IOC Report
49b35e.msi

loading gifFilesProcessesURLsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
49b35e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {770A70C2-F119-40BD-B7A3-2F598D8C0D8F}, Number of Words: 10, Subject: Microgamete, Author: Avizandum Thuggee, Name of Creating Application: Advanced Installer 18.0 build 1a235518, Template: x64;1033, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
initial sample
malicious
C:\Users\user\AppData\Local\Kart\GmRemote.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\31081\CasPol.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\glenpw
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\mebrpk
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Aact\GmRemote.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI77EF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI787C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI78BC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI791A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\66767a.rbs
data
modified
C:\ProgramData\Avira\Security\Logs\GmRemote.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CasPol.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ad77a551
PNG image data, 3072 x 1367, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\ae3f1db1
data
modified
C:\Users\user\AppData\Local\Temp\c6e5b386
PNG image data, 3072 x 1367, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\c7bdf61f
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Installer\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}\Mohair.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Windows\Installer\667678.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {770A70C2-F119-40BD-B7A3-2F598D8C0D8F}, Number of Words: 10, Subject: Microgamete, Author: Avizandum Thuggee, Name of Creating Application: Advanced Installer 18.0 build 1a235518, Template: x64;1033, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\66767b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {770A70C2-F119-40BD-B7A3-2F598D8C0D8F}, Number of Words: 10, Subject: Microgamete, Author: Avizandum Thuggee, Name of Creating Application: Advanced Installer 18.0 build 1a235518, Template: x64;1033, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\MSI79C7.tmp
data
dropped
C:\Windows\Installer\SourceHash{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF0720D4270B0AF1E2.TMP
data
dropped
C:\Windows\Temp\~DF11A1A2D97FEF5E39.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2D7B4B73BF5E320E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF34A8F6D121AEF3BE.TMP
data
dropped
C:\Windows\Temp\~DF4D9352C110CD1C21.TMP
data
dropped
C:\Windows\Temp\~DF7CBB0BD73913EBE3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF808C27465CC1ADAD.TMP
data
dropped
C:\Windows\Temp\~DF90C612C425AF24AD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB29D305C05EB3861.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFCBE709E96DF4B5C8.TMP
data
dropped
C:\Windows\Temp\~DFD9EE4ABA5BF526F9.TMP
data
dropped
C:\Windows\Temp\~DFE010206A9FD79970.TMP
data
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\49b35e.msi"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Users\user\AppData\Local\Kart\GmRemote.exe
"C:\Users\user\AppData\Local\Kart\GmRemote.exe"
malicious
C:\Users\user\AppData\Local\Temp\31081\CasPol.exe
C:\Users\user~1\AppData\Local\Temp\31081\CasPol.exe
malicious
C:\Windows\SysWOW64\gpupdate.exe
C:\Windows\SysWOW64\gpupdate.exe
malicious
C:\Users\user\AppData\Local\Temp\31081\CasPol.exe
"C:\Users\user~1\AppData\Local\Temp\31081\CasPol.exe"
malicious
C:\Users\user\AppData\Roaming\Aact\GmRemote.exe
C:\Users\user\AppData\Roaming\Aact\GmRemote.exe
malicious
C:\Users\user\AppData\Local\Temp\31081\CasPol.exe
C:\Users\user~1\AppData\Local\Temp\31081\CasPol.exe
malicious
C:\Windows\SysWOW64\gpupdate.exe
C:\Windows\SysWOW64\gpupdate.exe
malicious
C:\Users\user\AppData\Local\Temp\31081\CasPol.exe
"C:\Users\user~1\AppData\Local\Temp\31081\CasPol.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 406DFCD208F2E3201E062204E7D36772
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://pastebin.com/raw/m10GT1YV
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://www.vmware.com/0
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://pastebin.com/raw/m10GT1YVPO
unknown
https://github.com/Ratbag
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://github.com/mgravell/protobuf-net
unknown
http://www.vmware.com/0/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://github.com/RatbagDialogBitmapdialogARPCONTACTBegoniaWindowsTypeNT40DisplayWindows
unknown
http://www.symauth.com/cps0(
unknown
http://ocsp.sectigo.com0(
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://www.thawte.com/cps0/
unknown
http://www.symauth.com/rpa00
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://www.thawte.com/repository0W
unknown
https://www.nortonlifelock.com/
unknown
http://www.info-zip.org/
unknown
https://www.advancedinstaller.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
There are 21 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
149.248.78.209
unknown
Canada

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\66767a.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\66767a.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\17508BAE3F667104A812D3165932C93E
CAA4FD7D0B1D5F149BD6D0FC0981C23C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\350C522B425A12B4BA420F6C6E49A14C
CAA4FD7D0B1D5F149BD6D0FC0981C23C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2143C288AC86E6D4A92F6956BD4F0589
CAA4FD7D0B1D5F149BD6D0FC0981C23C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\20BDAF20A20E3F74C9EB59EF9905D75B
CAA4FD7D0B1D5F149BD6D0FC0981C23C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Avizandum Thuggee\Microgamete\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Avizandum Thuggee\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Avizandum Thuggee\Microgamete\32-bit\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Kart\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}\
HKEY_CURRENT_USER\SOFTWARE\Avizandum Thuggee\Microgamete
Path
HKEY_CURRENT_USER\SOFTWARE\Avizandum Thuggee\Microgamete
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\34C6405877754FB4F804BD3CE69A4CC5
CAA4FD7D0B1D5F149BD6D0FC0981C23C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CAA4FD7D0B1D5F149BD6D0FC0981C23C
MainFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\Features
MainFeature
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CAA4FD7D0B1D5F149BD6D0FC0981C23C
AI64BitFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\Features
AI64BitFiles
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CAA4FD7D0B1D5F149BD6D0FC0981C23C
AI32BitFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\Features
AI32BitFiles
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CAA4FD7D0B1D5F149BD6D0FC0981C23C
AIOtherFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\Features
AIOtherFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\34C6405877754FB4F804BD3CE69A4CC5
CAA4FD7D0B1D5F149BD6D0FC0981C23C
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\SourceList\Media
DiskPrompt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CAA4FD7D0B1D5F149BD6D0FC0981C23C\SourceList
LastUsedSource
There are 83 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4A82000
trusted library allocation
page read and write
malicious
822000
remote allocation
page execute and read and write
malicious
4672000
trusted library allocation
page read and write
malicious
3911000
trusted library allocation
page read and write
malicious
35BC000
trusted library allocation
page read and write
malicious
71D0000
trusted library section
page read and write
malicious
4D68000
trusted library allocation
page read and write
malicious
5DCE000
stack
page read and write
620B000
heap
page read and write
3BC0000
trusted library allocation
page read and write
397D000
trusted library allocation
page read and write
3D07000
trusted library allocation
page read and write
3894000
trusted library allocation
page read and write
3C86000
trusted library allocation
page read and write
3CA1000
trusted library allocation
page read and write
6380000
trusted library allocation
page execute and read and write
61FF000
heap
page read and write
2AF4000
heap
page read and write
37E0000
trusted library allocation
page read and write
7110000
trusted library section
page read and write
30F4000
trusted library allocation
page read and write
3E46000
trusted library allocation
page read and write
3D4F000
trusted library allocation
page read and write
3ABC000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
E1B000
heap
page read and write
3C20000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
13B0000
heap
page read and write
65F0000
trusted library allocation
page read and write
2A54000
heap
page read and write
3858000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
8D0000
unkown
page readonly
620E000
heap
page read and write
56A0000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
566E000
trusted library allocation
page read and write
1366000
heap
page read and write
56D0000
heap
page read and write
352D000
trusted library allocation
page read and write
363A000
trusted library allocation
page read and write
5D1E000
stack
page read and write
3979000
trusted library allocation
page read and write
139C000
heap
page read and write
3796000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
3E9E000
trusted library allocation
page read and write
2B1E000
stack
page read and write
BC0000
trusted library section
page read and write
2A74000
heap
page read and write
3DFA000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
865000
unkown
page readonly
3694000
trusted library allocation
page read and write
D03000
trusted library allocation
page execute and read and write
3A3B000
trusted library allocation
page read and write
4911000
trusted library allocation
page read and write
2720000
heap
page read and write
24655000
heap
page read and write
28A0000
trusted library allocation
page read and write
3B12000
trusted library allocation
page read and write
3F04000
trusted library allocation
page read and write
355E000
trusted library allocation
page read and write
1310000
heap
page read and write
3E10000
trusted library allocation
page read and write
565C000
trusted library allocation
page read and write
367B000
trusted library allocation
page read and write
2A74000
heap
page read and write
399B000
trusted library allocation
page read and write
3240000
heap
page read and write
2670000
trusted library allocation
page execute and read and write
3698000
trusted library allocation
page read and write
3947000
trusted library allocation
page read and write
3BCF000
trusted library allocation
page read and write
39F8000
trusted library allocation
page read and write
499E000
stack
page read and write
365B000
trusted library allocation
page read and write
3AAF000
trusted library allocation
page read and write
3E2B000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
C68000
heap
page read and write
3AE8000
trusted library allocation
page read and write
3254000
heap
page read and write
3D8E000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2AF4000
heap
page read and write
3AE6000
trusted library allocation
page read and write
2AF4000
heap
page read and write
463D000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
389C000
stack
page read and write
250C2000
unkown
page read and write
3AA9000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
3BDF000
trusted library allocation
page read and write
24BDD000
unkown
page read and write
2492A000
unkown
page read and write
6140000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
3254000
heap
page read and write
4850000
trusted library allocation
page read and write
3254000
heap
page read and write
30A0000
trusted library allocation
page read and write
3B3D000
trusted library allocation
page read and write
4E75000
unkown
page read and write
3A63000
trusted library allocation
page read and write
3D96000
trusted library allocation
page read and write
3C46000
trusted library allocation
page read and write
3AB5000
trusted library allocation
page read and write
5141000
unkown
page read and write
374A000
trusted library allocation
page read and write
27DC000
stack
page read and write
3900000
heap
page read and write
2A54000
heap
page read and write
3B50000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
3E7F000
trusted library allocation
page read and write
3967000
trusted library allocation
page read and write
9FF000
unkown
page read and write
EA0000
heap
page read and write
25DB000
stack
page read and write
2EC6000
heap
page read and write
3C0F000
trusted library allocation
page read and write
D1000
unkown
page execute read
3F16000
trusted library allocation
page read and write
2A54000
heap
page read and write
392E000
trusted library allocation
page read and write
614F000
trusted library allocation
page read and write
23819000
trusted library allocation
page read and write
3BA7000
trusted library allocation
page read and write
55BE000
stack
page read and write
2E7E000
stack
page read and write
2A74000
heap
page read and write
3CEA000
trusted library allocation
page read and write
3040000
heap
page execute and read and write
D00000
heap
page read and write
38E2000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
3254000
heap
page read and write
36F2000
trusted library allocation
page read and write
28C0000
heap
page read and write
3BA6000
trusted library allocation
page read and write
3B5A000
trusted library allocation
page read and write
851000
unkown
page execute read
2A74000
heap
page read and write
2AF4000
heap
page read and write
64B1000
heap
page read and write
3F1C000
trusted library allocation
page read and write
3AAB000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
4DAE000
stack
page read and write
38E8000
trusted library allocation
page read and write
22F80000
trusted library allocation
page read and write
52DE000
stack
page read and write
3B6E000
trusted library allocation
page read and write
3CEC000
trusted library allocation
page read and write
2B78000
heap
page read and write
2AF4000
heap
page read and write
2AAE000
stack
page read and write
3DEB000
trusted library allocation
page read and write
2AF0000
heap
page read and write
3DCA000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
3254000
heap
page read and write
50AE000
stack
page read and write
38CF000
trusted library allocation
page read and write
36FD000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
3E27000
trusted library allocation
page read and write
3AE4000
trusted library allocation
page read and write
3A2D000
trusted library allocation
page read and write
3254000
heap
page read and write
37F0000
trusted library allocation
page read and write
65E5000
trusted library allocation
page read and write
3B37000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
3D4D000
trusted library allocation
page read and write
3DC6000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
3EF5000
trusted library allocation
page read and write
3AB9000
trusted library allocation
page read and write
3B57000
trusted library allocation
page read and write
1320000
heap
page read and write
39DB000
trusted library allocation
page read and write
390D000
trusted library allocation
page read and write
567F000
stack
page read and write
3254000
heap
page read and write
3B6B000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
3D15000
trusted library allocation
page read and write
2AF4000
heap
page read and write
38C9000
trusted library allocation
page read and write
73B2D000
unkown
page read and write
3B8D000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
3D64000
trusted library allocation
page read and write
664E000
stack
page read and write
3DAD000
trusted library allocation
page read and write
B00000
unkown
page readonly
36ED000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
394E000
trusted library allocation
page read and write
CDE000
stack
page read and write
2A74000
heap
page read and write
2977000
heap
page read and write
28BC000
stack
page read and write
3C7A000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2AF4000
heap
page read and write
6B3E000
stack
page read and write
3254000
heap
page read and write
3B0A000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
CD1000
unkown
page readonly
D1000
unkown
page execute read
3CD3000
trusted library allocation
page read and write
2A74000
heap
page read and write
3A64000
trusted library allocation
page read and write
3B12000
trusted library allocation
page read and write
23CB2000
heap
page read and write
3D49000
trusted library allocation
page read and write
3254000
heap
page read and write
39C2000
trusted library allocation
page read and write
3E7B000
trusted library allocation
page read and write
3BF4000
trusted library allocation
page read and write
3CB4000
trusted library allocation
page read and write
2FF0000
heap
page read and write
D04000
trusted library allocation
page read and write
397B000
trusted library allocation
page read and write
73B2F000
unkown
page readonly
23BC6000
unkown
page read and write
2381D000
trusted library allocation
page read and write
3A92000
trusted library allocation
page read and write
2B70000
heap
page read and write
D89000
heap
page read and write
529000
unkown
page readonly
2F40000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
3BF0000
trusted library allocation
page read and write
2AF4000
heap
page read and write
372D000
trusted library allocation
page read and write
5141000
unkown
page read and write
30E0000
trusted library allocation
page read and write
37F2000
trusted library allocation
page read and write
3BA5000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
6FC000
stack
page read and write
37EC000
trusted library allocation
page read and write
3030000
trusted library allocation
page execute and read and write
6350000
trusted library allocation
page read and write
3B17000
trusted library allocation
page read and write
2316E000
stack
page read and write
D26000
unkown
page readonly
3137000
heap
page read and write
8D1000
unkown
page execute read
3D01000
trusted library allocation
page read and write
1B0000
unkown
page readonly
23830000
unkown
page read and write
56C0000
heap
page read and write
3EE7000
trusted library allocation
page read and write
D10000
heap
page read and write
3D94000
trusted library allocation
page read and write
3E66000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
3DAB000
trusted library allocation
page read and write
3822000
trusted library allocation
page read and write
3ADE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page execute and read and write
3792000
trusted library allocation
page read and write
3E42000
trusted library allocation
page read and write
2A74000
heap
page read and write
39A1000
trusted library allocation
page read and write
394B000
trusted library allocation
page read and write
44AD000
stack
page read and write
3F1F000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
2371A000
heap
page read and write
3794000
trusted library allocation
page read and write
3A68000
trusted library allocation
page read and write
3A3D000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
2AF4000
heap
page read and write
30FA000
trusted library allocation
page read and write
3D28000
trusted library allocation
page read and write
9E3000
unkown
page write copy
3EFF000
trusted library allocation
page read and write
2CCF000
stack
page read and write
D30000
unkown
page readonly
3636000
trusted library allocation
page read and write
3254000
heap
page read and write
3571000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
38FB000
trusted library allocation
page read and write
397F000
trusted library allocation
page read and write
59EA000
heap
page read and write
30FB000
stack
page read and write
67A8000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page execute and read and write
13E3000
heap
page read and write
38E0000
trusted library allocation
page read and write
3B0E000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
4520000
heap
page read and write
1B0000
unkown
page readonly
4F0E000
stack
page read and write
3659000
trusted library allocation
page read and write
61AC000
heap
page read and write
3A44000
trusted library allocation
page read and write
3254000
heap
page read and write
243CE000
unkown
page read and write
38C5000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
3B58000
trusted library allocation
page read and write
D1A000
unkown
page readonly
5725000
unkown
page read and write
2710000
heap
page read and write
368C000
trusted library allocation
page read and write
3D36000
trusted library allocation
page read and write
399D000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
2A40000
heap
page read and write
5D9E000
stack
page read and write
5CB1000
heap
page read and write
3843000
trusted library allocation
page read and write
64B1000
heap
page read and write
2AEE000
stack
page read and write
3C67000
trusted library allocation
page read and write
5BBE000
stack
page read and write
8F0000
remote allocation
page execute and read and write
62CE000
stack
page read and write
3E9C000
trusted library allocation
page read and write
3D1F000
trusted library allocation
page read and write
6206000
stack
page read and write
3254000
heap
page read and write
3A2B000
trusted library allocation
page read and write
3254000
heap
page read and write
30C0000
trusted library allocation
page read and write
526000
unkown
page readonly
2A54000
heap
page read and write
38F0000
trusted library allocation
page read and write
2A0F000
heap
page read and write
51A000
unkown
page readonly
3D1B000
trusted library allocation
page read and write
3AD5000
trusted library allocation
page read and write
3D38000
trusted library allocation
page read and write
3B40000
trusted library allocation
page read and write
3820000
trusted library allocation
page read and write
3655000
trusted library allocation
page read and write
3254000
heap
page read and write
5D8E000
stack
page read and write
3A97000
trusted library allocation
page read and write
3ACC000
trusted library allocation
page read and write
23294000
heap
page read and write
5AAE000
stack
page read and write
38B5000
trusted library allocation
page read and write
EFB000
stack
page read and write
2AF4000
heap
page read and write
25390000
unkown
page read and write
3880000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
3254000
heap
page read and write
2396E000
stack
page read and write
2AF4000
heap
page read and write
3CE4000
trusted library allocation
page read and write
3AB7000
trusted library allocation
page read and write
37DB000
trusted library allocation
page read and write
44FE000
stack
page read and write
13C2000
heap
page read and write
D1000
unkown
page execute read
3A39000
trusted library allocation
page read and write
3CB2000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
3696000
trusted library allocation
page read and write
5654000
trusted library allocation
page read and write
3CD8000
trusted library allocation
page read and write
2A74000
heap
page read and write
23324000
unkown
page read and write
3932000
trusted library allocation
page read and write
2820000
heap
page read and write
38B2000
trusted library allocation
page read and write
202000
unkown
page readonly
3D70000
trusted library allocation
page read and write
3EB3000
trusted library allocation
page read and write
452A000
heap
page read and write
4870000
heap
page read and write
6470000
trusted library allocation
page execute and read and write
3ABD000
trusted library allocation
page read and write
2AF4000
heap
page read and write
39A3000
trusted library allocation
page read and write
3A1A000
trusted library allocation
page read and write
3C97000
trusted library allocation
page read and write
3B1A000
trusted library allocation
page read and write
5141000
unkown
page read and write
2A74000
heap
page read and write
34DE000
stack
page read and write
264E000
stack
page read and write
3E83000
trusted library allocation
page read and write
3AEA000
trusted library allocation
page read and write
135B000
heap
page read and write
3A33000
trusted library allocation
page read and write
467F000
heap
page read and write
3735000
trusted library allocation
page read and write
3E2D000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
3CCD000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
3C2A000
trusted library allocation
page read and write
44A6000
heap
page read and write
38A0000
trusted library allocation
page execute and read and write
2A74000
heap
page read and write
73B2D000
unkown
page read and write
3DB8000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
3A65000
trusted library allocation
page read and write
3254000
heap
page read and write
3E8A000
trusted library allocation
page read and write
3B6A000
trusted library allocation
page read and write
3D9B000
trusted library allocation
page read and write
A10000
heap
page read and write
372B000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
5B3E000
stack
page read and write
3AB1000
trusted library allocation
page read and write
2BAD000
stack
page read and write
2401D000
trusted library allocation
page read and write
37DD000
trusted library allocation
page read and write
3254000
heap
page read and write
51EE000
stack
page read and write
5141000
unkown
page read and write
3644000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
3A12000
trusted library allocation
page read and write
B6E000
stack
page read and write
6190000
trusted library allocation
page execute and read and write
23320000
unkown
page read and write
3DEF000
trusted library allocation
page read and write
D37000
trusted library allocation
page execute and read and write
399F000
trusted library allocation
page read and write
3766000
trusted library allocation
page read and write
2AF4000
heap
page read and write
295E000
stack
page read and write
37F8000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
250C9000
unkown
page read and write
12B0000
trusted library allocation
page execute and read and write
3254000
heap
page read and write
3C03000
trusted library allocation
page read and write
23449000
heap
page read and write
624E000
stack
page read and write
23060000
heap
page read and write
3A9C000
trusted library allocation
page read and write
2A50000
heap
page read and write
BB0000
direct allocation
page execute and read and write
59B0000
heap
page read and write
4218000
trusted library allocation
page read and write
D1A000
heap
page read and write
73B10000
unkown
page readonly
3F14000
trusted library allocation
page read and write
3926000
trusted library allocation
page read and write
117E000
stack
page read and write
5141000
unkown
page read and write
392C000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
2A74000
heap
page read and write
36CA000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
3A9A000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3D57000
trusted library allocation
page read and write
3D5B000
trusted library allocation
page read and write
3C99000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3BC6000
trusted library allocation
page read and write
3B1A000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
DA7000
heap
page read and write
3BA2000
trusted library allocation
page read and write
2AD3000
heap
page read and write
3254000
heap
page read and write
2B70000
heap
page read and write
58AE000
stack
page read and write
3DC8000
trusted library allocation
page read and write
3A24000
trusted library allocation
page read and write
251C6000
unkown
page read and write
395C000
trusted library allocation
page read and write
5141000
unkown
page read and write
3C9D000
trusted library allocation
page read and write
4DB0000
heap
page read and write
363E000
trusted library allocation
page read and write
5079000
unkown
page read and write
D9E000
stack
page read and write
3D09000
trusted library allocation
page read and write
3B77000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
3EB5000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
3130000
heap
page read and write
22F7B000
stack
page read and write
69C5000
heap
page read and write
53DE000
stack
page read and write
3E94000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
3ABB000
trusted library allocation
page read and write
2A74000
heap
page read and write
3D03000
trusted library allocation
page read and write
3A8C000
trusted library allocation
page read and write
7170000
trusted library allocation
page execute and read and write
36E0000
trusted library allocation
page read and write
DE4000
heap
page read and write
373A000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
2994000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
3CE6000
trusted library allocation
page read and write
29B0000
heap
page read and write
3964000
trusted library allocation
page read and write
2A74000
heap
page read and write
3DC4000
trusted library allocation
page read and write
3D6C000
trusted library allocation
page read and write
2A74000
heap
page read and write
3B01000
trusted library allocation
page read and write
3AD6000
trusted library allocation
page read and write
DCE000
heap
page read and write
3579000
trusted library allocation
page read and write
7D0000
heap
page read and write
3640000
trusted library allocation
page read and write
3CBC000
trusted library allocation
page read and write
2CF6000
heap
page read and write
529000
unkown
page readonly
50B000
unkown
page readonly
750000
heap
page read and write
3AA0000
trusted library allocation
page read and write
38E4000
trusted library allocation
page read and write
3AB1000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
830000
heap
page read and write
3D8C000
trusted library allocation
page read and write
37BE000
trusted library allocation
page read and write
3C84000
trusted library allocation
page read and write
3960000
trusted library allocation
page read and write
61CF000
trusted library allocation
page read and write
242AB000
unkown
page read and write
2F17000
trusted library allocation
page execute and read and write
3B8E000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2790000
trusted library allocation
page read and write
27B0000
heap
page execute and read and write
3D3A000
trusted library allocation
page read and write
CDD000
unkown
page readonly
6950000
trusted library allocation
page read and write
563E000
stack
page read and write
3A4A000
trusted library allocation
page read and write
5D46000
stack
page read and write
377B000
trusted library allocation
page read and write
3BE4000
trusted library allocation
page read and write
3E0A000
trusted library allocation
page read and write
D1A000
unkown
page readonly
3EBB000
trusted library allocation
page read and write
CC7000
unkown
page readonly
530000
unkown
page readonly
38AA000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
3890000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
3928000
trusted library allocation
page read and write
36CF000
trusted library allocation
page read and write
5CB1000
heap
page read and write
5CBE000
stack
page read and write
362D000
trusted library allocation
page read and write
5C4D000
stack
page read and write
2AF4000
heap
page read and write
2CF0000
heap
page read and write
3BA8000
trusted library allocation
page read and write
5045000
unkown
page read and write
5141000
unkown
page read and write
236F0000
trusted library allocation
page read and write
C14000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
58AE000
stack
page read and write
4DD000
unkown
page readonly
23F16000
heap
page read and write
3B8A000
trusted library allocation
page read and write
516E000
stack
page read and write
3ACA000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
3704000
trusted library allocation
page read and write
244B5000
heap
page read and write
3E12000
trusted library allocation
page read and write
4F6E000
stack
page read and write
37AD000
trusted library allocation
page read and write
2680000
heap
page read and write
2DA0000
heap
page read and write
519E000
stack
page read and write
4E2E000
direct allocation
page read and write
2650000
heap
page read and write
4501000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3B82000
trusted library allocation
page read and write
38CD000
trusted library allocation
page read and write
4EBF000
stack
page read and write
D1E000
heap
page read and write
3623000
trusted library allocation
page read and write
3B53000
trusted library allocation
page read and write
3B54000
trusted library allocation
page read and write
6354000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
3254000
heap
page read and write
3BBC000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
CB8000
unkown
page write copy
23E52000
heap
page read and write
A75000
heap
page read and write
336E000
stack
page read and write
3B20000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
3617000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
3CAE000
trusted library allocation
page read and write
C7D000
heap
page read and write
388C000
trusted library allocation
page read and write
2A74000
heap
page read and write
59E0000
heap
page read and write
3AEC000
trusted library allocation
page read and write
3941000
trusted library allocation
page read and write
36C8000
trusted library allocation
page read and write
3F21000
trusted library allocation
page read and write
3EFD000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
34F0000
heap
page execute and read and write
69F0000
heap
page read and write
3B71000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
55FF000
stack
page read and write
2AF4000
heap
page read and write
202000
unkown
page readonly
6D00000
trusted library allocation
page read and write
3254000
heap
page read and write
61AC000
trusted library allocation
page read and write
3BFF000
trusted library allocation
page read and write
580D000
stack
page read and write
500F000
stack
page read and write
23171000
heap
page read and write
C24000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
24A14000
unkown
page read and write
5B40000
trusted library allocation
page read and write
3B89000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
22F2E000
heap
page read and write
850000
unkown
page readonly
3E85000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
39CD000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
3254000
heap
page read and write
3B84000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
4BED000
direct allocation
page read and write
3B9E000
trusted library allocation
page read and write
61C5000
heap
page read and write
3EFB000
trusted library allocation
page read and write
3C65000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
3DFC000
trusted library allocation
page read and write
4DB9000
direct allocation
page read and write
2AF4000
heap
page read and write
2AF4000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
2408E000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
253D9000
unkown
page read and write
61A0000
trusted library allocation
page read and write
3574000
trusted library allocation
page read and write
23B20000
unkown
page read and write
3E3E000
trusted library allocation
page read and write
DD2000
heap
page read and write
39BA000
trusted library allocation
page read and write
C13000
trusted library allocation
page execute and read and write
59D0000
heap
page execute and read and write
3A92000
trusted library allocation
page read and write
3B16000
trusted library allocation
page read and write
3B1E000
trusted library allocation
page read and write
6650000
trusted library allocation
page execute and read and write
3762000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
2D3F000
trusted library allocation
page read and write
B7E000
stack
page read and write
31D1000
heap
page read and write
3254000
heap
page read and write
2A90000
heap
page read and write
3BF2000
trusted library allocation
page read and write
5980000
trusted library allocation
page execute and read and write
59AF000
stack
page read and write
38C3000
trusted library allocation
page read and write
346E000
stack
page read and write
3D6E000
trusted library allocation
page read and write
3975000
trusted library allocation
page read and write
50B000
unkown
page readonly
3254000
heap
page read and write
3254000
heap
page read and write
6890000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
2A74000
heap
page read and write
320E000
stack
page read and write
37AF000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
4F2F000
stack
page read and write
3748000
trusted library allocation
page read and write
37B7000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page execute and read and write
387D000
trusted library allocation
page read and write
3EB9000
trusted library allocation
page read and write
3E23000
trusted library allocation
page read and write
C60000
heap
page read and write
3783000
trusted library allocation
page read and write
3E7D000
trusted library allocation
page read and write
3254000
heap
page read and write
3673000
trusted library allocation
page read and write
4AC0000
direct allocation
page read and write
FF8000
stack
page read and write
5740000
trusted library allocation
page read and write
3254000
heap
page read and write
3D62000
trusted library allocation
page read and write
202000
unkown
page readonly
368E000
trusted library allocation
page read and write
3B88000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
566F000
stack
page read and write
3B0B000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
3856000
trusted library allocation
page read and write
3D5D000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
375E000
stack
page read and write
38DA000
trusted library allocation
page read and write
3701000
trusted library allocation
page read and write
3690000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
5140000
unkown
page read and write
29D3000
heap
page read and write
530000
unkown
page readonly
3B55000
trusted library allocation
page read and write
3A6A000
trusted library allocation
page read and write
382A000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
61C4000
trusted library allocation
page read and write
2A74000
heap
page read and write
6130000
trusted library allocation
page read and write
3C93000
trusted library allocation
page read and write
3718000
trusted library allocation
page read and write
3254000
heap
page read and write
2F2B000
trusted library allocation
page execute and read and write
28DD000
heap
page read and write
3C4E000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
3A66000
trusted library allocation
page read and write
DD0000
heap
page read and write
3B4E000
trusted library allocation
page read and write
3C9B000
trusted library allocation
page read and write
3AAF000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
3D7E000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
3A16000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
6A0E000
heap
page read and write
3CF0000
trusted library allocation
page read and write
5141000
unkown
page read and write
1E3000
unkown
page read and write
3B8B000
trusted library allocation
page read and write
3AAD000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
2AF4000
heap
page read and write
61C0000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2AF4000
heap
page read and write
3254000
heap
page read and write
B1E000
unkown
page readonly
2A54000
heap
page read and write
61A9000
trusted library allocation
page read and write
370C000
trusted library allocation
page read and write
5141000
unkown
page read and write
34AE000
stack
page read and write
36F0000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
4D1000
unkown
page readonly
3AE1000
trusted library allocation
page read and write
610D000
stack
page read and write
3D05000
trusted library allocation
page read and write
49D5000
trusted library allocation
page read and write
A70000
heap
page read and write
3D2E000
trusted library allocation
page read and write
563E000
stack
page read and write
2BC0000
heap
page read and write
4D1000
unkown
page readonly
3CFD000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
62C0000
trusted library allocation
page execute and read and write
1E4000
unkown
page write copy
23AA3000
unkown
page read and write
5040000
unkown
page read and write
2F0A000
trusted library allocation
page read and write
5141000
unkown
page read and write
3930000
trusted library allocation
page read and write
1245000
heap
page read and write
2BB0000
heap
page read and write
3AC0000
trusted library allocation
page read and write
D43000
heap
page read and write
4A1D000
trusted library allocation
page read and write
3A37000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3A96000
trusted library allocation
page read and write
3A4E000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
5FCF000
stack
page read and write
3B6D000
trusted library allocation
page read and write
3B76000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
3EAF000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
4EDE000
stack
page read and write
5141000
unkown
page read and write
5690000
trusted library allocation
page read and write
2A3C000
stack
page read and write
3841000
trusted library allocation
page read and write
2EC0000
heap
page read and write
472E000
stack
page read and write
5E8000
stack
page read and write
3864000
trusted library allocation
page read and write
36F5000
trusted library allocation
page read and write
3254000
heap
page read and write
820000
remote allocation
page execute and read and write
3562000
trusted library allocation
page read and write
3B85000
trusted library allocation
page read and write
36F7000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
2A9F000
stack
page read and write
E4E000
stack
page read and write
25112000
unkown
page read and write
3D86000
trusted library allocation
page read and write
BC0000
heap
page read and write
2AF4000
heap
page read and write
5D5D000
stack
page read and write
39D1000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
3B8C000
trusted library allocation
page read and write
3196000
heap
page read and write
3AD9000
trusted library allocation
page read and write
4E0000
unkown
page readonly
3254000
heap
page read and write
3A18000
trusted library allocation
page read and write
57AE000
stack
page read and write
3B37000
trusted library allocation
page read and write
28FB000
stack
page read and write
36A7000
trusted library allocation
page read and write
2A54000
heap
page read and write
576F000
stack
page read and write
3C51000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
3CB8000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
2A74000
heap
page read and write
3DB3000
trusted library allocation
page read and write
5D30000
trusted library section
page read and write
2A74000
heap
page read and write
61A2000
trusted library allocation
page read and write
CE0000
direct allocation
page execute and read and write
3D19000
trusted library allocation
page read and write
3945000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
3B70000
trusted library allocation
page read and write
594E000
stack
page read and write
3BDB000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
287C000
stack
page read and write
3710000
trusted library allocation
page read and write
3A29000
trusted library allocation
page read and write
68D0000
trusted library section
page read and write
D0B000
unkown
page readonly
3E16000
trusted library allocation
page read and write
12C0000
heap
page read and write
AFC000
stack
page read and write
3EB7000
trusted library allocation
page read and write
3A7F000
trusted library allocation
page read and write
3D23000
trusted library allocation
page read and write
3657000
trusted library allocation
page read and write
3D90000
trusted library allocation
page read and write
1700000
heap
page read and write
D0000
unkown
page readonly
C4B000
trusted library allocation
page execute and read and write
4F71000
unkown
page read and write
2AF4000
heap
page read and write
4A6D000
trusted library allocation
page read and write
6C0000
unkown
page readonly
3EE4000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
36E6000
trusted library allocation
page execute and read and write
5D21000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3BD5000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
69C2000
heap
page read and write
2A74000
heap
page read and write
39E8000
trusted library allocation
page read and write
3254000
heap
page read and write
39F0000
trusted library allocation
page read and write
3BEE000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
3D44000
trusted library allocation
page read and write
5CB0000
heap
page read and write
367E000
trusted library allocation
page read and write
3A4C000
trusted library allocation
page read and write
2DB0000
direct allocation
page read and write
2EFD000
trusted library allocation
page execute and read and write
CF0000
trusted library allocation
page read and write
73B11000
unkown
page execute read
382E000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
3C6D000
trusted library allocation
page read and write
4E9E000
stack
page read and write
61B6000
heap
page read and write
3B33000
trusted library allocation
page read and write
2AF4000
heap
page read and write
385E000
stack
page read and write
38DE000
trusted library allocation
page read and write
4F71000
unkown
page read and write
36DF000
stack
page read and write
3EE2000
trusted library allocation
page read and write
3EBE000
trusted library allocation
page read and write
3A98000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
2A74000
heap
page read and write
3BA0000
trusted library allocation
page read and write
3A62000
trusted library allocation
page read and write
3B73000
trusted library allocation
page read and write
3ADB000
trusted library allocation
page read and write
3E0E000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
3B1C000
trusted library allocation
page read and write
36AB000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
A6E000
stack
page read and write
24B94000
unkown
page read and write
3D72000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
3254000
heap
page read and write
23B95000
unkown
page read and write
249C4000
unkown
page read and write
36AF000
trusted library allocation
page read and write
2A74000
heap
page read and write
3A5F000
trusted library allocation
page read and write
3A8E000
trusted library allocation
page read and write
C98000
heap
page read and write
3C18000
trusted library allocation
page read and write
3E4A000
trusted library allocation
page read and write
38A6000
trusted library allocation
page read and write
687E000
stack
page read and write
4E2E000
stack
page read and write
5B50000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
5CB1000
heap
page read and write
3E48000
trusted library allocation
page read and write
2870000
heap
page read and write
380F000
trusted library allocation
page read and write
3714000
trusted library allocation
page read and write
3C07000
trusted library allocation
page read and write
45C9000
heap
page read and write
5141000
unkown
page read and write
3B9C000
trusted library allocation
page read and write
3A6D000
trusted library allocation
page read and write
466F000
trusted library allocation
page read and write
2940000
heap
page read and write
530D000
stack
page read and write
3B3B000
trusted library allocation
page read and write
3BBE000
trusted library allocation
page read and write
3254000
heap
page read and write
3CCB000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page execute and read and write
36C0000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
489E000
stack
page read and write
63CE000
stack
page read and write
A6E000
stack
page read and write
361D000
trusted library allocation
page read and write
2388E000
trusted library allocation
page read and write
5DDE000
stack
page read and write
3956000
trusted library allocation
page read and write
388E000
trusted library allocation
page read and write
107E000
stack
page read and write
3903000
trusted library allocation
page read and write
3AC2000
trusted library allocation
page read and write
67D2000
trusted library allocation
page read and write
2950000
heap
page read and write
3642000
trusted library allocation
page read and write
69AC000
heap
page read and write
9E3000
unkown
page read and write
3BD7000
trusted library allocation
page read and write
3D6A000
trusted library allocation
page read and write
2A54000
heap
page read and write
35B0000
heap
page read and write
3D3E000
trusted library allocation
page read and write
2A74000
heap
page read and write
5D10000
trusted library allocation
page read and write
2960000
heap
page read and write
3B22000
trusted library allocation
page read and write
23860000
heap
page read and write
3E29000
trusted library allocation
page read and write
286C000
stack
page read and write
3B08000
trusted library allocation
page read and write
3A2F000
trusted library allocation
page read and write
3E98000
trusted library allocation
page read and write
5141000
unkown
page read and write
3BD1000
trusted library allocation
page read and write
2AF4000
heap
page read and write
37D9000
trusted library allocation
page read and write
29A0000
heap
page read and write
39EC000
trusted library allocation
page read and write
250C1000
unkown
page read and write
2D3D000
stack
page read and write
3B0C000
trusted library allocation
page read and write
7E0000
heap
page read and write
55FE000
stack
page read and write
39D3000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
3943000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
3C76000
trusted library allocation
page read and write
3B27000
trusted library allocation
page read and write
380B000
trusted library allocation
page read and write
68B0000
trusted library allocation
page execute and read and write
3B15000
trusted library allocation
page read and write
3CCF000
trusted library allocation
page read and write
3DCC000
trusted library allocation
page read and write
3AF0000
trusted library allocation
page read and write
9B0000
unkown
page readonly
3EC000
stack
page read and write
3EF7000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
CDD000
unkown
page readonly
2AF4000
heap
page read and write
2F1A000
trusted library allocation
page execute and read and write
5F0E000
stack
page read and write
4CEE000
stack
page read and write
36FB000
trusted library allocation
page execute and read and write
36B5000
trusted library allocation
page read and write
6360000
trusted library allocation
page execute and read and write
6920000
trusted library allocation
page read and write
6930000
trusted library allocation
page execute and read and write
15EF000
stack
page read and write
2A54000
heap
page read and write
3254000
heap
page read and write
4952000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2B40000
heap
page read and write
3C24000
trusted library allocation
page read and write
4CE0000
heap
page read and write
3E68000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
5247000
unkown
page read and write
3BAE000
trusted library allocation
page read and write
D18000
trusted library allocation
page read and write
3100000
heap
page read and write
5760000
heap
page execute and read and write
CD1000
unkown
page readonly
23C44000
heap
page read and write
3EE0000
trusted library allocation
page read and write
D93000
heap
page read and write
6970000
trusted library section
page read and write
529F000
stack
page read and write
3BEC000
trusted library allocation
page read and write
3D0C000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
3A36000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
5141000
unkown
page read and write
3A6C000
trusted library allocation
page read and write
3F1A000
trusted library allocation
page read and write
2AF4000
heap
page read and write
2AF4000
heap
page read and write
4B73000
trusted library allocation
page read and write
3B6F000
trusted library allocation
page read and write
60FE000
stack
page read and write
3809000
trusted library allocation
page read and write
3949000
trusted library allocation
page read and write
248C0000
unkown
page read and write
2BC8000
heap
page read and write
379A000
trusted library allocation
page read and write
3646000
trusted library allocation
page read and write
2AF4000
heap
page read and write
49B3000
trusted library allocation
page read and write
2AF4000
heap
page read and write
24019000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
2397A000
heap
page read and write
4DEF000
stack
page read and write
5E0E000
stack
page read and write
37AB000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
660F000
trusted library allocation
page read and write
369A000
trusted library allocation
page read and write
4A1E000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
249CB000
unkown
page read and write
61F0000
heap
page read and write
2A74000
heap
page read and write
D26000
unkown
page readonly
5C7F000
stack
page read and write
4C5E000
direct allocation
page read and write
2A74000
heap
page read and write
39F6000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
1E3000
unkown
page write copy
2AF4000
heap
page read and write
64B0000
heap
page read and write
73B26000
unkown
page readonly
3C69000
trusted library allocation
page read and write
3C48000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
3CFB000
trusted library allocation
page read and write
1368000
heap
page read and write
278E000
stack
page read and write
3740000
trusted library allocation
page read and write
3C6B000
trusted library allocation
page read and write
3D74000
trusted library allocation
page read and write
6215000
heap
page read and write
3E6F000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
371F000
trusted library allocation
page read and write
299D000
trusted library allocation
page execute and read and write
39F2000
trusted library allocation
page read and write
2F27000
trusted library allocation
page execute and read and write
3815000
trusted library allocation
page read and write
4EB000
stack
page read and write
3D21000
trusted library allocation
page read and write
3E79000
trusted library allocation
page read and write
3A10000
trusted library allocation
page read and write
2A74000
heap
page read and write
3AAB000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
1240000
heap
page read and write
38EA000
trusted library allocation
page read and write
3B4F000
trusted library allocation
page read and write
D32000
trusted library allocation
page read and write
385E000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
2EBF000
stack
page read and write
3764000
trusted library allocation
page read and write
3254000
heap
page read and write
462F000
stack
page read and write
395A000
trusted library allocation
page read and write
130E000
stack
page read and write
2A74000
heap
page read and write
69FF000
heap
page read and write
3D53000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
39C4000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
B15000
unkown
page readonly
3B24000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
D0000
unkown
page readonly
5685000
trusted library allocation
page read and write
3ADF000
trusted library allocation
page read and write
D3B000
trusted library allocation
page execute and read and write
E5F000
stack
page read and write
3CBA000
trusted library allocation
page read and write
76C000
stack
page read and write
62D0000
trusted library allocation
page execute and read and write
2A54000
heap
page read and write
5DB9000
heap
page read and write
5660000
trusted library allocation
page read and write
D30000
unkown
page readonly
26F0000
trusted library allocation
page execute and read and write
3DF5000
trusted library allocation
page read and write
D29000
unkown
page readonly
A20000
heap
page read and write
3B39000
trusted library allocation
page read and write
3AC6000
trusted library allocation
page read and write
DDC000
heap
page read and write
3AF3000
trusted library allocation
page read and write
CC7000
unkown
page readonly
37F6000
trusted library allocation
page read and write
3CD5000
trusted library allocation
page read and write
47A2000
heap
page read and write
2EE0000
trusted library allocation
page read and write
3D98000
trusted library allocation
page read and write
D26000
trusted library allocation
page execute and read and write
2D7F000
stack
page read and write
1FF000
unkown
page read and write
372F000
trusted library allocation
page read and write
62AE000
stack
page read and write
4E50000
heap
page read and write
3C12000
trusted library allocation
page read and write
3C09000
trusted library allocation
page read and write
60BC000
stack
page read and write
1270000
heap
page read and write
51AF000
stack
page read and write
3254000
heap
page read and write
3CE8000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
3250000
heap
page read and write
36C2000
trusted library allocation
page read and write
2F8E000
stack
page read and write
3E14000
trusted library allocation
page read and write
3254000
heap
page read and write
3AE5000
trusted library allocation
page read and write
3A67000
trusted library allocation
page read and write
2A74000
heap
page read and write
3ADD000
trusted library allocation
page read and write
586F000
stack
page read and write
9B0000
unkown
page readonly
37B9000
trusted library allocation
page read and write
3C95000
trusted library allocation
page read and write
395E000
trusted library allocation
page read and write
39E6000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
308D000
stack
page read and write
58EE000
stack
page read and write
C8A000
heap
page read and write
3254000
heap
page read and write
3848000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
3254000
heap
page read and write
2AF4000
heap
page read and write
3501000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3C26000
trusted library allocation
page read and write
5B70000
heap
page execute and read and write
3DB6000
trusted library allocation
page read and write
D13000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
3AA5000
trusted library allocation
page read and write
526000
unkown
page readonly
2993000
trusted library allocation
page execute and read and write
3C0D000
trusted library allocation
page read and write
3BDB000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
2AF4000
heap
page read and write
6A0B000
heap
page read and write
343E000
trusted library allocation
page read and write
86C000
unkown
page read and write
3D1D000
trusted library allocation
page read and write
628E000
stack
page read and write
6C2000
unkown
page readonly
3B72000
trusted library allocation
page read and write
2A74000
heap
page read and write
134D000
heap
page read and write
3B5D000
trusted library allocation
page read and write
2377B000
stack
page read and write
4BE9000
direct allocation
page read and write
23EF0000
trusted library allocation
page read and write
3A46000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
3B10000
trusted library allocation
page read and write
3DF1000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
676E000
stack
page read and write
3E0C000
trusted library allocation
page read and write
3E87000
trusted library allocation
page read and write
3BC8000
trusted library allocation
page read and write
36EA000
trusted library allocation
page execute and read and write
3D92000
trusted library allocation
page read and write
4C7000
unkown
page readonly
3254000
heap
page read and write
2AF4000
heap
page read and write
3254000
heap
page read and write
3CB6000
trusted library allocation
page read and write
4807000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
3E9A000
trusted library allocation
page read and write
3A83000
trusted library allocation
page read and write
162E000
stack
page read and write
4DE0000
trusted library allocation
page read and write
3254000
heap
page read and write
D29000
unkown
page readonly
3B03000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
6A15000
heap
page read and write
4DBD000
direct allocation
page read and write
3896000
trusted library allocation
page read and write
3BD3000
trusted library allocation
page read and write
3860000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
506F000
stack
page read and write
D00000
trusted library allocation
page read and write
2CFE000
stack
page read and write
3B91000
trusted library allocation
page read and write
2AF4000
heap
page read and write
62F0000
trusted library allocation
page read and write
3BA4000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
CF0000
trusted library section
page read and write
38C0000
heap
page execute and read and write
3807000
trusted library allocation
page read and write
3254000
heap
page read and write
36F9000
trusted library allocation
page read and write
482F000
stack
page read and write
385C000
trusted library allocation
page read and write
CE0000
unkown
page readonly
9E4000
unkown
page write copy
56B0000
unkown
page read and write
668F000
trusted library allocation
page read and write
2372E000
heap
page read and write
3E44000
trusted library allocation
page read and write
3DF3000
trusted library allocation
page read and write
3716000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
382C000
trusted library allocation
page read and write
3A48000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
D54000
heap
page read and write
3769000
trusted library allocation
page read and write
2DDB000
stack
page read and write
3862000
trusted library allocation
page read and write
4DD000
unkown
page readonly
3A7B000
trusted library allocation
page read and write
C82000
heap
page read and write
DA0000
heap
page read and write
3D59000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
1328000
heap
page read and write
3C80000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
2AF4000
heap
page read and write
249C0000
trusted library allocation
page read and write
3723000
trusted library allocation
page read and write
3EF9000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
3977000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BA3000
trusted library allocation
page read and write
2970000
heap
page read and write
573E000
stack
page read and write
D10000
trusted library allocation
page read and write
3DED000
trusted library allocation
page read and write
2AF4000
heap
page read and write
6153000
trusted library allocation
page read and write
3C1A000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
8D1000
unkown
page execute read
39A5000
trusted library allocation
page read and write
37EE000
trusted library allocation
page read and write
3A33000
trusted library allocation
page read and write
3E40000
trusted library allocation
page read and write
2AF4000
heap
page read and write
3BDD000
trusted library allocation
page read and write
68A0000
trusted library allocation
page execute and read and write
6600000
trusted library allocation
page read and write
2A74000
heap
page read and write
3B83000
trusted library allocation
page read and write
3254000
heap
page read and write
38AE000
trusted library allocation
page read and write
38A8000
trusted library allocation
page read and write
3BCB000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
BBE000
stack
page read and write
248C0000
trusted library allocation
page read and write
3AEE000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
3C7E000
trusted library allocation
page read and write
6390000
trusted library allocation
page execute and read and write
BD0000
heap
page read and write
3B74000
trusted library allocation
page read and write
E90000
trusted library section
page read and write
64B1000
heap
page read and write
5AFE000
stack
page read and write
3EB1000
trusted library allocation
page read and write
250C0000
unkown
page read and write
36E2000
trusted library allocation
page read and write
2A70000
heap
page read and write
3621000
trusted library allocation
page read and write
26E0000
heap
page read and write
3C63000
trusted library allocation
page read and write
61C6000
trusted library allocation
page read and write
36C6000
trusted library allocation
page read and write
3D25000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
61C2000
heap
page read and write
CE0000
unkown
page readonly
2A74000
heap
page read and write
36CC000
trusted library allocation
page read and write
6960000
trusted library allocation
page execute and read and write
3C4C000
trusted library allocation
page read and write
36C4000
trusted library allocation
page read and write
3A6A000
trusted library allocation
page read and write
3D80000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
3733000
trusted library allocation
page read and write
3C9F000
trusted library allocation
page read and write
65B9000
heap
page read and write
B1C000
unkown
page read and write
250C0000
trusted library allocation
page read and write
4C90000
direct allocation
page read and write
51A000
unkown
page readonly
3D3C000
trusted library allocation
page read and write
3DC2000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
3A8A000
trusted library allocation
page read and write
3BF8000
trusted library allocation
page read and write
6440000
trusted library section
page read and write
3254000
heap
page read and write
3AE7000
trusted library allocation
page read and write
8D0000
unkown
page readonly
3AE3000
trusted library allocation
page read and write
69B6000
heap
page read and write
36FB000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
509F000
stack
page read and write
2B50000
direct allocation
page read and write
2AF4000
heap
page read and write
3BA9000
trusted library allocation
page read and write
3A87000
trusted library allocation
page read and write
3254000
heap
page read and write
35AE000
stack
page read and write
3BAB000
trusted library allocation
page read and write
36FF000
trusted library allocation
page read and write
3A85000
trusted library allocation
page read and write
4E0000
unkown
page readonly
D0D000
trusted library allocation
page execute and read and write
A02000
unkown
page readonly
5141000
unkown
page read and write
3BD7000
trusted library allocation
page read and write
3EAD000
trusted library allocation
page read and write
51AE000
stack
page read and write
3C44000
trusted library allocation
page read and write
3692000
trusted library allocation
page read and write
BAE000
stack
page read and write
3B52000
trusted library allocation
page read and write
B01000
unkown
page execute read
392A000
trusted library allocation
page read and write
2AF4000
heap
page read and write
30F6000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
E8E000
stack
page read and write
4F70000
unkown
page read and write
3CB0000
trusted library allocation
page read and write
2A54000
heap
page read and write
3B8F000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
2648000
trusted library allocation
page read and write
60CE000
stack
page read and write
CE0000
trusted library section
page read and write
2AF4000
heap
page read and write
2A74000
heap
page read and write
2920000
heap
page read and write
3BC2000
trusted library allocation
page read and write
3B5E000
trusted library allocation
page read and write
5220000
heap
page read and write
39EE000
trusted library allocation
page read and write
3F01000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2A74000
heap
page read and write
3C5F000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
3254000
heap
page read and write
3BC4000
trusted library allocation
page read and write
D0B000
unkown
page readonly
6794000
trusted library allocation
page read and write
3254000
heap
page read and write
377F000
trusted library allocation
page read and write
1730000
heap
page read and write
3E6A000
trusted library allocation
page read and write
3254000
heap
page read and write
4E2E000
stack
page read and write
30EC000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
3725000
trusted library allocation
page read and write
4E70000
unkown
page read and write
3DCF000
trusted library allocation
page read and write
3C4A000
trusted library allocation
page read and write
62E0000
trusted library allocation
page execute and read and write
3EA0000
trusted library allocation
page read and write
23A9D000
heap
page read and write
2980000
trusted library allocation
page read and write
3CE2000
trusted library allocation
page read and write
38FF000
trusted library allocation
page read and write
4C7000
unkown
page readonly
930000
heap
page read and write
A02000
unkown
page readonly
7190000
trusted library allocation
page read and write
3254000
heap
page read and write
36F7000
trusted library allocation
page execute and read and write
2A3E000
stack
page read and write
2A74000
heap
page read and write
3AA7000
trusted library allocation
page read and write
3924000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
3AC4000
trusted library allocation
page read and write
2ADE000
stack
page read and write
5678000
trusted library allocation
page read and write
There are 1512 hidden memdumps, click here to show them.