IOC Report
Adobe-Setup.msi

loading gif

Files

File Path
Type
Category
Malicious
Adobe-Setup.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Windows Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Windows Installer., Template: Intel;1033, Revision Number: {A509E431-2CD2-476D-A0C7-B01FC235F124}, Create Time/Date: Fri Aug 16 11:25:12 2024, Last Saved Time/Date: Fri Aug 16 11:25:12 2024, Number of Pages: 400, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\SecurityScan\hid.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDeviceDetectionHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\gVCgHiMSMMBE\hid.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Config.Msi\3d4fbe.rbs
data
dropped
C:\ProgramData\.Logitech\LDevice.dat
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDevice.dat
data
dropped
C:\Windows\Installer\3d4fbd.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Windows Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Windows Installer., Template: Intel;1033, Revision Number: {A509E431-2CD2-476D-A0C7-B01FC235F124}, Create Time/Date: Fri Aug 16 11:25:12 2024, Last Saved Time/Date: Fri Aug 16 11:25:12 2024, Number of Pages: 400, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\3d4fbf.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Windows Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Windows Installer., Template: Intel;1033, Revision Number: {A509E431-2CD2-476D-A0C7-B01FC235F124}, Create Time/Date: Fri Aug 16 11:25:12 2024, Last Saved Time/Date: Fri Aug 16 11:25:12 2024, Number of Pages: 400, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI50D6.tmp
data
dropped
C:\Windows\Installer\SourceHash{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF13309DE02CD3908A.TMP
data
dropped
C:\Windows\Temp\~DF1B7B54C33606A20D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF248847D1B84556BA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3ED6BB1E3153DF31.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF49E8D0CAD87935AC.TMP
data
dropped
C:\Windows\Temp\~DF55BE266166BFF487.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7562E9697A5767F4.TMP
data
dropped
C:\Windows\Temp\~DF775CEE8E95BC32B0.TMP
data
modified
C:\Windows\Temp\~DF903135700F6CEA34.TMP
data
dropped
C:\Windows\Temp\~DF9B5173F9AFF02972.TMP
data
dropped
C:\Windows\Temp\~DFA0D73703F2E63F02.TMP
data
dropped
C:\Windows\Temp\~DFB8060E370B9496C2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDeviceDetectionHelper.exe
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDeviceDetectionHelper.exe
malicious
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe 979 576
malicious
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
"C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe" 890 904
malicious
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
"C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe" 890 904
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Adobe-Setup.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V

URLs

Name
IP
Malicious
https://103.238.227.183/nc.q
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://ocsp.sectigo.com0
unknown
https://103.238.227.183/Q
unknown
http://ocsp.thawte.com0
unknown
https://103.238.227.183/J
unknown
https://103.238.227.183/M
unknown
https://103.238.227.183/vop8
unknown
https://103.238.227.183/L
unknown
https://103.238.227.183/nc.
unknown
https://103.238.227.183:443/
unknown
https://103.238.227.183:443/h
unknown
https://103.238.227.183:443/c
unknown
https://103.238.227.183:443/k
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://103.238.227.183/
unknown
https://103.238.227.183:443/X
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://103.238.227.183/1
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://103.238.227.183/nc.Y
unknown
https://103.238.227.183/vo0?
unknown
https://103.238.227.183/a
unknown
https://103.238.227.183:443/P
unknown
https://103.238.227.183/Z
unknown
https://103.238.227.183:443/K
unknown
https://103.238.227.183:443/m:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?b009a331b20
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://103.238.227.183:443/L
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
103.238.227.183
unknown
Hong Kong
192.168.2.16
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3d4fbe.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3d4fbe.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\B6FBF0AA7F54D3448853DB4F3F5ED774
DD0B6D4F2392A634285C216967A7BB09
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\B6FBF0AB7F54F3448853DB4F3F5ED784
DD0B6D4F2392A634285C216967A7BB09
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\B6FBF0AC7F54F3448853DB4F3F5ED784
DD0B6D4F2392A634285C216967A7BB09
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\gVCgHiMSMMBE\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\12739565003F36143B6513B463284621
DD0B6D4F2392A634285C216967A7BB09
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\DD0B6D4F2392A634285C216967A7BB09
MainProgran
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\Features
MainProgran
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\12739565003F36143B6513B463284621
DD0B6D4F2392A634285C216967A7BB09
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SetPoint Update
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ms-pu
CLSID
There are 80 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E2A000
stack
page read and write
malicious
14D1000
heap
page read and write
995E000
heap
page read and write
14AC000
heap
page read and write
999A000
heap
page read and write
14D2000
heap
page read and write
9E1C000
heap
page read and write
14B0000
heap
page read and write
99B6000
heap
page read and write
DAC000
unkown
page readonly
9E14000
heap
page read and write
9A2B000
heap
page read and write
998D000
heap
page read and write
999A000
heap
page read and write
E7B000
heap
page read and write
DA5000
unkown
page read and write
9E25000
heap
page read and write
999A000
heap
page read and write
9A2E000
heap
page read and write
1370000
direct allocation
page read and write
99FD000
heap
page read and write
999A000
heap
page read and write
998B000
heap
page read and write
D8A000
unkown
page read and write
9A10000
heap
page read and write
9931000
heap
page read and write
999A000
heap
page read and write
9991000
heap
page read and write
9E13000
heap
page read and write
9E18000
heap
page read and write
998F000
heap
page read and write
E7B000
heap
page read and write
14D5000
heap
page read and write
998D000
heap
page read and write
1350000
heap
page read and write
9931000
heap
page read and write
995C000
heap
page read and write
1370000
direct allocation
page read and write
1370000
direct allocation
page read and write
9A2E000
heap
page read and write
996E000
heap
page read and write
99D0000
heap
page read and write
DAC000
unkown
page readonly
99FD000
heap
page read and write
5F0000
heap
page read and write
99FC000
heap
page read and write
9931000
heap
page read and write
998D000
heap
page read and write
14C0000
heap
page read and write
999A000
heap
page read and write
14AB000
heap
page read and write
14DB000
heap
page read and write
9E27000
heap
page read and write
1370000
direct allocation
page read and write
995E000
heap
page read and write
99A3000
heap
page read and write
99FC000
heap
page read and write
9A50000
direct allocation
page read and write
9DF1000
heap
page read and write
99FD000
heap
page read and write
999A000
heap
page read and write
14AB000
heap
page read and write
9A08000
heap
page read and write
D8A000
unkown
page write copy
99A3000
heap
page read and write
9DA000
unkown
page write copy
2F98000
direct allocation
page read and write
2F60000
direct allocation
page read and write
9931000
heap
page read and write
1580000
direct allocation
page read and write
2FC0000
direct allocation
page read and write
99D0000
heap
page read and write
9E01000
heap
page read and write
9E78000
heap
page read and write
13EA000
heap
page read and write
9E1E000
heap
page read and write
999A000
heap
page read and write
14D1000
heap
page read and write
9E1F000
heap
page read and write
9E27000
heap
page read and write
1406000
heap
page read and write
9A50000
direct allocation
page read and write
D9C000
unkown
page read and write
9A50000
direct allocation
page read and write
14AB000
heap
page read and write
13F0000
heap
page read and write
9A2A000
heap
page read and write
99D0000
heap
page read and write
14D0000
heap
page read and write
9E13000
heap
page read and write
E60000
heap
page read and write
E9B000
heap
page read and write
9A08000
heap
page read and write
31A0000
direct allocation
page read and write
998D000
heap
page read and write
14D4000
heap
page read and write
99D0000
heap
page read and write
14D1000
heap
page read and write
14A6000
heap
page read and write
998D000
heap
page read and write
1370000
direct allocation
page read and write
99FE000
heap
page read and write
E73000
heap
page read and write
14B0000
heap
page read and write
99D0000
heap
page read and write
9A10000
heap
page read and write
998B000
heap
page read and write
14CD000
heap
page read and write
1370000
direct allocation
page read and write
9E1F000
heap
page read and write
9E18000
heap
page read and write
E73000
heap
page read and write
995D000
heap
page read and write
9991000
heap
page read and write
9E1D000
heap
page read and write
14AB000
heap
page read and write
9931000
heap
page read and write
9A2E000
heap
page read and write
9E21000
heap
page read and write
99CF000
heap
page read and write
1489000
heap
page read and write
9A2E000
heap
page read and write
14CE000
heap
page read and write
14BE000
heap
page read and write
998D000
heap
page read and write
14D7000
heap
page read and write
3060000
heap
page read and write
14D5000
heap
page read and write
14CD000
heap
page read and write
4E64000
direct allocation
page read and write
DC3000
direct allocation
page read and write
D70000
direct allocation
page read and write
99FD000
heap
page read and write
998F000
heap
page read and write
1370000
direct allocation
page read and write
14D5000
heap
page read and write
14D2000
heap
page read and write
9958000
heap
page read and write
999A000
heap
page read and write
55C1000
direct allocation
page execute read
9E41000
heap
page read and write
1413000
heap
page read and write
9E1F000
heap
page read and write
DA5000
unkown
page read and write
999A000
heap
page read and write
148A000
heap
page read and write
99A3000
heap
page read and write
1485000
heap
page read and write
14D1000
heap
page read and write
14D5000
heap
page read and write
99A3000
heap
page read and write
1489000
heap
page read and write
999A000
heap
page read and write
15E0000
heap
page read and write
1489000
heap
page read and write
1370000
direct allocation
page read and write
E55000
heap
page read and write
9DA000
unkown
page read and write
996F000
heap
page read and write
1370000
direct allocation
page read and write
14D7000
heap
page read and write
E30000
heap
page read and write
9E31000
heap
page read and write
9E1F000
heap
page read and write
9E18000
heap
page read and write
CA1000
unkown
page execute read
999A000
heap
page read and write
9A2E000
heap
page read and write
14D7000
heap
page read and write
2FE9000
direct allocation
page read and write
9997000
heap
page read and write
998D000
heap
page read and write
99D0000
heap
page read and write
30A5000
heap
page read and write
99FE000
heap
page read and write
1355000
heap
page read and write
14CD000
heap
page read and write
10001000
unkown
page execute read
9E0F000
heap
page read and write
E5E000
heap
page read and write
999A000
heap
page read and write
14D3000
heap
page read and write
578000
stack
page read and write
14BE000
heap
page read and write
998D000
heap
page read and write
9A08000
heap
page read and write
E9B000
heap
page read and write
1001E000
unkown
page read and write
292E000
stack
page read and write
14CE000
stack
page read and write
15A0000
heap
page read and write
99FD000
heap
page read and write
14D7000
heap
page read and write
9A2E000
heap
page read and write
9E1C000
heap
page read and write
998D000
heap
page read and write
99A3000
heap
page read and write
CEF000
stack
page read and write
998D000
heap
page read and write
998D000
heap
page read and write
14B0000
heap
page read and write
DA8000
unkown
page read and write
F89000
stack
page read and write
9A10000
heap
page read and write
10000000
unkown
page readonly
14B1000
heap
page read and write
E5E000
heap
page read and write
9E0F000
heap
page read and write
D59000
unkown
page readonly
1438000
heap
page read and write
2F7A000
direct allocation
page read and write
999A000
heap
page read and write
9E4A000
heap
page read and write
14DC000
heap
page read and write
1001F000
unkown
page readonly
9A2B000
heap
page read and write
998D000
heap
page read and write
99E2000
heap
page read and write
998D000
heap
page read and write
14AC000
heap
page read and write
99FF000
heap
page read and write
28E4000
heap
page read and write
99D0000
heap
page read and write
14D1000
heap
page read and write
998D000
heap
page read and write
9E1F000
heap
page read and write
9A2A000
heap
page read and write
99CF000
heap
page read and write
3060000
heap
page read and write
9E1D000
heap
page read and write
14D2000
heap
page read and write
998C000
heap
page read and write
998D000
heap
page read and write
2B50000
direct allocation
page read and write
1608000
heap
page read and write
9A2E000
heap
page read and write
998D000
heap
page read and write
2F40000
direct allocation
page read and write
9989000
heap
page read and write
999A000
heap
page read and write
998C000
heap
page read and write
9E01000
heap
page read and write
91BE000
stack
page read and write
999A000
heap
page read and write
14D3000
heap
page read and write
998B000
heap
page read and write
9E08000
heap
page read and write
1480000
heap
page read and write
998B000
heap
page read and write
9BAD000
stack
page read and write
9990000
heap
page read and write
99A3000
heap
page read and write
CA1000
unkown
page execute read
14CF000
heap
page read and write
9A50000
direct allocation
page read and write
E55000
heap
page read and write
4E73000
direct allocation
page read and write
14D1000
heap
page read and write
9E1E000
heap
page read and write
1370000
direct allocation
page read and write
99B6000
heap
page read and write
14D7000
heap
page read and write
9E4A000
heap
page read and write
14AA000
heap
page read and write
2FD8000
direct allocation
page read and write
14AC000
heap
page read and write
9A50000
direct allocation
page read and write
9E27000
heap
page read and write
999A000
heap
page read and write
14AB000
heap
page read and write
9A50000
direct allocation
page read and write
14D1000
heap
page read and write
DA5000
unkown
page read and write
8F1000
unkown
page execute read
14D6000
heap
page read and write
9A2E000
heap
page read and write
1370000
direct allocation
page read and write
999A000
heap
page read and write
9DEE000
stack
page read and write
15A7000
heap
page read and write
1621000
heap
page read and write
9E4A000
heap
page read and write
9E16000
heap
page read and write
999A000
heap
page read and write
14D7000
heap
page read and write
2F7F000
stack
page read and write
14D5000
heap
page read and write
E5F000
heap
page read and write
9E3A000
heap
page read and write
998A000
heap
page read and write
1489000
heap
page read and write
CA1000
unkown
page execute read
9931000
heap
page read and write
CA1000
unkown
page execute read
DAC000
unkown
page readonly
998D000
heap
page read and write
9A50000
direct allocation
page read and write
1370000
direct allocation
page read and write
D93000
unkown
page write copy
995D000
heap
page read and write
2F58000
direct allocation
page read and write
5050000
direct allocation
page read and write
14CC000
heap
page read and write
999A000
heap
page read and write
14D4000
heap
page read and write
9E1E000
heap
page read and write
99E1000
heap
page read and write
1642000
heap
page read and write
998D000
heap
page read and write
14AA000
heap
page read and write
9A2E000
heap
page read and write
2F5B000
direct allocation
page read and write
9A50000
direct allocation
page read and write
9A50000
direct allocation
page read and write
99FF000
heap
page read and write
FB0000
heap
page read and write
1603000
heap
page read and write
9A2E000
heap
page read and write
2BD0000
direct allocation
page read and write
9E1C000
heap
page read and write
3064000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
9E54000
heap
page read and write
9A2E000
heap
page read and write
14AB000
heap
page read and write
15F9000
heap
page read and write
14D7000
heap
page read and write
982E000
stack
page read and write
9E19000
heap
page read and write
9E1D000
heap
page read and write
999A000
heap
page read and write
99E2000
heap
page read and write
14AF000
heap
page read and write
9991000
heap
page read and write
9A08000
heap
page read and write
9E1C000
heap
page read and write
9E21000
heap
page read and write
9E1E000
heap
page read and write
9991000
heap
page read and write
9DF1000
heap
page read and write
9E14000
heap
page read and write
9E23000
heap
page read and write
9E18000
heap
page read and write
99E1000
heap
page read and write
9E14000
heap
page read and write
10001000
unkown
page execute read
14B0000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
9E55000
heap
page read and write
9E1D000
heap
page read and write
1370000
direct allocation
page read and write
9E16000
heap
page read and write
1370000
direct allocation
page read and write
FEC000
stack
page read and write
148A000
heap
page read and write
3200000
direct allocation
page read and write
998D000
heap
page read and write
9A2E000
heap
page read and write
9E16000
heap
page read and write
148A000
heap
page read and write
15C8000
heap
page read and write
995E000
heap
page read and write
9F5000
unkown
page read and write
99FF000
heap
page read and write
14AC000
heap
page read and write
99B6000
heap
page read and write
14DA000
heap
page read and write
9A10000
heap
page read and write
99FE000
heap
page read and write
9ED000
unkown
page write copy
5E0000
heap
page read and write
999A000
heap
page read and write
9F8000
unkown
page read and write
1370000
direct allocation
page read and write
142C000
heap
page read and write
14D8000
heap
page read and write
99FE000
heap
page read and write
2FE0000
heap
page read and write
9E67000
heap
page read and write
D92000
unkown
page read and write
99A3000
heap
page read and write
9930000
heap
page read and write
9A10000
heap
page read and write
999A000
heap
page read and write
99E1000
heap
page read and write
999A000
heap
page read and write
9991000
heap
page read and write
998B000
heap
page read and write
14AA000
heap
page read and write
999A000
heap
page read and write
9931000
heap
page read and write
361D000
stack
page read and write
9E21000
heap
page read and write
D59000
unkown
page readonly
14D5000
heap
page read and write
14B0000
heap
page read and write
9DFF000
heap
page read and write
9E15000
heap
page read and write
99FF000
heap
page read and write
998D000
heap
page read and write
999A000
heap
page read and write
9A2E000
heap
page read and write
D9D000
unkown
page write copy
14B0000
heap
page read and write
1570000
heap
page read and write
148A000
heap
page read and write
9E1D000
heap
page read and write
998D000
heap
page read and write
99FE000
heap
page read and write
9A50000
direct allocation
page read and write
995D000
heap
page read and write
D93000
unkown
page write copy
1370000
direct allocation
page read and write
14D5000
heap
page read and write
1360000
heap
page read and write
FF0000
heap
page read and write
99D0000
heap
page read and write
999A000
heap
page read and write
99D0000
heap
page read and write
9A2E000
heap
page read and write
999A000
heap
page read and write
1604000
heap
page read and write
999A000
heap
page read and write
9E1C000
heap
page read and write
9A0F000
heap
page read and write
14B0000
heap
page read and write
99FE000
heap
page read and write
9931000
heap
page read and write
1370000
direct allocation
page read and write
995C000
heap
page read and write
999A000
heap
page read and write
E63000
heap
page read and write
146A000
heap
page read and write
9A10000
heap
page read and write
9E27000
heap
page read and write
14D5000
heap
page read and write
9931000
heap
page read and write
9E1D000
heap
page read and write
998D000
heap
page read and write
14D7000
heap
page read and write
4D80000
trusted library allocation
page read and write
CA0000
unkown
page readonly
1410000
heap
page read and write
4D3E000
stack
page read and write
9E2E000
heap
page read and write
99FE000
heap
page read and write
9A0C000
heap
page read and write
9E1D000
heap
page read and write
9E3A000
heap
page read and write
E38000
unkown
page readonly
10000000
unkown
page readonly
99CF000
heap
page read and write
9E1C000
heap
page read and write
9EC000
unkown
page read and write
1370000
direct allocation
page read and write
99D0000
heap
page read and write
9E1C000
heap
page read and write
E62000
heap
page read and write
1001E000
unkown
page read and write
9E1D000
heap
page read and write
9E1F000
heap
page read and write
92FD000
stack
page read and write
353C000
stack
page read and write
E3A000
heap
page read and write
9991000
heap
page read and write
14D1000
heap
page read and write
2FD3000
direct allocation
page read and write
9E1C000
heap
page read and write
1370000
direct allocation
page read and write
1370000
direct allocation
page read and write
14DB000
heap
page read and write
D99000
direct allocation
page read and write
14D7000
heap
page read and write
998D000
heap
page read and write
10015000
unkown
page read and write
99A3000
heap
page read and write
3480000
direct allocation
page execute and read and write
9A0F000
heap
page read and write
14AC000
heap
page read and write
296B000
stack
page read and write
999A000
heap
page read and write
995D000
heap
page read and write
999A000
heap
page read and write
14D5000
heap
page read and write
9A2E000
heap
page read and write
14AC000
heap
page read and write
9931000
heap
page read and write
9931000
heap
page read and write
14D1000
heap
page read and write
E38000
unkown
page readonly
9E14000
heap
page read and write
30A9000
heap
page read and write
5330000
direct allocation
page execute and read and write
9A9000
unkown
page readonly
2F80000
direct allocation
page read and write
99FE000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
2FA9000
direct allocation
page read and write
302D000
stack
page read and write
2F51000
direct allocation
page read and write
14B0000
heap
page read and write
995E000
heap
page read and write
2A50000
direct allocation
page read and write
999A000
heap
page read and write
9E4A000
heap
page read and write
9E4A000
heap
page read and write
1370000
direct allocation
page read and write
29A9000
heap
page read and write
EE8000
stack
page read and write
D59000
unkown
page readonly
1370000
direct allocation
page read and write
9A10000
heap
page read and write
99A3000
heap
page read and write
999A000
heap
page read and write
99D0000
heap
page read and write
9E13000
heap
page read and write
9A50000
direct allocation
page read and write
33C0000
direct allocation
page read and write
9E1D000
heap
page read and write
CA1000
unkown
page execute read
9DF1000
heap
page read and write
1497000
heap
page read and write
999A000
heap
page read and write
99A3000
heap
page read and write
1621000
heap
page read and write
161F000
stack
page read and write
99FD000
heap
page read and write
1001E000
unkown
page read and write
99D0000
heap
page read and write
9E2000
unkown
page read and write
9A2E000
heap
page read and write
9991000
heap
page read and write
99E1000
heap
page read and write
99FD000
heap
page read and write
9E1D000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
3340000
direct allocation
page read and write
9E27000
heap
page read and write
9E4A000
heap
page read and write
9A10000
heap
page read and write
9931000
heap
page read and write
14D7000
heap
page read and write
998D000
heap
page read and write
2FE0000
direct allocation
page read and write
995D000
heap
page read and write
99CF000
heap
page read and write
3280000
direct allocation
page read and write
9A2E000
heap
page read and write
15FB000
heap
page read and write
E7B000
heap
page read and write
9A2E000
heap
page read and write
2F69000
direct allocation
page read and write
9982000
heap
page read and write
BAC000
stack
page read and write
9A0F000
heap
page read and write
953E000
stack
page read and write
998B000
heap
page read and write
2F93000
direct allocation
page read and write
3380000
direct allocation
page read and write
14AF000
heap
page read and write
10001000
unkown
page execute read
15DF000
stack
page read and write
9E1C000
heap
page read and write
D88000
direct allocation
page read and write
999A000
heap
page read and write
995E000
heap
page read and write
5654000
direct allocation
page read and write
E38000
unkown
page readonly
51F0000
direct allocation
page read and write
140E000
stack
page read and write
99E1000
heap
page read and write
9931000
heap
page read and write
998D000
heap
page read and write
9FC000
unkown
page readonly
9931000
heap
page read and write
999A000
heap
page read and write
14D7000
heap
page read and write
998B000
heap
page read and write
999A000
heap
page read and write
9991000
heap
page read and write
9A50000
direct allocation
page read and write
1330000
heap
page read and write
4DC0000
trusted library allocation
page read and write
99FE000
heap
page read and write
2FDB000
direct allocation
page read and write
CA0000
unkown
page readonly
9A08000
heap
page read and write
14D5000
heap
page read and write
999A000
heap
page read and write
28E0000
heap
page read and write
995E000
heap
page read and write
9A9000
unkown
page readonly
1370000
direct allocation
page read and write
14AA000
heap
page read and write
99F4000
heap
page read and write
9931000
heap
page read and write
1370000
direct allocation
page read and write
9E18000
heap
page read and write
99A3000
heap
page read and write
4CFE000
stack
page read and write
14D7000
heap
page read and write
9DF0000
heap
page read and write
99E2000
heap
page read and write
99A3000
heap
page read and write
9A50000
direct allocation
page read and write
9991000
heap
page read and write
9E21000
heap
page read and write
E38000
unkown
page readonly
14D7000
heap
page read and write
9E1D000
heap
page read and write
9A2E000
heap
page read and write
D60000
heap
page read and write
99A3000
heap
page read and write
99E1000
heap
page read and write
9931000
heap
page read and write
CA0000
unkown
page readonly
1370000
direct allocation
page read and write
D8C000
unkown
page write copy
53D1000
direct allocation
page execute read
99D0000
heap
page read and write
14CD000
heap
page read and write
14D3000
heap
page read and write
9A2E000
heap
page read and write
9E15000
heap
page read and write
9DF1000
heap
page read and write
998F000
heap
page read and write
1370000
direct allocation
page read and write
9E1A000
heap
page read and write
999A000
heap
page read and write
9E01000
heap
page read and write
1470000
direct allocation
page read and write
8F0000
unkown
page readonly
9A10000
heap
page read and write
151E000
stack
page read and write
99A3000
heap
page read and write
9991000
heap
page read and write
998D000
heap
page read and write
999A000
heap
page read and write
E38000
unkown
page readonly
8F1000
unkown
page execute read
99FD000
heap
page read and write
14CD000
heap
page read and write
153E000
stack
page read and write
9E4A000
heap
page read and write
995E000
heap
page read and write
9E14000
heap
page read and write
99A3000
heap
page read and write
BEE000
stack
page read and write
D59000
unkown
page readonly
14AA000
heap
page read and write
14CD000
heap
page read and write
996A000
heap
page read and write
2FB0000
heap
page read and write
99D0000
heap
page read and write
D8A000
unkown
page read and write
14D2000
heap
page read and write
97C0000
remote allocation
page read and write
9E1E000
heap
page read and write
9E27000
heap
page read and write
998F000
heap
page read and write
9943000
heap
page read and write
32C0000
direct allocation
page read and write
E38000
unkown
page readonly
2FBA000
direct allocation
page read and write
99FD000
heap
page read and write
14D1000
heap
page read and write
9A0C000
heap
page read and write
D59000
unkown
page readonly
CA0000
unkown
page readonly
2AD0000
direct allocation
page read and write
9A2E000
heap
page read and write
1370000
direct allocation
page read and write
14CD000
heap
page read and write
D93000
unkown
page write copy
9DF1000
heap
page read and write
5270000
direct allocation
page read and write
3440000
direct allocation
page execute and read and write
93FD000
stack
page read and write
D8A000
unkown
page write copy
50F0000
direct allocation
page read and write
999A000
heap
page read and write
10000000
unkown
page readonly
1489000
heap
page read and write
13ED000
heap
page read and write
D8A000
unkown
page read and write
999A000
heap
page read and write
9931000
heap
page read and write
DA8000
unkown
page read and write
9A2E000
heap
page read and write
9991000
heap
page read and write
9E1D000
heap
page read and write
99D0000
heap
page read and write
99FD000
heap
page read and write
148A000
heap
page read and write
9E18000
heap
page read and write
D9C000
unkown
page read and write
9A0C000
heap
page read and write
99FD000
heap
page read and write
999A000
heap
page read and write
9DC000
unkown
page write copy
14CD000
heap
page read and write
1001E000
unkown
page read and write
306B000
stack
page read and write
14CB000
heap
page read and write
14B0000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
5464000
direct allocation
page read and write
9A2E000
heap
page read and write
14DB000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
9931000
heap
page read and write
9E26000
heap
page read and write
9E1C000
heap
page read and write
1370000
direct allocation
page read and write
99E1000
heap
page read and write
9E1C000
heap
page read and write
998D000
heap
page read and write
14D0000
heap
page read and write
99B3000
heap
page read and write
9E78000
heap
page read and write
9A0C000
heap
page read and write
9E1F000
heap
page read and write
CA1000
unkown
page execute read
14CD000
heap
page read and write
9E01000
heap
page read and write
99A3000
heap
page read and write
14D2000
heap
page read and write
9CED000
stack
page read and write
27CE000
stack
page read and write
1370000
direct allocation
page read and write
14B0000
heap
page read and write
2FD1000
direct allocation
page read and write
998D000
heap
page read and write
99D0000
heap
page read and write
9A0F000
heap
page read and write
999A000
heap
page read and write
9943000
heap
page read and write
29A5000
heap
page read and write
995E000
heap
page read and write
9E1C000
heap
page read and write
148A000
heap
page read and write
9991000
heap
page read and write
9E1C000
heap
page read and write
99FE000
heap
page read and write
3064000
heap
page read and write
99FF000
heap
page read and write
999A000
heap
page read and write
1604000
heap
page read and write
9931000
heap
page read and write
DF0000
direct allocation
page read and write
5623000
direct allocation
page read and write
DA8000
unkown
page read and write
9982000
heap
page read and write
99CF000
heap
page read and write
9A2E000
heap
page read and write
9A20000
heap
page read and write
E5E000
heap
page read and write
999A000
heap
page read and write
D92000
unkown
page read and write
9A2B000
heap
page read and write
9E1E000
heap
page read and write
999A000
heap
page read and write
DAC000
unkown
page readonly
9E01000
heap
page read and write
1461000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
14AA000
heap
page read and write
14DA000
heap
page read and write
1370000
direct allocation
page read and write
E7B000
heap
page read and write
9E02000
heap
page read and write
14D7000
heap
page read and write
995D000
heap
page read and write
999A000
heap
page read and write
9E1D000
heap
page read and write
1370000
direct allocation
page read and write
9931000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
99FC000
heap
page read and write
9991000
heap
page read and write
9E1C000
heap
page read and write
D8A000
unkown
page write copy
9A10000
heap
page read and write
3013000
direct allocation
page read and write
9991000
heap
page read and write
999A000
heap
page read and write
9E3000
unkown
page write copy
9E01000
heap
page read and write
9A50000
direct allocation
page read and write
99E3000
heap
page read and write
9991000
heap
page read and write
D8C000
unkown
page write copy
998A000
heap
page read and write
99E1000
heap
page read and write
9E4A000
heap
page read and write
D90000
direct allocation
page read and write
9E1E000
heap
page read and write
998D000
heap
page read and write
9E1A000
heap
page read and write
1370000
direct allocation
page read and write
9A50000
direct allocation
page read and write
14D4000
heap
page read and write
9A50000
direct allocation
page read and write
999A000
heap
page read and write
97C0000
remote allocation
page read and write
995D000
heap
page read and write
454E000
stack
page read and write
99FE000
heap
page read and write
14D6000
heap
page read and write
99FD000
heap
page read and write
9E01000
heap
page read and write
998D000
heap
page read and write
9E13000
heap
page read and write
9E30000
heap
page read and write
5663000
direct allocation
page read and write
9943000
heap
page read and write
33ED000
stack
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
99FC000
heap
page read and write
1603000
heap
page read and write
D9D000
unkown
page write copy
10001000
unkown
page execute read
9E1D000
heap
page read and write
14D5000
heap
page read and write
9E1C000
heap
page read and write
14BE000
heap
page read and write
14AF000
heap
page read and write
998C000
heap
page read and write
12FC000
stack
page read and write
998C000
heap
page read and write
9A20000
heap
page read and write
99B6000
heap
page read and write
99FC000
heap
page read and write
E3D000
heap
page read and write
9E1D000
heap
page read and write
E5C000
heap
page read and write
A88000
unkown
page readonly
99CF000
heap
page read and write
998B000
heap
page read and write
3300000
direct allocation
page read and write
999A000
heap
page read and write
99D0000
heap
page read and write
2F8A000
direct allocation
page read and write
1370000
direct allocation
page read and write
999A000
heap
page read and write
99A3000
heap
page read and write
9955000
heap
page read and write
14D5000
heap
page read and write
998D000
heap
page read and write
9A50000
direct allocation
page read and write
34F0000
heap
page read and write
99FD000
heap
page read and write
99FD000
heap
page read and write
999A000
heap
page read and write
9A50000
direct allocation
page read and write
10000000
unkown
page readonly
13D0000
heap
page read and write
9A00000
heap
page read and write
14D4000
heap
page read and write
99A3000
heap
page read and write
99D0000
heap
page read and write
9A10000
heap
page read and write
9A2E000
heap
page read and write
14DC000
heap
page read and write
ED7000
heap
page read and write
97C0000
remote allocation
page read and write
998D000
heap
page read and write
9E1F000
heap
page read and write
1370000
direct allocation
page read and write
161A000
heap
page read and write
917D000
stack
page read and write
9E13000
heap
page read and write
99E2000
heap
page read and write
5614000
direct allocation
page read and write
10015000
unkown
page read and write
14C0000
heap
page read and write
5581000
direct allocation
page execute read
9E4A000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
2F9B000
direct allocation
page read and write
F48000
stack
page read and write
995E000
heap
page read and write
9E1C000
heap
page read and write
14CE000
heap
page read and write
9E0F000
heap
page read and write
99FF000
heap
page read and write
99FC000
heap
page read and write
147B000
heap
page read and write
4DD1000
direct allocation
page execute read
361E000
stack
page read and write
4850000
trusted library allocation
page read and write
92BF000
stack
page read and write
9E27000
heap
page read and write
97BF000
stack
page read and write
999A000
heap
page read and write
99D0000
heap
page read and write
9943000
heap
page read and write
1370000
direct allocation
page read and write
2FCA000
direct allocation
page read and write
992F000
stack
page read and write
9991000
heap
page read and write
9E25000
heap
page read and write
CA0000
unkown
page readonly
14D7000
heap
page read and write
14AC000
heap
page read and write
9A2E000
heap
page read and write
998D000
heap
page read and write
148A000
heap
page read and write
1001F000
unkown
page readonly
943D000
stack
page read and write
8F0000
unkown
page readonly
995D000
heap
page read and write
99E2000
heap
page read and write
2C90000
direct allocation
page execute and read and write
9E0F000
heap
page read and write
9E16000
heap
page read and write
DAC000
unkown
page readonly
D92000
unkown
page read and write
E75000
heap
page read and write
15C3000
heap
page read and write
14FE000
stack
page read and write
CA0000
unkown
page readonly
96BD000
stack
page read and write
9E1C000
heap
page read and write
EA8000
heap
page read and write
9CAD000
stack
page read and write
9A2E000
heap
page read and write
1460000
heap
page read and write
30A0000
heap
page read and write
9FC000
unkown
page readonly
9E1C000
heap
page read and write
E62000
heap
page read and write
14AF000
heap
page read and write
9991000
heap
page read and write
10015000
unkown
page read and write
999A000
heap
page read and write
9982000
heap
page read and write
9931000
heap
page read and write
999A000
heap
page read and write
14D5000
heap
page read and write
3050000
heap
page read and write
9E41000
heap
page read and write
99CF000
heap
page read and write
9A2E000
heap
page read and write
998D000
heap
page read and write
9931000
heap
page read and write
995D000
heap
page read and write
9E1C000
heap
page read and write
2FFA000
direct allocation
page read and write
15E0000
heap
page read and write
D9C000
unkown
page read and write
998D000
heap
page read and write
9E27000
heap
page read and write
1001F000
unkown
page readonly
E5F000
heap
page read and write
2FA0000
direct allocation
page read and write
999A000
heap
page read and write
2F4A000
direct allocation
page read and write
99B6000
heap
page read and write
9970000
heap
page read and write
14AC000
heap
page read and write
1370000
direct allocation
page read and write
995C000
heap
page read and write
995D000
heap
page read and write
1359000
heap
page read and write
14AA000
heap
page read and write
351B000
stack
page read and write
9990000
heap
page read and write
14D1000
heap
page read and write
99FE000
heap
page read and write
998D000
heap
page read and write
99D0000
heap
page read and write
9A2E000
heap
page read and write
1600000
heap
page read and write
DAC000
unkown
page readonly
9E01000
heap
page read and write
998A000
heap
page read and write
998F000
heap
page read and write
998D000
heap
page read and write
9E27000
heap
page read and write
45D0000
trusted library allocation
page read and write
99CF000
heap
page read and write
998F000
heap
page read and write
13E0000
heap
page read and write
9997000
heap
page read and write
12FC000
stack
page read and write
14CB000
heap
page read and write
999A000
heap
page read and write
E10000
heap
page read and write
99A3000
heap
page read and write
995D000
heap
page read and write
10015000
unkown
page read and write
1603000
heap
page read and write
15BB000
heap
page read and write
9E17000
heap
page read and write
140E000
heap
page read and write
D9D000
unkown
page write copy
14CD000
heap
page read and write
2FC0000
heap
page read and write
5473000
direct allocation
page read and write
9A08000
heap
page read and write
3040000
direct allocation
page read and write
14D8000
heap
page read and write
9943000
heap
page read and write
1370000
direct allocation
page read and write
1370000
direct allocation
page read and write
E5E000
heap
page read and write
2F91000
direct allocation
page read and write
99FF000
heap
page read and write
9E18000
heap
page read and write
99CF000
heap
page read and write
9E4A000
heap
page read and write
2FE4000
heap
page read and write
99A3000
heap
page read and write
999A000
heap
page read and write
29A0000
heap
page read and write
14D5000
heap
page read and write
5170000
direct allocation
page read and write
14CD000
heap
page read and write
34EE000
stack
page read and write
1250000
heap
page read and write
9931000
heap
page read and write
998B000
heap
page read and write
9E14000
heap
page read and write
9E31000
heap
page read and write
14CB000
heap
page read and write
D8C000
unkown
page write copy
D8B000
direct allocation
page read and write
9E03000
heap
page read and write
14B1000
heap
page read and write
9E18000
heap
page read and write
303E000
stack
page read and write
9E11000
heap
page read and write
A88000
unkown
page readonly
99FE000
heap
page read and write
E75000
heap
page read and write
3240000
direct allocation
page read and write
99B4000
heap
page read and write
14D7000
heap
page read and write
9A2E000
heap
page read and write
E5B000
heap
page read and write
FFE000
stack
page read and write
998D000
heap
page read and write
999A000
heap
page read and write
99A3000
heap
page read and write
9A50000
direct allocation
page read and write
9E1C000
heap
page read and write
EA8000
heap
page read and write
DAA000
direct allocation
page read and write
9E4A000
heap
page read and write
D7A000
direct allocation
page read and write
99A3000
heap
page read and write
1607000
heap
page read and write
9991000
heap
page read and write
999A000
heap
page read and write
999A000
heap
page read and write
998D000
heap
page read and write
998C000
heap
page read and write
99CF000
heap
page read and write
14BD000
heap
page read and write
15E7000
heap
page read and write
D59000
unkown
page readonly
999A000
heap
page read and write
9931000
heap
page read and write
D00000
heap
page read and write
999A000
heap
page read and write
9931000
heap
page read and write
9A50000
direct allocation
page read and write
995D000
heap
page read and write
14D1000
heap
page read and write
9E1C000
heap
page read and write
99A3000
heap
page read and write
99A3000
heap
page read and write
99FF000
heap
page read and write
9E1D000
heap
page read and write
D4E000
stack
page read and write
3160000
direct allocation
page read and write
995C000
heap
page read and write
14AA000
heap
page read and write
1621000
heap
page read and write
14D2000
heap
page read and write
1489000
heap
page read and write
9931000
heap
page read and write
99D0000
heap
page read and write
1001F000
unkown
page readonly
E60000
heap
page read and write
179E000
stack
page read and write
9E1E000
heap
page read and write
29B0000
direct allocation
page read and write
There are 1089 hidden memdumps, click here to show them.