page read and write
20527A96000
heap
page read and write
29EE000
stack
page read and write
30AF000
stack
page read and write
61B000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
3160000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
34D0000
heap
page read and write
62C000
heap
page read and write
2E10000
remote allocation
page read and write
BE3C000
stack
page read and write
44D3000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
613000
heap
page read and write
2FF0000
heap
page read and write
785000
heap
page read and write
62C000
heap
page read and write
20D0000
heap
page read and write
570000
trusted library allocation
page read and write
613000
heap
page read and write
762000
heap
page read and write
3C90000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
91F000
stack
page read and write
23FE000
stack
page read and write
61B000
heap
page read and write
42E000
unkown
page readonly
3A30000
trusted library allocation
page read and write
9A000
stack
page read and write
613000
heap
page read and write
3F90000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
19E000
stack
page read and write
3380000
trusted library allocation
page read and write
600000
heap
page read and write
3D10000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
2BD0000
remote allocation
page read and write
62C000
heap
page read and write
42E000
unkown
page readonly
61B000
heap
page read and write
3534000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
1F0000
heap
page read and write
3C90000
trusted library allocation
page read and write
3B87000
heap
page read and write
401000
unkown
page execute and write copy
2900000
remote allocation
page read and write
1F0000
heap
page read and write
205235E0000
trusted library section
page readonly
61B000
heap
page read and write
5D0000
heap
page read and write
6DA000
heap
page read and write
1530000
heap
page read and write
3C90000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
3281000
heap
page read and write
205279D0000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
62C000
heap
page read and write
570000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
274D000
stack
page read and write
3281000
heap
page read and write
520000
trusted library allocation
page read and write
3B86000
heap
page read and write
2BDD000
stack
page read and write
6BA000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
729000
heap
page read and write
570000
trusted library allocation
page read and write
2E00000
heap
page read and write
570000
trusted library allocation
page read and write
20522400000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
5D8000
heap
page read and write
570000
trusted library allocation
page read and write
3040000
heap
page read and write
683000
heap
page read and write
602000
heap
page read and write
3C90000
trusted library allocation
page read and write
590000
trusted library allocation
page execute read
62C000
heap
page read and write
44B3000
trusted library allocation
page read and write
3281000
heap
page read and write
D30000
trusted library allocation
page read and write
30F0000
heap
page read and write
75A000
heap
page read and write
2C8D000
stack
page read and write
5FA000
heap
page read and write
3A30000
trusted library allocation
page read and write
352E000
trusted library allocation
page read and write
2920000
heap
page read and write
9371BFB000
stack
page read and write
1F8000
heap
page read and write
37B0000
trusted library allocation
page read and write
1A30000
heap
page read and write
3C90000
trusted library allocation
page read and write
400000
unkown
page readonly
520000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
489000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
450000
heap
page read and write
6F60000
heap
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
3F90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
1760000
heap
page read and write
570000
trusted library allocation
page read and write
680D000
stack
page read and write
62C000
heap
page read and write
3090000
trusted library allocation
page read and write
613000
heap
page read and write
694E000
stack
page read and write
613000
heap
page read and write
27C0000
heap
page read and write
2EE0000
heap
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
20527A41000
heap
page read and write
4D90000
trusted library allocation
page read and write
613000
heap
page read and write
62C000
heap
page read and write
2DD0000
heap
page read and write
339F000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
613000
heap
page read and write
67B000
heap
page read and write
613000
heap
page read and write
461F000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
520000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2895000
heap
page read and write
2EDE000
stack
page read and write
70C000
heap
page read and write
570000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
29F0000
heap
page read and write
3C90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
3281000
heap
page read and write
7B0000
heap
page read and write
61B000
heap
page read and write
520000
trusted library allocation
page read and write
62C000
heap
page read and write
280E000
stack
page read and write
3C90000
trusted library allocation
page read and write
2ED5000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
4F4A000
trusted library allocation
page read and write
93724FE000
unkown
page readonly
62C000
heap
page read and write
317E000
stack
page read and write
570000
trusted library allocation
page read and write
1E0000
heap
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
2760000
heap
page read and write
2E40000
heap
page read and write
3582000
trusted library allocation
page read and write
2350000
heap
page read and write
3281000
heap
page read and write
31C0000
remote allocation
page read and write
4DC0000
trusted library section
page readonly
2FA5000
heap
page read and write
520000
trusted library allocation
page read and write
2A70000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3A30000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
2DC0000
heap
page read and write
20527C04000
trusted library allocation
page read and write
3281000
heap
page read and write
3F90000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
683000
heap
page read and write
2249000
heap
page read and write
613000
heap
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
3A7F000
stack
page read and write
3C90000
trusted library allocation
page read and write
9A000
stack
page read and write
2800000
heap
page read and write
62C000
heap
page read and write
2F9F000
stack
page read and write
3C90000
trusted library allocation
page read and write
44F7000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
8AF000
stack
page read and write
3281000
heap
page read and write
33A0000
heap
page read and write
2191000
heap
page read and write
3445000
trusted library allocation
page read and write
20A0000
heap
page read and write
5812000
trusted library allocation
page read and write
34E0000
remote allocation
page read and write
7120000
trusted library allocation
page read and write
613000
heap
page read and write
2900000
remote allocation
page read and write
20522F01000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
2E7F000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
473B000
trusted library allocation
page read and write
BE7D000
stack
page read and write
3C90000
trusted library allocation
page read and write
6FBF000
heap
page read and write
3A30000
trusted library allocation
page read and write
613000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
20527CFC000
trusted library allocation
page read and write
613000
heap
page read and write
3A30000
trusted library allocation
page read and write
77A000
heap
page read and write
3281000
heap
page read and write
62E000
heap
page read and write
786000
heap
page read and write
2836000
heap
page read and write
3C90000
trusted library allocation
page read and write
3000000
trusted library section
page read and write
6BE000
heap
page read and write
3281000
heap
page read and write
C90000
heap
page read and write
570000
trusted library allocation
page read and write
5AE000
heap
page read and write
314E000
stack
page read and write
3C90000
trusted library allocation
page read and write
42C000
unkown
page read and write
782000
heap
page read and write
3C90000
trusted library allocation
page read and write
3390000
heap
page read and write
3306000
heap
page read and write
570000
trusted library allocation
page read and write
4AE4000
trusted library allocation
page read and write
6EF000
stack
page read and write
3C90000
trusted library allocation
page read and write
8B0000
heap
page read and write
3A30000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
268C000
heap
page read and write
3E8C000
stack
page read and write
3C90000
trusted library allocation
page read and write
20527D07000
trusted library allocation
page read and write
25FE000
stack
page read and write
3C90000
trusted library allocation
page read and write
77ED000
stack
page read and write
3281000
heap
page read and write
613000
heap
page read and write
3E50000
trusted library allocation
page read and write
2670000
heap
page read and write
937227E000
stack
page read and write
510000
heap
page read and write
4F30000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
62C000
heap
page read and write
613000
heap
page read and write
80A000
heap
page read and write
2246000
heap
page read and write
3050000
heap
page read and write
28C0000
heap
page read and write
920000
heap
page read and write
61B000
heap
page read and write
3281000
heap
page read and write
5D0000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
7BDD000
stack
page read and write
28DF000
stack
page read and write
5F0000
trusted library allocation
page execute read
613000
heap
page read and write
19B000
stack
page read and write
3E50000
trusted library allocation
page read and write
613000
heap
page read and write
20C7000
heap
page read and write
62C000
heap
page read and write
570000
trusted library allocation
page read and write
3281000
heap
page read and write
3380000
trusted library allocation
page read and write
3281000
heap
page read and write
3A30000
trusted library allocation
page read and write
3281000
heap
page read and write
3D10000
trusted library allocation
page read and write
3281000
heap
page read and write
613000
heap
page read and write
2D90000
remote allocation
page read and write
9372BFE000
unkown
page readonly
B00000
heap
page read and write
2D30000
heap
page read and write
2ABD000
stack
page read and write
42E000
unkown
page readonly
613000
heap
page read and write
3281000
heap
page read and write
3220000
heap
page read and write
3281000
heap
page read and write
938000
heap
page read and write
4608000
trusted library allocation
page read and write
6B9000
heap
page read and write
6B8E000
stack
page read and write
3C90000
trusted library allocation
page read and write
20527A21000
heap
page read and write
800000
heap
page read and write
570000
trusted library allocation
page read and write
3281000
heap
page read and write
2B0F000
stack
page read and write
3281000
heap
page read and write
3A30000
remote allocation
page read and write
4665000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
7160000
heap
page read and write
28BF000
stack
page read and write
46E8000
trusted library allocation
page read and write
205279D1000
trusted library allocation
page read and write
62C000
heap
page read and write
2A30000
heap
page read and write
2BEF000
stack
page read and write
62C000
heap
page read and write
44D9000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
57E6000
trusted library allocation
page read and write
29D000
stack
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
3281000
heap
page read and write
6F0000
heap
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
C30000
trusted library allocation
page read and write
6D8C000
trusted library section
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
5B20000
heap
page execute and read and write
580D000
trusted library allocation
page read and write
2D50000
heap
page read and write
205224BD000
heap
page read and write
613000
heap
page read and write
2835000
heap
page read and write
BD3C000
stack
page read and write
3110000
heap
page read and write
34BE000
stack
page read and write
2FD000
stack
page read and write
570000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
3F90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
20522D1A000
heap
page read and write
62C000
heap
page read and write
205224A1000
heap
page read and write
300000
heap
page read and write
328E000
stack
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
937247E000
stack
page read and write
3727000
trusted library allocation
page read and write
5FE000
heap
page read and write
3281000
heap
page read and write
613000
heap
page read and write
2EF0000
heap
page read and write
61B000
heap
page read and write
27DE000
stack
page read and write
3EA000
stack
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
61B000
heap
page read and write
6DA0000
trusted library allocation
page execute and read and write
613000
heap
page read and write
42E000
unkown
page readonly
3281000
heap
page read and write
4DF0000
heap
page read and write
8FE000
heap
page read and write
42C000
unkown
page read and write
3380000
trusted library allocation
page read and write
2199000
heap
page read and write
3C90000
trusted library allocation
page read and write
812000
heap
page read and write
3C90000
trusted library allocation
page read and write
1845000
heap
page read and write
3C90000
trusted library allocation
page read and write
205235C0000
trusted library section
page readonly
860000
heap
page read and write
613000
heap
page read and write
34B0000
remote allocation
page read and write
3281000
heap
page read and write
3E50000
trusted library allocation
page read and write
620000
heap
page read and write
2190000
heap
page read and write
937267E000
stack
page read and write
62C000
heap
page read and write
5C0000
trusted library allocation
page execute read
1E0000
heap
page read and write
20527C91000
trusted library allocation
page read and write
706000
heap
page read and write
6D0F000
stack
page read and write
2E50000
heap
page read and write
3459000
trusted library allocation
page read and write
2B10000
heap
page read and write
3281000
heap
page read and write
2B5E000
stack
page read and write
2F9E000
stack
page read and write
1A20000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
3A30000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2052245B000
heap
page read and write
71C000
heap
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
263D000
stack
page read and write
2430000
heap
page read and write
2A71000
heap
page read and write
20522C15000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
613000
heap
page read and write
3BA4000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
19C000
stack
page read and write
2DC0000
heap
page read and write
20522477000
heap
page read and write
3C90000
trusted library allocation
page read and write
3281000
heap
page read and write
3150000
heap
page read and write
33A8000
heap
page read and write
9A000
stack
page read and write
570000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
64D000
heap
page read and write
D57000
heap
page read and write
3C90000
trusted library allocation
page read and write
47C000
heap
page read and write
62C000
heap
page read and write
613000
heap
page read and write
205000
heap
page read and write
3A30000
trusted library allocation
page read and write
6D4E000
stack
page read and write
3281000
heap
page read and write
3F90000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
790000
heap
page read and write
5050000
heap
page read and write
890000
heap
page read and write
20527C00000
trusted library allocation
page read and write
205235F0000
trusted library section
page readonly
3C90000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
23BE000
stack
page read and write
3281000
heap
page read and write
613000
heap
page read and write
34E0000
remote allocation
page read and write
290F000
stack
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
31A0000
heap
page read and write
20527CC2000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
2196000
heap
page read and write
3281000
heap
page read and write
6E7000
heap
page read and write
61B000
heap
page read and write
560000
heap
page read and write
62C000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
28E0000
remote allocation
page read and write
613000
heap
page read and write
9371AFE000
unkown
page readonly
75C0000
heap
page read and write
3281000
heap
page read and write
570000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
2957000
heap
page read and write
9A000
stack
page read and write
28B0000
heap
page read and write
2EED000
stack
page read and write
58E0000
heap
page read and write
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
5C3000
heap
page read and write
61B000
heap
page read and write
57FE000
trusted library allocation
page read and write
3281000
heap
page read and write
62C000
heap
page read and write
2CE0000
heap
page read and write
3281000
heap
page read and write
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
62C000
heap
page read and write
613000
heap
page read and write
3281000
heap
page read and write
293F000
stack
page read and write
474A000
trusted library allocation
page read and write
3281000
heap
page read and write
3E50000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
20D000
stack
page read and write
402000
unkown
page execute and write copy
3C90000
trusted library allocation
page read and write
314E000
stack
page read and write
3281000
heap
page read and write
42C000
unkown
page read and write
3D10000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3B86000
heap
page read and write
23C0000
heap
page read and write
706000
heap
page read and write
20527C72000
trusted library allocation
page read and write
20522D13000
heap
page read and write
402000
unkown
page execute and write copy
2AD0000
heap
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
62C000
heap
page read and write
34DE000
stack
page read and write
2160000
heap
page read and write
4F0E000
stack
page read and write
613000
heap
page read and write
CE0000
heap
page execute and read and write
30E0000
remote allocation
page read and write
3281000
heap
page read and write
834000
heap
page read and write
280000
unkown
page readonly
62C000
heap
page read and write
7AB000
heap
page read and write
570000
trusted library allocation
page read and write
62C000
heap
page read and write
61B000
heap
page read and write
2E10000
remote allocation
page read and write
3281000
heap
page read and write
11F7000
stack
page read and write
2DFF000
stack
page read and write
62C000
heap
page read and write
5DE000
stack
page read and write
2900000
heap
page read and write
2900000
remote allocation
page read and write
3281000
heap
page read and write
2D7F000
stack
page read and write
6FD000
heap
page read and write
683000
heap
page read and write
2090000
heap
page read and write
7840000
trusted library allocation
page read and write
3A30000
remote allocation
page read and write
23D0000
remote allocation
page read and write
4B0D000
trusted library allocation
page read and write
172D000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
4608000
trusted library allocation
page read and write
29F0000
heap
page read and write
508E000
heap
page read and write
20527A61000
heap
page read and write
58AE000
stack
page read and write
741E000
stack
page read and write
3C90000
trusted library allocation
page read and write
2B10000
heap
page read and write
93729FE000
unkown
page readonly
613000
heap
page read and write
3290000
heap
page execute and read and write
613000
heap
page read and write
62A000
heap
page read and write
3D10000
trusted library allocation
page read and write
62C000
heap
page read and write
3A30000
trusted library allocation
page read and write
42E000
unkown
page readonly
3281000
heap
page read and write
3281000
heap
page read and write
35BE000
stack
page read and write
658E000
stack
page read and write
61B000
heap
page read and write
20527CF1000
trusted library allocation
page read and write
3281000
heap
page read and write
3BA3000
heap
page read and write
613000
heap
page read and write
570000
trusted library allocation
page read and write
93719FE000
stack
page read and write
3281000
heap
page read and write
2B18000
heap
page read and write
3281000
heap
page read and write
540000
heap
page read and write
937257E000
stack
page read and write
520000
trusted library allocation
page read and write
61B000
heap
page read and write
62C000
heap
page read and write
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
61B000
heap
page read and write
3C90000
trusted library allocation
page read and write
7AB000
heap
page read and write
2F35000
heap
page read and write
2BDF000
stack
page read and write
3414000
trusted library allocation
page read and write
61B000
heap
page read and write
400000
unkown
page readonly
3C90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
58E000
stack
page read and write
61B000
heap
page read and write
613000
heap
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
288E000
stack
page read and write
383E000
stack
page read and write
400000
unkown
page readonly
3C90000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
613000
heap
page read and write
270D000
stack
page read and write
3441000
trusted library allocation
page read and write
2E40000
remote allocation
page read and write
520000
trusted library allocation
page read and write
4AEB000
trusted library allocation
page read and write
613000
heap
page read and write
29F8000
heap
page read and write
3F90000
trusted library allocation
page read and write
3C90000
trusted library allocation
page read and write
690F000
stack
page read and write
62C000
heap
page read and write
267D000
stack
page read and write
3281000
heap
page read and write
320000
heap
page read and write
62E000
stack
page read and write
2E95000
heap
page read and write
7F1D0000
trusted library allocation
page execute and read and write
2F15000
heap
page read and write
20527AE0000
heap
page read and write
3C90000
trusted library allocation
page read and write
There are 2667 hidden memdumps, click here to show them.