Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Adobe-Setup.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Windows Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database
contains the logic and data required to install Windows Installer., Template: Intel;1033, Revision Number: {A509E431-2CD2-476D-A0C7-B01FC235F124},
Create Time/Date: Fri Aug 16 11:25:12 2024, Last Saved Time/Date: Fri Aug 16 11:25:12 2024, Number of Pages: 400, Number of
Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\SecurityScan\hid.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDeviceDetectionHelper.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\gVCgHiMSMMBE\hid.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Config.Msi\3d4fbe.rbs
|
data
|
dropped
|
||
C:\ProgramData\.Logitech\LDevice.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDevice.dat
|
data
|
dropped
|
||
C:\Windows\Installer\3d4fbd.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Windows Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database
contains the logic and data required to install Windows Installer., Template: Intel;1033, Revision Number: {A509E431-2CD2-476D-A0C7-B01FC235F124},
Create Time/Date: Fri Aug 16 11:25:12 2024, Last Saved Time/Date: Fri Aug 16 11:25:12 2024, Number of Pages: 400, Number of
Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\3d4fbf.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Windows Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database
contains the logic and data required to install Windows Installer., Template: Intel;1033, Revision Number: {A509E431-2CD2-476D-A0C7-B01FC235F124},
Create Time/Date: Fri Aug 16 11:25:12 2024, Last Saved Time/Date: Fri Aug 16 11:25:12 2024, Number of Pages: 400, Number of
Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI50D6.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF13309DE02CD3908A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF1B7B54C33606A20D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF248847D1B84556BA.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF3ED6BB1E3153DF31.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF49E8D0CAD87935AC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF55BE266166BFF487.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7562E9697A5767F4.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF775CEE8E95BC32B0.TMP
|
data
|
modified
|
||
C:\Windows\Temp\~DF903135700F6CEA34.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9B5173F9AFF02972.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA0D73703F2E63F02.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB8060E370B9496C2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDeviceDetectionHelper.exe
|
C:\Users\user\AppData\Local\gVCgHiMSMMBE\LDeviceDetectionHelper.exe
|
||
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
|
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe 979 576
|
||
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
|
"C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe" 890 904
|
||
C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe
|
"C:\ProgramData\SecurityScan\LDeviceDetectionHelper.exe" 890 904
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Adobe-Setup.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://103.238.227.183/nc.q
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://103.238.227.183/Q
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://103.238.227.183/J
|
unknown
|
||
https://103.238.227.183/M
|
unknown
|
||
https://103.238.227.183/vop8
|
unknown
|
||
https://103.238.227.183/L
|
unknown
|
||
https://103.238.227.183/nc.
|
unknown
|
||
https://103.238.227.183:443/
|
unknown
|
||
https://103.238.227.183:443/h
|
unknown
|
||
https://103.238.227.183:443/c
|
unknown
|
||
https://103.238.227.183:443/k
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
|
unknown
|
||
https://103.238.227.183/
|
unknown
|
||
https://103.238.227.183:443/X
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://103.238.227.183/1
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
https://103.238.227.183/nc.Y
|
unknown
|
||
https://103.238.227.183/vo0?
|
unknown
|
||
https://103.238.227.183/a
|
unknown
|
||
https://103.238.227.183:443/P
|
unknown
|
||
https://103.238.227.183/Z
|
unknown
|
||
https://103.238.227.183:443/K
|
unknown
|
||
https://103.238.227.183:443/m:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?b009a331b20
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
https://103.238.227.183:443/L
|
unknown
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.238.227.183
|
unknown
|
Hong Kong
|
||
192.168.2.16
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3d4fbe.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3d4fbe.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\Microsoft\Installer\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\B6FBF0AA7F54D3448853DB4F3F5ED774
|
DD0B6D4F2392A634285C216967A7BB09
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\B6FBF0AB7F54F3448853DB4F3F5ED784
|
DD0B6D4F2392A634285C216967A7BB09
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\B6FBF0AC7F54F3448853DB4F3F5ED784
|
DD0B6D4F2392A634285C216967A7BB09
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\gVCgHiMSMMBE\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\12739565003F36143B6513B463284621
|
DD0B6D4F2392A634285C216967A7BB09
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F4D6B0DD-2932-436A-82C5-1296767ABB90}
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\DD0B6D4F2392A634285C216967A7BB09
|
MainProgran
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\Features
|
MainProgran
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\DD0B6D4F2392A634285C216967A7BB09\Patches
|
AllPatches
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
ProductName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
PackageCode
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
Assignment
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
AdvertiseFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
InstanceType
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
AuthorizedLUAApp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
DeploymentFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\12739565003F36143B6513B463284621
|
DD0B6D4F2392A634285C216967A7BB09
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList
|
PackageName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList\Net
|
1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList\Media
|
1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09
|
Clients
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\DD0B6D4F2392A634285C216967A7BB09\SourceList
|
LastUsedSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SetPoint Update
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ms-pu
|
CLSID
|
There are 80 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E2A000
|
stack
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
99B6000
|
heap
|
page read and write
|
||
DAC000
|
unkown
|
page readonly
|
||
9E14000
|
heap
|
page read and write
|
||
9A2B000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
DA5000
|
unkown
|
page read and write
|
||
9E25000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
D8A000
|
unkown
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E13000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
995C000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
996E000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
DAC000
|
unkown
|
page readonly
|
||
99FD000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
99FC000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
99FC000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
9DF1000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
9A08000
|
heap
|
page read and write
|
||
D8A000
|
unkown
|
page write copy
|
||
99A3000
|
heap
|
page read and write
|
||
9DA000
|
unkown
|
page write copy
|
||
2F98000
|
direct allocation
|
page read and write
|
||
2F60000
|
direct allocation
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
1580000
|
direct allocation
|
page read and write
|
||
2FC0000
|
direct allocation
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9E01000
|
heap
|
page read and write
|
||
9E78000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
D9C000
|
unkown
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
9A2A000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
9E13000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
9A08000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
14A6000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9E21000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
4E64000
|
direct allocation
|
page read and write
|
||
DC3000
|
direct allocation
|
page read and write
|
||
D70000
|
direct allocation
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
9958000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
55C1000
|
direct allocation
|
page execute read
|
||
9E41000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
DA5000
|
unkown
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
1485000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
9DA000
|
unkown
|
page read and write
|
||
996F000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
9E31000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
999A000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
2FE9000
|
direct allocation
|
page read and write
|
||
9997000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
30A5000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
9E0F000
|
heap
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
578000
|
stack
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9A08000
|
heap
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
1001E000
|
unkown
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
DA8000
|
unkown
|
page read and write
|
||
F89000
|
stack
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
14B1000
|
heap
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
9E0F000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page readonly
|
||
1438000
|
heap
|
page read and write
|
||
2F7A000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
1001F000
|
unkown
|
page readonly
|
||
9A2B000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
99E2000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
28E4000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
9A2A000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
998C000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
2B50000
|
direct allocation
|
page read and write
|
||
1608000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
9989000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
998C000
|
heap
|
page read and write
|
||
9E01000
|
heap
|
page read and write
|
||
91BE000
|
stack
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
9E08000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
9BAD000
|
stack
|
page read and write
|
||
9990000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
14CF000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
4E73000
|
direct allocation
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
99B6000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
2FD8000
|
direct allocation
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
DA5000
|
unkown
|
page read and write
|
||
8F1000
|
unkown
|
page execute read
|
||
14D6000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9DEE000
|
stack
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
9E16000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
9E3A000
|
heap
|
page read and write
|
||
998A000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
9931000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
DAC000
|
unkown
|
page readonly
|
||
998D000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
D93000
|
unkown
|
page write copy
|
||
995D000
|
heap
|
page read and write
|
||
2F58000
|
direct allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
14CC000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
2F5B000
|
direct allocation
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
1603000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
3064000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E54000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
15F9000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
982E000
|
stack
|
page read and write
|
||
9E19000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99E2000
|
heap
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9A08000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
9E21000
|
heap
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9DF1000
|
heap
|
page read and write
|
||
9E14000
|
heap
|
page read and write
|
||
9E23000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
9E14000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
14B0000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E55000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9E16000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
FEC000
|
stack
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
3200000
|
direct allocation
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9E16000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
9F5000
|
unkown
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
99B6000
|
heap
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
9ED000
|
unkown
|
page write copy
|
||
5E0000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9F8000
|
unkown
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
142C000
|
heap
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
9E67000
|
heap
|
page read and write
|
||
D92000
|
unkown
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
9930000
|
heap
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
361D000
|
stack
|
page read and write
|
||
9E21000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page readonly
|
||
14D5000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
9DFF000
|
heap
|
page read and write
|
||
9E15000
|
heap
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
D9D000
|
unkown
|
page write copy
|
||
14B0000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
D93000
|
unkown
|
page write copy
|
||
1370000
|
direct allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
9A0F000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
995C000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
146A000
|
heap
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
9E2E000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
9A0C000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
9E3A000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
99CF000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
9EC000
|
unkown
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
1001E000
|
unkown
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
92FD000
|
stack
|
page read and write
|
||
353C000
|
stack
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
2FD3000
|
direct allocation
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
D99000
|
direct allocation
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
10015000
|
unkown
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
3480000
|
direct allocation
|
page execute and read and write
|
||
9A0F000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
296B000
|
stack
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
9E14000
|
heap
|
page read and write
|
||
30A9000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
9A9000
|
unkown
|
page readonly
|
||
2F80000
|
direct allocation
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
2FA9000
|
direct allocation
|
page read and write
|
||
302D000
|
stack
|
page read and write
|
||
2F51000
|
direct allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
2A50000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
29A9000
|
heap
|
page read and write
|
||
EE8000
|
stack
|
page read and write
|
||
D59000
|
unkown
|
page readonly
|
||
1370000
|
direct allocation
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9E13000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
33C0000
|
direct allocation
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
9DF1000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
1001E000
|
unkown
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9E2000
|
unkown
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
3340000
|
direct allocation
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
2F69000
|
direct allocation
|
page read and write
|
||
9982000
|
heap
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
9A0F000
|
heap
|
page read and write
|
||
953E000
|
stack
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
2F93000
|
direct allocation
|
page read and write
|
||
3380000
|
direct allocation
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
15DF000
|
stack
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
D88000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
5654000
|
direct allocation
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
51F0000
|
direct allocation
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9FC000
|
unkown
|
page readonly
|
||
9931000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
2FDB000
|
direct allocation
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
9A08000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
9A9000
|
unkown
|
page readonly
|
||
1370000
|
direct allocation
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
99F4000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
9DF0000
|
heap
|
page read and write
|
||
99E2000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E21000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
14D7000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
1370000
|
direct allocation
|
page read and write
|
||
D8C000
|
unkown
|
page write copy
|
||
53D1000
|
direct allocation
|
page execute read
|
||
99D0000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9E15000
|
heap
|
page read and write
|
||
9DF1000
|
heap
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9E1A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E01000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
9A10000
|
heap
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
8F1000
|
unkown
|
page execute read
|
||
99FD000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
9E14000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
D59000
|
unkown
|
page readonly
|
||
14AA000
|
heap
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
996A000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
D8A000
|
unkown
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
97C0000
|
remote allocation
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
9943000
|
heap
|
page read and write
|
||
32C0000
|
direct allocation
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
2FBA000
|
direct allocation
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
9A0C000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page readonly
|
||
CA0000
|
unkown
|
page readonly
|
||
2AD0000
|
direct allocation
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
D93000
|
unkown
|
page write copy
|
||
9DF1000
|
heap
|
page read and write
|
||
5270000
|
direct allocation
|
page read and write
|
||
3440000
|
direct allocation
|
page execute and read and write
|
||
93FD000
|
stack
|
page read and write
|
||
D8A000
|
unkown
|
page write copy
|
||
50F0000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1489000
|
heap
|
page read and write
|
||
13ED000
|
heap
|
page read and write
|
||
D8A000
|
unkown
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
DA8000
|
unkown
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
D9C000
|
unkown
|
page read and write
|
||
9A0C000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9DC000
|
unkown
|
page write copy
|
||
14CD000
|
heap
|
page read and write
|
||
1001E000
|
unkown
|
page read and write
|
||
306B000
|
stack
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
5464000
|
direct allocation
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
9E26000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
99B3000
|
heap
|
page read and write
|
||
9E78000
|
heap
|
page read and write
|
||
9A0C000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
14CD000
|
heap
|
page read and write
|
||
9E01000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
9CED000
|
stack
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
2FD1000
|
direct allocation
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9A0F000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9943000
|
heap
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
3064000
|
heap
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5623000
|
direct allocation
|
page read and write
|
||
DA8000
|
unkown
|
page read and write
|
||
9982000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
9A20000
|
heap
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
D92000
|
unkown
|
page read and write
|
||
9A2B000
|
heap
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
DAC000
|
unkown
|
page readonly
|
||
9E01000
|
heap
|
page read and write
|
||
1461000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
9E02000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99FC000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
D8A000
|
unkown
|
page write copy
|
||
9A10000
|
heap
|
page read and write
|
||
3013000
|
direct allocation
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9E3000
|
unkown
|
page write copy
|
||
9E01000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
99E3000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
D8C000
|
unkown
|
page write copy
|
||
998A000
|
heap
|
page read and write
|
||
99E1000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9E1A000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
97C0000
|
remote allocation
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
14D6000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
9E01000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9E13000
|
heap
|
page read and write
|
||
9E30000
|
heap
|
page read and write
|
||
5663000
|
direct allocation
|
page read and write
|
||
9943000
|
heap
|
page read and write
|
||
33ED000
|
stack
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99FC000
|
heap
|
page read and write
|
||
1603000
|
heap
|
page read and write
|
||
D9D000
|
unkown
|
page write copy
|
||
10001000
|
unkown
|
page execute read
|
||
9E1D000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
998C000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
998C000
|
heap
|
page read and write
|
||
9A20000
|
heap
|
page read and write
|
||
99B6000
|
heap
|
page read and write
|
||
99FC000
|
heap
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
A88000
|
unkown
|
page readonly
|
||
99CF000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
3300000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
2F8A000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
9955000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
99FD000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
13D0000
|
heap
|
page read and write
|
||
9A00000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9A10000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
97C0000
|
remote allocation
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9E1F000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
161A000
|
heap
|
page read and write
|
||
917D000
|
stack
|
page read and write
|
||
9E13000
|
heap
|
page read and write
|
||
99E2000
|
heap
|
page read and write
|
||
5614000
|
direct allocation
|
page read and write
|
||
10015000
|
unkown
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
5581000
|
direct allocation
|
page execute read
|
||
9E4A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
2F9B000
|
direct allocation
|
page read and write
|
||
F48000
|
stack
|
page read and write
|
||
995E000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
9E0F000
|
heap
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
99FC000
|
heap
|
page read and write
|
||
147B000
|
heap
|
page read and write
|
||
4DD1000
|
direct allocation
|
page execute read
|
||
361E000
|
stack
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
92BF000
|
stack
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
97BF000
|
stack
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9943000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
2FCA000
|
direct allocation
|
page read and write
|
||
992F000
|
stack
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
9E25000
|
heap
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
14D7000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
1001F000
|
unkown
|
page readonly
|
||
943D000
|
stack
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
995D000
|
heap
|
page read and write
|
||
99E2000
|
heap
|
page read and write
|
||
2C90000
|
direct allocation
|
page execute and read and write
|
||
9E0F000
|
heap
|
page read and write
|
||
9E16000
|
heap
|
page read and write
|
||
DAC000
|
unkown
|
page readonly
|
||
D92000
|
unkown
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
15C3000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
96BD000
|
stack
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
9CAD000
|
stack
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
9FC000
|
unkown
|
page readonly
|
||
9E1C000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
10015000
|
unkown
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9982000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
9E41000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
2FFA000
|
direct allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
D9C000
|
unkown
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
1001F000
|
unkown
|
page readonly
|
||
E5F000
|
heap
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
2F4A000
|
direct allocation
|
page read and write
|
||
99B6000
|
heap
|
page read and write
|
||
9970000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
995C000
|
heap
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
351B000
|
stack
|
page read and write
|
||
9990000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
99FE000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
DAC000
|
unkown
|
page readonly
|
||
9E01000
|
heap
|
page read and write
|
||
998A000
|
heap
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
9E27000
|
heap
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
9997000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
10015000
|
unkown
|
page read and write
|
||
1603000
|
heap
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
9E17000
|
heap
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
D9D000
|
unkown
|
page write copy
|
||
14CD000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
5473000
|
direct allocation
|
page read and write
|
||
9A08000
|
heap
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
9943000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
2F91000
|
direct allocation
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
998B000
|
heap
|
page read and write
|
||
9E14000
|
heap
|
page read and write
|
||
9E31000
|
heap
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
D8C000
|
unkown
|
page write copy
|
||
D8B000
|
direct allocation
|
page read and write
|
||
9E03000
|
heap
|
page read and write
|
||
14B1000
|
heap
|
page read and write
|
||
9E18000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
9E11000
|
heap
|
page read and write
|
||
A88000
|
unkown
|
page readonly
|
||
99FE000
|
heap
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
3240000
|
direct allocation
|
page read and write
|
||
99B4000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
9A2E000
|
heap
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
DAA000
|
direct allocation
|
page read and write
|
||
9E4A000
|
heap
|
page read and write
|
||
D7A000
|
direct allocation
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
1607000
|
heap
|
page read and write
|
||
9991000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
998D000
|
heap
|
page read and write
|
||
998C000
|
heap
|
page read and write
|
||
99CF000
|
heap
|
page read and write
|
||
14BD000
|
heap
|
page read and write
|
||
15E7000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page readonly
|
||
999A000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
999A000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
9A50000
|
direct allocation
|
page read and write
|
||
995D000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
9E1C000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
99A3000
|
heap
|
page read and write
|
||
99FF000
|
heap
|
page read and write
|
||
9E1D000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
3160000
|
direct allocation
|
page read and write
|
||
995C000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
9931000
|
heap
|
page read and write
|
||
99D0000
|
heap
|
page read and write
|
||
1001F000
|
unkown
|
page readonly
|
||
E60000
|
heap
|
page read and write
|
||
179E000
|
stack
|
page read and write
|
||
9E1E000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
There are 1089 hidden memdumps, click here to show them.