Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Exel.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last
Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer
contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities
- Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield
2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed
Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code
page: 1252, Template: Intel;1033
|
dropped
|
||
C:\Config.Msi\49a7b8.rbs
|
data
|
modified
|
||
C:\Program Files (x86)\Remote Utilities - Host\EULA.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\MessageBox.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\VPDAgent.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\emf2pdf.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\fwproc.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\pdfout.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\printer.ico
|
MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\progressbar.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\properties.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\rupd.lng
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\srvinst.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\vpd_sdk.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\vpdisp.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\msvcp120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\msvcr120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\ntprint.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\printer.ico
|
MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupd.gpd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupd.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupd.lng
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupdpm.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupdui.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\setupdrv.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\stdnames_vpd.gpd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unidrv_rupd.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unidrv_rupd.hlp
|
MS Windows 3.1 help, Tue Apr 17 13:11:56 2001, 21225 bytes
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unidrvui_rupd.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unires_vpd.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\vccorlib120.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\msvcp120.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\msvcr120.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\ntprint.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\printer.ico
|
MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupd.gpd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupd.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupd.lng
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupdpm.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupdui.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\setupdrv.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\stdnames_vpd.gpd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unidrv_rupd.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unidrv_rupd.hlp
|
MS Windows 3.1 help, Tue Apr 17 13:11:56 2001, 21225 bytes
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unidrvui_rupd.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unires_vpd.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\vccorlib120.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\eventmsg.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\libeay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\ssleay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\vp8decoder.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\vp8encoder.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\webmmux.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\webmvorbisdecoder.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Remote Utilities - Host\webmvorbisencoder.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Remote Utilities\Logs\rut_log_2024-02.html
|
HTML document, Unicode text, UTF-8 text, with CR line terminators
|
dropped
|
||
C:\ProgramData\Remote Utilities\install.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Remote Utilities\msi\70220_{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\Exel.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last
Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer
contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities
- Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield
2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed
Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code
page: 1252, Template: Intel;1033
|
dropped
|
||
C:\Windows\Installer\49a7b6.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last
Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer
contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities
- Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield
2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed
Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code
page: 1252, Template: Intel;1033
|
dropped
|
||
C:\Windows\Installer\49a7b9.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last
Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer
contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities
- Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield
2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed
Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code
page: 1252, Template: Intel;1033
|
dropped
|
||
C:\Windows\Installer\MSIAB6F.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIACD8.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\ARPPRODUCTICON.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\en_server_settings_E3BFC76BE38F4CF79D2ED7163B7DECEE.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\en_server_start_85DB64512C79429FA70AC6C0611579DD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\en_server_stop_B603677802D142C98E7A415B72132E14.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_C5856A5EB1E3B74AE8014850A678CDBF
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3EC49180A59F0C351C30F112AD97CFA5_ED80F76A55EEDF047A88FD3F37D62FA3
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_C5856A5EB1E3B74AE8014850A678CDBF
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3EC49180A59F0C351C30F112AD97CFA5_ED80F76A55EEDF047A88FD3F37D62FA3
|
data
|
dropped
|
||
C:\Windows\Temp\~DF10BD94535F44088B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF43AE85119F93081A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF46A59DA49B45DF44.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF529C0FE4C5A9CE4B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF70B43A60818B563C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8E23FC32B87CAA71.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9FE2B93D9F6F7365.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB588C3675999CB76.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFCE78CABB386C66F3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD5F4580B380072C8.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFDE25689DD43B2CB0.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFE4BF60F9C7AF91F3.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
There are 79 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe
|
C:\Users\user\Desktop\3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i Exel.msi /qn
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
|
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" -msi_copy "C:\Users\user\AppData\Local\Temp\Exel.msi
|
||
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /silentinstall
|
||
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /firewall
|
||
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /start
|
||
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -service
|
||
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -firewall
|
||
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
|
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
|
||
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
|
||
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
|
"C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 494BECA00E3009394CA5F2713F238EA9
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
|
unknown
|
||
https://www.remoteutilities.com/support/docs/e
|
unknown
|
||
https://www.remoteutilities.com/support/docs/
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpities.com/tell-me-more.phpet
|
unknown
|
||
http://www.openssl.org/V
|
unknown
|
||
https://www.remoteutilities.com/support/docs/s0
|
unknown
|
||
http://madExcept.comU
|
unknown
|
||
https://www.remoteutilities.com/support/docs/o0
|
unknown
|
||
https://www.remoteutilities.com/support/docs/rt/docs/r
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpet
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://www.remoteutilities.com/support/docs/0
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpB
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://rmansys.ru/internet-id/
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.php...
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
https://www.remoteutilities.com/index.php?src=app?src=app
|
unknown
|
||
https://www.remoteutilities.com/index.php?src=appx.php?src=app0
|
unknown
|
||
http://update.remoteutilities.net/upgrade.ini
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.php1
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.php.
|
unknown
|
||
http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://www.remoteutilities.com/index.php?src=app
|
unknown
|
||
https://www.remoteutilities.com/support/docs/t0
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpes.
|
unknown
|
||
https://www.remoteutilities.com/support/docs/connecting-over-the-internet/
|
unknown
|
||
https://www.remoteutilities.com/support/docs/rt/docs/
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.php
|
unknown
|
||
http://update.remoteutilities.net/upgrade_beta.ini
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpdo?
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpken
|
unknown
|
||
http://www.flexerasoftware.com0
|
unknown
|
||
http://www.inkscape.org/namespaces/inkscape
|
unknown
|
||
https://www.remoteutilities.com/support/docs/a0
|
unknown
|
||
https://www.remoteutilities.com/support/docs
|
unknown
|
||
https://www.remoteutilities.com/tell-me-more.phpities.com/tell-me-more.phpum
|
unknown
|
There are 29 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
id.remoteutilities.com
|
64.20.61.146
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
||
id72.remoteutilities.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
101.99.94.54
|
unknown
|
Malaysia
|
||
77.105.132.70
|
unknown
|
Russian Federation
|
||
64.20.61.146
|
id.remoteutilities.com
|
United States
|
||
185.70.104.90
|
unknown
|
Russian Federation
|
||
66.23.226.254
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
notification
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
Security
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
General
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
CallbackSettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
FUSClientPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
InternetId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
Certificates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
CalendarRecordSettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
General
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
General
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
Certificates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
notification
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
General
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
|
InternetId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\49a7b8.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\49a7b8.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E45BAE6295648E74689FC47BF4E730EB
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6364F69515D55F943B4B3F3C669ECD32
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6364F69515D55F943B4B3F3C669ECD32
|
00000000000000000000000000000000
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6EDC4423414699340B5D245426472701
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B296F791ACC797D4585ADE4002D2800D
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\481CA97E83DA62B4980D577BEC1AF92A
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E081FFDBED9215946AE89615F366707B
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B04AC0DFA70310942A95D53DA01D552C
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Remote Utilities - Host\Printer\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Remote Utilities - Host\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
|
notification
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
|
Security
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
|
General
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
|
CallbackSettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
RegOwner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
RegCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
ProductID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\ADD21FF3AD83F6644B3E7657CAFE5583
|
RMS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\Features
|
RMS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
ProductIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17
|
ADD21FF3AD83F6644B3E7657CAFE5583
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
|
@%systemroot%\system32\FirewallControlPanel.dll,-12122
|
There are 104 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21F8000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1244000
|
unkown
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
263B000
|
direct allocation
|
page read and write
|
||
3996000
|
direct allocation
|
page read and write
|
||
3847000
|
direct allocation
|
page read and write
|
||
193F000
|
stack
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
661E000
|
heap
|
page read and write
|
||
1FF9000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
2035000
|
heap
|
page read and write
|
||
483000
|
unkown
|
page execute read
|
||
7EAF000
|
stack
|
page read and write
|
||
31D3000
|
direct allocation
|
page read and write
|
||
9DFE000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
A3BF000
|
stack
|
page read and write
|
||
7DAE000
|
stack
|
page read and write
|
||
1D8D000
|
stack
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
1A6A21BF000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
759E000
|
stack
|
page read and write
|
||
1249000
|
unkown
|
page read and write
|
||
2023000
|
heap
|
page read and write
|
||
C48D000
|
stack
|
page read and write
|
||
673F000
|
heap
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
1A6A0108000
|
heap
|
page read and write
|
||
B80E000
|
stack
|
page read and write
|
||
1A6A41D4000
|
heap
|
page read and write
|
||
1A69E033000
|
heap
|
page read and write
|
||
311D000
|
stack
|
page read and write
|
||
1ED8000
|
heap
|
page read and write
|
||
2671000
|
direct allocation
|
page read and write
|
||
17D1000
|
heap
|
page read and write
|
||
1F6D000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1611000
|
unkown
|
page readonly
|
||
1A69E051000
|
heap
|
page read and write
|
||
1254000
|
unkown
|
page read and write
|
||
66CA000
|
heap
|
page read and write
|
||
3411000
|
direct allocation
|
page read and write
|
||
6418000
|
direct allocation
|
page read and write
|
||
6405000
|
heap
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
203F000
|
heap
|
page read and write
|
||
64FE000
|
heap
|
page read and write
|
||
E65000
|
unkown
|
page read and write
|
||
1F96000
|
heap
|
page read and write
|
||
346B000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
369F000
|
heap
|
page read and write
|
||
735F000
|
stack
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
2695000
|
direct allocation
|
page read and write
|
||
1A69DFCE000
|
heap
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
3694000
|
direct allocation
|
page read and write
|
||
1204F000
|
unkown
|
page read and write
|
||
672E000
|
heap
|
page read and write
|
||
B47E000
|
stack
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1A69DFA5000
|
heap
|
page read and write
|
||
26AB000
|
direct allocation
|
page read and write
|
||
3796000
|
direct allocation
|
page read and write
|
||
1A69E062000
|
heap
|
page read and write
|
||
8300000
|
heap
|
page read and write
|
||
1FC9000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1A69E04F000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page read and write
|
||
2155000
|
direct allocation
|
page read and write
|
||
31E2000
|
direct allocation
|
page read and write
|
||
3712000
|
heap
|
page read and write
|
||
16C1000
|
unkown
|
page readonly
|
||
3711000
|
heap
|
page read and write
|
||
125E000
|
unkown
|
page read and write
|
||
677F000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
11140000
|
unkown
|
page read and write
|
||
2176000
|
direct allocation
|
page read and write
|
||
1A69E062000
|
heap
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
1A6A229E000
|
heap
|
page read and write
|
||
26C8000
|
direct allocation
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
5138000
|
heap
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
67FD000
|
stack
|
page read and write
|
||
1A6A41D6000
|
heap
|
page read and write
|
||
1FD9000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
1803000
|
unkown
|
page readonly
|
||
1F15000
|
heap
|
page read and write
|
||
F27000
|
unkown
|
page read and write
|
||
3403000
|
direct allocation
|
page read and write
|
||
675F000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
5631000
|
direct allocation
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
31AE000
|
direct allocation
|
page read and write
|
||
1BE5000
|
heap
|
page read and write
|
||
199E000
|
stack
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
1A69E045000
|
heap
|
page read and write
|
||
1F50000
|
direct allocation
|
page execute and read and write
|
||
1F57000
|
heap
|
page read and write
|
||
1203F000
|
unkown
|
page readonly
|
||
3170000
|
direct allocation
|
page read and write
|
||
17E2000
|
heap
|
page read and write
|
||
204F000
|
heap
|
page read and write
|
||
1F60000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
12053000
|
unkown
|
page readonly
|
||
1DC4000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
34C3000
|
direct allocation
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
2048000
|
heap
|
page read and write
|
||
6617000
|
heap
|
page read and write
|
||
34C1000
|
direct allocation
|
page read and write
|
||
3179000
|
direct allocation
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
66AE000
|
stack
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
E83000
|
unkown
|
page read and write
|
||
1F6A000
|
heap
|
page read and write
|
||
1A69DFE2000
|
heap
|
page read and write
|
||
3E9D000
|
stack
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17C6000
|
heap
|
page read and write
|
||
1F98000
|
heap
|
page read and write
|
||
1FA8000
|
heap
|
page read and write
|
||
82BE000
|
stack
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
1F31000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
125E000
|
unkown
|
page read and write
|
||
26B2000
|
direct allocation
|
page read and write
|
||
1F57000
|
heap
|
page read and write
|
||
34AD000
|
direct allocation
|
page read and write
|
||
D41000
|
unkown
|
page execute read
|
||
17DC000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
11145000
|
unkown
|
page read and write
|
||
1F11000
|
heap
|
page read and write
|
||
85FD000
|
stack
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
1FED000
|
heap
|
page read and write
|
||
1A6A21EE000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
1654000
|
unkown
|
page readonly
|
||
15BE000
|
heap
|
page read and write
|
||
2014000
|
heap
|
page read and write
|
||
1F27000
|
heap
|
page read and write
|
||
7EEB0000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
36BE000
|
direct allocation
|
page read and write
|
||
36E0000
|
direct allocation
|
page execute and read and write
|
||
1FE6000
|
heap
|
page read and write
|
||
204F000
|
heap
|
page read and write
|
||
B17000
|
unkown
|
page execute read
|
||
16E4000
|
heap
|
page read and write
|
||
2026000
|
heap
|
page read and write
|
||
3B22000
|
direct allocation
|
page read and write
|
||
EC6000
|
unkown
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
269A000
|
direct allocation
|
page read and write
|
||
64F6000
|
heap
|
page read and write
|
||
2200000
|
direct allocation
|
page read and write
|
||
33EC000
|
direct allocation
|
page read and write
|
||
684B000
|
stack
|
page read and write
|
||
2120000
|
direct allocation
|
page execute and read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
3E80000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
6410000
|
unkown
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
1F31000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
34F6000
|
direct allocation
|
page read and write
|
||
2240000
|
direct allocation
|
page read and write
|
||
319F000
|
direct allocation
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
1ECE000
|
stack
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1A6A4251000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
261E000
|
direct allocation
|
page read and write
|
||
215F000
|
stack
|
page read and write
|
||
127B000
|
unkown
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
E7D000
|
unkown
|
page read and write
|
||
1A6A4211000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
650A000
|
trusted library allocation
|
page read and write
|
||
1FF9000
|
heap
|
page read and write
|
||
8F6000
|
unkown
|
page execute read
|
||
1262000
|
unkown
|
page read and write
|
||
1ECE000
|
stack
|
page read and write
|
||
2339CEF000
|
stack
|
page read and write
|
||
3488000
|
direct allocation
|
page read and write
|
||
1FC0000
|
heap
|
page read and write
|
||
1F63000
|
heap
|
page read and write
|
||
168D000
|
unkown
|
page readonly
|
||
1F31000
|
heap
|
page read and write
|
||
18BB000
|
stack
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
203F000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
647E000
|
direct allocation
|
page read and write
|
||
220E000
|
direct allocation
|
page read and write
|
||
7EEE000
|
stack
|
page read and write
|
||
3DCB000
|
heap
|
page read and write
|
||
5027000
|
heap
|
page read and write
|
||
2043000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
12B7000
|
unkown
|
page read and write
|
||
1A69DFC4000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
B43D000
|
stack
|
page read and write
|
||
38B3000
|
direct allocation
|
page read and write
|
||
1A69E061000
|
heap
|
page read and write
|
||
5720000
|
direct allocation
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page execute read
|
||
66D1000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
7B8C0000
|
direct allocation
|
page read and write
|
||
3B32000
|
direct allocation
|
page read and write
|
||
1FA4000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
2701000
|
direct allocation
|
page read and write
|
||
514D000
|
heap
|
page read and write
|
||
677A000
|
heap
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
AF4000
|
unkown
|
page execute read
|
||
4D30000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
1F1A000
|
heap
|
page read and write
|
||
222B000
|
direct allocation
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
1204E000
|
unkown
|
page read and write
|
||
2FB000
|
stack
|
page read and write
|
||
672B000
|
heap
|
page read and write
|
||
21CA000
|
direct allocation
|
page read and write
|
||
6E6F000
|
stack
|
page read and write
|
||
34BC000
|
direct allocation
|
page read and write
|
||
6215000
|
direct allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
B1FE000
|
stack
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
1F2C000
|
stack
|
page read and write
|
||
11000000
|
unkown
|
page readonly
|
||
4E0B000
|
direct allocation
|
page read and write
|
||
E5C000
|
unkown
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3864000
|
direct allocation
|
page read and write
|
||
1267000
|
unkown
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
31E9000
|
direct allocation
|
page read and write
|
||
88FF000
|
stack
|
page read and write
|
||
1A69E045000
|
heap
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
1A69DFA2000
|
heap
|
page read and write
|
||
6772000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
66D6000
|
heap
|
page read and write
|
||
F05000
|
unkown
|
page read and write
|
||
670D000
|
heap
|
page read and write
|
||
1A69FFF2000
|
trusted library allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
34B4000
|
direct allocation
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
1F21000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
1F82000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
17D9000
|
heap
|
page read and write
|
||
370A000
|
direct allocation
|
page read and write
|
||
17A7000
|
heap
|
page read and write
|
||
8D7E000
|
stack
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
265E000
|
direct allocation
|
page read and write
|
||
3B42000
|
direct allocation
|
page read and write
|
||
1684000
|
unkown
|
page readonly
|
||
1FDC000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3910000
|
heap
|
page read and write
|
||
36AF000
|
direct allocation
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
1A6A010E000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
126B000
|
unkown
|
page read and write
|
||
19F0000
|
heap
|
page read and write
|
||
66DD000
|
heap
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page execute read
|
||
376B000
|
direct allocation
|
page read and write
|
||
25DA000
|
direct allocation
|
page read and write
|
||
25D5000
|
direct allocation
|
page read and write
|
||
7FF6CDB6B000
|
unkown
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3935000
|
direct allocation
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
3197000
|
direct allocation
|
page read and write
|
||
31E9000
|
direct allocation
|
page read and write
|
||
2056000
|
heap
|
page read and write
|
||
957000
|
unkown
|
page execute read
|
||
19BB000
|
stack
|
page read and write
|
||
1FF9000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
F06000
|
unkown
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
17D3000
|
heap
|
page read and write
|
||
1F59000
|
heap
|
page read and write
|
||
E5C000
|
unkown
|
page read and write
|
||
17E6000
|
heap
|
page read and write
|
||
1FED000
|
heap
|
page read and write
|
||
B1BF000
|
stack
|
page read and write
|
||
1A6A4222000
|
heap
|
page read and write
|
||
1A69DFBC000
|
heap
|
page read and write
|
||
1A69DFB8000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
640B000
|
heap
|
page read and write
|
||
50A7000
|
heap
|
page read and write
|
||
34D9000
|
direct allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1FEA000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1A69FCF9000
|
heap
|
page read and write
|
||
C2CE000
|
stack
|
page read and write
|
||
1A6A2264000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1247000
|
unkown
|
page read and write
|
||
31CC000
|
direct allocation
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
507F000
|
direct allocation
|
page read and write
|
||
6294000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
89FF000
|
stack
|
page read and write
|
||
1FDF000
|
heap
|
page read and write
|
||
A0C0000
|
heap
|
page read and write
|
||
641C000
|
trusted library allocation
|
page read and write
|
||
7FF6CDB7A000
|
unkown
|
page readonly
|
||
1A69E205000
|
heap
|
page read and write
|
||
17F1000
|
heap
|
page read and write
|
||
6520000
|
heap
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
3B5F000
|
direct allocation
|
page read and write
|
||
217E000
|
direct allocation
|
page read and write
|
||
641A000
|
trusted library allocation
|
page read and write
|
||
31A6000
|
direct allocation
|
page read and write
|
||
66EB000
|
heap
|
page read and write
|
||
127D000
|
unkown
|
page read and write
|
||
1303000
|
unkown
|
page read and write
|
||
37E0000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
66CE000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1A69DFE4000
|
heap
|
page read and write
|
||
812000
|
unkown
|
page execute read
|
||
2ED000
|
stack
|
page read and write
|
||
F28000
|
unkown
|
page read and write
|
||
1A69DFD9000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
33F3000
|
direct allocation
|
page read and write
|
||
7FF6CDB7F000
|
unkown
|
page readonly
|
||
1F21000
|
heap
|
page read and write
|
||
3472000
|
direct allocation
|
page read and write
|
||
349D000
|
direct allocation
|
page read and write
|
||
2070000
|
heap
|
page read and write
|
||
26E4000
|
direct allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1272000
|
unkown
|
page read and write
|
||
219E000
|
direct allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
31BC000
|
direct allocation
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1F71000
|
heap
|
page read and write
|
||
66E2000
|
heap
|
page read and write
|
||
368B000
|
heap
|
page read and write
|
||
11149000
|
unkown
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
12F7000
|
unkown
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1A69E061000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
350C000
|
direct allocation
|
page read and write
|
||
62A8000
|
trusted library allocation
|
page read and write
|
||
3453000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
36A8000
|
direct allocation
|
page read and write
|
||
379A000
|
direct allocation
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
311B000
|
direct allocation
|
page read and write
|
||
1FD8000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
11F7000
|
stack
|
page read and write
|
||
11145000
|
unkown
|
page read and write
|
||
39A6000
|
direct allocation
|
page read and write
|
||
2043000
|
heap
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
641E000
|
unkown
|
page read and write
|
||
3B2E000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
803E000
|
stack
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
1A69E04F000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
513A000
|
heap
|
page read and write
|
||
5149000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
66D3000
|
heap
|
page read and write
|
||
34AC000
|
direct allocation
|
page read and write
|
||
4EE1000
|
direct allocation
|
page read and write
|
||
1788000
|
heap
|
page read and write
|
||
11C4000
|
unkown
|
page execute read
|
||
1955000
|
heap
|
page read and write
|
||
319F000
|
direct allocation
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
E7D000
|
unkown
|
page read and write
|
||
227A000
|
direct allocation
|
page read and write
|
||
21F1000
|
direct allocation
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
1FFB000
|
heap
|
page read and write
|
||
66C0000
|
heap
|
page read and write
|
||
3734000
|
heap
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
3105000
|
direct allocation
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
197E000
|
stack
|
page read and write
|
||
BA0E000
|
stack
|
page read and write
|
||
1A6A225A000
|
heap
|
page read and write
|
||
55AF000
|
stack
|
page read and write
|
||
4010000
|
heap
|
page read and write
|
||
1FBB000
|
heap
|
page read and write
|
||
126F000
|
unkown
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
2207000
|
direct allocation
|
page read and write
|
||
506A000
|
direct allocation
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
8F3E000
|
stack
|
page read and write
|
||
17D9000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
133B000
|
unkown
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
1FA6000
|
heap
|
page read and write
|
||
7F4000
|
unkown
|
page execute read
|
||
1634000
|
heap
|
page read and write
|
||
5860000
|
direct allocation
|
page read and write
|
||
66E8000
|
heap
|
page read and write
|
||
26C1000
|
direct allocation
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
6269000
|
direct allocation
|
page read and write
|
||
81D000
|
unkown
|
page execute read
|
||
38C8000
|
direct allocation
|
page read and write
|
||
1FF3000
|
heap
|
page read and write
|
||
26C0000
|
direct allocation
|
page read and write
|
||
E83000
|
unkown
|
page read and write
|
||
61DB000
|
stack
|
page read and write
|
||
3FA0000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
6620000
|
unkown
|
page read and write
|
||
1D0E000
|
stack
|
page read and write
|
||
1A69FEE4000
|
heap
|
page read and write
|
||
1A6A2102000
|
heap
|
page read and write
|
||
1FDE000
|
heap
|
page read and write
|
||
1A6A22BE000
|
heap
|
page read and write
|
||
26EC000
|
direct allocation
|
page read and write
|
||
E76000
|
unkown
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1FF7000
|
heap
|
page read and write
|
||
66E4000
|
heap
|
page read and write
|
||
9F9000
|
unkown
|
page execute read
|
||
33A5000
|
direct allocation
|
page read and write
|
||
1A6A4229000
|
heap
|
page read and write
|
||
1A69FEF0000
|
heap
|
page read and write
|
||
7FF6CDB7E000
|
unkown
|
page readonly
|
||
16A4000
|
unkown
|
page readonly
|
||
6726000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
201F000
|
heap
|
page read and write
|
||
629D000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
unkown
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
662E000
|
unkown
|
page read and write
|
||
1A6A1900000
|
trusted library allocation
|
page read and write
|
||
1204F000
|
unkown
|
page read and write
|
||
1FF9000
|
heap
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
21D1000
|
direct allocation
|
page read and write
|
||
37AC000
|
direct allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1F57000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
8CFE000
|
stack
|
page read and write
|
||
1FF7000
|
heap
|
page read and write
|
||
1F6A000
|
heap
|
page read and write
|
||
3504000
|
direct allocation
|
page read and write
|
||
397E000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
8C6F000
|
stack
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
7FF6CDB11000
|
unkown
|
page execute read
|
||
17D0000
|
heap
|
page read and write
|
||
3463000
|
direct allocation
|
page read and write
|
||
1F63000
|
heap
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
161E000
|
unkown
|
page readonly
|
||
34D2000
|
direct allocation
|
page read and write
|
||
3177000
|
direct allocation
|
page read and write
|
||
1F5E000
|
heap
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
3683000
|
heap
|
page read and write
|
||
5135000
|
heap
|
page read and write
|
||
675B000
|
heap
|
page read and write
|
||
66F8000
|
heap
|
page read and write
|
||
26D6000
|
direct allocation
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
31E2000
|
direct allocation
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
677F000
|
heap
|
page read and write
|
||
16C8000
|
unkown
|
page readonly
|
||
37A4000
|
direct allocation
|
page read and write
|
||
37A8000
|
direct allocation
|
page read and write
|
||
260E000
|
direct allocation
|
page read and write
|
||
1FD9000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
389D000
|
direct allocation
|
page read and write
|
||
11149000
|
unkown
|
page read and write
|
||
11145000
|
unkown
|
page read and write
|
||
1A69DFC4000
|
heap
|
page read and write
|
||
50B8000
|
direct allocation
|
page read and write
|
||
1249000
|
unkown
|
page read and write
|
||
1A6A421E000
|
heap
|
page read and write
|
||
1A6A4193000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
1A6A4229000
|
heap
|
page read and write
|
||
37B3000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16E4000
|
unkown
|
page readonly
|
||
347F000
|
direct allocation
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
1337000
|
unkown
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
6420000
|
heap
|
page read and write
|
||
5126000
|
trusted library allocation
|
page read and write
|
||
133A000
|
unkown
|
page write copy
|
||
1811000
|
heap
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
2038000
|
heap
|
page read and write
|
||
38A4000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
5941000
|
direct allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
344D000
|
direct allocation
|
page read and write
|
||
670E000
|
heap
|
page read and write
|
||
4013000
|
heap
|
page read and write
|
||
BD0E000
|
stack
|
page read and write
|
||
6621000
|
trusted library allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1EC0000
|
direct allocation
|
page execute and read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
F28000
|
unkown
|
page read and write
|
||
508E000
|
direct allocation
|
page read and write
|
||
1A6A4111000
|
heap
|
page read and write
|
||
1BE0000
|
heap
|
page read and write
|
||
890F000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
3788000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
4E4F000
|
direct allocation
|
page read and write
|
||
1317000
|
unkown
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
1F95000
|
heap
|
page read and write
|
||
1A6A211F000
|
heap
|
page read and write
|
||
1FA4000
|
heap
|
page read and write
|
||
17DE000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
36A0000
|
direct allocation
|
page read and write
|
||
1A69DFAA000
|
heap
|
page read and write
|
||
33BA000
|
direct allocation
|
page read and write
|
||
57AF000
|
stack
|
page read and write
|
||
12C6000
|
unkown
|
page read and write
|
||
86FD000
|
stack
|
page read and write
|
||
B57F000
|
stack
|
page read and write
|
||
378F000
|
direct allocation
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
34A4000
|
direct allocation
|
page read and write
|
||
1F31000
|
heap
|
page read and write
|
||
3718000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
34E0000
|
direct allocation
|
page read and write
|
||
1AE5000
|
heap
|
page read and write
|
||
3755000
|
direct allocation
|
page read and write
|
||
616000
|
unkown
|
page execute read
|
||
1DA0000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
19BB000
|
stack
|
page read and write
|
||
3496000
|
direct allocation
|
page read and write
|
||
3880000
|
direct allocation
|
page read and write
|
||
2036000
|
heap
|
page read and write
|
||
163F000
|
unkown
|
page readonly
|
||
662C000
|
trusted library allocation
|
page read and write
|
||
372B000
|
heap
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
1A69E063000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
2281000
|
direct allocation
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1680000
|
unkown
|
page readonly
|
||
1A69FEF1000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1337000
|
unkown
|
page read and write
|
||
127B000
|
unkown
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
7E710000
|
direct allocation
|
page read and write
|
||
2339EFE000
|
stack
|
page read and write
|
||
3802000
|
direct allocation
|
page read and write
|
||
5433000
|
heap
|
page read and write
|
||
6501000
|
trusted library allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1249000
|
unkown
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
679F000
|
heap
|
page read and write
|
||
6407000
|
heap
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
1FFF000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
1FD8000
|
heap
|
page read and write
|
||
5191000
|
direct allocation
|
page read and write
|
||
21BB000
|
direct allocation
|
page read and write
|
||
204F000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
E7A000
|
unkown
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5250000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
3985000
|
direct allocation
|
page read and write
|
||
3DC7000
|
heap
|
page read and write
|
||
38AC000
|
direct allocation
|
page read and write
|
||
1FD2000
|
heap
|
page read and write
|
||
3122000
|
direct allocation
|
page read and write
|
||
12000000
|
unkown
|
page readonly
|
||
1C20000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
650E000
|
unkown
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
6FB000
|
unkown
|
page execute read
|
||
3DEA000
|
heap
|
page read and write
|
||
166F000
|
unkown
|
page readonly
|
||
1A6A4210000
|
heap
|
page read and write
|
||
1FA2000
|
heap
|
page read and write
|
||
1A6A4355000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
E59000
|
unkown
|
page read and write
|
||
1A69E031000
|
heap
|
page read and write
|
||
1279000
|
unkown
|
page read and write
|
||
1B5D000
|
stack
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1317000
|
unkown
|
page read and write
|
||
C90E000
|
stack
|
page read and write
|
||
1C40000
|
heap
|
page read and write
|
||
37E5000
|
direct allocation
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
6223000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1A69DFEB000
|
heap
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
349F000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
386B000
|
direct allocation
|
page read and write
|
||
F29000
|
unkown
|
page write copy
|
||
2264000
|
direct allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1690000
|
unkown
|
page readonly
|
||
673F000
|
heap
|
page read and write
|
||
1A6A00E0000
|
trusted library allocation
|
page read and write
|
||
1EF8000
|
heap
|
page read and write
|
||
C80E000
|
stack
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
1FA4000
|
heap
|
page read and write
|
||
1D3D000
|
stack
|
page read and write
|
||
E76000
|
unkown
|
page read and write
|
||
20DE000
|
stack
|
page read and write
|
||
17EE000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
16BB000
|
unkown
|
page readonly
|
||
3871000
|
heap
|
page read and write
|
||
4DAF000
|
direct allocation
|
page read and write
|
||
37BA000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A6A4355000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
1F21000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A69E200000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1114B000
|
unkown
|
page readonly
|
||
3711000
|
heap
|
page read and write
|
||
12C3000
|
unkown
|
page read and write
|
||
B7CE000
|
stack
|
page read and write
|
||
6705000
|
heap
|
page read and write
|
||
1D8E000
|
stack
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
6291000
|
trusted library allocation
|
page read and write
|
||
14FB000
|
stack
|
page read and write
|
||
1A6A2262000
|
heap
|
page read and write
|
||
1FDF000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1DF0000
|
heap
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
1FD8000
|
heap
|
page read and write
|
||
1FA2000
|
heap
|
page read and write
|
||
F06000
|
unkown
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
26F3000
|
direct allocation
|
page read and write
|
||
4EC3000
|
direct allocation
|
page read and write
|
||
163B000
|
unkown
|
page readonly
|
||
1634000
|
heap
|
page read and write
|
||
2339FFE000
|
stack
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1A6A22CB000
|
heap
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
671E000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3DCE000
|
heap
|
page read and write
|
||
64F5000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
38C1000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1633000
|
unkown
|
page readonly
|
||
1664000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
672C000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
33C1000
|
direct allocation
|
page read and write
|
||
5429000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3B1B000
|
direct allocation
|
page read and write
|
||
1608000
|
unkown
|
page readonly
|
||
2718000
|
direct allocation
|
page read and write
|
||
392E000
|
direct allocation
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
671E000
|
heap
|
page read and write
|
||
54B3000
|
direct allocation
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
1A6A4251000
|
heap
|
page read and write
|
||
1A69DFEB000
|
heap
|
page read and write
|
||
1247000
|
unkown
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
11149000
|
unkown
|
page read and write
|
||
17F1000
|
heap
|
page read and write
|
||
650C000
|
trusted library allocation
|
page read and write
|
||
1244000
|
unkown
|
page read and write
|
||
159C000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
7E7E0000
|
direct allocation
|
page read and write
|
||
1F74000
|
heap
|
page read and write
|
||
E86000
|
unkown
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
177C000
|
heap
|
page read and write
|
||
AEFE000
|
stack
|
page read and write
|
||
11145000
|
unkown
|
page read and write
|
||
1806000
|
heap
|
page read and write
|
||
15FF000
|
unkown
|
page readonly
|
||
3711000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
791F000
|
stack
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
9CFD000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1EAE000
|
stack
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1605000
|
unkown
|
page readonly
|
||
1262000
|
unkown
|
page read and write
|
||
204A000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
E7D000
|
unkown
|
page read and write
|
||
318F000
|
direct allocation
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
25FE000
|
direct allocation
|
page read and write
|
||
7CCF0000
|
direct allocation
|
page read and write
|
||
1337000
|
unkown
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
26A4000
|
direct allocation
|
page read and write
|
||
3496000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1F0C000
|
heap
|
page read and write
|
||
1F24000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
1279000
|
unkown
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
1EF0000
|
heap
|
page read and write
|
||
BE8E000
|
stack
|
page read and write
|
||
1FB1000
|
heap
|
page read and write
|
||
17D3000
|
heap
|
page read and write
|
||
1A6A2228000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
37FB000
|
direct allocation
|
page read and write
|
||
36BC000
|
stack
|
page read and write
|
||
700B000
|
stack
|
page read and write
|
||
1F57000
|
heap
|
page read and write
|
||
1FF2000
|
heap
|
page read and write
|
||
1A69FE91000
|
heap
|
page read and write
|
||
1D3E000
|
stack
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
6270000
|
direct allocation
|
page read and write
|
||
B2FF000
|
stack
|
page read and write
|
||
3231000
|
direct allocation
|
page read and write
|
||
7F450000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1349000
|
unkown
|
page readonly
|
||
3427000
|
direct allocation
|
page read and write
|
||
1A6A41D4000
|
heap
|
page read and write
|
||
34BA000
|
direct allocation
|
page read and write
|
||
2026000
|
heap
|
page read and write
|
||
2339DFD000
|
stack
|
page read and write
|
||
3EC0000
|
heap
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
577F000
|
stack
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
25EF000
|
direct allocation
|
page read and write
|
||
7FF6CDB58000
|
unkown
|
page readonly
|
||
2AA2000
|
heap
|
page read and write
|
||
1A6A41D3000
|
heap
|
page read and write
|
||
5406000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
1664000
|
heap
|
page read and write
|
||
1739000
|
unkown
|
page readonly
|
||
1A6A223B000
|
heap
|
page read and write
|
||
64F7000
|
heap
|
page read and write
|
||
161A000
|
unkown
|
page readonly
|
||
1A6A4293000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
18BB000
|
stack
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
7FF6CDB58000
|
unkown
|
page readonly
|
||
4010000
|
heap
|
page read and write
|
||
3838000
|
direct allocation
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
B6BE000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3738000
|
direct allocation
|
page read and write
|
||
1303000
|
unkown
|
page read and write
|
||
1A69DFAB000
|
heap
|
page read and write
|
||
1FF5000
|
heap
|
page read and write
|
||
5134000
|
trusted library allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
639F000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A69DFBC000
|
heap
|
page read and write
|
||
3855000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
4F09000
|
heap
|
page read and write
|
||
126B000
|
unkown
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
1A6A21A0000
|
heap
|
page read and write
|
||
B74E000
|
stack
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
E72000
|
unkown
|
page read and write
|
||
3560000
|
direct allocation
|
page read and write
|
||
3528000
|
direct allocation
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
1244000
|
unkown
|
page read and write
|
||
1A69E01E000
|
heap
|
page read and write
|
||
F37000
|
unkown
|
page readonly
|
||
3711000
|
heap
|
page read and write
|
||
F2A000
|
unkown
|
page read and write
|
||
1A6A4355000
|
heap
|
page read and write
|
||
17D9000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1F35000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3961000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1279000
|
unkown
|
page read and write
|
||
66F5000
|
heap
|
page read and write
|
||
1F64000
|
heap
|
page read and write
|
||
341A000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
233A2FE000
|
stack
|
page read and write
|
||
2023000
|
heap
|
page read and write
|
||
E76000
|
unkown
|
page read and write
|
||
314A000
|
direct allocation
|
page read and write
|
||
1A6A4292000
|
heap
|
page read and write
|
||
1F68000
|
heap
|
page read and write
|
||
264A000
|
direct allocation
|
page read and write
|
||
1D70000
|
heap
|
page read and write
|
||
133B000
|
unkown
|
page read and write
|
||
3690000
|
direct allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3B66000
|
direct allocation
|
page read and write
|
||
53DA000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
1FE4000
|
heap
|
page read and write
|
||
8B60000
|
remote allocation
|
page read and write
|
||
1262000
|
unkown
|
page read and write
|
||
7FF6CDB10000
|
unkown
|
page readonly
|
||
B0BF000
|
stack
|
page read and write
|
||
675D000
|
heap
|
page read and write
|
||
16BD000
|
unkown
|
page readonly
|
||
1634000
|
heap
|
page read and write
|
||
36BC000
|
stack
|
page read and write
|
||
1F14000
|
heap
|
page read and write
|
||
1A6A2CCE000
|
heap
|
page read and write
|
||
1FAF000
|
heap
|
page read and write
|
||
2046000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
3772000
|
direct allocation
|
page read and write
|
||
66FC000
|
heap
|
page read and write
|
||
1A6A4252000
|
heap
|
page read and write
|
||
1858000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1A6A2162000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
6430000
|
trusted library allocation
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
1FE0000
|
heap
|
page read and write
|
||
66E8000
|
heap
|
page read and write
|
||
1A69FEE0000
|
heap
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
84FE000
|
stack
|
page read and write
|
||
16ED000
|
unkown
|
page readonly
|
||
36E0000
|
direct allocation
|
page execute and read and write
|
||
1F77000
|
heap
|
page read and write
|
||
5136000
|
trusted library allocation
|
page read and write
|
||
312A000
|
direct allocation
|
page read and write
|
||
BE4F000
|
stack
|
page read and write
|
||
22C6000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
348F000
|
direct allocation
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
1A6A4315000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A69DFBC000
|
heap
|
page read and write
|
||
17E7000
|
heap
|
page read and write
|
||
341F000
|
direct allocation
|
page read and write
|
||
1FBD000
|
heap
|
page read and write
|
||
17C3000
|
heap
|
page read and write
|
||
3DB0000
|
heap
|
page read and write
|
||
E6F000
|
unkown
|
page read and write
|
||
3790000
|
direct allocation
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
F2F000
|
unkown
|
page read and write
|
||
3129000
|
direct allocation
|
page read and write
|
||
1FB8000
|
heap
|
page read and write
|
||
9F7D000
|
stack
|
page read and write
|
||
3D10000
|
heap
|
page read and write
|
||
4040000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
1F58000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
380A000
|
direct allocation
|
page read and write
|
||
1DC0000
|
heap
|
page read and write
|
||
1FE2000
|
heap
|
page read and write
|
||
1249000
|
unkown
|
page read and write
|
||
513B000
|
heap
|
page read and write
|
||
AFBD000
|
stack
|
page read and write
|
||
1F34000
|
heap
|
page read and write
|
||
1204F000
|
unkown
|
page read and write
|
||
3B20000
|
direct allocation
|
page execute and read and write
|
||
17E6000
|
heap
|
page read and write
|
||
6296000
|
trusted library allocation
|
page read and write
|
||
8CAE000
|
stack
|
page read and write
|
||
215A000
|
direct allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
540F000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
343E000
|
direct allocation
|
page read and write
|
||
1A69DFD0000
|
heap
|
page read and write
|
||
9A7E000
|
stack
|
page read and write
|
||
6400000
|
heap
|
page read and write
|
||
1FD8000
|
heap
|
page read and write
|
||
1A6A4229000
|
heap
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
1F36000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
8B60000
|
remote allocation
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3445000
|
direct allocation
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
B993000
|
heap
|
page read and write
|
||
16DD000
|
unkown
|
page readonly
|
||
1A6A00E6000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
110EA000
|
unkown
|
page readonly
|
||
1DF4000
|
heap
|
page read and write
|
||
6485000
|
direct allocation
|
page read and write
|
||
EBB000
|
unkown
|
page read and write
|
||
201F000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1FA4000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
5136000
|
heap
|
page read and write
|
||
36CE000
|
direct allocation
|
page read and write
|
||
66F5000
|
heap
|
page read and write
|
||
1D73000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3888000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
344C000
|
direct allocation
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
3B58000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
7EF000
|
unkown
|
page execute read
|
||
3795000
|
direct allocation
|
page read and write
|
||
64D9000
|
direct allocation
|
page read and write
|
||
1279000
|
unkown
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
1A6A4359000
|
heap
|
page read and write
|
||
21D8000
|
direct allocation
|
page read and write
|
||
2625000
|
direct allocation
|
page read and write
|
||
12A5000
|
unkown
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
5063000
|
direct allocation
|
page read and write
|
||
205C000
|
heap
|
page read and write
|
||
3899000
|
direct allocation
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1317000
|
unkown
|
page read and write
|
||
371F000
|
direct allocation
|
page read and write
|
||
6708000
|
heap
|
page read and write
|
||
385C000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
162A000
|
unkown
|
page readonly
|
||
6A5F000
|
stack
|
page read and write
|
||
6777000
|
heap
|
page read and write
|
||
200E000
|
heap
|
page read and write
|
||
6B0000
|
unkown
|
page execute read
|
||
19F3000
|
heap
|
page read and write
|
||
12D7000
|
unkown
|
page read and write
|
||
1275000
|
unkown
|
page read and write
|
||
1244000
|
unkown
|
page write copy
|
||
513E000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
17D5000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
1A69E032000
|
heap
|
page read and write
|
||
3B34000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
3920000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
34A5000
|
direct allocation
|
page read and write
|
||
36B6000
|
direct allocation
|
page read and write
|
||
1F66000
|
heap
|
page read and write
|
||
6726000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
268B000
|
direct allocation
|
page read and write
|
||
1A69DFCF000
|
heap
|
page read and write
|
||
7E900000
|
direct allocation
|
page read and write
|
||
1A69E04F000
|
heap
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
1F93000
|
heap
|
page read and write
|
||
233A3FE000
|
stack
|
page read and write
|
||
1F08000
|
heap
|
page read and write
|
||
661B000
|
heap
|
page read and write
|
||
4E58000
|
direct allocation
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
19BB000
|
stack
|
page read and write
|
||
12EC000
|
unkown
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
26FA000
|
direct allocation
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
1736000
|
unkown
|
page readonly
|
||
11142000
|
unkown
|
page write copy
|
||
832000
|
unkown
|
page execute read
|
||
125C000
|
unkown
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
3487000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
384E000
|
direct allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
C58F000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
F2F000
|
unkown
|
page read and write
|
||
513E000
|
heap
|
page read and write
|
||
1A69DF50000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
1637000
|
unkown
|
page readonly
|
||
672E000
|
heap
|
page read and write
|
||
3D9D000
|
stack
|
page read and write
|
||
1F14000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
204A000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A6A22BC000
|
heap
|
page read and write
|
||
53C7000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
646E000
|
direct allocation
|
page read and write
|
||
3A58000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
192B000
|
stack
|
page read and write
|
||
21C2000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
6726000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
17B7000
|
heap
|
page read and write
|
||
63C4000
|
direct allocation
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
224F000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
2060000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
180D000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page read and write
|
||
16FA000
|
unkown
|
page readonly
|
||
17C4000
|
heap
|
page read and write
|
||
3436000
|
direct allocation
|
page read and write
|
||
3831000
|
direct allocation
|
page read and write
|
||
6610000
|
heap
|
page read and write
|
||
1F14000
|
heap
|
page read and write
|
||
4D8C000
|
direct allocation
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
605D000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
66D6000
|
heap
|
page read and write
|
||
22B000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3727000
|
heap
|
page read and write
|
||
14FB000
|
stack
|
page read and write
|
||
5A9D000
|
stack
|
page read and write
|
||
5EDF000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
11A7000
|
unkown
|
page execute read
|
||
53A0000
|
heap
|
page read and write
|
||
5289000
|
direct allocation
|
page read and write
|
||
6724000
|
heap
|
page read and write
|
||
2224000
|
direct allocation
|
page read and write
|
||
1F21000
|
heap
|
page read and write
|
||
1091000
|
unkown
|
page readonly
|
||
233A4FF000
|
stack
|
page read and write
|
||
1F0C000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
226C000
|
direct allocation
|
page read and write
|
||
1679000
|
unkown
|
page readonly
|
||
1A69DFC6000
|
heap
|
page read and write
|
||
62A8000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
3949000
|
direct allocation
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
1F35000
|
heap
|
page read and write
|
||
1648000
|
unkown
|
page readonly
|
||
8AFE000
|
stack
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
204A000
|
heap
|
page read and write
|
||
513E000
|
heap
|
page read and write
|
||
1F8C000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
7F1000
|
unkown
|
page execute read
|
||
31C4000
|
direct allocation
|
page read and write
|
||
17D1000
|
heap
|
page read and write
|
||
2339CF5000
|
stack
|
page read and write
|
||
5170000
|
direct allocation
|
page read and write
|
||
1F74000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
514B000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
225D000
|
direct allocation
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
53C2000
|
direct allocation
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
17D9000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
64FB000
|
heap
|
page read and write
|
||
1204D000
|
unkown
|
page write copy
|
||
481000
|
unkown
|
page execute read
|
||
127F000
|
unkown
|
page read and write
|
||
9BFF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
26DD000
|
direct allocation
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
2620000
|
direct allocation
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
3B63000
|
heap
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
8EBE000
|
stack
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
3168000
|
direct allocation
|
page read and write
|
||
1A69DF30000
|
heap
|
page read and write
|
||
25E8000
|
direct allocation
|
page read and write
|
||
2076000
|
heap
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
2007000
|
heap
|
page read and write
|
||
1F50000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
16B2000
|
unkown
|
page readonly
|
||
62AA000
|
trusted library allocation
|
page read and write
|
||
AEBF000
|
stack
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
6714000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3720000
|
heap
|
page read and write
|
||
5137000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
1A69FE90000
|
heap
|
page read and write
|
||
B90F000
|
stack
|
page read and write
|
||
3B34000
|
direct allocation
|
page read and write
|
||
1244000
|
unkown
|
page read and write
|
||
A2BE000
|
stack
|
page read and write
|
||
11B7000
|
unkown
|
page execute read
|
||
2678000
|
direct allocation
|
page read and write
|
||
66F3000
|
heap
|
page read and write
|
||
262C000
|
direct allocation
|
page read and write
|
||
34E8000
|
direct allocation
|
page read and write
|
||
188C000
|
heap
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
1FCB000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
66F5000
|
heap
|
page read and write
|
||
1340000
|
unkown
|
page read and write
|
||
1A69DFC4000
|
heap
|
page read and write
|
||
5054000
|
direct allocation
|
page read and write
|
||
545A000
|
direct allocation
|
page read and write
|
||
66E2000
|
heap
|
page read and write
|
||
61FE000
|
direct allocation
|
page read and write
|
||
678F000
|
heap
|
page read and write
|
||
3513000
|
direct allocation
|
page read and write
|
||
674E000
|
heap
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
3896000
|
direct allocation
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
1FD8000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
2232000
|
direct allocation
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2642000
|
direct allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
31D8000
|
direct allocation
|
page read and write
|
||
374E000
|
direct allocation
|
page read and write
|
||
16B9000
|
unkown
|
page readonly
|
||
17B4000
|
heap
|
page read and write
|
||
659000
|
unkown
|
page execute read
|
||
A4BF000
|
stack
|
page read and write
|
||
BD4E000
|
stack
|
page read and write
|
||
3123000
|
direct allocation
|
page read and write
|
||
1A6A4151000
|
heap
|
page read and write
|
||
3764000
|
direct allocation
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
34CB000
|
direct allocation
|
page read and write
|
||
1EFE000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A6A2256000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
2675000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1268000
|
unkown
|
page read and write
|
||
125D000
|
unkown
|
page read and write
|
||
65AE000
|
stack
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
2680000
|
direct allocation
|
page read and write
|
||
17DE000
|
heap
|
page read and write
|
||
11149000
|
unkown
|
page read and write
|
||
5717000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
7B1F000
|
stack
|
page read and write
|
||
1F76000
|
heap
|
page read and write
|
||
E59000
|
unkown
|
page write copy
|
||
7FF6CDB6B000
|
unkown
|
page write copy
|
||
26C8000
|
direct allocation
|
page read and write
|
||
3872000
|
direct allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
2286000
|
heap
|
page read and write
|
||
2001000
|
heap
|
page read and write
|
||
1876000
|
heap
|
page read and write
|
||
3A10000
|
heap
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
36EC000
|
direct allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
C08E000
|
stack
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
5A6F000
|
stack
|
page read and write
|
||
A07E000
|
stack
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
1C45000
|
heap
|
page read and write
|
||
66F5000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1DA5000
|
heap
|
page read and write
|
||
6291000
|
trusted library allocation
|
page read and write
|
||
310D000
|
direct allocation
|
page read and write
|
||
36B5000
|
direct allocation
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
1F2F000
|
heap
|
page read and write
|
||
18B8000
|
stack
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
8DBE000
|
stack
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
3405000
|
direct allocation
|
page read and write
|
||
1F9A000
|
heap
|
page read and write
|
||
218E000
|
direct allocation
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
6409000
|
direct allocation
|
page read and write
|
||
17D2000
|
heap
|
page read and write
|
||
3181000
|
direct allocation
|
page read and write
|
||
17F4000
|
heap
|
page read and write
|
||
E7A000
|
unkown
|
page read and write
|
||
6500000
|
unkown
|
page read and write
|
||
1A69FCF0000
|
heap
|
page read and write
|
||
3B49000
|
direct allocation
|
page read and write
|
||
6616000
|
heap
|
page read and write
|
||
37AF000
|
direct allocation
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
134B000
|
unkown
|
page readonly
|
||
2010000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E14000
|
direct allocation
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
E7D000
|
unkown
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
16D2000
|
unkown
|
page readonly
|
||
8F5000
|
unkown
|
page execute read
|
||
1640000
|
heap
|
page read and write
|
||
1FB9000
|
heap
|
page read and write
|
||
1696000
|
unkown
|
page readonly
|
||
1F5F000
|
heap
|
page read and write
|
||
1302000
|
unkown
|
page read and write
|
||
E67000
|
unkown
|
page read and write
|
||
1A69E062000
|
heap
|
page read and write
|
||
3454000
|
direct allocation
|
page read and write
|
||
14FB000
|
stack
|
page read and write
|
||
C70D000
|
stack
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
2037000
|
heap
|
page read and write
|
||
1262000
|
unkown
|
page read and write
|
||
385B000
|
direct allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
1A6A21E5000
|
heap
|
page read and write
|
||
1337000
|
unkown
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
25F6000
|
direct allocation
|
page read and write
|
||
16D5000
|
unkown
|
page readonly
|
||
1FD2000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
11001000
|
unkown
|
page execute read
|
||
3711000
|
heap
|
page read and write
|
||
3229000
|
direct allocation
|
page read and write
|
||
1FEF000
|
heap
|
page read and write
|
||
3D11000
|
heap
|
page read and write
|
||
12001000
|
unkown
|
page execute read
|
||
7CAE000
|
stack
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
1A69FFF0000
|
trusted library allocation
|
page read and write
|
||
38BA000
|
direct allocation
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
7FF6CDB7A000
|
unkown
|
page readonly
|
||
7FF6CDB10000
|
unkown
|
page readonly
|
||
37B6000
|
direct allocation
|
page read and write
|
||
1FFC000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page read and write
|
||
25D0000
|
direct allocation
|
page read and write
|
||
37CE000
|
direct allocation
|
page read and write
|
||
66FD000
|
heap
|
page read and write
|
||
1317000
|
unkown
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
2046000
|
heap
|
page read and write
|
||
3D11000
|
heap
|
page read and write
|
||
3421000
|
direct allocation
|
page read and write
|
||
17AF000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
E65000
|
unkown
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
504D000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
4030000
|
heap
|
page read and write
|
||
1652000
|
unkown
|
page readonly
|
||
17D8000
|
heap
|
page read and write
|
||
1A69DF70000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
201F000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
7FF6CDB74000
|
unkown
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
50A3000
|
direct allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
1A6A4356000
|
heap
|
page read and write
|
||
1A6A422A000
|
heap
|
page read and write
|
||
290000
|
heap
|
page read and write
|
||
160D000
|
unkown
|
page readonly
|
||
1F93000
|
heap
|
page read and write
|
||
C1CE000
|
stack
|
page read and write
|
||
36DE000
|
direct allocation
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
1A6A22C0000
|
heap
|
page read and write
|
||
21AC000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
F39000
|
unkown
|
page readonly
|
||
34EF000
|
direct allocation
|
page read and write
|
||
127F000
|
unkown
|
page read and write
|
||
1A6A21B2000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
1FDA000
|
heap
|
page read and write
|
||
1A6A2222000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
3B30000
|
heap
|
page read and write
|
||
3463000
|
direct allocation
|
page read and write
|
||
1F6D000
|
heap
|
page read and write
|
||
33E000
|
stack
|
page read and write
|
||
21DF000
|
direct allocation
|
page read and write
|
||
2658000
|
direct allocation
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
1A69DFC6000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
6775000
|
heap
|
page read and write
|
||
33FD000
|
direct allocation
|
page read and write
|
||
3B2A000
|
direct allocation
|
page read and write
|
||
3731000
|
direct allocation
|
page read and write
|
||
3B27000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
2017000
|
heap
|
page read and write
|
||
1A69E04F000
|
heap
|
page read and write
|
||
5426000
|
heap
|
page read and write
|
||
4E66000
|
direct allocation
|
page read and write
|
||
2168000
|
direct allocation
|
page read and write
|
||
3B18000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1F6C000
|
heap
|
page read and write
|
||
1F15000
|
heap
|
page read and write
|
||
53BE000
|
heap
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
514B000
|
trusted library allocation
|
page read and write
|
||
1F74000
|
heap
|
page read and write
|
||
2687000
|
direct allocation
|
page read and write
|
||
1A6A435A000
|
heap
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
2651000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
1A69DFF0000
|
heap
|
page read and write
|
||
37BE000
|
direct allocation
|
page read and write
|
||
14FB000
|
stack
|
page read and write
|
||
2010000
|
heap
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
1676000
|
unkown
|
page readonly
|
||
66CA000
|
heap
|
page read and write
|
||
1A69FE92000
|
heap
|
page read and write
|
||
127B000
|
unkown
|
page read and write
|
||
53CB000
|
direct allocation
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
6732000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1FEE000
|
heap
|
page read and write
|
||
1615000
|
unkown
|
page readonly
|
||
167D000
|
unkown
|
page readonly
|
||
640E000
|
heap
|
page read and write
|
||
E59000
|
unkown
|
page read and write
|
||
E81000
|
unkown
|
page read and write
|
||
1FE2000
|
heap
|
page read and write
|
||
1FF7000
|
heap
|
page read and write
|
||
3B12000
|
direct allocation
|
page read and write
|
||
64B0000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
E2D000
|
unkown
|
page execute read
|
||
2708000
|
direct allocation
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
9AFE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
2248000
|
direct allocation
|
page read and write
|
||
E59000
|
unkown
|
page read and write
|
||
B33E000
|
stack
|
page read and write
|
||
1FE7000
|
heap
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1F69000
|
heap
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
6B5E000
|
stack
|
page read and write
|
||
2215000
|
direct allocation
|
page read and write
|
||
11145000
|
unkown
|
page read and write
|
||
37EC000
|
direct allocation
|
page read and write
|
||
320D000
|
direct allocation
|
page read and write
|
||
1EBF000
|
stack
|
page read and write
|
||
26F4000
|
direct allocation
|
page read and write
|
||
674F000
|
heap
|
page read and write
|
||
1A69E045000
|
heap
|
page read and write
|
||
1303000
|
unkown
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
3B60000
|
heap
|
page read and write
|
||
221C000
|
direct allocation
|
page read and write
|
||
3D2B000
|
heap
|
page read and write
|
||
1693000
|
unkown
|
page readonly
|
||
1A6A4355000
|
heap
|
page read and write
|
||
82FE000
|
stack
|
page read and write
|
||
1622000
|
unkown
|
page readonly
|
||
1A69DFCE000
|
heap
|
page read and write
|
||
3840000
|
direct allocation
|
page read and write
|
||
BF8E000
|
stack
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
3131000
|
direct allocation
|
page read and write
|
||
122A000
|
unkown
|
page execute read
|
||
907E000
|
stack
|
page read and write
|
||
818D000
|
stack
|
page read and write
|
||
503E000
|
direct allocation
|
page read and write
|
||
5141000
|
trusted library allocation
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
162F000
|
unkown
|
page readonly
|
||
6740000
|
heap
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
E83000
|
unkown
|
page read and write
|
||
3747000
|
direct allocation
|
page read and write
|
||
1F70000
|
heap
|
page read and write
|
||
17ED000
|
heap
|
page read and write
|
||
1FF3000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
3B6D000
|
direct allocation
|
page read and write
|
||
37C8000
|
direct allocation
|
page read and write
|
||
50A6000
|
direct allocation
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
515F000
|
heap
|
page read and write
|
||
1A6A42D4000
|
heap
|
page read and write
|
||
3811000
|
direct allocation
|
page read and write
|
||
1A6A22CE000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
1A69DFCF000
|
heap
|
page read and write
|
||
126F000
|
unkown
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
6411000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
678F000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
1244000
|
unkown
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A6A2258000
|
heap
|
page read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
E65000
|
unkown
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
671C000
|
heap
|
page read and write
|
||
3A43000
|
direct allocation
|
page read and write
|
||
11F7000
|
stack
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
E86000
|
unkown
|
page read and write
|
||
388F000
|
direct allocation
|
page read and write
|
||
203B000
|
heap
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
216F000
|
direct allocation
|
page read and write
|
||
1EF2000
|
heap
|
page read and write
|
||
53A7000
|
heap
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
1269000
|
unkown
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1D3E000
|
stack
|
page read and write
|
||
1FCD000
|
heap
|
page read and write
|
||
345C000
|
direct allocation
|
page read and write
|
||
1A69E035000
|
heap
|
page read and write
|
||
3B4B000
|
heap
|
page read and write
|
||
1A6A4314000
|
heap
|
page read and write
|
||
36E5000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
E7F000
|
unkown
|
page read and write
|
||
87FF000
|
stack
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
2038000
|
heap
|
page read and write
|
||
1F5E000
|
heap
|
page read and write
|
||
EDB000
|
unkown
|
page read and write
|
||
2136000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1303000
|
unkown
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
F06000
|
unkown
|
page read and write
|
||
50A9000
|
direct allocation
|
page read and write
|
||
1A69DFBB000
|
heap
|
page read and write
|
||
1FF6000
|
heap
|
page read and write
|
||
17F8000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1A69E01F000
|
heap
|
page read and write
|
||
17D1000
|
heap
|
page read and write
|
||
1A69DFE6000
|
heap
|
page read and write
|
||
1FF3000
|
heap
|
page read and write
|
||
1A69E002000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1A6A2289000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
1FA9000
|
heap
|
page read and write
|
||
3152000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
64E8000
|
direct allocation
|
page read and write
|
||
12B000
|
stack
|
page read and write
|
||
58EF000
|
stack
|
page read and write
|
||
1FB6000
|
heap
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
1A6A4221000
|
heap
|
page read and write
|
||
673F000
|
heap
|
page read and write
|
||
1A5F000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
26CF000
|
direct allocation
|
page read and write
|
||
3780000
|
direct allocation
|
page read and write
|
||
379D000
|
direct allocation
|
page read and write
|
||
3B7C000
|
direct allocation
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
3927000
|
direct allocation
|
page read and write
|
||
349000
|
unkown
|
page execute read
|
||
1FF8000
|
heap
|
page read and write
|
||
3DB1000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
6718000
|
heap
|
page read and write
|
||
34FD000
|
direct allocation
|
page read and write
|
||
9E7E000
|
stack
|
page read and write
|
||
269C000
|
direct allocation
|
page read and write
|
||
5036000
|
direct allocation
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
3479000
|
direct allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
339D000
|
direct allocation
|
page read and write
|
||
712000
|
unkown
|
page execute read
|
||
127F000
|
unkown
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
1A6A21F1000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
5141000
|
heap
|
page read and write
|
||
348F000
|
direct allocation
|
page read and write
|
||
1FFB000
|
heap
|
page read and write
|
||
351A000
|
direct allocation
|
page read and write
|
||
3718000
|
direct allocation
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
7CB000
|
unkown
|
page execute read
|
||
3D13000
|
heap
|
page read and write
|
||
265F000
|
direct allocation
|
page read and write
|
||
37DE000
|
direct allocation
|
page read and write
|
||
1A69E062000
|
heap
|
page read and write
|
||
2044000
|
heap
|
page read and write
|
||
268E000
|
direct allocation
|
page read and write
|
||
3A23000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
8B60000
|
remote allocation
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1A6A2266000
|
heap
|
page read and write
|
||
710F000
|
stack
|
page read and write
|
||
168A000
|
unkown
|
page readonly
|
||
1A69DF79000
|
heap
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
500B000
|
stack
|
page read and write
|
||
17ED000
|
heap
|
page read and write
|
||
3521000
|
direct allocation
|
page read and write
|
||
31F8000
|
direct allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
2692000
|
direct allocation
|
page read and write
|
||
203E000
|
heap
|
page read and write
|
||
5C9D000
|
stack
|
page read and write
|
||
1F17000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1269000
|
unkown
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1A69FE93000
|
heap
|
page read and write
|
||
1F66000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
1279000
|
unkown
|
page read and write
|
||
1E0E000
|
stack
|
page read and write
|
||
1268000
|
unkown
|
page read and write
|
||
3DD1000
|
heap
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1687000
|
unkown
|
page readonly
|
||
381F000
|
direct allocation
|
page read and write
|
||
6726000
|
heap
|
page read and write
|
||
16BF000
|
unkown
|
page readonly
|
||
1249000
|
unkown
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
1A69DFDA000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1E4E000
|
stack
|
page read and write
|
||
1F14000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
E59000
|
unkown
|
page read and write
|
||
8EFE000
|
stack
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
7B20000
|
heap
|
page read and write
|
||
2A0000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1A6A4251000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
3DB1000
|
heap
|
page read and write
|
||
B78E000
|
stack
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
7FF6CDB7E000
|
unkown
|
page write copy
|
||
1FBB000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1634000
|
heap
|
page read and write
|
||
53C4000
|
heap
|
page read and write
|
||
1A6A4152000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
1317000
|
unkown
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
1F57000
|
heap
|
page read and write
|
||
1F21000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1D96000
|
heap
|
page read and write
|
||
1F35000
|
heap
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
8F7E000
|
stack
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
3871000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
50A8000
|
direct allocation
|
page read and write
|
||
127F000
|
unkown
|
page read and write
|
||
63AE000
|
direct allocation
|
page read and write
|
||
31F8000
|
direct allocation
|
page read and write
|
||
17EA000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
66EB000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
5148000
|
trusted library allocation
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
3B2B000
|
heap
|
page read and write
|
||
78D000
|
unkown
|
page execute read
|
||
36FB000
|
direct allocation
|
page read and write
|
||
3A2000
|
unkown
|
page execute read
|
||
1A7E000
|
stack
|
page read and write
|
||
6B9E000
|
stack
|
page read and write
|
||
3154000
|
direct allocation
|
page read and write
|
||
1F93000
|
heap
|
page read and write
|
||
1DCE000
|
stack
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1FF2000
|
heap
|
page read and write
|
||
6294000
|
trusted library allocation
|
page read and write
|
||
1A69E032000
|
heap
|
page read and write
|
||
1FB4000
|
heap
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
125E000
|
unkown
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
3818000
|
direct allocation
|
page read and write
|
||
1A69FEB0000
|
heap
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
31EB000
|
direct allocation
|
page read and write
|
||
3711000
|
direct allocation
|
page read and write
|
||
1A69DFF6000
|
heap
|
page read and write
|
||
677F000
|
heap
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
E2F000
|
unkown
|
page execute read
|
||
1DB4000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
2A51000
|
heap
|
page read and write
|
||
22B0000
|
direct allocation
|
page execute and read and write
|
||
BC0E000
|
stack
|
page read and write
|
||
1601000
|
unkown
|
page readonly
|
||
266E000
|
direct allocation
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
1FC7000
|
heap
|
page read and write
|
||
1FFB000
|
heap
|
page read and write
|
||
34B3000
|
direct allocation
|
page read and write
|
||
6296000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
direct allocation
|
page read and write
|
||
1A69E04F000
|
heap
|
page read and write
|
||
1A69DFCE000
|
heap
|
page read and write
|
||
1FB3000
|
heap
|
page read and write
|
||
17DF000
|
heap
|
page read and write
|
||
1A6A228E000
|
heap
|
page read and write
|
||
1A6A4355000
|
heap
|
page read and write
|
||
EE6000
|
unkown
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
620E000
|
direct allocation
|
page read and write
|
||
1A6A4192000
|
heap
|
page read and write
|
||
1FF6000
|
heap
|
page read and write
|
||
1B7E000
|
stack
|
page read and write
|
||
1FF9000
|
heap
|
page read and write
|
||
6705000
|
heap
|
page read and write
|
||
315C000
|
direct allocation
|
page read and write
|
||
1A69E045000
|
heap
|
page read and write
|
||
1DF4000
|
heap
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
1C20000
|
heap
|
page read and write
|
||
11F7000
|
stack
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
17D8000
|
heap
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
1748000
|
heap
|
page read and write
|
||
1F31000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
2273000
|
direct allocation
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
E7A000
|
unkown
|
page read and write
|
||
1A69DFBC000
|
heap
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
1A69DFAC000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
1204F000
|
unkown
|
page read and write
|
||
7F350000
|
direct allocation
|
page read and write
|
||
2339CF9000
|
stack
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
997E000
|
stack
|
page read and write
|
||
1C20000
|
heap
|
page read and write
|
||
1A6A41D4000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
3478000
|
direct allocation
|
page read and write
|
||
1A6A21AC000
|
heap
|
page read and write
|
||
12E3000
|
unkown
|
page read and write
|
||
1FF0000
|
heap
|
page read and write
|
||
651000
|
unkown
|
page execute read
|
||
3711000
|
heap
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
2037000
|
heap
|
page read and write
|
||
1A69DE40000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
3471000
|
direct allocation
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
4EEA000
|
direct allocation
|
page read and write
|
||
1A69DF20000
|
heap
|
page readonly
|
||
375C000
|
direct allocation
|
page read and write
|
||
1A6A42D3000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
3FF0000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
6701000
|
heap
|
page read and write
|
||
E76000
|
unkown
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
11F7000
|
stack
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
1A6A1904000
|
heap
|
page read and write
|
||
1A6A010B000
|
heap
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
1A6A4110000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
3740000
|
direct allocation
|
page read and write
|
||
1A69DFF4000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
E65000
|
unkown
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A69DFBC000
|
heap
|
page read and write
|
||
1657000
|
unkown
|
page readonly
|
||
3711000
|
heap
|
page read and write
|
||
6493000
|
direct allocation
|
page read and write
|
||
1F72000
|
heap
|
page read and write
|
||
670E000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
7C6F000
|
stack
|
page read and write
|
||
17ED000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
127F000
|
unkown
|
page read and write
|
||
1FDF000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
21A5000
|
direct allocation
|
page read and write
|
||
4DA8000
|
direct allocation
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
5131000
|
trusted library allocation
|
page read and write
|
||
1A69E01E000
|
heap
|
page read and write
|
||
662A000
|
trusted library allocation
|
page read and write
|
||
1FFF000
|
heap
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
6787000
|
heap
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
233A5FB000
|
stack
|
page read and write
|
||
1FBF000
|
heap
|
page read and write
|
||
7FF6CDB11000
|
unkown
|
page execute read
|
||
5159000
|
heap
|
page read and write
|
||
3913000
|
heap
|
page read and write
|
||
1797000
|
heap
|
page read and write
|
||
1262000
|
unkown
|
page read and write
|
||
1A69DFC6000
|
heap
|
page read and write
|
||
63B6000
|
direct allocation
|
page read and write
|
||
1FEA000
|
heap
|
page read and write
|
||
342F000
|
direct allocation
|
page read and write
|
||
808B000
|
stack
|
page read and write
|
||
1626000
|
unkown
|
page readonly
|
||
3B11000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
1DC4000
|
heap
|
page read and write
|
||
12FE000
|
unkown
|
page read and write
|
||
17E1000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1A6A4251000
|
heap
|
page read and write
|
||
E83000
|
unkown
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
1E8E000
|
stack
|
page read and write
|
||
31DA000
|
direct allocation
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
7EA10000
|
direct allocation
|
page read and write
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
1A69E045000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
675F000
|
heap
|
page read and write
|
||
1F27000
|
heap
|
page read and write
|
||
53E1000
|
direct allocation
|
page read and write
|
||
17CD000
|
heap
|
page read and write
|
||
AD8000
|
unkown
|
page execute read
|
||
17D0000
|
heap
|
page read and write
|
||
E67000
|
unkown
|
page read and write
|
||
1F57000
|
heap
|
page read and write
|
||
3197000
|
direct allocation
|
page read and write
|
||
37C1000
|
direct allocation
|
page read and write
|
||
16E4000
|
heap
|
page read and write
|
||
1A69DFB0000
|
heap
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
direct allocation
|
page read and write
|
||
E4E000
|
unkown
|
page execute read
|
||
1643000
|
unkown
|
page readonly
|
||
B5BE000
|
stack
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
3418000
|
direct allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
16EB000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
7E120000
|
direct allocation
|
page read and write
|
||
6406000
|
heap
|
page read and write
|
||
3EDC000
|
stack
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
2A4000
|
heap
|
page read and write
|
||
53D9000
|
direct allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
1FE6000
|
heap
|
page read and write
|
||
2048000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
3B11000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
51A5000
|
heap
|
page read and write
|
||
5257000
|
heap
|
page read and write
|
||
3711000
|
heap
|
page read and write
|
||
E2D000
|
unkown
|
page execute read
|
||
16D2000
|
heap
|
page read and write
|
||
2256000
|
direct allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
6350000
|
heap
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
ECA000
|
unkown
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
There are 2133 hidden memdumps, click here to show them.