Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\ISSee730.rra
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\ISSetup.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\_Sete701.rra
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\_Setup.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\data1.cab (copy)
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\data1.hdr (copy)
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\datae684.rra
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\datae6a3.rra
|
InstallShield CAB
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\layoe675.rra
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\layout.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setue6d2.rra
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setue75f.rra
|
data
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setue79d.rra
|
Generic INItialization configuration [Languages]
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setup.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setup.ilg (copy)
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setup.ini
|
Generic INItialization configuration [Languages]
|
dropped
|
||
C:\Program Files (x86)\InstallShield Installation Information\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setup.inx (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\87f9.rra
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\ISSetup.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\_Setup.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\data1.cab
|
InstallShield CAB
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\data1.hdr
|
InstallShield CAB
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\layout.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\setup.ini
|
Generic INItialization configuration [Languages]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\setup.inx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\Disk1\setup.iss
|
Generic INItialization configuration [File Transfer]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\_Setup.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{778FCF74-FE94-4145-9E73-38A3FDF64CF5}\setup.ini
|
Generic INItialization configuration [Languages]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\ISBE8b26.rra
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\ISBEW64.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\core8af7.rra
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\corecomp.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\dotn8b06.rra
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\dotnetinstaller.exe (copy)
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\DIFx8b26.rra
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\DIFxData.ini
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Font8b16.rra
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\FontData.ini
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Lice8ad7.rra
|
ASCII text, with very long lines (943), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\License.txt
(copy)
|
ASCII text, with very long lines (943), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Setu8ae7.rra
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\SetupEx.dll
(copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Stri8b35.rra
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\StringTable-0009-English.ips
(copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2e849.rra
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2e859.rra
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2e869.rra
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2pl.cat
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2pl.inf
(copy)
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2pl.sys
(copy)
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\Vista\ser2pl64.sys
(copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\_IsR8b64.rra
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\_IsRes.dll
(copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\defa8b54.rra
|
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\default.pal
(copy)
|
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\isrt.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\isrt8b45.rra
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setu898f.rra
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\setup.inx (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\SETE963.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\SETE9B2.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\SETE9C2.tmp
|
Windows setup INFormation
|
modified
|
||
C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\ser2pl.cat (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\ser2pl.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\ser2pl64.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\INF\SERSe7ec.rra
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\SERWe7ec.rra
|
Generic INItialization configuration [Pro]
|
dropped
|
||
C:\Windows\INF\oem4.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\setupapi.dev.log
|
Generic INItialization configuration [BeginLog]
|
dropped
|
||
C:\Windows\SysWOW64\SER9PL.sys (copy)
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\SER9e7cc.rra
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\SERSPL.VXD (copy)
|
MS-DOS executable, LE executable for MS Windows (VxD)
|
dropped
|
||
C:\Windows\SysWOW64\SERSe7dc.rra
|
MS-DOS executable, LE executable for MS Windows (VxD)
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{70b83d36-4fd5-fd40-b014-79cd26fdf766}\SETEE54.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{70b83d36-4fd5-fd40-b014-79cd26fdf766}\SETEEB3.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{70b83d36-4fd5-fd40-b014-79cd26fdf766}\SETEEC4.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{70b83d36-4fd5-fd40-b014-79cd26fdf766}\ser2pl.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{70b83d36-4fd5-fd40-b014-79cd26fdf766}\ser2pl.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{70b83d36-4fd5-fd40-b014-79cd26fdf766}\ser2pl64.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\catroot2\dberr.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\Temp\Delee81a.rra
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\DeleteUSB.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\PLUninst.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\QReme7fb.rra
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\QRemover.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\Unine82a.rra
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\Uninstall.ICO (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\Uninstall.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\inf\SERSPL.INF (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\inf\SERWPL.INF (copy)
|
Generic INItialization configuration [Pro]
|
dropped
|
There are 82 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{db8292e7-9182-634b-bd0b-24ec6dd32e91}\ser2pl.inf" "9" "4da2256ef" "000000000000015C"
"WinSta0\Default" "0000000000000170" "208" "C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}\VISTA"
|
||
C:\Users\user\Desktop\Setup.exe
|
"C:\Users\user\Desktop\Setup.exe"
|
||
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\ISBEW64.exe
|
C:\Users\user\AppData\Local\Temp\{90526762-4976-408D-B1EE-8DD48247745C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{11912180-FEB4-44CD-AFBE-10E73F62322C}
|
||
C:\Windows\System32\SrTasks.exe
|
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://deviis4.installshield.com/NetNirvana/
|
unknown
|
||
http://deviis4.installshield.com/NetNirvana/data2.cabDisk1
|
unknown
|
||
http://www.macrovision.com0
|
unknown
|
||
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
|
unknown
|
||
http://crl.thawte.com/ThawtePremiumServerCA.crl0
|
unknown
|
||
http://www.installshield.com/isetup/ProErrorC
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
http://www.intallshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
|
unknown
|
||
http://crl.thawte.com/ThawteCodeSigningCA.crl0
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIError
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIResult
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
FirstRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
SRInitDone
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\PL-2303 Driver Installer.exe
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\PL-2303 Driver Installer.exe
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
LogFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
ProductGuid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
RegOwner
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
LogMode
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
|
setupapi.dev.log
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
RPSessionInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ECC3713C-08A4-40E3-95F1-7D0704F1CE5E}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
There are 149 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28A0000
|
heap
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
4E42000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
50D3000
|
heap
|
page read and write
|
||
4EF7000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
24ECB2BA000
|
heap
|
page read and write
|
||
24ECB2CD000
|
heap
|
page read and write
|
||
72F000
|
stack
|
page read and write
|
||
24ECB2D3000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
FB9197E000
|
stack
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
4919000
|
heap
|
page read and write
|
||
4949000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
4208000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
286EF78A000
|
heap
|
page read and write
|
||
286EF773000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286EF730000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB2F2000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
4E44000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
24ECB30D000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
24ECB34F000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
24ECB2B2000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
4932000
|
heap
|
page read and write
|
||
4246000
|
heap
|
page read and write
|
||
48DD000
|
heap
|
page read and write
|
||
423D000
|
heap
|
page read and write
|
||
49D4000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
24ECB2DE000
|
heap
|
page read and write
|
||
5E14000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
24ECB2FE000
|
heap
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
24ECB220000
|
heap
|
page read and write
|
||
4891000
|
heap
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
4180000
|
direct allocation
|
page execute and read and write
|
||
5D8D000
|
heap
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
4918000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
77B000
|
heap
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
24ECB2CB000
|
heap
|
page read and write
|
||
5DA4000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
229F000
|
stack
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
24ECB290000
|
heap
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
4A59000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
24ECB2FF000
|
heap
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
449000
|
unkown
|
page readonly
|
||
286EF7CA000
|
heap
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
49EB000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
41DF000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
4918000
|
heap
|
page read and write
|
||
5107000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
41D9000
|
heap
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4932000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
5DC5000
|
heap
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
4A26000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
171000
|
stack
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B8A000
|
trusted library allocation
|
page read and write
|
||
50E2000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286F1B8D000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB351000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
5E09000
|
heap
|
page read and write
|
||
5D11000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
4E45000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
24ECB34B000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
421F000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
41E6000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
heap
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
4272000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
4AA000
|
heap
|
page read and write
|
||
41DE000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
41DC000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
24ECB2CC000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1510000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
4F2E000
|
heap
|
page read and write
|
||
4F19000
|
heap
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
24ECB2B9000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286EF720000
|
heap
|
page read and write
|
||
5D4C000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
4932000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
41F9000
|
heap
|
page read and write
|
||
511E000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
4EB2000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
4237000
|
heap
|
page read and write
|
||
286EF78B000
|
heap
|
page read and write
|
||
24ECB351000
|
heap
|
page read and write
|
||
24ECB200000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
heap
|
page read and write
|
||
4A59000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
24ECB1F0000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
5D54000
|
heap
|
page read and write
|
||
24ECB2ED000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
28A6000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
4918000
|
heap
|
page read and write
|
||
4E53000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B77000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF990000
|
heap
|
page read and write
|
||
24ECB351000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
41E7000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
24ECB340000
|
heap
|
page read and write
|
||
50EC000
|
heap
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EF7D6000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
7B9000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
24ECB34A000
|
heap
|
page read and write
|
||
41D6000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
24ECB2FC000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
24ECB295000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
4EE9000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
5E4A000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
41FB000
|
heap
|
page read and write
|
||
4244000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
425D000
|
heap
|
page read and write
|
||
4282000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
48C2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B88000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
24ECB2F2000
|
heap
|
page read and write
|
||
286EF78D000
|
heap
|
page read and write
|
||
4267000
|
heap
|
page read and write
|
||
24ECB346000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
24ECB340000
|
heap
|
page read and write
|
||
286F1B74000
|
trusted library allocation
|
page read and write
|
||
286F17E0000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
FB918FF000
|
stack
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286EF792000
|
heap
|
page read and write
|
||
49A9000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
24ECB2F1000
|
heap
|
page read and write
|
||
286F1B71000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
41C3000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
4909000
|
heap
|
page read and write
|
||
4F2E000
|
heap
|
page read and write
|
||
41DA000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286EF78A000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B70000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B73000
|
trusted library allocation
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
4EDD000
|
heap
|
page read and write
|
||
45A000
|
unkown
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
24ECB343000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
41E3000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
4A82000
|
heap
|
page read and write
|
||
4A47000
|
heap
|
page read and write
|
||
4EDD000
|
heap
|
page read and write
|
||
24ECB34A000
|
heap
|
page read and write
|
||
24ECB2EF000
|
heap
|
page read and write
|
||
48D6000
|
heap
|
page read and write
|
||
286F1B79000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
24ECB2C4000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286EF78B000
|
heap
|
page read and write
|
||
41E6000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
24ECB340000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
7A1000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
4F09000
|
heap
|
page read and write
|
||
24ECB352000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
49B2000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
41C5000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4F2B000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
24ECB2F0000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
24E1000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
24ECB2F1000
|
heap
|
page read and write
|
||
175000
|
stack
|
page read and write
|
||
24ECB32D000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
286F1B89000
|
trusted library allocation
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
4E54000
|
heap
|
page read and write
|
||
4222000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
4EAB000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
6016EFE000
|
stack
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
6016BF5000
|
stack
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4A59000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
24ECB2F0000
|
heap
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
286EF786000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286EFAC0000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
24ECB2F1000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
heap
|
page read and write
|
||
4EAE000
|
heap
|
page read and write
|
||
1FCF000
|
stack
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
41C2000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
heap
|
page read and write
|
||
4E4A000
|
heap
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
24ECB2A0000
|
heap
|
page read and write
|
||
421B000
|
heap
|
page read and write
|
||
24ECB351000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
4272000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
24ECB2D0000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
2193000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F17E4000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
209F000
|
stack
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
24ECB2FF000
|
heap
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
5DD6000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286F1B72000
|
trusted library allocation
|
page read and write
|
||
24ECB2F0000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
24ECB353000
|
heap
|
page read and write
|
||
4200000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4EDA000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
24ECB2DE000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
4F1C000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
4A27000
|
heap
|
page read and write
|
||
4207000
|
heap
|
page read and write
|
||
50E2000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
6016F7F000
|
stack
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
24ECB30B000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4231000
|
heap
|
page read and write
|
||
24ECB2EF000
|
heap
|
page read and write
|
||
5DD7000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
4E4A000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
2780000
|
direct allocation
|
page execute and read and write
|
||
425A000
|
heap
|
page read and write
|
||
286EF792000
|
heap
|
page read and write
|
||
24ECB2DB000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF78A000
|
heap
|
page read and write
|
||
28AD000
|
heap
|
page read and write
|
||
41E5000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
24ECB2CB000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
4206000
|
heap
|
page read and write
|
||
48C5000
|
heap
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
286EF789000
|
heap
|
page read and write
|
||
41D6000
|
heap
|
page read and write
|
||
24ECB340000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
41D6000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
49C2000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
41C6000
|
heap
|
page read and write
|
||
4ED9000
|
heap
|
page read and write
|
||
41CD000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
4A1C000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
49E4000
|
heap
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EF785000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
286F1B8F000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
24ECB2F9000
|
heap
|
page read and write
|
||
46C000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
41E7000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
50DC000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
24ECB2CB000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
24ECB2CB000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
4F0E000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
42BD000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2C4000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
heap
|
page read and write
|
||
5109000
|
heap
|
page read and write
|
||
2085000
|
heap
|
page read and write
|
||
24ECB2E0000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
49D3000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
24ECB2ED000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286EF789000
|
heap
|
page read and write
|
||
5E02000
|
heap
|
page read and write
|
||
423D000
|
heap
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
4F2E000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
4A59000
|
heap
|
page read and write
|
||
286EF758000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
4E64000
|
heap
|
page read and write
|
||
423E000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
286EF78A000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
286EF778000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
41C1000
|
heap
|
page read and write
|
||
219F000
|
stack
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
4235000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
753000
|
heap
|
page read and write
|
||
24ECB2F2000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B8E000
|
trusted library allocation
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
41E5000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F17D0000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4A9000
|
heap
|
page read and write
|
||
42BD000
|
heap
|
page read and write
|
||
286F1320000
|
heap
|
page read and write
|
||
48E8000
|
heap
|
page read and write
|
||
4A1C000
|
heap
|
page read and write
|
||
286EF791000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
4A82000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF789000
|
heap
|
page read and write
|
||
5E4A000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
41E4000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
4E43000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
4BA4000
|
heap
|
page read and write
|
||
5DAD000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
4EE9000
|
heap
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B78000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
286F17EF000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
41DF000
|
heap
|
page read and write
|
||
286EF784000
|
heap
|
page read and write
|
||
457000
|
unkown
|
page write copy
|
||
3CAE000
|
stack
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
5107000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
4274000
|
heap
|
page read and write
|
||
449000
|
unkown
|
page readonly
|
||
4929000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
24ECB2F9000
|
heap
|
page read and write
|
||
24ECB32D000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
286EF78B000
|
heap
|
page read and write
|
||
24ECB2FF000
|
heap
|
page read and write
|
||
457000
|
unkown
|
page read and write
|
||
286F1B75000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
41CE000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
FB919FF000
|
stack
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
heap
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
41DA000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
FB9167A000
|
stack
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
423D000
|
heap
|
page read and write
|
||
455000
|
unkown
|
page read and write
|
||
4A1E000
|
heap
|
page read and write
|
||
5E03000
|
heap
|
page read and write
|
||
453000
|
unkown
|
page write copy
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
5109000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB34A000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
41D6000
|
heap
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
286F1420000
|
heap
|
page read and write
|
||
50D5000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
4979000
|
heap
|
page read and write
|
||
286EF78D000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
heap
|
page read and write
|
||
4262000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
286EF785000
|
heap
|
page read and write
|
||
5E4B000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF7F4000
|
heap
|
page read and write
|
||
24ECB34A000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
24ECB32D000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
24ECB352000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
41DC000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
49C3000
|
heap
|
page read and write
|
||
2080000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
41D6000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
4415000
|
trusted library section
|
page read and write
|
||
4A85000
|
heap
|
page read and write
|
||
196000
|
stack
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
4F0D000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
423B000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
286F1B8B000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
423A000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
4228000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
4285000
|
heap
|
page read and write
|
||
41DA000
|
heap
|
page read and write
|
||
50DC000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
41E3000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
4932000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
24ECB32A000
|
heap
|
page read and write
|
||
48D6000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4908000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
4EDE000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
5102000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
286EF920000
|
heap
|
page read and write
|
||
41DC000
|
heap
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
4E44000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
4272000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
5D23000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
24ECB2F2000
|
heap
|
page read and write
|
||
421B000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
4275000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
41E6000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
5DC4000
|
heap
|
page read and write
|
||
5DC4000
|
heap
|
page read and write
|
||
4985000
|
heap
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
41D6000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
48B2000
|
heap
|
page read and write
|
||
4F11000
|
heap
|
page read and write
|
||
286EF786000
|
heap
|
page read and write
|
||
5E28000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
286EF78A000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
24ECB32A000
|
heap
|
page read and write
|
||
41D2000
|
heap
|
page read and write
|
||
427A000
|
heap
|
page read and write
|
||
24ECB34C000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4EE9000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
6016FFF000
|
stack
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
28A4000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EF784000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
4932000
|
heap
|
page read and write
|
||
24ECB2CC000
|
heap
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
24ECB2C4000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
41CF000
|
heap
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
41CB000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
24ECB2A7000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
24ECB2FC000
|
heap
|
page read and write
|
||
286F1990000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF78A000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
178000
|
stack
|
page read and write
|
||
24ECB343000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
24ECB2F9000
|
heap
|
page read and write
|
||
41D8000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
149000
|
stack
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
50F7000
|
heap
|
page read and write
|
||
49B2000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
24ECB343000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B60000
|
heap
|
page read and write
|
||
286F1B87000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
286EF7A2000
|
heap
|
page read and write
|
||
4410000
|
trusted library section
|
page read and write
|
||
48A3000
|
heap
|
page read and write
|
||
4E73000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4A67000
|
heap
|
page read and write
|
||
28AD000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4A59000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
4EF7000
|
heap
|
page read and write
|
||
6016E7E000
|
stack
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
48F8000
|
heap
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
24ECB351000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
286EF7D4000
|
heap
|
page read and write
|
||
24ECB32A000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
791000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
4223000
|
heap
|
page read and write
|
||
24ECB343000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
28A8000
|
heap
|
page read and write
|
||
42BD000
|
heap
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B86000
|
trusted library allocation
|
page read and write
|
||
24ECB2AF000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
24ECB2BE000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
41DC000
|
heap
|
page read and write
|
||
24ECB2FF000
|
heap
|
page read and write
|
||
286EFAC5000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286EF78D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
73B000
|
heap
|
page read and write
|
||
5DC4000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
482000
|
heap
|
page read and write
|
||
286F1340000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B76000
|
trusted library allocation
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
24ECB2D2000
|
heap
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
41DC000
|
heap
|
page read and write
|
||
421C000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
28AD000
|
heap
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
4F28000
|
heap
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
4A79000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
24ECB2B9000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
50F7000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
286EF785000
|
heap
|
page read and write
|
||
24ECB356000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
FB916FD000
|
stack
|
page read and write
|
||
FB9177F000
|
stack
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
41DF000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
4A59000
|
heap
|
page read and write
|
||
49B2000
|
heap
|
page read and write
|
||
50FA000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
24ECB2F3000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
50EC000
|
heap
|
page read and write
|
||
286EF750000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
24ECB2EA000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
24ECB2CB000
|
heap
|
page read and write
|
||
286EF789000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
590000
|
direct allocation
|
page execute and read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
4F16000
|
heap
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
24ECB346000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
heap
|
page read and write
|
||
24ECB340000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB2B9000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
trusted library allocation
|
page read and write
|
||
24ECB2B6000
|
heap
|
page read and write
|
||
4EF9000
|
heap
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
4F12000
|
heap
|
page read and write
|
||
286F1B8C000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
453000
|
unkown
|
page write copy
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
24ECB2E0000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
42B1000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286EF792000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
789000
|
heap
|
page read and write
|
||
4243000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286F1B7F000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
421C000
|
heap
|
page read and write
|
||
4E4E000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
4226000
|
heap
|
page read and write
|
||
41DB000
|
heap
|
page read and write
|
||
286F1B85000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF7E3000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
423D000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
5102000
|
heap
|
page read and write
|
||
24ECB2B0000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
24ECB2D6000
|
heap
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
286F1B7A000
|
trusted library allocation
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
4ED6000
|
heap
|
page read and write
|
||
4E46000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
24ECB309000
|
heap
|
page read and write
|
||
286F1B81000
|
trusted library allocation
|
page read and write
|
||
24ECB2FF000
|
heap
|
page read and write
|
||
286F1B87000
|
trusted library allocation
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
286EF78E000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286EF786000
|
heap
|
page read and write
|
||
24ECB2F6000
|
heap
|
page read and write
|
||
41DD000
|
heap
|
page read and write
|
||
286EFAA4000
|
trusted library allocation
|
page read and write
|
||
286EF7CA000
|
heap
|
page read and write
|
||
4ED3000
|
heap
|
page read and write
|
||
286EF7CC000
|
heap
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
286F1610000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
42A9000
|
heap
|
page read and write
|
||
286EF7D0000
|
heap
|
page read and write
|
||
4A1A000
|
heap
|
page read and write
|
||
286EFAA0000
|
trusted library allocation
|
page read and write
|
||
24ECB2ED000
|
heap
|
page read and write
|
||
24ECB2AE000
|
heap
|
page read and write
|
||
24ECB2F2000
|
heap
|
page read and write
|
||
286F1B82000
|
trusted library allocation
|
page read and write
|
||
286F1B7B000
|
trusted library allocation
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
24ECB343000
|
heap
|
page read and write
|
||
4233000
|
heap
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
24ECB2CB000
|
heap
|
page read and write
|
||
50FA000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
FB917FF000
|
stack
|
page read and write
|
||
286F1B80000
|
trusted library allocation
|
page read and write
|
||
286F1B7E000
|
trusted library allocation
|
page read and write
|
||
286F1B84000
|
trusted library allocation
|
page read and write
|
||
286F1B83000
|
trusted library allocation
|
page read and write
|
||
41E3000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
4F0A000
|
heap
|
page read and write
|
||
24ECB2E4000
|
heap
|
page read and write
|
||
41DC000
|
heap
|
page read and write
|
||
286EF795000
|
heap
|
page read and write
|
||
286EF7A2000
|
heap
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
24ECB351000
|
heap
|
page read and write
|
||
286F1B7C000
|
trusted library allocation
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
286EF7A0000
|
heap
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
24ECB2FC000
|
heap
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
286F1B7D000
|
trusted library allocation
|
page read and write
|
There are 1408 hidden memdumps, click here to show them.