IOC Report
ArchivoNuevo.msi

loading gif

Files

File Path
Type
Category
Malicious
ArchivoNuevo.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {85C6D84F-37EC-4D4B-94DE-DB23DEF61F1F}, Create Time/Date: Wed Nov 6 23:53:40 2024, Last Saved Time/Date: Wed Nov 6 23:53:40 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
initial sample
malicious
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Config.Msi\54241a.rbs
data
dropped
C:\Config.Msi\54241e.rbs
data
modified
C:\Program Files\PDQ\PDQConnectAgent\LICENSE.html
HTML document, ASCII text, with CRLF, LF line terminators
dropped
C:\Program Files\PDQ\PDQConnectUpdater\pdq-connect-updater.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db
SQLite 3.x database, user version 7, last written using SQLite version 3046000, file counter 4, database pages 9, cookie 0x8, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db-journal
SQLite Rollback Journal
dropped
C:\ProgramData\PDQ\PDQConnectAgent\Updates\PDQConnectUpdater-0.3.0.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {B086F434-9ED9-4857-9B74-509A6B3D31F3}, Create Time/Date: Thu Oct 10 16:36:06 2024, Last Saved Time/Date: Thu Oct 10 16:36:06 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\ProgramData\PDQ\PDQConnectAgent\Updates\updater_install.log
Unicode text, UTF-16, little-endian text, with very long lines (386), with CRLF, LF line terminators
dropped
C:\ProgramData\PDQ\PDQConnectAgent\token
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\542419.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {85C6D84F-37EC-4D4B-94DE-DB23DEF61F1F}, Create Time/Date: Wed Nov 6 23:53:40 2024, Last Saved Time/Date: Wed Nov 6 23:53:40 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\Windows\Installer\54241b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {85C6D84F-37EC-4D4B-94DE-DB23DEF61F1F}, Create Time/Date: Wed Nov 6 23:53:40 2024, Last Saved Time/Date: Wed Nov 6 23:53:40 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\Windows\Installer\54241c.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {B086F434-9ED9-4857-9B74-509A6B3D31F3}, Create Time/Date: Thu Oct 10 16:36:06 2024, Last Saved Time/Date: Thu Oct 10 16:36:06 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\Windows\Installer\54241f.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {B086F434-9ED9-4857-9B74-509A6B3D31F3}, Create Time/Date: Thu Oct 10 16:36:06 2024, Last Saved Time/Date: Thu Oct 10 16:36:06 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\Windows\Installer\MSI25AF.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI307E.tmp
data
dropped
C:\Windows\Installer\MSI308F.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI30BF.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI3861.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI3891.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI392E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI3EBD.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI45D2.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI4D55.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI4D85.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI73EA.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI7979.tmp
data
dropped
C:\Windows\Installer\MSI798A.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI7A36.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI7EDB.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA0AFEF201D34F9FEB9B68C29FF1DEA299\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA0ED2EC38E74DD8E8B1AFF51FA0AC9210\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\pdqconnectupdater-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA2D62C371EC4462894F00FB8E155458C3\pdqconnectupdater-setup.pdb
MSVC program database ver 7.00, 512*51 bytes
dropped
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA346E64854645062B71D18DA79DA4EE43\pdqconnectagent-setup.pdb
MSVC program database ver 7.00, 512*59 bytes
dropped
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABB31053B1D4845A965C92D7ACB4427E9\pdqconnectagent-setup.pdb
MSVC program database ver 7.00, 512*59 bytes
dropped
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCAC25C26A72E4A6B69ED3BA12DF4525456\pdqconnectagent-setup.pdb
MSVC program database ver 7.00, 512*59 bytes
dropped
C:\Windows\Installer\SFXCAD45AA528324E95A938548E4BDEFAECCD\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCAD45AA528324E95A938548E4BDEFAECCD\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCAD45AA528324E95A938548E4BDEFAECCD\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}\app_icon.ico
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58033B84}\app_icon.ico
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_0gmc1xpq.45e.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_2mg222ch.kvp.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_34dm3cgj.baf.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_3s35suwm.sj2.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_4g5muoa3.ksl.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_5cxobujq.wdr.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_io4zihet.1bh.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_j1r1lpq1.uij.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_j25gu0yn.hqn.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_llmoqnvo.nuh.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_nxuczmpm.vkh.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_rltd2vtr.rer.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_sepyllgf.0en.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_smr3w5xl.i0v.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_vih42yy4.412.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_x213e1mu.wu1.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\~DF00B60B6640158ABD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF04B56EE4FE0C85B9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF068413FD4572B18B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF081FDE5C5C4F8C40.TMP
data
dropped
C:\Windows\Temp\~DF123623DC0DBC14E1.TMP
data
dropped
C:\Windows\Temp\~DF396B647460244CB8.TMP
data
dropped
C:\Windows\Temp\~DF39785F1C7EAC9544.TMP
data
dropped
C:\Windows\Temp\~DF40101C4164EE1389.TMP
data
dropped
C:\Windows\Temp\~DF427C9CD0A0F61B51.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF6DAA4C518DA0BEE2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF78D3429EAC201473.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF799661E2806E9310.TMP
data
dropped
C:\Windows\Temp\~DF7C8F5E9AA3F7E2DA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF8D3C4B8E96645F00.TMP
data
dropped
C:\Windows\Temp\~DF94219595E4254551.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA4F7A66D8A531DF3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB26093FE399E8175.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB7A2BBBADFBA6F6F.TMP
data
dropped
C:\Windows\Temp\~DFD0ED53F7D32255F4.TMP
data
dropped
C:\Windows\Temp\~DFD37AACF6C66EB826.TMP
data
dropped
C:\Windows\Temp\~DFD714D47762D76C2E.TMP
data
dropped
C:\Windows\Temp\~DFF3F720C887E9CF67.TMP
data
dropped
C:\Windows\Temp\~DFFE1C461AF89FBC57.TMP
data
dropped
C:\Windows\Temp\~DFFE29409A32CCE350.TMP
data
dropped
There are 101 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI25AF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5515890 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI30BF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5517562 16 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI392E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5519718 38 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.CreateEventSource
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI3EBD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5521109 44 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.WriteToken
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI45D2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5522921 50 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.StartService
malicious
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
"C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe" --service
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI73EA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5534781 61 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI7A36.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5536343 77 pdqconnectupdater-setup!pdqconnectupdater_setup.CustomActions.CreateEventSource
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ArchivoNuevo.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding D76B6F71B87802B3ACFEEA578FA9D516
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 7A304B5B3B95AEB5D3F9D9F785650ADA E Global\MSI0000
C:\Windows\System32\sc.exe
"C:\Windows\system32\sc.exe" start "PDQConnectAgent"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
"msiexec" /i C:\ProgramData\PDQ\PDQConnectAgent\Updates\PDQConnectUpdater-0.3.0.msi /quiet /qn /norestart /L*V C:\ProgramData\PDQ\PDQConnectAgent\Updates\updater_install.log
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 20DA56B5F1114D07CD140C2FB8662C4F E Global\MSI0000
C:\Program Files\PDQ\PDQConnectUpdater\pdq-connect-updater.exe
"C:\Program Files\PDQ\PDQConnectUpdater\pdq-connect-updater.exe" --service
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://app.pdq.com/v1/devices/release-channels/stable/manifest.jsonD
unknown
https://github.com/clap-rs/clap/issuesh~
unknown
http://wixtoolset.org/schemas/v4/wxs/netfx-WixToolset.Http.wixext
unknown
https://app.pdq.com/%pU
unknown
http://wixtoolset.org/schemas/v4/wxs/difxappZhttp://wixtoolset.org/schemas/v4/wxs/firewallRhttp://wi
unknown
http://wixtoolset.org/schemas/v4/wxs/powershellNhttp://wixtoolset.org/schemas/v4/wxs/vsRhttp://wixto
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://app.pdq.com/v1/devices/release-channels/emergency/manifest.jsonCouldn
unknown
http://wixtoolset.org/schemas/v4/wxs/vs-WixToolset.Msmq.wixext
unknown
https://app.pdq.com/Hardcoded
unknown
http://wixtoolset.org/schemas/v4/wxs/difxapp5WixToolset.Firewall.wixext
unknown
https://pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com/connect-agent/PDQCon
unknown
https://github.com/clap-rs/clap/issues
unknown
http://wixtoolset.org/schemas/v4/wxs/dependency3WixToolset.DirectX.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs/ui9WixToolset.PowerShell.wixext
unknown
https://app.pdq.com/v1/devices/release-channels/stable/manifest.json
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://github.com/clap-rs/clap/issuesservice
unknown
http://wixtoolset.org/schemas/v4/wxs/iis
unknown
https://app.pdq.com/
unknown
https://app.pdq.com/v1/devices/auth-challenge
unknown
https://app.pdq.com/v1/devices/register05
unknown
http://wixtoolset.org/schemas/v4/wxs/firewall-WixToolset.Util.wixext
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://github.com/clap-rs/clap/issuesC:
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://wixtoolset.org/schemas/v4/wxs/directx
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://wixtoolset.org/schemas/v4/wxs/bal
unknown
https://github.com/clap-rs/clap/issuesP
unknown
https://contoso.com/Icon
unknown
https://github.com/clap-rs/clap/issuescannot
unknown
https://o192192.ingest.sentry.io/api/6095569/envelope/
unknown
http://wixtoolset.org/schemas/v4/wxs/msmq3WixToolset.ComPlus.wixext
unknown
https://github.com/Pester/Pester
unknown
https://app.pdq.com/v1/devices/release-channels/emergency/manifest.jsony
unknown
http://wixtoolset.org/schemas/v4/wxs/dependencyXhttp://wixtoolset.org/schemas/v4/wxs/directx
unknown
https://app.pdq.com/v1/devices/register
unknown
https://app.pdq.com/v1/devices/release-channels/emergency/manifest.json
unknown
https://github.com/oleg-shilo/wixsharp/issues/1396#issuecomment-1849731522
unknown
http://wixtoolset.org/schemas/v4/wxs/powershell=WixToolset.VisualStudio.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs/complus9WixToolset.Dependency.wixext
unknown
https://websocket.app.pdq.com:443/v1/devices/socket/websocket?device_id=dvc_63f55ebc1302b93d178c5d51bd3d0717
34.128.163.126
http://wixtoolset.org/schemas/v4/wxs
unknown
https://wixtoolset.org/
unknown
http://wixtoolset.org/schemas/v4/wxs/sql/WixToolset.Netfx.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs/http
unknown
https://aka.ms/pscore68
unknown
http://www.test.com/xml/2015
unknown
http://crl.microsoftL
unknown
http://wixtoolset.org/schemas/v4/wxs/util
unknown
https://oneget.org
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
162.159.140.238
app.pdq.com
104.16.77.47
websocket.app.pdq.com
34.128.163.126
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
34.128.163.126
websocket.app.pdq.com
United States
104.16.77.47
app.pdq.com
United States
162.159.140.238
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\54241a.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\54241a.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6386C99F8
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6C3D6A20F
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A61DD4B302
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A65E431729
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6ACEAC9E8
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\PDQ\PDQConnectAgent\Downloads\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\PDQ\PDQConnectAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\PDQ\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58033B84}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\2B61430F79C84CC45887F5A68530B348
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\Features
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58033B84}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A68530B348\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
2B61430F79C84CC45887F5A68530B348
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A68530B348\SourceList
LastUsedSource
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\54241e.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\54241e.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8DC50CE071D8C27468ADFAE1EF40C1CD
8DC50CE071D8C27468ADFAE1356552F6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\PDQ\PDQConnectUpdater\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\8DC50CE071D8C27468ADFAE1356251F6
8DC50CE071D8C27468ADFAE1356552F6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\8DC50CE071D8C27468ADFAE1356552F6
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\Features
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{0EC05CD8-8D17-472C-86DA-AF1E5356256F}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8DC50CE071D8C27468ADFAE1356552F6\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\8DC50CE071D8C27468ADFAE1356251F6
8DC50CE071D8C27468ADFAE1356552F6
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8DC50CE071D8C27468ADFAE1356552F6\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQ.com
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQConnectAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
MaxSize
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQConnectUpdater
EventMessageFile
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 173 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22AB5F80000
heap
page read and write
2728D8E0000
heap
page read and write
2728D8E9000
heap
page read and write
22D0EDE0000
heap
page read and write
1C71CDE8000
heap
page read and write
7FFAAB4F6000
trusted library allocation
page execute and read and write
2728DC3B000
heap
page read and write
2256A300000
trusted library allocation
page read and write
1C7066DC000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2831C4C0000
heap
page read and write
7FFAAB746000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2754274A000
heap
page read and write
27544310000
trusted library allocation
page read and write
28BA8D70000
trusted library allocation
page read and write
28335519000
heap
page read and write
23203B90000
trusted library allocation
page read and write
96F897D000
stack
page read and write
1FB1F566000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
F5CBE7E000
stack
page read and write
1C71CEF0000
heap
page execute and read and write
7FFAAB3DC000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
1DFF9080000
trusted library allocation
page read and write
7FFAAB5E0000
trusted library allocation
page read and write
2831C7E0000
heap
page read and write
22AB6680000
trusted library allocation
page read and write
22ACEF62000
heap
page read and write
2D8147AD000
heap
page read and write
1DFF9150000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2728D8DF000
heap
page read and write
7FF792381000
unkown
page execute read
2D816330000
trusted library allocation
page read and write
7FFAAB3F0000
trusted library allocation
page read and write
2728D0A0000
heap
page read and write
7FFAAB4D8000
trusted library allocation
page execute and read and write
1FB0E860000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1FB0F281000
trusted library allocation
page read and write
2728D827000
heap
page read and write
7FFAAB313000
trusted library allocation
page execute and read and write
2D816330000
trusted library allocation
page read and write
2D8162B0000
heap
page read and write
23203D90000
trusted library allocation
page read and write
28BA8D90000
trusted library allocation
page read and write
1DFF90CF000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1FB274FB000
heap
page read and write
22ACEF06000
heap
page execute and read and write
7FFAAB426000
trusted library allocation
page execute and read and write
7FFAAB330000
trusted library allocation
page read and write
7FFAAB71C000
trusted library allocation
page read and write
1EF206AF000
heap
page read and write
23203B52000
heap
page read and write
27544320000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2256A2F0000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
26033FE000
stack
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page execute and read and write
2D816331000
trusted library allocation
page read and write
B5E80E3000
stack
page read and write
7FFAAB440000
trusted library allocation
page execute and read and write
27544313000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2831DAB6000
trusted library allocation
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
22D0EDF0000
heap
page read and write
2728D8B0000
heap
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB770000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
23202108000
heap
page read and write
7FFAAB550000
trusted library allocation
page read and write
7FFAAB592000
trusted library allocation
page read and write
96F8313000
stack
page read and write
232021BD000
heap
page read and write
2D816330000
trusted library allocation
page read and write
2D816360000
trusted library allocation
page read and write
2728D280000
heap
page read and write
7FFAAB520000
trusted library allocation
page execute and read and write
2256A300000
trusted library allocation
page read and write
7FFAAB34B000
trusted library allocation
page read and write
22D0EE62000
heap
page read and write
22D0EE5A000
heap
page read and write
28E16B85000
heap
page read and write
23203DC0000
trusted library allocation
page read and write
1FB0EFD0000
trusted library allocation
page read and write
7FFAAB590000
trusted library allocation
page read and write
2728DCFD000
heap
page read and write
98D9963000
stack
page read and write
1C705440000
trusted library allocation
page read and write
7FFAAB322000
trusted library allocation
page read and write
2728D8CF000
heap
page read and write
27544310000
trusted library allocation
page read and write
2831D71F000
trusted library allocation
page read and write
7FFB23B00000
unkown
page read and write
2728DCB5000
heap
page read and write
1EF206FF000
heap
page read and write
B9CBAFD000
stack
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB3D0000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page read and write
B86147D000
stack
page read and write
7FFAAB450000
trusted library allocation
page execute and read and write
2728D881000
heap
page read and write
2728D34A000
heap
page read and write
7FFAAB760000
trusted library allocation
page read and write
1EF206BA000
heap
page read and write
28BA7201000
heap
page read and write
23203DA0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
7FFAAB780000
trusted library allocation
page read and write
7FFAAB5A2000
trusted library allocation
page read and write
2728D840000
heap
page read and write
F6624FE000
stack
page read and write
2728DC7A000
heap
page read and write
2831DAA7000
trusted library allocation
page read and write
2256A3A0000
trusted library allocation
page read and write
7FFAAB520000
trusted library allocation
page read and write
B5E90FF000
stack
page read and write
2728DCE5000
heap
page read and write
7FFAAB312000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
1FB27400000
heap
page read and write
1FB0E8C0000
heap
page read and write
1DFF91D0000
trusted library allocation
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
98D9C7E000
stack
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
2831D210000
heap
page execute and read and write
28BA8BE0000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2728DCE5000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
1C705187000
trusted library allocation
page read and write
28E167C0000
heap
page read and write
2728DCE5000
heap
page read and write
F66267C000
stack
page read and write
7FFAAB510000
trusted library allocation
page execute and read and write
7FFAAB333000
trusted library allocation
page execute and read and write
2833556E000
heap
page read and write
27544330000
trusted library allocation
page read and write
7FF792381000
unkown
page execute read
7FFAAB4CD000
trusted library allocation
page execute and read and write
22AB82DA000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
1FB1066F000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
23203C50000
heap
page read and write
27544310000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
1EF2072C000
heap
page read and write
7FFAAB4C4000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
1EF207C0000
trusted library allocation
page read and write
7FFAAB59B000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2831C57C000
heap
page read and write
7FF649391000
unkown
page execute read
7FFAAB334000
trusted library allocation
page read and write
96F86FE000
stack
page read and write
7FFAAB350000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB4D5000
trusted library allocation
page read and write
1DFF91D0000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
1C7042A0000
trusted library allocation
page read and write
7FFAAB4E9000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1FB0E650000
heap
page read and write
2728DC3C000
heap
page read and write
1EF20813000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
28BA8BE1000
trusted library allocation
page read and write
7FFAAB750000
trusted library allocation
page execute and read and write
2832D319000
trusted library allocation
page read and write
7DF48F190000
trusted library allocation
page execute and read and write
1EF20810000
trusted library allocation
page read and write
28BA72D0000
heap
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
7FFAAB4C3000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB4C0000
trusted library allocation
page read and write
B5E7AEE000
stack
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
23203DC0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2256898B000
heap
page read and write
22AB6D27000
heap
page read and write
2728DCA2000
heap
page read and write
1EF20820000
trusted library allocation
page read and write
275426C2000
heap
page read and write
2728D82D000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
2832D2A1000
trusted library allocation
page read and write
7FFAAB512000
trusted library allocation
page read and write
2D8146D0000
heap
page read and write
2831EB6A000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1DFF91C0000
heap
page execute and read and write
22ACEF10000
heap
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
A6E447C000
stack
page read and write
7FF649BCF000
unkown
page write copy
275426DB000
heap
page read and write
1FD08709000
heap
page read and write
23203D90000
trusted library allocation
page read and write
28BA727C000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB320000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2831CC60000
trusted library allocation
page read and write
1EF205B0000
heap
page read and write
2728D8C1000
heap
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
7FFAAB592000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2728D83D000
heap
page read and write
1DFF9170000
trusted library allocation
page read and write
7FFAAB3E0000
trusted library allocation
page execute and read and write
2728D8AD000
heap
page read and write
A6E3FCD000
stack
page read and write
98D99EF000
stack
page read and write
96F984C000
stack
page read and write
22AC7052000
trusted library allocation
page read and write
2728D28C000
heap
page read and write
1C7065B4000
trusted library allocation
page read and write
26035FD000
stack
page read and write
1EF20813000
trusted library allocation
page read and write
2728D325000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
B860ED3000
stack
page read and write
B9CB5CF000
stack
page read and write
2831CFD2000
heap
page read and write
2728D8C8000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
1C70552C000
trusted library allocation
page read and write
B5E82EE000
stack
page read and write
2D816330000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
275426D7000
heap
page read and write
7FFAAB663000
trusted library allocation
page read and write
2728DCDD000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
1FB0E8A0000
trusted library allocation
page read and write
7FF649BC8000
unkown
page write copy
7FFAAB713000
trusted library allocation
page read and write
28BA8D70000
trusted library allocation
page read and write
7FFAAB4F0000
trusted library allocation
page execute and read and write
28335551000
heap
page read and write
7FFAAB790000
trusted library allocation
page read and write
7FFAAB653000
trusted library allocation
page read and write
22D0EE02000
heap
page read and write
2831EAE3000
trusted library allocation
page read and write
1FB1F574000
trusted library allocation
page read and write
260337E000
stack
page read and write
7FFAAB502000
trusted library allocation
page read and write
2256A240000
heap
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB4D2000
trusted library allocation
page read and write
7FFAAB4EE000
trusted library allocation
page read and write
2D816323000
trusted library allocation
page read and write
22568980000
heap
page read and write
B5E71FE000
stack
page read and write
28BA8BE0000
trusted library allocation
page read and write
98D9CFE000
stack
page read and write
7DF4930D0000
trusted library allocation
page execute and read and write
1FB0E6DC000
heap
page read and write
1DFF7790000
heap
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
B5E8FFF000
stack
page read and write
27544310000
trusted library allocation
page read and write
7C88DFC000
stack
page read and write
2831D256000
heap
page execute and read and write
27544320000
trusted library allocation
page read and write
7FFAAB540000
trusted library allocation
page read and write
7FFAAB430000
trusted library allocation
page execute and read and write
7FFAAB406000
trusted library allocation
page execute and read and write
7FFAAB3F6000
trusted library allocation
page execute and read and write
2728DCDC000
heap
page read and write
2D816330000
trusted library allocation
page read and write
26039FC000
stack
page read and write
7FFAAB33B000
trusted library allocation
page read and write
7FFAAB4ED000
trusted library allocation
page execute and read and write
2251000F000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
96F8B78000
stack
page read and write
27544310000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2831D4C9000
trusted library allocation
page read and write
7FFAAB4EA000
trusted library allocation
page read and write
283354A0000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
119DAFE000
stack
page read and write
7FFAAB550000
trusted library allocation
page read and write
22D0F602000
trusted library allocation
page read and write
B9CC98C000
stack
page read and write
7FFAAB7A0000
trusted library allocation
page read and write
7FFAAB34B000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
22510009000
trusted library allocation
page read and write
22AC7056000
trusted library allocation
page read and write
7561E7B000
stack
page read and write
2728D30A000
heap
page read and write
225688E0000
heap
page read and write
28BA8BF0000
heap
page read and write
2728D827000
heap
page read and write
7FFAAB5F0000
trusted library allocation
page read and write
1EF20830000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2D826409000
trusted library allocation
page read and write
22AB5FE6000
heap
page read and write
28BA8D90000
trusted library allocation
page read and write
119DD7C000
stack
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB730000
trusted library allocation
page read and write
22AB6170000
heap
page read and write
283353A0000
heap
page read and write
B86153F000
stack
page read and write
23203D80000
trusted library allocation
page read and write
2728DCD6000
heap
page read and write
2831C580000
heap
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
1FB10E91000
trusted library allocation
page read and write
1C706567000
trusted library allocation
page read and write
1EF207D0000
heap
page readonly
28BA8DEE000
trusted library allocation
page read and write
7561D7F000
stack
page read and write
2728D857000
heap
page read and write
28BA8DA0000
trusted library allocation
page read and write
27544210000
trusted library allocation
page read and write
1FD086EC000
heap
page read and write
2831C59C000
heap
page read and write
2256A390000
trusted library allocation
page read and write
7FFAAB3D0000
trusted library allocation
page execute and read and write
2728DC30000
heap
page read and write
28BA71D8000
heap
page read and write
2728D8C6000
heap
page read and write
7FFAAB3D6000
trusted library allocation
page read and write
1FD08766000
heap
page read and write
22AB815A000
trusted library allocation
page read and write
B9CBC38000
stack
page read and write
28BA8BD0000
heap
page read and write
7FFAAB340000
trusted library allocation
page read and write
8E85A7E000
stack
page read and write
28BA8BE0000
trusted library allocation
page read and write
1EF206F5000
heap
page read and write
7FFAAB776000
trusted library allocation
page read and write
1C71CD9D000
heap
page read and write
260387F000
stack
page read and write
1EF22170000
heap
page read and write
1DFF9143000
trusted library allocation
page read and write
2728DCB2000
heap
page read and write
1C704810000
heap
page read and write
2D816350000
trusted library allocation
page read and write
23203F70000
heap
page execute and read and write
1FD08790000
heap
page read and write
2728D881000
heap
page read and write
7FFAAB660000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2832D58C000
trusted library allocation
page read and write
2831E609000
trusted library allocation
page read and write
1DFF7658000
heap
page read and write
7FFAAB334000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
7FFAAB4EA000
trusted library allocation
page read and write
2728D8B6000
heap
page read and write
1EF20830000
trusted library allocation
page read and write
2603579000
stack
page read and write
27544330000
trusted library allocation
page read and write
1DFF7630000
heap
page read and write
7FFAAB426000
trusted library allocation
page execute and read and write
7FFAAB4ED000
trusted library allocation
page execute and read and write
2728D8A8000
heap
page read and write
2D814768000
heap
page read and write
7FFAAB5C2000
trusted library allocation
page read and write
1C704D10000
heap
page execute and read and write
1DFF9170000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2754276C000
heap
page read and write
1EF22130000
heap
page execute and read and write
232021A0000
heap
page read and write
2D816370000
trusted library allocation
page read and write
2728DC65000
heap
page read and write
7FFAAB550000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
7FFAAB684000
trusted library allocation
page read and write
7DF49FD10000
trusted library allocation
page execute and read and write
B5E79FF000
stack
page read and write
26034FF000
stack
page read and write
2D816360000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB592000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
CEED3FE000
stack
page read and write
23203C40000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
27544280000
trusted library allocation
page read and write
2728D730000
remote allocation
page read and write
7FFAAB653000
trusted library allocation
page read and write
119DBFF000
stack
page read and write
1DFF7704000
heap
page read and write
7FFAAB32D000
trusted library allocation
page execute and read and write
28BA70D0000
heap
page read and write
7FFAAB682000
trusted library allocation
page read and write
1C714D41000
trusted library allocation
page read and write
7FFAAB71A000
trusted library allocation
page read and write
7FFAAB4D4000
trusted library allocation
page execute and read and write
1FB0E69E000
heap
page read and write
2728D87F000
heap
page read and write
23203DB0000
trusted library allocation
page read and write
27544233000
heap
page read and write
B5E7CF2000
stack
page read and write
1C7065FB000
trusted library allocation
page read and write
22AB6CE4000
heap
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
2256A301000
trusted library allocation
page read and write
7DF449BA0000
trusted library allocation
page execute and read and write
1FB0F714000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
B5E6DFF000
stack
page read and write
7DF48F1A0000
trusted library allocation
page execute and read and write
1EF20810000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2728D8DF000
heap
page read and write
1FD087E0000
heap
page read and write
27544313000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
1C71CD4F000
heap
page read and write
1FD086D0000
remote allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
7FFAAB530000
trusted library allocation
page read and write
23202102000
heap
page read and write
1FB0F0E0000
heap
page read and write
7FFAAB570000
trusted library allocation
page read and write
2728DC35000
heap
page read and write
2256A246000
heap
page read and write
22AC6D80000
trusted library allocation
page read and write
7FFAAB3F6000
trusted library allocation
page execute and read and write
7FFAAB34D000
trusted library allocation
page execute and read and write
28BA8BE0000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
2728DC99000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
1C71D048000
heap
page read and write
2256A3B0000
heap
page execute and read and write
2D8147DE000
heap
page read and write
2D816330000
trusted library allocation
page read and write
2728DCC2000
heap
page read and write
B86137E000
stack
page read and write
1C7042C5000
heap
page read and write
7FFAAB313000
trusted library allocation
page execute and read and write
27544220000
heap
page read and write
7FFB23B05000
unkown
page readonly
2831C4F0000
heap
page read and write
7FFAAB3E0000
trusted library allocation
page execute and read and write
1C71CE20000
trusted library allocation
page read and write
28BA73B0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB5BB000
trusted library allocation
page read and write
28BA8D80000
trusted library allocation
page read and write
CEECEFD000
stack
page read and write
7FFAAB59B000
trusted library allocation
page read and write
2831D71D000
trusted library allocation
page read and write
7FFAAB4D6000
trusted library allocation
page execute and read and write
7FFAAB4C6000
trusted library allocation
page execute and read and write
28BA8D90000
trusted library allocation
page read and write
2728D827000
heap
page read and write
7FFAAB502000
trusted library allocation
page read and write
2728D817000
heap
page read and write
1FB10B4A000
trusted library allocation
page read and write
28BA8D90000
trusted library allocation
page read and write
28BA8DC0000
heap
page read and write
2831D290000
heap
page execute and read and write
2256A390000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB4E3000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
1DFF9090000
heap
page readonly
1FD0870F000
heap
page read and write
7FFAAB689000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB4E2000
trusted library allocation
page read and write
7FFAAB692000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB560000
trusted library allocation
page read and write
7FFAAB3EC000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
1C714D21000
trusted library allocation
page read and write
1FB105EB000
trusted library allocation
page read and write
2831C830000
trusted library allocation
page read and write
7FF792557000
unkown
page readonly
23203C66000
heap
page read and write
225689BB000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
1FB272B5000
heap
page read and write
7FFAAB688000
trusted library allocation
page read and write
22AB6D1B000
heap
page read and write
22AB80DB000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
22AB6D71000
trusted library allocation
page read and write
1FB27329000
heap
page read and write
1DFF9150000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1FD0873D000
heap
page read and write
7FFAAB530000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
23202030000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
27544340000
trusted library allocation
page read and write
26037F9000
stack
page read and write
27544310000
trusted library allocation
page read and write
28BA8D70000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
1FD08790000
heap
page read and write
27544330000
trusted library allocation
page read and write
CEED0FF000
stack
page read and write
7FFAAB406000
trusted library allocation
page execute and read and write
1FB0E690000
heap
page read and write
23203D90000
trusted library allocation
page read and write
7FF792699000
unkown
page read and write
28BA8DEB000
trusted library allocation
page read and write
7FFAAB3D6000
trusted library allocation
page read and write
7FFAAB33D000
trusted library allocation
page execute and read and write
28BA721A000
heap
page read and write
E409E7E000
stack
page read and write
7DF48E810000
trusted library allocation
page execute and read and write
7DF4F20A0000
trusted library allocation
page execute and read and write
7FFAAB4C2000
trusted library allocation
page read and write
22AB6C6F000
heap
page read and write
1FB27337000
heap
page read and write
22AB66D0000
trusted library allocation
page read and write
2833536F000
heap
page read and write
7DF4AE350000
trusted library allocation
page execute and read and write
1DFF9150000
trusted library allocation
page read and write
2728DC7B000
heap
page read and write
2602FFE000
stack
page read and write
2256A390000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2831D2A1000
trusted library allocation
page read and write
2256A2C0000
trusted library allocation
page read and write
96F8C7F000
stack
page read and write
225689A7000
heap
page read and write
1EF20820000
trusted library allocation
page read and write
22ACEFE6000
heap
page read and write
7C88D7D000
stack
page read and write
28BA7247000
heap
page read and write
7DF4AE330000
trusted library allocation
page execute and read and write
2256A300000
trusted library allocation
page read and write
28BA71B0000
heap
page read and write
2728D8AF000
heap
page read and write
1DFF76D1000
heap
page read and write
7FFAAB5E0000
trusted library allocation
page read and write
22ACEE00000
heap
page read and write
7FFAAB342000
trusted library allocation
page read and write
7FFAAB322000
trusted library allocation
page read and write
22ACEF89000
heap
page read and write
26043CE000
stack
page read and write
22ACEF5C000
heap
page read and write
2831C57E000
heap
page read and write
2D814730000
heap
page read and write
7C888A3000
stack
page read and write
2256A3A0000
trusted library allocation
page read and write
22AB8985000
trusted library allocation
page read and write
7FFAAB720000
trusted library allocation
page read and write
1C704B66000
heap
page read and write
27544310000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1FB10AEF000
trusted library allocation
page read and write
B9CBE39000
stack
page read and write
7FFAAB5A8000
trusted library allocation
page read and write
7FFAAB504000
trusted library allocation
page read and write
7FFAAB5A1000
trusted library allocation
page read and write
2D8149E0000
heap
page readonly
28BA8D73000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB600000
trusted library allocation
page read and write
2728D837000
heap
page read and write
2728D83C000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
1C704815000
heap
page read and write
28BA8D80000
trusted library allocation
page read and write
1DFF74D0000
heap
page read and write
225689B2000
heap
page read and write
7FF649BD4000
unkown
page readonly
28E16830000
heap
page read and write
22ACEF00000
heap
page execute and read and write
7FFAAB514000
trusted library allocation
page read and write
7FFAAB560000
trusted library allocation
page read and write
1FB1F28F000
trusted library allocation
page read and write
2831C540000
heap
page read and write
23203D90000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB695000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
7FFAAB406000
trusted library allocation
page execute and read and write
7FFAAB519000
trusted library allocation
page read and write
2728DCC2000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
23203B40000
heap
page read and write
F66257E000
stack
page read and write
96F8CFE000
stack
page read and write
7FFAAB5B1000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7C889AE000
stack
page read and write
7FF79269C000
unkown
page readonly
2728DCA4000
heap
page read and write
23202194000
heap
page read and write
2728DC65000
heap
page read and write
2833553D000
heap
page read and write
225689C7000
heap
page read and write
7FFAAB355000
trusted library allocation
page read and write
26044CE000
stack
page read and write
2D816330000
trusted library allocation
page read and write
7DF4930F0000
trusted library allocation
page execute and read and write
283354FD000
heap
page read and write
756207E000
stack
page read and write
96F839E000
stack
page read and write
1FD0876D000
heap
page read and write
2D816330000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
27544313000
trusted library allocation
page read and write
28BA8BD5000
heap
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB790000
trusted library allocation
page read and write
1C71CF20000
heap
page read and write
7FFAAB332000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page read and write
2728DCB3000
heap
page read and write
7FFAAB500000
trusted library allocation
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
7FFAAB5BB000
trusted library allocation
page read and write
2728D35A000
heap
page read and write
2728D8B5000
heap
page read and write
7FFAAB630000
trusted library allocation
page read and write
232020D0000
heap
page read and write
7FFB23AE0000
unkown
page readonly
7FFAAB5B0000
trusted library allocation
page read and write
2728D815000
heap
page read and write
1C706939000
trusted library allocation
page read and write
2832D58A000
trusted library allocation
page read and write
1EF2068B000
heap
page read and write
1EF20813000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
2256A390000
trusted library allocation
page read and write
96F974E000
stack
page read and write
7DF42DF00000
trusted library allocation
page execute and read and write
1EF20820000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB324000
trusted library allocation
page read and write
7DF4AE340000
trusted library allocation
page execute and read and write
22AB6A8C000
heap
page read and write
1EF20820000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2728D8AF000
heap
page read and write
1FD0870F000
heap
page read and write
2728D7F3000
heap
page read and write
27544313000
trusted library allocation
page read and write
22ACEEE0000
heap
page execute and read and write
23203F90000
heap
page execute and read and write
7FFAAB33D000
trusted library allocation
page execute and read and write
7FFAAB322000
trusted library allocation
page read and write
1C71D036000
heap
page read and write
27544310000
trusted library allocation
page read and write
B9CCA89000
stack
page read and write
98D9DFC000
stack
page read and write
1DFF76DC000
heap
page read and write
1FB0F270000
heap
page execute and read and write
2728DC84000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
2833555D000
heap
page read and write
7FFAAB520000
trusted library allocation
page execute and read and write
2D816330000
trusted library allocation
page read and write
1EF20650000
heap
page read and write
7FFAAB500000
trusted library allocation
page read and write
B5E82EC000
stack
page read and write
2831C58A000
heap
page read and write
7FFAAB610000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
275426CC000
heap
page read and write
275441D0000
heap
page read and write
2D8146C0000
heap
page read and write
B5E7EEC000
stack
page read and write
1EF206F7000
heap
page read and write
1EF20820000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1C71CD20000
heap
page read and write
7561C7F000
stack
page read and write
A6E3F43000
stack
page read and write
1C704115000
heap
page read and write
7FFAAB692000
trusted library allocation
page read and write
2D816360000
trusted library allocation
page read and write
7FFAAB756000
trusted library allocation
page read and write
2728D369000
heap
page read and write
7FFAAB416000
trusted library allocation
page execute and read and write
2603677000
stack
page read and write
275543E1000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
28BA7217000
heap
page read and write
27544310000
trusted library allocation
page read and write
1DFF9160000
trusted library allocation
page read and write
7FFAAB760000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
28BA8DA0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1DFF9160000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1DFF9173000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
28BA8DB0000
heap
page execute and read and write
2831CC20000
trusted library allocation
page read and write
2728DCE5000
heap
page read and write
1C704670000
heap
page readonly
7FFAAB355000
trusted library allocation
page read and write
28BA8CFB000
heap
page read and write
B9CBCB9000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB406000
trusted library allocation
page execute and read and write
1C71CEF6000
heap
page execute and read and write
22AC6DE5000
trusted library allocation
page read and write
7FFAAB400000
trusted library allocation
page execute and read and write
2D816360000
trusted library allocation
page read and write
B8616B8000
stack
page read and write
1EF208B5000
heap
page read and write
7FFAAB510000
trusted library allocation
page execute and read and write
28BA8D90000
trusted library allocation
page read and write
2D816360000
trusted library allocation
page read and write
7FFAAB416000
trusted library allocation
page execute and read and write
B9CBEBE000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
28BA7202000
heap
page read and write
7FFAAB650000
trusted library allocation
page read and write
B8612F9000
stack
page read and write
27544320000
trusted library allocation
page read and write
7FFAAB640000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
7FFAAB343000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
1FB27531000
heap
page read and write
1C70553A000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB698000
trusted library allocation
page read and write
7FFAAB790000
trusted library allocation
page read and write
1FD086E0000
heap
page read and write
275543E9000
trusted library allocation
page read and write
28BB8DD1000
trusted library allocation
page read and write
7FFAAB560000
trusted library allocation
page read and write
1FD08717000
heap
page read and write
2728D8D0000
heap
page read and write
2320216F000
heap
page read and write
1EF208B0000
heap
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
CEECFFF000
stack
page read and write
2728DCE7000
heap
page read and write
7FF649390000
unkown
page readonly
7FFAAB4E0000
trusted library allocation
page execute and read and write
22AB66A0000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
7FFAAB4E1000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
28BA7209000
heap
page read and write
2D8163D0000
heap
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB591000
trusted library allocation
page read and write
119DC7E000
stack
page read and write
7561E7F000
stack
page read and write
28BA7245000
heap
page read and write
7FFAAB450000
trusted library allocation
page execute and read and write
1DF90001000
trusted library allocation
page read and write
7FFAAB312000
trusted library allocation
page read and write
23203D91000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
7FFAAB786000
trusted library allocation
page read and write
7FFAAB340000
trusted library allocation
page read and write
2728D8DF000
heap
page read and write
7FFAAB4E8000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
2728D8CF000
heap
page read and write
7FFAAB334000
trusted library allocation
page read and write
96F83DE000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
2728D824000
heap
page read and write
7FFAAB3EC000
trusted library allocation
page execute and read and write
7FFAAB324000
trusted library allocation
page read and write
96F8BFE000
stack
page read and write
27544310000
trusted library allocation
page read and write
1C704118000
heap
page read and write
7FFAAB5F0000
trusted library allocation
page read and write
7FFAAB3F0000
trusted library allocation
page execute and read and write
1C7065EE000
trusted library allocation
page read and write
1FB0E6B0000
heap
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
7FF792698000
unkown
page write copy
260347A000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
2D814960000
heap
page read and write
2D816330000
trusted library allocation
page read and write
2831C845000
heap
page read and write
2D814A00000
trusted library allocation
page read and write
1C7040D4000
heap
page read and write
1DFF9170000
trusted library allocation
page read and write
27544270000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
7FFAAB68A000
trusted library allocation
page read and write
7FFAAB3F0000
trusted library allocation
page execute and read and write
7FFAAB5B4000
trusted library allocation
page read and write
7FFAAB663000
trusted library allocation
page read and write
28BA8BA0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB4F9000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1C714D8C000
trusted library allocation
page read and write
2728D881000
heap
page read and write
7FFAAB620000
trusted library allocation
page read and write
7DF449B90000
trusted library allocation
page execute and read and write
23203D90000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
96F8DFE000
stack
page read and write
27544330000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB72C000
trusted library allocation
page read and write
1FB274E0000
heap
page read and write
22AB873C000
trusted library allocation
page read and write
2728D82D000
heap
page read and write
1C7040EC000
heap
page read and write
1FB2734D000
heap
page read and write
2D816350000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2831CBE0000
heap
page readonly
1FB273C0000
trusted library allocation
page read and write
26038FE000
stack
page read and write
7FFAAB4DA000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1FB0E696000
heap
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
1C71CD74000
heap
page read and write
2256A300000
trusted library allocation
page read and write
22AB88BC000
trusted library allocation
page read and write
7FFAAB3D0000
trusted library allocation
page read and write
7FFAAB4C5000
trusted library allocation
page read and write
1EF204D0000
heap
page read and write
28BC1260000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
7FFAAB4D2000
trusted library allocation
page read and write
275428C5000
heap
page read and write
7FFAAB4B0000
trusted library allocation
page read and write
7FFAAB332000
trusted library allocation
page read and write
7DF42D8B0000
trusted library allocation
page execute and read and write
7FFAAB4C0000
trusted library allocation
page read and write
2728DCE9000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB3F0000
trusted library allocation
page read and write
22510001000
trusted library allocation
page read and write
28BA8DD1000
trusted library allocation
page read and write
2728D710000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1EF2073A000
heap
page read and write
1C706593000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2831EEB0000
trusted library allocation
page read and write
1EF208A0000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
7DF48E820000
trusted library allocation
page execute and read and write
2D816330000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
B86228E000
stack
page read and write
7FFAAB640000
trusted library allocation
page read and write
8E8576C000
stack
page read and write
119DCFD000
stack
page read and write
23203DA0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB440000
trusted library allocation
page execute and read and write
A6E427E000
stack
page read and write
2728DCE5000
heap
page read and write
23203B50000
heap
page read and write
2728DCE5000
heap
page read and write
2831C5C8000
heap
page read and write
2728DCAE000
heap
page read and write
2831CC85000
heap
page read and write
1C704D9A000
trusted library allocation
page read and write
7FFAAB4EE000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1FB0F307000
trusted library allocation
page read and write
7FFAAB582000
trusted library allocation
page read and write
1DFF9205000
heap
page read and write
7FFAAB4B0000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB4D1000
trusted library allocation
page read and write
2728D7E5000
heap
page read and write
27544310000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
7FFAAB3E0000
trusted library allocation
page read and write
23203DB0000
trusted library allocation
page read and write
7FFAAB4D6000
trusted library allocation
page execute and read and write
22AB6730000
heap
page read and write
1FB0E6D8000
heap
page read and write
2256A300000
trusted library allocation
page read and write
2728D8B9000
heap
page read and write
B9CBBBE000
stack
page read and write
283354C0000
heap
page read and write
2D816330000
trusted library allocation
page read and write
2728D8D8000
heap
page read and write
B5E73FF000
stack
page read and write
2728D817000
heap
page read and write
1C70686F000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
225689B8000
heap
page read and write
7FFAAB540000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2831EB0F000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2256A810000
trusted library allocation
page read and write
96F87FA000
stack
page read and write
1EF3A7C0000
heap
page execute and read and write
23203DB0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB3C0000
trusted library allocation
page read and write
7FFAAB550000
trusted library allocation
page read and write
2D8149C0000
heap
page read and write
2728DC65000
heap
page read and write
1FB10589000
trusted library allocation
page read and write
28BA8D60000
trusted library allocation
page read and write
1C704730000
heap
page read and write
27544310000
trusted library allocation
page read and write
27542704000
heap
page read and write
7FFAAB590000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1FB10E95000
trusted library allocation
page read and write
1C71CD76000
heap
page read and write
1DF80001000
trusted library allocation
page read and write
7FFAAB584000
trusted library allocation
page read and write
23203DB0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB520000
trusted library allocation
page execute and read and write
7FFAAB680000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
22AB6660000
trusted library allocation
page read and write
28E16841000
heap
page read and write
7FFAAB5AA000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2D81477C000
heap
page read and write
28335579000
heap
page read and write
23203D90000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
7FF64993A000
unkown
page readonly
2256A810000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
B5E88FE000
stack
page read and write
7FFAAB674000
trusted library allocation
page read and write
2256A2E0000
trusted library allocation
page read and write
22D0EE00000
heap
page read and write
275441C5000
heap
page read and write
1EF206A6000
heap
page read and write
23203D90000
trusted library allocation
page read and write
1FB10667000
trusted library allocation
page read and write
7FF64993A000
unkown
page readonly
1FB2736B000
heap
page read and write
22AB71E1000
trusted library allocation
page read and write
7FFAAB4E4000
trusted library allocation
page execute and read and write
1FB10172000
trusted library allocation
page read and write
2728D730000
remote allocation
page read and write
2D816330000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
B9CBA7B000
stack
page read and write
23203DE0000
heap
page read and write
23202164000
heap
page read and write
22D0F570000
remote allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB4F0000
trusted library allocation
page execute and read and write
1DFF76A9000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
1FB275AD000
heap
page read and write
7FFAAB34D000
trusted library allocation
page execute and read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB4B3000
trusted library allocation
page read and write
260377C000
stack
page read and write
1DFF90A0000
trusted library allocation
page read and write
7FFAAB4F0000
trusted library allocation
page execute and read and write
7FFAAB31D000
trusted library allocation
page execute and read and write
1EF205D0000
heap
page read and write
27544310000
trusted library allocation
page read and write
2D8164B0000
heap
page read and write
7C88C7E000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
22AB6280000
heap
page read and write
23202430000
heap
page read and write
27542880000
heap
page read and write
2728DCB0000
heap
page read and write
1EF20820000
trusted library allocation
page read and write
1FB0E69A000
heap
page read and write
22AB5FDC000
heap
page read and write
2D8147A5000
heap
page read and write
1C706934000
trusted library allocation
page read and write
2D8149D0000
trusted library allocation
page read and write
23203D93000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB710000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
1FB0FA95000
trusted library allocation
page read and write
7FFAAB5A6000
trusted library allocation
page read and write
2D816370000
trusted library allocation
page read and write
7FFAAB430000
trusted library allocation
page execute and read and write
1EF20810000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB344000
trusted library allocation
page read and write
7DF4F2080000
trusted library allocation
page execute and read and write
1FB272B7000
heap
page read and write
7FFAAB4F0000
trusted library allocation
page execute and read and write
2728D8C3000
heap
page read and write
7FFAAB4E5000
trusted library allocation
page read and write
7FFAAB590000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
22AB6DF6000
trusted library allocation
page read and write
B86127F000
stack
page read and write
98D9D7D000
stack
page read and write
283352A0000
heap
page read and write
7FF649BC8000
unkown
page read and write
2256A300000
trusted library allocation
page read and write
7FFAAB32D000
trusted library allocation
page execute and read and write
1FB0E820000
heap
page read and write
1EF20830000
trusted library allocation
page read and write
22D0EE62000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
B5E6CFE000
stack
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
2D8163F5000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
2728D824000
heap
page read and write
2728DCB4000
heap
page read and write
1DFF77E5000
heap
page read and write
7FFAAB689000
trusted library allocation
page read and write
23203D70000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
B9CB8FE000
stack
page read and write
28BA8D80000
trusted library allocation
page read and write
7FFAAB590000
trusted library allocation
page read and write
22500001000
trusted library allocation
page read and write
1FB0FA86000
trusted library allocation
page read and write
2D816401000
trusted library allocation
page read and write
1EF32181000
trusted library allocation
page read and write
283354D1000
heap
page read and write
2728D824000
heap
page read and write
7FFAAB782000
trusted library allocation
page read and write
7FFAAB69C000
trusted library allocation
page read and write
1C705B26000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
1DFF77C0000
trusted library allocation
page read and write
7FFAAB620000
trusted library allocation
page read and write
28335514000
heap
page read and write
7FFAAB584000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB323000
trusted library allocation
page execute and read and write
2728D850000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
1C70610E000
trusted library allocation
page read and write
7FFAAB460000
trusted library allocation
page execute and read and write
1EF22181000
trusted library allocation
page read and write
1C704050000
heap
page read and write
23203D90000
trusted library allocation
page read and write
28BA7272000
heap
page read and write
2728D87F000
heap
page read and write
7FFAAB4F8000
trusted library allocation
page execute and read and write
2728DCE5000
heap
page read and write
28BA73D0000
heap
page read and write
1DF90009000
trusted library allocation
page read and write
7FFAAB68C000
trusted library allocation
page read and write
275543EF000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
B86238E000
stack
page read and write
28BA720C000
heap
page read and write
A6E43FD000
stack
page read and write
2256A3A0000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
7FFAAB780000
trusted library allocation
page read and write
1C704F48000
trusted library allocation
page read and write
22AB8643000
trusted library allocation
page read and write
1C706106000
trusted library allocation
page read and write
7DF42DF20000
trusted library allocation
page execute and read and write
7FFAAB500000
trusted library allocation
page execute and read and write
7FFAAB3E0000
trusted library allocation
page execute and read and write
7FFAAB590000
trusted library allocation
page read and write
23203BB0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2728D842000
heap
page read and write
7FF649BCE000
unkown
page read and write
22D0EDC0000
heap
page read and write
275426B9000
heap
page read and write
27544340000
trusted library allocation
page read and write
7FFAAB58A000
trusted library allocation
page read and write
7FFAAB598000
trusted library allocation
page read and write
1DFF77E0000
heap
page read and write
22568955000
heap
page read and write
1EF20890000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
7FFAAB3D6000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
96F867E000
stack
page read and write
7FFAAB720000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
1C7042C0000
heap
page read and write
2755C3E3000
heap
page read and write
7FFAAB69A000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
22ACEF7D000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
23213FAE000
trusted library allocation
page read and write
2256A820000
trusted library allocation
page read and write
7FF792697000
unkown
page read and write
7FFAAB520000
trusted library allocation
page execute and read and write
27544310000
trusted library allocation
page read and write
28BA8B90000
heap
page readonly
22AB6D60000
heap
page execute and read and write
22AB760E000
trusted library allocation
page read and write
7FFAAB640000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
7561F7E000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
2728D8EE000
heap
page read and write
7FFAAB540000
trusted library allocation
page read and write
1EF20680000
heap
page read and write
7FFAAB3D0000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2D814778000
heap
page read and write
2832D2C1000
trusted library allocation
page read and write
2728D8DB000
heap
page read and write
23203D90000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
B9CB97A000
stack
page read and write
23202435000
heap
page read and write
7FFAAB323000
trusted library allocation
page execute and read and write
1EF20810000
trusted library allocation
page read and write
2728D80B000
heap
page read and write
7FFAAB4F9000
trusted library allocation
page read and write
27544260000
trusted library allocation
page read and write
2831D31B000
trusted library allocation
page read and write
1DFF7770000
heap
page read and write
27544310000
trusted library allocation
page read and write
1FD086D0000
remote allocation
page read and write
96F8A76000
stack
page read and write
F662113000
stack
page read and write
1EF207F0000
trusted library allocation
page read and write
23203DB0000
trusted library allocation
page read and write
B5E8AFC000
stack
page read and write
A6E42FE000
stack
page read and write
1C705BF3000
trusted library allocation
page read and write
1C71D046000
heap
page read and write
E409F7C000
stack
page read and write
2728D2BD000
heap
page read and write
2D8149F0000
trusted library allocation
page read and write
2728D8C7000
heap
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB416000
trusted library allocation
page execute and read and write
1FD0878E000
heap
page read and write
7FFAAB570000
trusted library allocation
page read and write
7FFAAB344000
trusted library allocation
page read and write
1EF20830000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2754270C000
heap
page read and write
2603273000
stack
page read and write
1C705181000
trusted library allocation
page read and write
2831CC80000
heap
page read and write
7FFAAB3E6000
trusted library allocation
page read and write
7FFAAB323000
trusted library allocation
page execute and read and write
2728D8C2000
heap
page read and write
2D816350000
trusted library allocation
page read and write
1C71CDDA000
heap
page read and write
28BA8BB0000
trusted library allocation
page read and write
7FFAAB3E6000
trusted library allocation
page read and write
23202117000
heap
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB32D000
trusted library allocation
page execute and read and write
7FFAAB5F0000
trusted library allocation
page read and write
2320211B000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1FB27282000
heap
page read and write
28BA8D60000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB69C000
trusted library allocation
page read and write
22AB6D84000
trusted library allocation
page read and write
7FF792697000
unkown
page write copy
2728DCB0000
heap
page read and write
E409D7D000
stack
page read and write
1DFF91F0000
heap
page read and write
2728D8D3000
heap
page read and write
2832D594000
trusted library allocation
page read and write
28BB8DDE000
trusted library allocation
page read and write
28BA8B80000
trusted library allocation
page read and write
7FFAAB630000
trusted library allocation
page read and write
7FFAAB330000
trusted library allocation
page read and write
7FFAAB760000
trusted library allocation
page execute and read and write
1FD08710000
heap
page read and write
22ACEFAB000
heap
page read and write
2728DCB5000
heap
page read and write
1DFF90B0000
heap
page read and write
1FB0E890000
heap
page readonly
7FFAAB750000
trusted library allocation
page read and write
B8613FB000
stack
page read and write
2728D81E000
heap
page read and write
22568900000
heap
page read and write
28BA8D70000
trusted library allocation
page read and write
1C705CB1000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
22AB5FE8000
heap
page read and write
1EF20811000
trusted library allocation
page read and write
22AC7071000
trusted library allocation
page read and write
2728DCD5000
heap
page read and write
B86230C000
stack
page read and write
2728DCE5000
heap
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB690000
trusted library allocation
page read and write
B5E6FFE000
stack
page read and write
7FFAAB594000
trusted library allocation
page read and write
7FFAAB324000
trusted library allocation
page read and write
2D816370000
trusted library allocation
page read and write
1C714D98000
trusted library allocation
page read and write
F5CBBAF000
stack
page read and write
27544433000
heap
page read and write
2256A300000
trusted library allocation
page read and write
7FFAAB684000
trusted library allocation
page read and write
1FB1F281000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1FB0E692000
heap
page read and write
27544240000
trusted library allocation
page read and write
2831D100000
heap
page read and write
7DF470220000
trusted library allocation
page execute and read and write
1FB1F2A1000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
283354B9000
heap
page read and write
7FFAAB400000
trusted library allocation
page execute and read and write
2256A300000
trusted library allocation
page read and write
23203BC0000
heap
page readonly
28BA8BE0000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
7FF649BCD000
unkown
page write copy
2728D8A8000
heap
page read and write
1EF20820000
trusted library allocation
page read and write
7FFAAB4FE000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
2256A280000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
2D8146F0000
heap
page read and write
27544310000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
23202150000
heap
page read and write
22AB5FDE000
heap
page read and write
7FFAAB680000
trusted library allocation
page read and write
E409C72000
stack
page read and write
27544330000
trusted library allocation
page read and write
7FFAAB343000
trusted library allocation
page execute and read and write
26032FD000
stack
page read and write
27544330000
trusted library allocation
page read and write
2D814738000
heap
page read and write
1EF20890000
trusted library allocation
page read and write
2755C900000
heap
page execute and read and write
7FFAAB5B8000
trusted library allocation
page read and write
7DF448CC0000
trusted library allocation
page execute and read and write
22AB7238000
trusted library allocation
page read and write
7FFAAB33D000
trusted library allocation
page execute and read and write
7FFAAB5F0000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
2D8147EA000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
28BA71F8000
heap
page read and write
1EF207A0000
trusted library allocation
page read and write
2728D836000
heap
page read and write
B9CBD3E000
stack
page read and write
7FFAAB4C4000
trusted library allocation
page execute and read and write
7FFAAB510000
trusted library allocation
page read and write
28BA71D0000
heap
page read and write
7FFAAB6A0000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2728D823000
heap
page read and write
1EF207E0000
trusted library allocation
page read and write
7FFAAB72A000
trusted library allocation
page read and write
2D8163F0000
heap
page read and write
28BA8D73000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB33B000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
F66247E000
stack
page read and write
2728D315000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB650000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1C704260000
heap
page read and write
232020D8000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB324000
trusted library allocation
page read and write
22D0F570000
remote allocation
page read and write
2256A300000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
1FD0871D000
heap
page read and write
7FFAAB4DD000
trusted library allocation
page execute and read and write
1FD08764000
heap
page read and write
1EF20813000
trusted library allocation
page read and write
2D816333000
trusted library allocation
page read and write
1FD08793000
heap
page read and write
1FB27380000
heap
page execute and read and write
1DFF9150000
trusted library allocation
page read and write
119DA73000
stack
page read and write
7FF792380000
unkown
page readonly
232021AE000
heap
page read and write
7FFAAB698000
trusted library allocation
page read and write
1FD08771000
heap
page read and write
28BA8D70000
trusted library allocation
page read and write
2728DC31000
heap
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page execute and read and write
7FFAAB740000
trusted library allocation
page read and write
7FFAAB730000
trusted library allocation
page read and write
7FFAAB72C000
trusted library allocation
page read and write
1DFF7677000
heap
page read and write
1FB0F99A000
trusted library allocation
page read and write
7DF42DF10000
trusted library allocation
page execute and read and write
7FFAAB4E0000
trusted library allocation
page execute and read and write
23203D93000
trusted library allocation
page read and write
1EF2206B000
heap
page read and write
2D82E950000
heap
page execute and read and write
7DF42D8A0000
trusted library allocation
page execute and read and write
7FFAAB32D000
trusted library allocation
page execute and read and write
1C714D30000
trusted library allocation
page read and write
2831C4D0000
heap
page read and write
2728D831000
heap
page read and write
7DF470230000
trusted library allocation
page execute and read and write
7FFAAB5B0000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
2256A850000
heap
page execute and read and write
7561A7B000
stack
page read and write
1FD08771000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB4BD000
trusted library allocation
page execute and read and write
23202106000
heap
page read and write
2831C810000
trusted library allocation
page read and write
2728D180000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
1DFF75D0000
heap
page read and write
7FFAAB314000
trusted library allocation
page read and write
2256A3A0000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
28BA8D70000
trusted library allocation
page read and write
1DFF91D0000
trusted library allocation
page read and write
28BA8D70000
trusted library allocation
page read and write
1DFF7660000
heap
page read and write
7FFAAB770000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
2728D377000
heap
page read and write
2256A3A0000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB323000
trusted library allocation
page execute and read and write
22AB6710000
trusted library allocation
page read and write
B9CBF3B000
stack
page read and write
B9CBDBE000
stack
page read and write
7FFAAB4E9000
trusted library allocation
page read and write
2256A310000
heap
page read and write
1C70565A000
trusted library allocation
page read and write
28BC0DD3000
heap
page read and write
7FFB23B00000
unkown
page read and write
1C703F50000
heap
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
1DFF76A5000
heap
page read and write
2D816350000
trusted library allocation
page read and write
7FFAAB660000
trusted library allocation
page read and write
B5E6911000
stack
page read and write
1DFF75B0000
heap
page read and write
27544310000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
27544330000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
1EF20722000
heap
page read and write
1FB0E698000
heap
page read and write
225689F3000
heap
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB4F4000
trusted library allocation
page execute and read and write
7FFAAB4DA000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
27544390000
trusted library allocation
page read and write
2D816333000
trusted library allocation
page read and write
7FFAAB51E000
trusted library allocation
page read and write
7FFAAB750000
trusted library allocation
page execute and read and write
225689CD000
heap
page read and write
2728DCE5000
heap
page read and write
1FB273D7000
heap
page execute and read and write
7FF649390000
unkown
page readonly
B8617BE000
stack
page read and write
7FFAAB560000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB4BD000
trusted library allocation
page execute and read and write
283354A6000
heap
page read and write
225689F8000
heap
page read and write
1C7040CE000
heap
page read and write
1FB10DCB000
trusted library allocation
page read and write
1DFF9130000
trusted library allocation
page read and write
7DF49FD00000
trusted library allocation
page execute and read and write
2728D82D000
heap
page read and write
7FFAAB5C2000
trusted library allocation
page read and write
28BA8D70000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2256A446000
heap
page read and write
2256A2B0000
heap
page readonly
22568A2D000
heap
page read and write
275426CB000
heap
page read and write
22568950000
heap
page read and write
7FFB23B00000
unkown
page read and write
7FFAAB620000
trusted library allocation
page read and write
1FB27280000
heap
page read and write
2D816350000
trusted library allocation
page read and write
7FFAAB679000
trusted library allocation
page read and write
2D814758000
heap
page read and write
1DFF9150000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB4D4000
trusted library allocation
page execute and read and write
2754273E000
heap
page read and write
2D816333000
trusted library allocation
page read and write
28BA724B000
heap
page read and write
1DFF9151000
trusted library allocation
page read and write
1C715005000
trusted library allocation
page read and write
2728D87F000
heap
page read and write
7FFAAB688000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1C71D0E5000
heap
page read and write
7FFAAB5B2000
trusted library allocation
page read and write
2832D30D000
trusted library allocation
page read and write
22AB5FA0000
heap
page read and write
7FFAAB314000
trusted library allocation
page read and write
B9CCA0E000
stack
page read and write
2256A300000
trusted library allocation
page read and write
283353C0000
heap
page read and write
27544283000
trusted library allocation
page read and write
28BA8D90000
trusted library allocation
page read and write
7FFAAB3E0000
trusted library allocation
page execute and read and write
7FFAAB320000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
B5E92FF000
stack
page read and write
2D816380000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1FB1F2F9000
trusted library allocation
page read and write
2831D240000
trusted library allocation
page read and write
1EF20830000
trusted library allocation
page read and write
7FF792380000
unkown
page readonly
7FFAAB650000
trusted library allocation
page read and write
23203DD0000
trusted library allocation
page read and write
23203FA1000
trusted library allocation
page read and write
7FFAAB770000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
1DFF91D0000
trusted library allocation
page read and write
23213FA9000
trusted library allocation
page read and write
2256A315000
heap
page read and write
28E16B80000
heap
page read and write
2D814A15000
heap
page read and write
22D0EE4C000
heap
page read and write
2728D8AA000
heap
page read and write
2D816330000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
7FFAAB650000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
1C704D21000
trusted library allocation
page read and write
7DF470210000
trusted library allocation
page execute and read and write
2256A2A0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB350000
trusted library allocation
page read and write
2728D8C5000
heap
page read and write
7FFAAB68C000
trusted library allocation
page read and write
7FFAAB73C000
trusted library allocation
page read and write
CEED4FF000
stack
page read and write
2D814761000
heap
page read and write
2256A303000
trusted library allocation
page read and write
1EF32189000
trusted library allocation
page read and write
22AB7712000
trusted library allocation
page read and write
7FFAAB440000
trusted library allocation
page execute and read and write
2D81476C000
heap
page read and write
283354A9000
heap
page read and write
2256A3A0000
trusted library allocation
page read and write
7FFAAB670000
trusted library allocation
page read and write
B9CB87E000
stack
page read and write
2D816330000
trusted library allocation
page read and write
28BC1260000
trusted library allocation
page read and write
22AB6C88000
heap
page read and write
2728DCE5000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1FB0F4A8000
trusted library allocation
page read and write
7FFAAB740000
trusted library allocation
page read and write
2256A3C6000
heap
page read and write
22AB6027000
heap
page read and write
B5E75FF000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
283352F3000
heap
page read and write
119DB7F000
stack
page read and write
7FFAAB5A2000
trusted library allocation
page read and write
260454C000
stack
page read and write
2D816330000
trusted library allocation
page read and write
1C705189000
trusted library allocation
page read and write
B5E8CFF000
stack
page read and write
2D816330000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB4D8000
trusted library allocation
page execute and read and write
1EF20830000
trusted library allocation
page read and write
1FB27508000
heap
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
2728D730000
remote allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
275441C0000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB530000
trusted library allocation
page read and write
28E16838000
heap
page read and write
1C7040D6000
heap
page read and write
27542680000
heap
page read and write
22ACEF5E000
heap
page read and write
2728D87F000
heap
page read and write
1DFF9140000
trusted library allocation
page read and write
2728D2F1000
heap
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1FD088D0000
heap
page read and write
2832D2B0000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
1FB10AC4000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
23203D83000
trusted library allocation
page read and write
22AB6BD0000
heap
page read and write
2728D8C8000
heap
page read and write
2728DC65000
heap
page read and write
7FFAAB4C0000
trusted library allocation
page read and write
2831E227000
trusted library allocation
page read and write
2728D7E0000
heap
page read and write
7FFAAB5E0000
trusted library allocation
page read and write
7FFB23AE1000
unkown
page execute read
2728DCBE000
heap
page read and write
7DF49FD20000
trusted library allocation
page execute and read and write
2728D7F8000
heap
page read and write
260397E000
stack
page read and write
2728D7F0000
heap
page read and write
7FFAAB31D000
trusted library allocation
page execute and read and write
7FFAAB4F0000
trusted library allocation
page execute and read and write
2728D8CA000
heap
page read and write
23203D90000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
28BA8D80000
trusted library allocation
page read and write
B860FDF000
stack
page read and write
2728D89C000
heap
page read and write
28BA8D70000
trusted library allocation
page read and write
22D0F550000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
275443E1000
trusted library allocation
page read and write
7FFAAB460000
trusted library allocation
page execute and read and write
2D816330000
trusted library allocation
page read and write
2D82E40C000
heap
page read and write
23203D90000
trusted library allocation
page read and write
22AB6F99000
trusted library allocation
page read and write
2320216A000
heap
page read and write
1C71CD30000
heap
page read and write
260444D000
stack
page read and write
28BA8D70000
trusted library allocation
page read and write
2728DCBF000
heap
page read and write
22AB77DA000
trusted library allocation
page read and write
7FFAAB73C000
trusted library allocation
page read and write
96F88F9000
stack
page read and write
7FFB23B02000
unkown
page readonly
22D0F570000
remote allocation
page read and write
2D816330000
trusted library allocation
page read and write
1C715013000
trusted library allocation
page read and write
1C7040DA000
heap
page read and write
7FFAAB3DC000
trusted library allocation
page execute and read and write
2D816330000
trusted library allocation
page read and write
28BA7360000
heap
page read and write
7FFAAB610000
trusted library allocation
page read and write
2728DC8E000
heap
page read and write
2728DC5D000
heap
page read and write
2256A300000
trusted library allocation
page read and write
2728D286000
heap
page read and write
27544320000
trusted library allocation
page read and write
232020F9000
heap
page read and write
7FFAAB630000
trusted library allocation
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
1DFF91E0000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
1EF206CC000
heap
page read and write
2728DCAF000
heap
page read and write
7FFAAB760000
trusted library allocation
page execute and read and write
28BA8D60000
trusted library allocation
page read and write
2728D83D000
heap
page read and write
7FFAAB3D0000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FF649BD0000
unkown
page read and write
CEEC90D000
stack
page read and write
1EF3A181000
heap
page read and write
1FB27540000
heap
page read and write
225689B0000
heap
page read and write
7FFAAB600000
trusted library allocation
page read and write
22568A22000
heap
page read and write
96F8D7B000
stack
page read and write
27544320000
trusted library allocation
page read and write
B9CBB77000
stack
page read and write
27544310000
trusted library allocation
page read and write
96F877E000
stack
page read and write
7FFAAB519000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
27542860000
heap
page read and write
B5E86FE000
stack
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
22D0EE40000
heap
page read and write
2D816333000
trusted library allocation
page read and write
2728D881000
heap
page read and write
96F97CE000
stack
page read and write
23203C55000
heap
page read and write
275426C8000
heap
page read and write
2256A2E3000
trusted library allocation
page read and write
22ACEDE0000
heap
page read and write
7FFAAB600000
trusted library allocation
page read and write
7C88CFE000
stack
page read and write
B9CC90E000
stack
page read and write
7FFAAB570000
trusted library allocation
page read and write
8E85B7E000
stack
page read and write
B862409000
stack
page read and write
7FFAAB570000
trusted library allocation
page read and write
2320210D000
heap
page read and write
2728DC65000
heap
page read and write
1FD085F0000
heap
page read and write
2D8147D4000
heap
page read and write
27544310000
trusted library allocation
page read and write
2728D8C6000
heap
page read and write
7FFAAB685000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
22AB8152000
trusted library allocation
page read and write
23203DA0000
trusted library allocation
page read and write
7FFAAB342000
trusted library allocation
page read and write
2728DCD3000
heap
page read and write
1EF20830000
trusted library allocation
page read and write
7FFAAB7A0000
trusted library allocation
page read and write
7FFAAB610000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
2728D8CB000
heap
page read and write
7FFAAB330000
trusted library allocation
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
1FD0876D000
heap
page read and write
23203D90000
trusted library allocation
page read and write
B8618BC000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
F5CBF7C000
stack
page read and write
27544310000
trusted library allocation
page read and write
1C71D08D000
heap
page read and write
27544310000
trusted library allocation
page read and write
2831C840000
heap
page read and write
2728DCB2000
heap
page read and write
27544311000
trusted library allocation
page read and write
2D816360000
trusted library allocation
page read and write
7FFAAB509000
trusted library allocation
page read and write
22AC7060000
trusted library allocation
page read and write
7C8892F000
stack
page read and write
28E167E0000
heap
page read and write
27544310000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
B5E84FE000
stack
page read and write
2D816360000
trusted library allocation
page read and write
2728D8AC000
heap
page read and write
1DFF9150000
trusted library allocation
page read and write
1EF2226B000
heap
page read and write
7FFAAB790000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
B9CB543000
stack
page read and write
23203DB0000
trusted library allocation
page read and write
7DF4F2090000
trusted library allocation
page execute and read and write
1DFF9150000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB4C6000
trusted library allocation
page execute and read and write
7FFAAB4E6000
trusted library allocation
page execute and read and write
B86183E000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1DFF767A000
heap
page read and write
1FB0E8C5000
heap
page read and write
7FFAAB674000
trusted library allocation
page read and write
1C704680000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
1DFF9153000
trusted library allocation
page read and write
283354DB000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FF649391000
unkown
page execute read
7FFAAB4C5000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB58B000
trusted library allocation
page read and write
2831DBD5000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
1FB1067E000
trusted library allocation
page read and write
23213FA1000
trusted library allocation
page read and write
2728D816000
heap
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
7FFAAB640000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
2256A303000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
26036F8000
stack
page read and write
1C704090000
heap
page read and write
2D816330000
trusted library allocation
page read and write
225689CA000
heap
page read and write
F66219E000
stack
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB504000
trusted library allocation
page read and write
2603A7E000
stack
page read and write
1C7046B0000
trusted library allocation
page read and write
22AB872E000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB679000
trusted library allocation
page read and write
22568800000
heap
page read and write
2728D817000
heap
page read and write
7FFAAB55F000
trusted library allocation
page read and write
7FF79269C000
unkown
page readonly
2D816350000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page execute and read and write
23203D90000
trusted library allocation
page read and write
2D816350000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2728D8B1000
heap
page read and write
7FFAAB4F8000
trusted library allocation
page execute and read and write
23203D90000
trusted library allocation
page read and write
7FFAAB514000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
22AB6C71000
heap
page read and write
2728D8BF000
heap
page read and write
E409DFF000
stack
page read and write
1DFF9150000
trusted library allocation
page read and write
E409CFF000
stack
page read and write
1FB0F0F8000
heap
page read and write
7FFAAB540000
trusted library allocation
page read and write
7FFAAB730000
trusted library allocation
page read and write
2832D586000
trusted library allocation
page read and write
2728D82D000
heap
page read and write
7FFAAB325000
trusted library allocation
page read and write
1FB0E8B5000
heap
page read and write
F5CBEFD000
stack
page read and write
28BA8BC3000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
22AB6C5F000
heap
page read and write
275428C0000
heap
page read and write
22AB6735000
heap
page read and write
96F8AF9000
stack
page read and write
2831E68B000
trusted library allocation
page read and write
7FFAAB72A000
trusted library allocation
page read and write
22AB8981000
trusted library allocation
page read and write
1FD086D0000
remote allocation
page read and write
27544310000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB335000
trusted library allocation
page read and write
2831CBF0000
trusted library allocation
page read and write
2728DCE5000
heap
page read and write
7FFAAB345000
trusted library allocation
page read and write
28335501000
heap
page read and write
2728D336000
heap
page read and write
28BA8BE3000
trusted library allocation
page read and write
1EF20800000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB440000
trusted library allocation
page execute and read and write
2D816330000
trusted library allocation
page read and write
1FD08800000
heap
page read and write
7FFAAB4CD000
trusted library allocation
page execute and read and write
2256A2D0000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page execute and read and write
1DFF9170000
trusted library allocation
page read and write
22D0EE2B000
heap
page read and write
1C7040CC000
heap
page read and write
2D816330000
trusted library allocation
page read and write
7FF792557000
unkown
page readonly
7FFAAB512000
trusted library allocation
page read and write
B5E8BFF000
stack
page read and write
2728D815000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
22AB62C0000
heap
page read and write
2831D250000
heap
page execute and read and write
1FD0873D000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
2831C584000
heap
page read and write
1FD08764000
heap
page read and write
7FFAAB610000
trusted library allocation
page read and write
28E167B0000
heap
page read and write
F5CBB2F000
stack
page read and write
22AB5FE0000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
28BA8EFB000
heap
page read and write
7DF449BB0000
trusted library allocation
page execute and read and write
23203D90000
trusted library allocation
page read and write
2728DCD8000
heap
page read and write
28BA8D60000
trusted library allocation
page read and write
7FFAAB770000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB4F4000
trusted library allocation
page execute and read and write
1FB0E5F0000
heap
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
7FFAAB520000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
1EF20741000
heap
page read and write
1C71D0F4000
heap
page read and write
28BC1270000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
2728DC3D000
heap
page read and write
7FFAAB450000
trusted library allocation
page execute and read and write
2728DCD6000
heap
page read and write
2728D7FF000
heap
page read and write
2728DCE8000
heap
page read and write
F6625FD000
stack
page read and write
B8615B9000
stack
page read and write
7FFB23B00000
unkown
page read and write
7FFAAB4E5000
trusted library allocation
page read and write
7FFAAB4C8000
trusted library allocation
page execute and read and write
7FFAAB5C4000
trusted library allocation
page read and write
2728DC3F000
heap
page read and write
2D816350000
trusted library allocation
page read and write
2728DCC2000
heap
page read and write
22AB6024000
heap
page read and write
1DFF9150000
trusted library allocation
page read and write
1FD08766000
heap
page read and write
96F887E000
stack
page read and write
28BA8BE0000
trusted library allocation
page read and write
2728DC4F000
heap
page read and write
7FFB23AF6000
unkown
page readonly
27542690000
heap
page read and write
1C71D000000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1C7046F0000
trusted library allocation
page read and write
1FB0F6BC000
trusted library allocation
page read and write
2728D2D0000
heap
page read and write
7FFAAB600000
trusted library allocation
page read and write
2728DCC2000
heap
page read and write
7FFAAB5E0000
trusted library allocation
page read and write
232020F9000
heap
page read and write
7FFAAB530000
trusted library allocation
page read and write
7FFAAB740000
trusted library allocation
page read and write
2728D7F5000
heap
page read and write
23203D90000
trusted library allocation
page read and write
7FFAAB3C0000
trusted library allocation
page read and write
22AB62C5000
heap
page read and write
275443D0000
heap
page execute and read and write
28BA8DA0000
trusted library allocation
page read and write
1FD088D5000
heap
page read and write
28BA8BE0000
trusted library allocation
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
27544290000
heap
page read and write
2D816330000
trusted library allocation
page read and write
1FB0EFA0000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
1FD08700000
heap
page read and write
2831EDEB000
trusted library allocation
page read and write
7FFAAB3E0000
trusted library allocation
page read and write
283354EB000
heap
page read and write
1C71D0AF000
heap
page read and write
B5E7CF4000
stack
page read and write
1EF20810000
trusted library allocation
page read and write
7FFAAB4F6000
trusted library allocation
page execute and read and write
283352BC000
heap
page read and write
23202010000
heap
page read and write
22AB5F70000
heap
page read and write
2728D8A9000
heap
page read and write
1EF20803000
trusted library allocation
page read and write
7FFAAB630000
trusted library allocation
page read and write
225689B6000
heap
page read and write
1EF20810000
trusted library allocation
page read and write
1FB0E880000
trusted library allocation
page read and write
7FFAAB340000
trusted library allocation
page read and write
1C71D077000
heap
page read and write
1DFF96E0000
heap
page execute and read and write
1EF20810000
trusted library allocation
page read and write
1EF20845000
heap
page read and write
2D816330000
trusted library allocation
page read and write
2256A300000
trusted library allocation
page read and write
1FD0871D000
heap
page read and write
7FF649BD4000
unkown
page readonly
2D816350000
trusted library allocation
page read and write
7FFAAB335000
trusted library allocation
page read and write
2831C5C2000
heap
page read and write
7FFAAB690000
trusted library allocation
page read and write
7FFAAB4C0000
trusted library allocation
page read and write
1FB0E610000
heap
page read and write
7FFAAB333000
trusted library allocation
page execute and read and write
2831D9BB000
trusted library allocation
page read and write
1DFF76A3000
heap
page read and write
27544330000
trusted library allocation
page read and write
1C71CD24000
heap
page read and write
2728DCE5000
heap
page read and write
27544310000
trusted library allocation
page read and write
22AC6DD9000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
22AB6690000
heap
page readonly
1DFF9160000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
7FFAAB570000
trusted library allocation
page read and write
7FFAAB620000
trusted library allocation
page read and write
27542764000
heap
page read and write
7FFAAB4C0000
trusted library allocation
page read and write
2728D8AA000
heap
page read and write
B86163A000
stack
page read and write
1EF206C8000
heap
page read and write
1C715009000
trusted library allocation
page read and write
1EF206B8000
heap
page read and write
1FB105EE000
trusted library allocation
page read and write
22D0EF02000
heap
page read and write
2D816320000
trusted library allocation
page read and write
B8614F6000
stack
page read and write
23203DA0000
trusted library allocation
page read and write
1EF20820000
trusted library allocation
page read and write
7FFAAB4D1000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1DFF7662000
heap
page read and write
2831C62C000
heap
page read and write
23203D90000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
22D0EE13000
heap
page read and write
1C704660000
trusted library allocation
page read and write
22AB607F000
heap
page read and write
CEECCFF000
stack
page read and write
1DFF9150000
trusted library allocation
page read and write
1DFF9170000
trusted library allocation
page read and write
1DFF9150000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
22AB6C6D000
heap
page read and write
7FFAAB3F6000
trusted library allocation
page read and write
28BC1280000
trusted library allocation
page read and write
B860F5E000
stack
page read and write
7FFAAB325000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
22ACF150000
trusted library allocation
page read and write
B5E77FB000
stack
page read and write
28BA8DA0000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
2728D8C6000
heap
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
96F89F8000
stack
page read and write
B9CB9FE000
stack
page read and write
22AC6D71000
trusted library allocation
page read and write
22ACEF44000
heap
page read and write
7DF448CD0000
trusted library allocation
page execute and read and write
28BA73D5000
heap
page read and write
1DFF9170000
trusted library allocation
page read and write
27544313000
trusted library allocation
page read and write
27544320000
trusted library allocation
page read and write
22ACEFDA000
heap
page read and write
7FFAAB581000
trusted library allocation
page read and write
2831EEB4000
trusted library allocation
page read and write
27544310000
trusted library allocation
page read and write
28BA8BC0000
trusted library allocation
page read and write
1FB0E510000
heap
page read and write
7FFAAB3F0000
trusted library allocation
page execute and read and write
22D0EE4B000
heap
page read and write
7DF448CB0000
trusted library allocation
page execute and read and write
B86173E000
stack
page read and write
1DFF7638000
heap
page read and write
2831E683000
trusted library allocation
page read and write
1FB27378000
heap
page read and write
A6E437E000
stack
page read and write
2728DCD6000
heap
page read and write
2728DC70000
heap
page read and write
1DFF7795000
heap
page read and write
27544310000
trusted library allocation
page read and write
1FB1F56A000
trusted library allocation
page read and write
1DFF91E0000
trusted library allocation
page read and write
7FFAAB780000
trusted library allocation
page read and write
1C704CA0000
heap
page execute and read and write
1FB1020C000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
2D816330000
trusted library allocation
page read and write
1FB0F712000
trusted library allocation
page read and write
96F98CA000
stack
page read and write
2728DCB1000
heap
page read and write
22AB700F000
trusted library allocation
page read and write
28BA8BE0000
trusted library allocation
page read and write
1DFF92CF000
heap
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
1FB0E8B0000
heap
page read and write
7FFAAB333000
trusted library allocation
page execute and read and write
1FB1F2ED000
trusted library allocation
page read and write
1FB0FBB5000
trusted library allocation
page read and write
1DFF9160000
trusted library allocation
page read and write
2D814A10000
heap
page read and write
2D816340000
heap
page execute and read and write
7FFAAB570000
trusted library allocation
page read and write
E409EFD000
stack
page read and write
7DF4930E0000
trusted library allocation
page execute and read and write
7FFAAB4C8000
trusted library allocation
page execute and read and write
7FFAAB3D0000
trusted library allocation
page read and write
1FB1F56C000
trusted library allocation
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
22AB6C30000
heap
page read and write
27544310000
trusted library allocation
page read and write
B5E93FF000
stack
page read and write
F5CBAA3000
stack
page read and write
7FFAAB4B4000
trusted library allocation
page read and write
27544313000
trusted library allocation
page read and write
2D8149A0000
trusted library allocation
page read and write
23203D52000
heap
page read and write
1EF20890000
trusted library allocation
page read and write
1DFF766B000
heap
page read and write
28BC13D0000
heap
page execute and read and write
7FFAAB330000
trusted library allocation
page read and write
23203D90000
trusted library allocation
page read and write
1EF20840000
heap
page read and write
1FD0878E000
heap
page read and write
28BA8D70000
trusted library allocation
page read and write
7FFAAB3E0000
trusted library allocation
page read and write
2D826401000
trusted library allocation
page read and write
7FFAAB590000
trusted library allocation
page read and write
2728DD00000
heap
page read and write
22AB5FFC000
heap
page read and write
23202000000
heap
page read and write
1FB273D0000
heap
page execute and read and write
2833532F000
heap
page read and write
28BB8DD9000
trusted library allocation
page read and write
2728D8AC000
heap
page read and write
27544250000
heap
page readonly
1FD0878B000
heap
page read and write
27544310000
trusted library allocation
page read and write
1EF20810000
trusted library allocation
page read and write
275426C3000
heap
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
1C704030000
heap
page read and write
7FFAAB4E1000
trusted library allocation
page read and write
There are 2091 hidden memdumps, click here to show them.