Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NB4EASbynx.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252,
Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows,
Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data
required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date:
Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of
Pages: 450
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SymposiumTaiwan.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Config.Msi\68e8f0.rbs
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\558563\k
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Analysts
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Assumed
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Basketball
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Beverages
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cheque
|
MPEG ADTS, AAC, v4 LTP, stereo + center
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Displaying
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Emotions
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Explaining
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Feeling
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Grain
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Hero
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Immigrants
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Kelly
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Louisiana
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI4F6E.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI5124.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI523E.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI527E.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI52AE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI537A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIC706.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Manage
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Notify
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Oak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Open
|
ASCII text, with very long lines (1084), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Open.cmd
|
ASCII text, with very long lines (1084), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Paintball
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Productivity
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Qualifications
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ring
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Spa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Transexual
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Twin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Upc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Utility
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Version
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Webpage
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Width
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Wt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Yearly
|
data
|
dropped
|
||
C:\Windows\Installer\68e8ef.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252,
Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows,
Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data
required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date:
Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of
Pages: 450
|
dropped
|
||
C:\Windows\Installer\68e8f1.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252,
Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows,
Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data
required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date:
Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of
Pages: 450
|
dropped
|
||
C:\Windows\Installer\MSIEA27.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIEA95.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIEAB6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIEB24.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF0134FB345E482C7A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF23FAA980D14CD732.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2A7C783D5DE4B7FD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF3FECA6A770E2A6D3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF60147ABB188BCB9C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF79247D6107B4D357.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF8ACC052D60164BF1.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA44E230E9286797A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFAC706A84CEB26BA8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC9703DE7EF69207B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFE14BFCAB93EAE800.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE70856C2C128635C.TMP
|
data
|
dropped
|
There are 58 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
|
"C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1
|
||
C:\Users\user\Desktop\SymposiumTaiwan.exe
|
"C:\Users\user\Desktop\SymposiumTaiwan.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "wrsa.exe opssvc.exe"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 558563
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /V "cbsinchhavefcc" Basketball
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\k
|
||
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
|
558563\Dicks.pif 558563\k
|
||
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
|
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\NB4EASbynx.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 4C0B4EE6A62E23CFF044B1F01FFADBEC C
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 5
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 6E4C0896962209942EF6224878A6EC23
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
lariatedzugspd.shop
|
|||
callosallsaospz.shop
|
|||
liernessfornicsa.shop
|
|||
shepherdlyopzc.shop
|
|||
warrantelespsz.shop
|
|||
upknittsoappz.shop
|
|||
outpointsozp.shop
|
|||
unseaffarignsk.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://warrantelespsz.shop:443/api
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://warrantelespsz.shop:443/api0-
|
unknown
|
||
https://warrantelespsz.shop/
|
unknown
|
||
https://warrantelespsz.shop/apiOR
|
unknown
|
||
https://warrantelespsz.shop/N
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://warrantelespsz.shop:443/apiMicrosoft
|
unknown
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://warrantelespsz.sho8
|
unknown
|
||
https://warrantelespsz.shop/fe
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://warrantelespsz.shop/api7N/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://warrantelespsz.shop/apiBNz
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://warrantelespsz.shop/api
|
188.114.96.3
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://warrantelespsz.shop/ob
|
unknown
|
||
https://warrantelespsz.shop/pim
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://warrantelespsz.shop/pid
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://warrantelespsz.shop/pi
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://warrantelespsz.shop/ta
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
There are 41 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
warrantelespsz.shop
|
188.114.96.3
|
||
fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPh
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
warrantelespsz.shop
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\68e8f0.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\68e8f0.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4F9CC0FE1242C1C40BA82079002B1BC1
|
3394517F7BAF31F40AC82019BDE5D550
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52B4DD7E97EB05B479074BEF603942A9
|
3394517F7BAF31F40AC82019BDE5D550
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\UpdateMSwindows\UpdateMSwindows\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\UpdateMSwindows\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\UpdateMSwindows\UpdateMSwindows
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\UpdateMSwindows\UpdateMSwindows
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\C9755B9D4E0603F4F8B82CC013446D90
|
3394517F7BAF31F40AC82019BDE5D550
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\3394517F7BAF31F40AC82019BDE5D550
|
MainFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\Features
|
MainFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C9755B9D4E0603F4F8B82CC013446D90
|
3394517F7BAF31F40AC82019BDE5D550
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
There are 72 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
43FC000
|
trusted library allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
3683000
|
trusted library allocation
|
page read and write
|
||
2352000
|
heap
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
1848000
|
heap
|
page read and write
|
||
44E5000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
442C000
|
trusted library allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
91FF000
|
stack
|
page read and write
|
||
20D0000
|
heap
|
page read and write
|
||
18A9000
|
heap
|
page read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
2326000
|
heap
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
17BE000
|
heap
|
page read and write
|
||
3458000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
35D3000
|
heap
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
76A2000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
3644000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
7DFF000
|
stack
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
3435000
|
trusted library allocation
|
page read and write
|
||
17C6000
|
heap
|
page read and write
|
||
731D000
|
trusted library allocation
|
page read and write
|
||
22FA000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
17AD000
|
heap
|
page read and write
|
||
3485000
|
trusted library allocation
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
35AD000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
35BB000
|
trusted library allocation
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
3CC1000
|
trusted library allocation
|
page read and write
|
||
186F000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
182F000
|
heap
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
187D000
|
heap
|
page read and write
|
||
343A000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
stack
|
page read and write
|
||
18D9000
|
heap
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
4588000
|
trusted library allocation
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
292B000
|
heap
|
page read and write
|
||
235A000
|
heap
|
page read and write
|
||
883E000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
198D000
|
heap
|
page read and write
|
||
F9000
|
unkown
|
page readonly
|
||
2382000
|
heap
|
page read and write
|
||
8F7F000
|
stack
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
11F5000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
933F000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4455000
|
trusted library allocation
|
page read and write
|
||
947F000
|
stack
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
3458000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
stack
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
3493000
|
trusted library allocation
|
page read and write
|
||
1794000
|
heap
|
page read and write
|
||
3514000
|
trusted library allocation
|
page read and write
|
||
17C3000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
8AA000
|
unkown
|
page write copy
|
||
32B0000
|
heap
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
344B000
|
trusted library allocation
|
page read and write
|
||
7CBF000
|
stack
|
page read and write
|
||
7671000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
1843000
|
heap
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
1955000
|
heap
|
page read and write
|
||
8CFF000
|
stack
|
page read and write
|
||
3482000
|
trusted library allocation
|
page read and write
|
||
1952000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
22E7000
|
heap
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
19EB000
|
heap
|
page read and write
|
||
3476000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
22FA000
|
heap
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
1928000
|
heap
|
page read and write
|
||
EF2000
|
stack
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
3FA0000
|
heap
|
page read and write
|
||
3483000
|
trusted library allocation
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
FFC000
|
heap
|
page read and write
|
||
847E000
|
stack
|
page read and write
|
||
833E000
|
stack
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
871000
|
unkown
|
page execute read
|
||
174E000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
3456000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
571F000
|
stack
|
page read and write
|
||
1984000
|
heap
|
page read and write
|
||
35A4000
|
heap
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
973E000
|
stack
|
page read and write
|
||
44EE000
|
trusted library allocation
|
page read and write
|
||
539D000
|
stack
|
page read and write
|
||
180A000
|
heap
|
page read and write
|
||
8AA000
|
unkown
|
page read and write
|
||
4453000
|
trusted library allocation
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
FB3000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
1828000
|
heap
|
page read and write
|
||
1A9B000
|
heap
|
page read and write
|
||
3428000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page read and write
|
||
44EB000
|
trusted library allocation
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
17EB000
|
heap
|
page read and write
|
||
4308000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
remote allocation
|
page execute and read and write
|
||
720000
|
heap
|
page read and write
|
||
2352000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
3472000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
unkown
|
page readonly
|
||
1716000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
16C3000
|
heap
|
page read and write
|
||
344B000
|
trusted library allocation
|
page read and write
|
||
4308000
|
trusted library allocation
|
page read and write
|
||
1877000
|
heap
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
1504000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
61F000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
42D8000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
445B000
|
trusted library allocation
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
3FA1000
|
heap
|
page read and write
|
||
E3A000
|
stack
|
page read and write
|
||
429B000
|
trusted library allocation
|
page read and write
|
||
4451000
|
trusted library allocation
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
7236000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
1A9B000
|
heap
|
page read and write
|
||
3C54000
|
heap
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
2307000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3456000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
4454000
|
trusted library allocation
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
30E4000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
190F000
|
heap
|
page read and write
|
||
937E000
|
stack
|
page read and write
|
||
3468000
|
trusted library allocation
|
page read and write
|
||
2382000
|
heap
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
2315000
|
heap
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
44EB000
|
trusted library allocation
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
1899000
|
heap
|
page read and write
|
||
3629000
|
trusted library allocation
|
page read and write
|
||
452A000
|
trusted library allocation
|
page read and write
|
||
4250000
|
trusted library allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
34B3000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
3458000
|
trusted library allocation
|
page read and write
|
||
4454000
|
trusted library allocation
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
2375000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
575C000
|
stack
|
page read and write
|
||
997F000
|
stack
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
807F000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
44F3000
|
trusted library allocation
|
page read and write
|
||
2382000
|
heap
|
page read and write
|
||
2352000
|
heap
|
page read and write
|
||
46DE000
|
trusted library allocation
|
page read and write
|
||
191A000
|
heap
|
page read and write
|
||
3432000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
451B000
|
trusted library allocation
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
FF9000
|
heap
|
page read and write
|
||
4A2F000
|
heap
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
9C3E000
|
stack
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
EB9000
|
stack
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
11BD000
|
heap
|
page read and write
|
||
18DA000
|
heap
|
page read and write
|
||
EE1000
|
stack
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
8A7F000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
4451000
|
trusted library allocation
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
2C6A000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
FB3000
|
heap
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
4519000
|
trusted library allocation
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
3473000
|
trusted library allocation
|
page read and write
|
||
7E3E000
|
stack
|
page read and write
|
||
44F3000
|
trusted library allocation
|
page read and write
|
||
184B000
|
heap
|
page read and write
|
||
459F000
|
trusted library allocation
|
page read and write
|
||
3CB0000
|
heap
|
page read and write
|
||
1A7A000
|
heap
|
page read and write
|
||
22FE000
|
heap
|
page read and write
|
||
35D4000
|
heap
|
page read and write
|
||
43FB000
|
trusted library allocation
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
43E7000
|
trusted library allocation
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
351A000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
346E000
|
trusted library allocation
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
2DD0000
|
remote allocation
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4458000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
stack
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
182F000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
776000
|
heap
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
3469000
|
trusted library allocation
|
page read and write
|
||
1748000
|
heap
|
page read and write
|
||
95FE000
|
stack
|
page read and write
|
||
E60000
|
remote allocation
|
page execute and read and write
|
||
182F000
|
heap
|
page read and write
|
||
1889000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
76A1000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page write copy
|
||
19B4000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
213E000
|
stack
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
1727000
|
heap
|
page read and write
|
||
17FF000
|
heap
|
page read and write
|
||
8FBE000
|
stack
|
page read and write
|
||
342C000
|
trusted library allocation
|
page read and write
|
||
190D000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
344B000
|
trusted library allocation
|
page read and write
|
||
3453000
|
trusted library allocation
|
page read and write
|
||
44FD000
|
trusted library allocation
|
page read and write
|
||
34B7000
|
trusted library allocation
|
page read and write
|
||
87FF000
|
stack
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
4454000
|
trusted library allocation
|
page read and write
|
||
34E1000
|
heap
|
page read and write
|
||
16C3000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
793F000
|
stack
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
18DC000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
175C000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
1A0E000
|
heap
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
4458000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
heap
|
page read and write
|
||
4A96000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page execute and read and write
|
||
1504000
|
heap
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
9BFF000
|
stack
|
page read and write
|
||
3618000
|
trusted library allocation
|
page read and write
|
||
4A9C000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
7D5F000
|
stack
|
page read and write
|
||
1778000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
EC6000
|
stack
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
2DD0000
|
remote allocation
|
page read and write
|
||
7A3F000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
1046000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
35D4000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
3422000
|
trusted library allocation
|
page read and write
|
||
3FA1000
|
heap
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
196B000
|
heap
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
2307000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
2445000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
8E7E000
|
stack
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
342A000
|
trusted library allocation
|
page read and write
|
||
9D3F000
|
stack
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
3487000
|
trusted library allocation
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
8BBF000
|
stack
|
page read and write
|
||
4283000
|
trusted library allocation
|
page read and write
|
||
344D000
|
trusted library allocation
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
189B000
|
heap
|
page read and write
|
||
2C8C000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
229F000
|
stack
|
page read and write
|
||
1984000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
3417000
|
trusted library allocation
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
186F000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
4457000
|
trusted library allocation
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
345B000
|
trusted library allocation
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
1974000
|
heap
|
page read and write
|
||
4455000
|
trusted library allocation
|
page read and write
|
||
22A1000
|
heap
|
page read and write
|
||
7564000
|
trusted library allocation
|
page read and write
|
||
197B000
|
heap
|
page read and write
|
||
349F000
|
trusted library allocation
|
page read and write
|
||
35D4000
|
heap
|
page read and write
|
||
3D58000
|
trusted library allocation
|
page read and write
|
||
893F000
|
stack
|
page read and write
|
||
22CB000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
1899000
|
heap
|
page read and write
|
||
19A8000
|
heap
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
3A66000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
1830000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
4514000
|
trusted library allocation
|
page read and write
|
||
987E000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
80BE000
|
stack
|
page read and write
|
||
346A000
|
trusted library allocation
|
page read and write
|
||
17FD000
|
heap
|
page read and write
|
||
172F000
|
heap
|
page read and write
|
||
44FA000
|
trusted library allocation
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
923E000
|
stack
|
page read and write
|
||
7641000
|
heap
|
page read and write
|
||
81BF000
|
stack
|
page read and write
|
||
1933000
|
heap
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
2376000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
983F000
|
stack
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
22E4000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
90BF000
|
stack
|
page read and write
|
||
17BE000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
198E000
|
heap
|
page read and write
|
||
F71000
|
heap
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
2911000
|
heap
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
2F38000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
857F000
|
stack
|
page read and write
|
||
3467000
|
trusted library allocation
|
page read and write
|
||
E6000
|
unkown
|
page readonly
|
||
11DD000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
445F000
|
trusted library allocation
|
page read and write
|
||
1839000
|
heap
|
page read and write
|
||
724D000
|
trusted library allocation
|
page read and write
|
||
2326000
|
heap
|
page read and write
|
||
194B000
|
heap
|
page read and write
|
||
585C000
|
stack
|
page read and write
|
||
1942000
|
heap
|
page read and write
|
||
9E7F000
|
stack
|
page read and write
|
||
44E6000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
8E3F000
|
stack
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
F9000
|
unkown
|
page readonly
|
||
345F000
|
trusted library allocation
|
page read and write
|
||
4366000
|
trusted library allocation
|
page read and write
|
||
22B8000
|
heap
|
page read and write
|
||
208E000
|
stack
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
1504000
|
heap
|
page read and write
|
||
2307000
|
heap
|
page read and write
|
||
238D000
|
heap
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
3448000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
1716000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
293C000
|
heap
|
page read and write
|
||
170F000
|
heap
|
page read and write
|
||
1A0D000
|
heap
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
4307000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
3CC8000
|
trusted library allocation
|
page read and write
|
||
1952000
|
heap
|
page read and write
|
||
3422000
|
trusted library allocation
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
445C000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
unkown
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
17BE000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
41CA000
|
trusted library allocation
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
244A000
|
heap
|
page read and write
|
||
1899000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
CCA000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
EE7000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1709000
|
heap
|
page read and write
|
||
43C1000
|
trusted library allocation
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
19B9000
|
heap
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
354B000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
17BD000
|
heap
|
page read and write
|
||
3465000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
94BE000
|
stack
|
page read and write
|
||
45AF000
|
trusted library allocation
|
page read and write
|
||
72F3000
|
trusted library allocation
|
page read and write
|
||
1854000
|
heap
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4366000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
346A000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
239E000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
1A9B000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
BE0000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
1904000
|
heap
|
page read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
182F000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
22BC000
|
heap
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
1952000
|
heap
|
page read and write
|
||
4456000
|
trusted library allocation
|
page read and write
|
||
197C000
|
heap
|
page read and write
|
||
231C000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
F4000
|
unkown
|
page write copy
|
||
451D000
|
trusted library allocation
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
35E3000
|
trusted library allocation
|
page read and write
|
||
1A59000
|
heap
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
7F7E000
|
stack
|
page read and write
|
||
34AB000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
4367000
|
trusted library allocation
|
page read and write
|
||
198D000
|
heap
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
186F000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
4458000
|
trusted library allocation
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
110D000
|
stack
|
page read and write
|
||
1886000
|
heap
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
7565000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
173F000
|
heap
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
7F3F000
|
stack
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
445A000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
2352000
|
heap
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
450C000
|
trusted library allocation
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
347F000
|
trusted library allocation
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
3FA1000
|
heap
|
page read and write
|
||
2FBC000
|
stack
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
450F000
|
trusted library allocation
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
7252000
|
trusted library allocation
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
179D000
|
heap
|
page read and write
|
||
4451000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
F9000
|
unkown
|
page readonly
|
||
4289000
|
trusted library allocation
|
page read and write
|
||
445C000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
450B000
|
trusted library allocation
|
page read and write
|
||
197D000
|
heap
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
65A000
|
heap
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
4366000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
stack
|
page read and write
|
||
1809000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
7BBE000
|
stack
|
page read and write
|
||
1877000
|
heap
|
page read and write
|
||
35F3000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
182F000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
4281000
|
trusted library allocation
|
page read and write
|
||
86BF000
|
stack
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
1718000
|
heap
|
page read and write
|
||
43E7000
|
trusted library allocation
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
18CF000
|
heap
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
176B000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
186F000
|
heap
|
page read and write
|
||
44FA000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
147B000
|
heap
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
28F8000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
342A000
|
trusted library allocation
|
page read and write
|
||
113D000
|
heap
|
page read and write
|
||
43FC000
|
trusted library allocation
|
page read and write
|
||
42EC000
|
trusted library allocation
|
page read and write
|
||
3542000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
1987000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3631000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1713000
|
heap
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
71C1000
|
trusted library allocation
|
page read and write
|
||
174D000
|
heap
|
page read and write
|
||
4457000
|
trusted library allocation
|
page read and write
|
||
18BC000
|
heap
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
190F000
|
heap
|
page read and write
|
||
E6000
|
unkown
|
page readonly
|
||
B76000
|
stack
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
3461000
|
trusted library allocation
|
page read and write
|
||
4444000
|
trusted library allocation
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
1899000
|
heap
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
95BF000
|
stack
|
page read and write
|
||
9ABF000
|
stack
|
page read and write
|
||
4448000
|
trusted library allocation
|
page read and write
|
||
1904000
|
heap
|
page read and write
|
||
FFC000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
116F000
|
heap
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
4459000
|
trusted library allocation
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
90FE000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
81FE000
|
stack
|
page read and write
|
||
2FFC000
|
stack
|
page read and write
|
||
198D000
|
heap
|
page read and write
|
||
1A36000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
3649000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
remote allocation
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
17D7000
|
heap
|
page read and write
|
||
2382000
|
heap
|
page read and write
|
||
196A000
|
heap
|
page read and write
|
||
E6000
|
unkown
|
page readonly
|
||
4357000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
9D7E000
|
stack
|
page read and write
|
||
18DD000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
233E000
|
heap
|
page read and write
|
||
17B6000
|
heap
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
28E7000
|
heap
|
page read and write
|
||
445D000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
2363000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
636000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
4453000
|
trusted library allocation
|
page read and write
|
||
4506000
|
trusted library allocation
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
35A3000
|
heap
|
page read and write
|
||
19B8000
|
heap
|
page read and write
|
||
450E000
|
trusted library allocation
|
page read and write
|
||
1984000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
197B000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
179D000
|
heap
|
page read and write
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4455000
|
trusted library allocation
|
page read and write
|
||
1911000
|
heap
|
page read and write
|
||
445B000
|
trusted library allocation
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
unkown
|
page readonly
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
EE3000
|
stack
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4448000
|
trusted library allocation
|
page read and write
|
||
4523000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
18E6000
|
heap
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
346B000
|
trusted library allocation
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
239E000
|
heap
|
page read and write
|
||
2CAC000
|
stack
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
1A9B000
|
heap
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
19D1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
3468000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
9AFE000
|
stack
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
4366000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
F48000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
86FE000
|
stack
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
3457000
|
trusted library allocation
|
page read and write
|
||
4A2A000
|
heap
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
7569000
|
trusted library allocation
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
230D000
|
heap
|
page read and write
|
||
44F4000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
8BFE000
|
stack
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
435D000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
2B8C000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
4454000
|
trusted library allocation
|
page read and write
|
||
4308000
|
trusted library allocation
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
22FC000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
341D000
|
trusted library allocation
|
page read and write
|
||
2337000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2382000
|
heap
|
page read and write
|
||
67BE000
|
heap
|
page read and write
|
||
445A000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
8ABE000
|
stack
|
page read and write
|
||
16C6000
|
heap
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
17C4000
|
heap
|
page read and write
|
||
17A3000
|
heap
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
3461000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
4519000
|
trusted library allocation
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
458A000
|
trusted library allocation
|
page read and write
|
||
F94000
|
heap
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
341B000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
F4000
|
unkown
|
page write copy
|
||
13BE000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
4451000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
451E000
|
trusted library allocation
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
4458000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
7226000
|
trusted library allocation
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
2307000
|
heap
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
4500000
|
trusted library allocation
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
99BE000
|
stack
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1837000
|
heap
|
page read and write
|
||
871000
|
unkown
|
page execute read
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
2A2E000
|
stack
|
page read and write
|
||
22DA000
|
heap
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
44E2000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1A0D000
|
heap
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
43E7000
|
trusted library allocation
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
7B7F000
|
stack
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
43E7000
|
trusted library allocation
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
897E000
|
stack
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
16D7000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
1792000
|
heap
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
16D7000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
3444000
|
trusted library allocation
|
page read and write
|
||
73D3000
|
trusted library allocation
|
page read and write
|
||
1761000
|
heap
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
1995000
|
heap
|
page read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
13DD000
|
stack
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
F9000
|
unkown
|
page readonly
|
||
11DB000
|
heap
|
page read and write
|
||
2382000
|
heap
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
F4000
|
unkown
|
page write copy
|
||
1905000
|
heap
|
page read and write
|
||
76D2000
|
heap
|
page read and write
|
||
35EB000
|
trusted library allocation
|
page read and write
|
||
E6000
|
unkown
|
page readonly
|
||
452C000
|
trusted library allocation
|
page read and write
|
||
2362000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
1783000
|
heap
|
page read and write
|
||
1A3A000
|
heap
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
2352000
|
heap
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
3610000
|
trusted library allocation
|
page read and write
|
||
16C6000
|
heap
|
page read and write
|
||
445A000
|
trusted library allocation
|
page read and write
|
||
18BA000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
16A8000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
238D000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
196B000
|
heap
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
96FF000
|
stack
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4456000
|
trusted library allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
3473000
|
trusted library allocation
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
33C8000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
239D000
|
heap
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
82FF000
|
stack
|
page read and write
|
||
13AF000
|
stack
|
page read and write
|
There are 1154 hidden memdumps, click here to show them.