Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi.zip
|
Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Coolmuster PDF Image Extractor.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Config.Msi\5f925f.rbs
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\API-MS-Win-core-xstate-l2-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Containers\Temp.wav
|
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\DGBCDX64.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Error.raw
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\GuardEassosRestoreBoot,1.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\GuardEassosRestoreBoot,2.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\ImageUtility.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Module.Helper.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Module.View.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\OfflineReg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Support\Client.db
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Unrar.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-console-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-console-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-datetime-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-debug-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-file-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-file-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-file-l2-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-handle-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-heap-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-louserzation-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-memory-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-profile-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-string-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-synch-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-synch-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-timezone-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-util-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-conio-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-convert-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-environment-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-heap-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-locale-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-math-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-multibyte-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-private-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-process-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-string-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-time-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-utility-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\concrt140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\curl-ca-bundle.crt
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\groceryc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libBasic.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libI18n.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libIPC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libRG.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libUpdate.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libcrypto-1_1.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libcurl.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libdrive.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libexpat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libgccfree.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libglog.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libpng14-14.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libssl-1_1.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libxml2-2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\license_En.txt
|
Unicode text, UTF-16, little-endian text, with very long lines (948), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_atomic_wait.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_codecvt_ids.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\pthreadGC2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\ucrtbase.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\vccorlib140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\Network MPluginManager\zlib1.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0bfve4qa.4da.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arwntn0c.mv2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0bxoce5.cxv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ksynebg1.etj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvtazs4x.yhz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_raghmy3b.zpd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ANSWA0EUVFUTOWB89JZF.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Network MPluginManager, Author: MeldaProduction, Keywords: Installer, Comments: This installer database
contains the logic and data required to install Network MPluginManager., Template: Intel;1033, Revision Number: {29FF04AE-EC3E-484A-BDA9-9EFFD6567EDB},
Create Time/Date: Wed Aug 14 23:53:36 2024, Last Saved Time/Date: Wed Aug 14 23:53:36 2024, Number of Pages: 200, Number of
Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
|
dropped
|
||
C:\Windows\Installer\5f925e.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Network MPluginManager, Author: MeldaProduction, Keywords: Installer, Comments: This installer database
contains the logic and data required to install Network MPluginManager., Template: Intel;1033, Revision Number: {29FF04AE-EC3E-484A-BDA9-9EFFD6567EDB},
Create Time/Date: Wed Aug 14 23:53:36 2024, Last Saved Time/Date: Wed Aug 14 23:53:36 2024, Number of Pages: 200, Number of
Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
|
dropped
|
||
C:\Windows\Installer\5f9260.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Network MPluginManager, Author: MeldaProduction, Keywords: Installer, Comments: This installer database
contains the logic and data required to install Network MPluginManager., Template: Intel;1033, Revision Number: {29FF04AE-EC3E-484A-BDA9-9EFFD6567EDB},
Create Time/Date: Wed Aug 14 23:53:36 2024, Last Saved Time/Date: Wed Aug 14 23:53:36 2024, Number of Pages: 200, Number of
Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI9665.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF1EA527CFE639A4FA.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF3F9C7D1DA5072CF6.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4373894EECD42FC3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF69B1BBB13B50E0E4.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF70352A30D1C5B994.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF87CF483E6DA02B20.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8CBC165542D2A308.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF9FA0ADB470962148.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA5BB92E24269FE3F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC39ED6EEB1200EA2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD1EAF73F2BC975AF.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFB5D0CE104C656FA.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with very long lines (445), with no line terminators, with escape sequences
|
dropped
|
There are 105 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Coolmuster PDF Image Extractor.exe
|
"C:\Users\user\AppData\Local\Programs\Network MPluginManager\Coolmuster PDF Image Extractor.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c powershell -ep bypass
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -ep bypass
|
||
C:\Windows\System32\whoami.exe
|
"C:\Windows\system32\whoami.exe" /all
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Program Files\7-Zip\7zG.exe
|
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi\"
-spe -an -ai#7zMap15499:192:7zEvent20179
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 1228
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.133.74.183
|
|||
http://www.typography.nethi
|
unknown
|
||
http://www.jiyu-kobo.co.jp/8E
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.htmlp4(
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD
|
unknown
|
||
http://www.fonts.comnt
|
unknown
|
||
http://www.fontbureau.comF8E
|
unknown
|
||
http://www.ascc.net/xml/schematron
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.jiyu-kobo.co.jp/yE
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://www.fontbureau.com2
|
unknown
|
||
http://www.fontbureau.comoJER
|
unknown
|
||
http://www.jiyu-kobo.co.jp//
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.fontbureau.com/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.jiyu-kobo.co.jp/Y0
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/vE.
|
unknown
|
||
http://www.fontbureau.comgrito
|
unknown
|
||
http://www.ascendercorp.com/typedesigners.html
|
unknown
|
||
http://www.ascc.net/xml/schematronL
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.fontbureau.comalsd
|
unknown
|
||
http://www.galapagosdesign.com/
|
unknown
|
||
http://www.fontbureau.comsiefdE
|
unknown
|
||
http://www.carterandcone.comd
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.carterandcone.comX
|
unknown
|
||
http://www.carterandcone.comde0)
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://relaxng.org/ns/structure/1.0Use
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.fontbureau.comcomo
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://en.w
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.jiyu-kobo.co.jp/CE
|
unknown
|
||
http://www.zhongyicts.com.cnk
|
unknown
|
||
http://sourceware.org/pthreads-win32/DVarFileInfo$
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
http://www.jiyu-kobo.co.jp/Y0/
|
unknown
|
||
http://www.carterandcone.comTCU)
|
unknown
|
||
http://www.galapagosdesign.com/oE7
|
unknown
|
||
http://www.fontbureau.comrita
|
unknown
|
||
http://www.fontbureau.comitu
|
unknown
|
||
http://www.carterandcone.combli
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/oE7
|
unknown
|
||
http://www.fontbureau.comtas
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.html8z
|
unknown
|
||
http://www.winimage.com/zLibDll0123456789ABCDEFuuuuuuuubtnufruuuuuuuuuuuuuuuuuu
|
unknown
|
||
https://curl.se/V
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.jiyu-kobo.co.jp/JER
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://pesterbdd.com/images/Pester.pngp4(
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.fontbureau.como.jp/
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htmY=
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://.css
|
unknown
|
||
http://purl.oclc.org/dsdl/schematron
|
unknown
|
||
http://www.carterandcone.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designersDLr
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
http://www.typography.net
|
unknown
|
||
http://www.fontbureau.comased
|
unknown
|
||
http://www.fontbureau.comonyd
|
unknown
|
||
http://www.fontbureau.com/designerse
|
unknown
|
||
http://www.fontbureau.com/designersd
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/oE7
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
http://.jpg
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.comF
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
http://www.carterandcone.comTC
|
unknown
|
||
http://www.fontbureau.com/designers/r
|
unknown
|
||
http://www.urwpp.deO
|
unknown
|
||
http://www.fontbureau.comF.Ev
|
unknown
|
||
http://www.fonts.comn-u
|
unknown
|
||
http://www.jiyu-kobo.co.jp/1Ei
|
unknown
|
There are 90 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5f925f.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5f925f.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\Microsoft\Installer\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F85D802A421C8ABFE5269D3F908A987F
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5D29A7187FB86BB89851394C29A9CBB9
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1CE203BCE18B2BB429DB83C323CA0DC0
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\180E7EE3D5246E487FA5811AB17B091D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\77194369AD0D0F00979356BAEE9A694E
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AB2D7CAF292E8CDB5F5872A3BB257BDD
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F12BFE1BFA05A4906F43AEDB74CFB8B6
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\632314826A74D7CED8B8D351F9584B50
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2438EA595E90BCFF99FA93BC83568A5D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\E4AC6EDF2BA337DE08B4B66F50E6C2AF
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\95D6E699CA5B873EF14ACE7D33EABA3A
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\29FA69830F41DDA2EF4080A0BFA93D86
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BD75C9ED009365C7BC17B1FCFD455716
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\0CD261CD88ECC463219735C988CB90FC
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\276EEB1CC3C1045012DF16E33776B2E6
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1475C53893E51D2AEAFE49E25F369AC9
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\53509F3D6F6AD21BA984E869BB9E534F
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2257A5CB7459888CCD06865AD5923A66
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BD2D470B1BC6FC820CFB7718E67A6BCF
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\E6CEDFA064AD4EBC2F8AE28B90531908
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8FAACA690A3FE69B8F89D769D6F2D7BF
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\EF79CA4B6645ADA7885615A31DB9CAE5
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\3C0FB570664954F382CB1431E6FAFE60
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A4C65418D29DD0D4B641D2C113F927AB
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\235CE3EE3448A364574D710055093DF5
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8273DF74E5968396BA47B1EF18445C45
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5505F55E7DCCBB99E37A6D91EAEEBD56
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\D11247F63D720A56FDF16807614FCDE5
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\DD71EBC9D9EA8FE478FAF6D2B1ADC60D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5529641F4C3C551C1E3511C9AD4A9F74
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9B88E633A5388F8583598C475997EE0A
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9F76F934F3B1FCEE732CD6DEA0C45CD9
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9AB042FDDABF71CB6E313583448EF714
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\CB5B38F4AD053B6F959EF89D8BFC182E
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\502540899B167C7542A4097FF6F6F7AC
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\0CBA3C9919D4308A365E8CD90839A86D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\D6535E465ED5CFD3A1D5A0ACFDD463A9
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\FDEA555ECC96E66EE7BCDA455E4E00EC
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\4724499B91BDACDAF0170111014BBFE5
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\83273570EB15E04801CF8A38EE1078F0
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9C35CCB1837D296F598949DB5BC8B806
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1C4A5F29124AB2713705F278BB3BE325
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\B6C175A181A34074E3D1BD47ECC7B78B
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\DA35A074E2C7B3B1D6DE88F12E1E4748
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\434D6E37F27A848504A151B453173D59
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BDF5E39D57FC485E2E6A38C2EEDF17A0
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F88D6B121373BD058B11E8D2A644279D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\105845F1BA41E84B97B3663AC937C782
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AE2EE789425F26E524BF425D5B5BABF8
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2D894C3542778D62ECB24AA6EB002EAB
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\B389EC7837D1EBFA6A88DAE99EDED58F
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8328452AFEE3BB7E87B76BB4855B2F11
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A086F2E9A91BD2ACDBF8D272A8B86095
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\98BB45E135CD728C4CCFA24AC86114EA
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\50A78D570A6215E289E4108515A0BF31
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\620AFE6FB2ADB64CA345A13967F350E4
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AA9F9820A2855B8AC010F68567158E64
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\94B0B2C3523B891208F120004D41ACCC
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\061913D0B9111FA94C3DB60ECCA34F2A
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\15A6CE2BC6594820D8C052C686D02634
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C9E9E0CE857B9D0C0A46ACA09D9B30D1
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\219ABBA03D14EBA4AA4238C25FD72578
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\FFD2919E0D842D5C0EC72F671C7074BB
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\42D1E8D09D4A054CA326CF3C9FF45F26
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A505C0794BC25279F91D71DC84E43157
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8BACED2970FD81975931A55DB3D2E5D6
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\60AC1AAAFFFDEE4BEDF047407F7D5110
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\03F679D7994EA13477C5179CEAB1FDE2
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C804C6B801F83B6154547C48710A4AE3
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\34ED4FD7868551BB7596BD793CF95E8C
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\0E5C97773C3EF001379E089C4F5628BC
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C6CEBBCCECDC789D8D0C7264F0708CC3
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\E963067064E158B590B46D4E0BA3F30B
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\247D2FC70B8D64E334B6D8C28BB7EF0D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\CDC36CF03C2EB71EBCB2C8BB3162B33D
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\CFC0AB9D31DDF6E0B98DDB553CEAF461
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1A2C47FF1FB080FDEDCBB5A921240EF4
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F148591C77125ABB264FC7A785CD3DF8
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\56538859377FD1BF884EDF27E587A5FF
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\258F368C91AF7C06A46296E186137C2E
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9B3A4D6E4DF40B21AEB53F28E211C5F2
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\Programs\Network MPluginManager\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\Programs\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Containers\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\76885C20F226248409FEE76F56DC3A8A
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CDF491A47CF5C82438ACCBA457D035B0
|
f
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\Features
|
f
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\Patches
|
AllPatches
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
ProductName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
PackageCode
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
Assignment
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
AdvertiseFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
InstanceType
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
AuthorizedLUAApp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
DeploymentFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\76885C20F226248409FEE76F56DC3A8A
|
CDF491A47CF5C82438ACCBA457D035B0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList
|
PackageName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList\Net
|
1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList\Media
|
1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
|
Clients
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList
|
LastUsedSource
|
There are 147 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
33A1000
|
heap
|
page read and write
|
||
3418000
|
heap
|
page read and write
|
||
51C1000
|
heap
|
page read and write
|
||
3418000
|
heap
|
page read and write
|
||
52AD000
|
heap
|
page read and write
|
||
57F3000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
5778000
|
heap
|
page read and write
|
||
532A000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
19138630000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
215CE1F9000
|
trusted library allocation
|
page read and write
|
||
76B000
|
stack
|
page read and write
|
||
7FFEC8340000
|
trusted library allocation
|
page read and write
|
||
5778000
|
heap
|
page read and write
|
||
AC9EAF9000
|
stack
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
6C1F5000
|
unkown
|
page readonly
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC87B3000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
5293000
|
heap
|
page read and write
|
||
38AC000
|
heap
|
page read and write
|
||
215CA5F2000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC8430000
|
trusted library allocation
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CDFA7000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
389A000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
7FFEC8380000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
6BC6F000
|
unkown
|
page read and write
|
||
22350B95000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
215E45E5000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
264B000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
7FFEC7E90000
|
trusted library allocation
|
page read and write
|
||
6C193000
|
unkown
|
page readonly
|
||
9AA000
|
heap
|
page read and write
|
||
DD7FA4E000
|
stack
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
22350B64000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC87A0000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
3887000
|
heap
|
page read and write
|
||
82D000
|
stack
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
73DE1000
|
unkown
|
page execute read
|
||
4A3E000
|
stack
|
page read and write
|
||
1A43E540000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
7FFEC85B0000
|
trusted library allocation
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
223524A0000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
22350B8D000
|
heap
|
page read and write
|
||
73D8B000
|
unkown
|
page read and write
|
||
7FFEC8030000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
1A43E6E4000
|
heap
|
page read and write
|
||
5778000
|
heap
|
page read and write
|
||
7FFEC8023000
|
trusted library allocation
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
215CA625000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
DD7EFFE000
|
stack
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
DD7EC7E000
|
stack
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
7FFEC7E9C000
|
trusted library allocation
|
page execute and read and write
|
||
389B000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
5245000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
7FFEC8630000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CA730000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
38AF000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
38AB000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38B4000
|
heap
|
page read and write
|
||
215CC490000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
7FFEC82E0000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC8740000
|
trusted library allocation
|
page read and write
|
||
6BC01000
|
unkown
|
page execute and read and write
|
||
388F000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
6BF40000
|
unkown
|
page readonly
|
||
3899000
|
heap
|
page read and write
|
||
7FFEC85F0000
|
trusted library allocation
|
page read and write
|
||
38A8000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
6BC81000
|
unkown
|
page execute read
|
||
388F000
|
heap
|
page read and write
|
||
215E4A6D000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
7FFEC85A0000
|
trusted library allocation
|
page read and write
|
||
6C9B0000
|
unkown
|
page readonly
|
||
7FFEC8245000
|
trusted library allocation
|
page read and write
|
||
7FFEC7DF7000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
heap
|
page read and write
|
||
7FFEC8280000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6BC00000
|
unkown
|
page readonly
|
||
38B5000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC86F0000
|
trusted library allocation
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
215E4BF0000
|
heap
|
page read and write
|
||
6C9BC000
|
unkown
|
page readonly
|
||
7FFEC8410000
|
trusted library allocation
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
6CB90000
|
unkown
|
page readonly
|
||
7FFEC8820000
|
trusted library allocation
|
page read and write
|
||
6CA94000
|
unkown
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
DD7EB7E000
|
stack
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
22350B60000
|
heap
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215E4A6F000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
5277000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
22350B67000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215E47E5000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
19138840000
|
heap
|
page read and write
|
||
7FFEC7F00000
|
trusted library allocation
|
page execute and read and write
|
||
388F000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
7FFEC8600000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC80E0000
|
trusted library allocation
|
page read and write
|
||
71040000
|
unkown
|
page readonly
|
||
3891000
|
heap
|
page read and write
|
||
38A7000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
73D7C000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
215CDA36000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
6CB50000
|
unkown
|
page readonly
|
||
FDC000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
22350B79000
|
heap
|
page read and write
|
||
22350B78000
|
heap
|
page read and write
|
||
7FFEC80A0000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
22350B6E000
|
heap
|
page read and write
|
||
7FFEC8200000
|
trusted library allocation
|
page execute and read and write
|
||
38AA000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
97E000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
6CAE9000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
6C972000
|
unkown
|
page readonly
|
||
215CA61F000
|
heap
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC800A000
|
trusted library allocation
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
73CE1000
|
unkown
|
page execute read
|
||
215CBF10000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
5241000
|
heap
|
page read and write
|
||
73DE0000
|
unkown
|
page readonly
|
||
2C4707E000
|
stack
|
page read and write
|
||
7FFEC7DED000
|
trusted library allocation
|
page execute and read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
3891000
|
heap
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC8080000
|
trusted library allocation
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
19138970000
|
heap
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
7FFEC7DE3000
|
trusted library allocation
|
page execute and read and write
|
||
9AA000
|
heap
|
page read and write
|
||
A0298FE000
|
stack
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
215E48D7000
|
heap
|
page execute and read and write
|
||
7FFEC8480000
|
trusted library allocation
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
6C192000
|
unkown
|
page read and write
|
||
7FFEC8060000
|
trusted library allocation
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
62499000
|
unkown
|
page readonly
|
||
215E4BD0000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
95C000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
7FFEC8750000
|
trusted library allocation
|
page read and write
|
||
215CBF35000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
983000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
7FFEC8660000
|
trusted library allocation
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
DD7EBFF000
|
stack
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
7FFEC8730000
|
trusted library allocation
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
5DAA000
|
direct allocation
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
529C000
|
heap
|
page read and write
|
||
3754000
|
heap
|
page read and write
|
||
387A000
|
heap
|
page read and write
|
||
389D000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
35C29FF000
|
stack
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
4A82000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC80D0000
|
trusted library allocation
|
page read and write
|
||
3887000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
215CA558000
|
heap
|
page read and write
|
||
22352CAC000
|
trusted library allocation
|
page read and write
|
||
38B5000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9AF000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
38B1000
|
heap
|
page read and write
|
||
283E6710000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC8250000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
6CAE1000
|
unkown
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3878000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B4000
|
heap
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
215CCB21000
|
trusted library allocation
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
7FFEC8040000
|
trusted library allocation
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
7FFEC8900000
|
trusted library allocation
|
page read and write
|
||
973000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
387C000
|
heap
|
page read and write
|
||
22350B81000
|
heap
|
page read and write
|
||
73D44000
|
unkown
|
page read and write
|
||
6CC01000
|
unkown
|
page execute read
|
||
7FFEC7DE0000
|
trusted library allocation
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
387C000
|
heap
|
page read and write
|
||
215CA562000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
FDE000
|
heap
|
page read and write
|
||
7FFEC7DFB000
|
trusted library allocation
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
7FFEC8330000
|
trusted library allocation
|
page read and write
|
||
7FFEC8160000
|
trusted library allocation
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
389A000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
6BF9F000
|
unkown
|
page write copy
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC8020000
|
trusted library allocation
|
page read and write
|
||
215DC78E000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
5285000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
215CA617000
|
heap
|
page read and write
|
||
7FFEC8640000
|
trusted library allocation
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
6248F000
|
unkown
|
page readonly
|
||
389B000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
7FFEC8710000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
A0295BE000
|
stack
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC88D0000
|
trusted library allocation
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC80C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEC8370000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
9E9000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
215CC040000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
6CBE9000
|
unkown
|
page read and write
|
||
6C260000
|
unkown
|
page readonly
|
||
389A000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
22350B6F000
|
heap
|
page read and write
|
||
38B5000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
6BC04000
|
unkown
|
page execute and write copy
|
||
7FFEC8070000
|
trusted library allocation
|
page read and write
|
||
9B2000
|
heap
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
22352430000
|
trusted library allocation
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FFEC8310000
|
trusted library allocation
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
22352490000
|
heap
|
page read and write
|
||
22350B65000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
19138820000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
215DC5E1000
|
trusted library allocation
|
page read and write
|
||
6BFC0000
|
unkown
|
page readonly
|
||
3897000
|
heap
|
page read and write
|
||
71005000
|
unkown
|
page readonly
|
||
215E4988000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
22350B85000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6CB30000
|
unkown
|
page readonly
|
||
38B1000
|
heap
|
page read and write
|
||
223523D0000
|
trusted library allocation
|
page read and write
|
||
7FFEC8490000
|
trusted library allocation
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
215CCA58000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
6CB00000
|
unkown
|
page readonly
|
||
38AE000
|
heap
|
page read and write
|
||
7FFEC8500000
|
trusted library allocation
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
22350B60000
|
heap
|
page read and write
|
||
9EF000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
7FFEC8390000
|
trusted library allocation
|
page execute and read and write
|
||
3892000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
22350A60000
|
heap
|
page read and write
|
||
7FFEC8290000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
62E9D000
|
unkown
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
339F000
|
heap
|
page read and write
|
||
7103D000
|
unkown
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3887000
|
heap
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
7FFEC8220000
|
trusted library allocation
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
389D000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215DC5E9000
|
trusted library allocation
|
page read and write
|
||
22350B6F000
|
heap
|
page read and write
|
||
52A5000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
1A43E640000
|
heap
|
page read and write
|
||
7FFEC8050000
|
trusted library allocation
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
283E68B0000
|
heap
|
page read and write
|
||
55FC000
|
stack
|
page read and write
|
||
6CB91000
|
unkown
|
page execute read
|
||
3890000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
DD7EA7E000
|
stack
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
5778000
|
heap
|
page read and write
|
||
22352AB0000
|
trusted library allocation
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
215CA520000
|
heap
|
page read and write
|
||
215E4A65000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
7FFEC87BA000
|
trusted library allocation
|
page read and write
|
||
5277000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
98F000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
6CB31000
|
unkown
|
page execute read
|
||
22350B93000
|
heap
|
page read and write
|
||
7FFEC8130000
|
trusted library allocation
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
348E000
|
heap
|
page read and write
|
||
215CA530000
|
heap
|
page read and write
|
||
7FFEC8026000
|
trusted library allocation
|
page read and write
|
||
6C21A000
|
unkown
|
page readonly
|
||
999000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38A4000
|
heap
|
page read and write
|
||
7FFEC8590000
|
trusted library allocation
|
page read and write
|
||
215E4772000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
22350B7D000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC88E0000
|
trusted library allocation
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC8260000
|
trusted library allocation
|
page read and write
|
||
7FFEC82D0000
|
trusted library allocation
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
62481000
|
unkown
|
page execute read
|
||
3894000
|
heap
|
page read and write
|
||
7FFEC8085000
|
trusted library allocation
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
38A4000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6BFA1000
|
unkown
|
page readonly
|
||
FDA000
|
heap
|
page read and write
|
||
71004000
|
unkown
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8300000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
6BF9E000
|
unkown
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
6CB21000
|
unkown
|
page readonly
|
||
292E000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
274B000
|
stack
|
page read and write
|
||
215CC430000
|
trusted library section
|
page read and write
|
||
7FFEC87F0000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
389F000
|
heap
|
page read and write
|
||
7DF4098D0000
|
trusted library allocation
|
page execute and read and write
|
||
6CB85000
|
unkown
|
page readonly
|
||
215E4A41000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8360000
|
trusted library allocation
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
71030000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC829B000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC8620000
|
trusted library allocation
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
5281000
|
heap
|
page read and write
|
||
215CBF30000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
74AC0000
|
unkown
|
page readonly
|
||
5700000
|
heap
|
page read and write
|
||
6BF41000
|
unkown
|
page execute read
|
||
3897000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
3392000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
215E4A4C000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
215CC030000
|
trusted library allocation
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
35C27FE000
|
unkown
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC82B0000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
7FFEC87A2000
|
trusted library allocation
|
page read and write
|
||
215CE198000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
215CCB1D000
|
trusted library allocation
|
page read and write
|
||
70F41000
|
unkown
|
page execute read
|
||
22350B78000
|
heap
|
page read and write
|
||
38A4000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC85E0000
|
trusted library allocation
|
page read and write
|
||
7FFEC8830000
|
trusted library allocation
|
page read and write
|
||
74AC1000
|
unkown
|
page execute read
|
||
388F000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
95C000
|
heap
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
22350B6B000
|
heap
|
page read and write
|
||
3886000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
5281000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
7FFEC84B0000
|
trusted library allocation
|
page read and write
|
||
7102E000
|
unkown
|
page read and write
|
||
A02953C000
|
stack
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
215CC450000
|
trusted library allocation
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
73D47000
|
unkown
|
page readonly
|
||
22352CB0000
|
trusted library allocation
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
215E47E7000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC82F0000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
5275000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC8770000
|
trusted library allocation
|
page read and write
|
||
7FFEC8850000
|
trusted library allocation
|
page execute and read and write
|
||
389B000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
6C9D0000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
6249B000
|
unkown
|
page readonly
|
||
AC9EFFE000
|
stack
|
page read and write
|
||
388E000
|
heap
|
page read and write
|
||
7FFEC7DE4000
|
trusted library allocation
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
7FFEC8460000
|
trusted library allocation
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38B4000
|
heap
|
page read and write
|
||
6CB40000
|
unkown
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
389F000
|
heap
|
page read and write
|
||
215E48D0000
|
heap
|
page execute and read and write
|
||
70F40000
|
unkown
|
page readonly
|
||
BCD000
|
stack
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8790000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
direct allocation
|
page readonly
|
||
999000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
3889000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
8DD000
|
stack
|
page read and write
|
||
7FFEC8065000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
5328000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
DD7E9FD000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
DD7E581000
|
stack
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
7FFEC8420000
|
trusted library allocation
|
page read and write
|
||
6CC24000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
7FFEC7E0B000
|
trusted library allocation
|
page execute and read and write
|
||
FDA000
|
heap
|
page read and write
|
||
223524A9000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
215E4880000
|
heap
|
page execute and read and write
|
||
6C79F000
|
unkown
|
page readonly
|
||
7FFEC8270000
|
trusted library allocation
|
page read and write
|
||
7FFEC85D0000
|
trusted library allocation
|
page read and write
|
||
215E4A99000
|
heap
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
62EA0000
|
unkown
|
page write copy
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
73CE0000
|
unkown
|
page readonly
|
||
9FC000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
387C000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
52A8000
|
heap
|
page read and write
|
||
3416000
|
heap
|
page read and write
|
||
7FFEC84A0000
|
trusted library allocation
|
page read and write
|
||
7FFEC8450000
|
trusted library allocation
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
6CC00000
|
unkown
|
page readonly
|
||
38A3000
|
heap
|
page read and write
|
||
527F000
|
heap
|
page read and write
|
||
227000
|
unkown
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CC4C0000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
5291000
|
heap
|
page read and write
|
||
7FFEC7E0D000
|
trusted library allocation
|
page execute and read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
95D000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC7E00000
|
trusted library allocation
|
page read and write
|
||
22350B8C000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
7FFEC8350000
|
trusted library allocation
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
A02987F000
|
stack
|
page read and write
|
||
7FFEC84E0000
|
trusted library allocation
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
3872000
|
heap
|
page read and write
|
||
38A7000
|
heap
|
page read and write
|
||
7FFEC8720000
|
trusted library allocation
|
page read and write
|
||
6C9B1000
|
unkown
|
page execute read
|
||
38B7000
|
heap
|
page read and write
|
||
283E6810000
|
heap
|
page read and write
|
||
3875000
|
heap
|
page read and write
|
||
9F1000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
365B000
|
stack
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
62480000
|
unkown
|
page readonly
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8320000
|
trusted library allocation
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
214000
|
unkown
|
page readonly
|
||
389A000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
5289000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
215CE1BE000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
62E81000
|
unkown
|
page execute read
|
||
6BFD1000
|
unkown
|
page execute read
|
||
38B2000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8440000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
9F1000
|
heap
|
page read and write
|
||
3898000
|
heap
|
page read and write
|
||
2C46DFE000
|
stack
|
page read and write
|
||
5C61000
|
direct allocation
|
page execute read
|
||
3892000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
6CB41000
|
unkown
|
page readonly
|
||
38AD000
|
heap
|
page read and write
|
||
22350B6C000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
22350B59000
|
heap
|
page read and write
|
||
62EA1000
|
unkown
|
page readonly
|
||
3899000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
52AD000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A8000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC87D0000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
1A43E6E6000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CC480000
|
heap
|
page execute and read and write
|
||
3898000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
7FFEC88D2000
|
trusted library allocation
|
page read and write
|
||
6BC5F000
|
unkown
|
page readonly
|
||
747FF000
|
unkown
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
499C000
|
stack
|
page read and write
|
||
9E9000
|
heap
|
page read and write
|
||
1A43E8F0000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
6BD1E000
|
unkown
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
73DEF000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC80B0000
|
trusted library allocation
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
529C000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
6CBEC000
|
unkown
|
page readonly
|
||
38AE000
|
heap
|
page read and write
|
||
215CA5FB000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
38A7000
|
heap
|
page read and write
|
||
6C95D000
|
unkown
|
page write copy
|
||
74AC9000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
6CAE0000
|
unkown
|
page readonly
|
||
38A0000
|
heap
|
page read and write
|
||
6CBD6000
|
unkown
|
page readonly
|
||
215E4A72000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
DD7EF7E000
|
stack
|
page read and write
|
||
215CA637000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
2C46CFC000
|
stack
|
page read and write
|
||
7FFEC80F0000
|
trusted library allocation
|
page read and write
|
||
215E4715000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215E497E000
|
heap
|
page read and write
|
||
DD7F079000
|
stack
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
215DC8C5000
|
trusted library allocation
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
215CDFDF000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
22350B75000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
74AC6000
|
unkown
|
page readonly
|
||
7FFEC8090000
|
trusted library allocation
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
215CE1B8000
|
trusted library allocation
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
747F0000
|
unkown
|
page readonly
|
||
38AD000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
6BFA0000
|
unkown
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
3891000
|
heap
|
page read and write
|
||
215CC669000
|
trusted library allocation
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
DD7E97E000
|
stack
|
page read and write
|
||
6BFB4000
|
unkown
|
page readonly
|
||
987000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
19138654000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
35C26FC000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
528E000
|
heap
|
page read and write
|
||
747F1000
|
unkown
|
page execute read
|
||
389B000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
215CDFE3000
|
trusted library allocation
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
7FFEC87E0000
|
trusted library allocation
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
7FFEC82C0000
|
trusted library allocation
|
page read and write
|
||
7FFEC7E3C000
|
trusted library allocation
|
page execute and read and write
|
||
1A43E7C0000
|
heap
|
page read and write
|
||
DD7FB4A000
|
stack
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
22350B91000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
7FFEC87AD000
|
trusted library allocation
|
page read and write
|
||
283E6718000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
73DEB000
|
unkown
|
page readonly
|
||
9D7000
|
heap
|
page read and write
|
||
5277000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CC460000
|
heap
|
page readonly
|
||
9B7000
|
heap
|
page read and write
|
||
7FFEC8610000
|
trusted library allocation
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
7FFEC8800000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
2C46D7E000
|
stack
|
page read and write
|
||
1A43E620000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC8170000
|
trusted library allocation
|
page execute and read and write
|
||
38B2000
|
heap
|
page read and write
|
||
6BFD0000
|
unkown
|
page readonly
|
||
38A3000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
5289000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
215CA550000
|
heap
|
page read and write
|
||
7FFEC87C0000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
215CC8C4000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CA588000
|
heap
|
page read and write
|
||
6C219000
|
unkown
|
page write copy
|
||
3897000
|
heap
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CC470000
|
trusted library allocation
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
7FFEC8470000
|
trusted library allocation
|
page read and write
|
||
7FFEC8120000
|
trusted library allocation
|
page read and write
|
||
387B000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
227000
|
unkown
|
page write copy
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
6C9C1000
|
unkown
|
page readonly
|
||
7FFEC8840000
|
trusted library allocation
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
53C8000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6BD21000
|
unkown
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
389A000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
22350B6E000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B1000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
7FFEC8140000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
215E4A9D000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
3886000
|
heap
|
page read and write
|
||
4F5D000
|
stack
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC84F0000
|
trusted library allocation
|
page read and write
|
||
7FFEC82A0000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7FFEC8780000
|
trusted library allocation
|
page execute and read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6BD0F000
|
unkown
|
page readonly
|
||
38AA000
|
heap
|
page read and write
|
||
6C9D1000
|
unkown
|
page execute read
|
||
389D000
|
heap
|
page read and write
|
||
6CBE7000
|
unkown
|
page write copy
|
||
3897000
|
heap
|
page read and write
|
||
5281000
|
heap
|
page read and write
|
||
215CA740000
|
heap
|
page read and write
|
||
6CB82000
|
unkown
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8110000
|
trusted library allocation
|
page read and write
|
||
98D000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
6CB77000
|
unkown
|
page readonly
|
||
9B2000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
5293000
|
heap
|
page read and write
|
||
215E4A91000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
215CC500000
|
trusted library allocation
|
page read and write
|
||
529C000
|
heap
|
page read and write
|
||
7FFEC8670000
|
trusted library allocation
|
page execute and read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8760000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
215E477A000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
6BFBF000
|
unkown
|
page write copy
|
||
9EB000
|
heap
|
page read and write
|
||
38A4000
|
heap
|
page read and write
|
||
7FFEC7DF0000
|
trusted library allocation
|
page read and write
|
||
6C215000
|
unkown
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
5DAE000
|
direct allocation
|
page readonly
|
||
388F000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215E47A0000
|
heap
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
215E4998000
|
heap
|
page read and write
|
||
73D51000
|
unkown
|
page execute read
|
||
3897000
|
heap
|
page read and write
|
||
38A4000
|
heap
|
page read and write
|
||
73D8D000
|
unkown
|
page readonly
|
||
5C60000
|
direct allocation
|
page readonly
|
||
7FFEC8920000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
62498000
|
unkown
|
page write copy
|
||
388F000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
5239000
|
heap
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
668000
|
stack
|
page read and write
|
||
6C960000
|
unkown
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
98D000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
283E66E0000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FFEC87A4000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
387C000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
6BFB9000
|
unkown
|
page read and write
|
||
6CB1A000
|
unkown
|
page readonly
|
||
975000
|
heap
|
page read and write
|
||
215E49C1000
|
heap
|
page read and write
|
||
7FFEC84C0000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
62E80000
|
unkown
|
page readonly
|
||
389B000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
19138647000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38A4000
|
heap
|
page read and write
|
||
19138740000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC88F0000
|
trusted library allocation
|
page read and write
|
||
387D000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
389A000
|
heap
|
page read and write
|
||
7FFEC8000000
|
trusted library allocation
|
page read and write
|
||
89D000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
6C261000
|
unkown
|
page execute read
|
||
7FFEC7F90000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
215CC5D0000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
389F000
|
heap
|
page read and write
|
||
7FFEC7EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEC8100000
|
trusted library allocation
|
page execute and read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
215DC64E000
|
trusted library allocation
|
page read and write
|
||
22350B93000
|
heap
|
page read and write
|
||
19138975000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
5239000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
6CC21000
|
unkown
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
73D50000
|
unkown
|
page readonly
|
||
19138637000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
389D000
|
heap
|
page read and write
|
||
22350960000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
5293000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6CAE8000
|
unkown
|
page write copy
|
||
3895000
|
heap
|
page read and write
|
||
22350B8A000
|
heap
|
page read and write
|
||
6C9C0000
|
unkown
|
page read and write
|
||
215CCA15000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
3893000
|
heap
|
page read and write
|
||
22350B81000
|
heap
|
page read and write
|
||
215CA5E7000
|
heap
|
page read and write
|
||
215CC503000
|
trusted library allocation
|
page read and write
|
||
22350B79000
|
heap
|
page read and write
|
||
215CE16D000
|
trusted library allocation
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
73D4A000
|
unkown
|
page readonly
|
||
3897000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
215E4A75000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
6C216000
|
unkown
|
page write copy
|
||
35C28FE000
|
stack
|
page read and write
|
||
AC9EBFD000
|
stack
|
page read and write
|
||
38B1000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
7FFEC8910000
|
trusted library allocation
|
page read and write
|
||
7FFEC8150000
|
trusted library allocation
|
page read and write
|
||
7FFEC8510000
|
trusted library allocation
|
page execute and read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CC5E1000
|
trusted library allocation
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
387C000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
283E69A0000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
7FFEC8240000
|
trusted library allocation
|
page read and write
|
||
7FFEC8211000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
6CB3C000
|
unkown
|
page readonly
|
||
9B4000
|
heap
|
page read and write
|
||
62E95000
|
unkown
|
page readonly
|
||
3897000
|
heap
|
page read and write
|
||
215E46F0000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
982000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
74AC8000
|
unkown
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
5289000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
62494000
|
unkown
|
page readonly
|
||
22352BB0000
|
trusted library allocation
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
1A43E6CC000
|
heap
|
page read and write
|
||
57F1000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
AC9F0FF000
|
stack
|
page read and write
|
||
22350B00000
|
heap
|
page read and write
|
||
FDC000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
98F000
|
heap
|
page read and write
|
||
6BC74000
|
unkown
|
page readonly
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC87CA000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
6BC73000
|
unkown
|
page write copy
|
||
52AD000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
22350A80000
|
heap
|
page read and write
|
||
215CC440000
|
trusted library section
|
page read and write
|
||
215CDFA3000
|
trusted library allocation
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
DD7FA00000
|
stack
|
page read and write
|
||
22352493000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9B2000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
5285000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
22350B8B000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
387E000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
214000
|
unkown
|
page readonly
|
||
38AA000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC85C0000
|
trusted library allocation
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
283E69A5000
|
heap
|
page read and write
|
||
6CC0D000
|
unkown
|
page readonly
|
||
280E000
|
stack
|
page read and write
|
||
7FFEC8810000
|
trusted library allocation
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
52A5000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
22350B30000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
7FFEC8650000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
22354230000
|
trusted library allocation
|
page read and write
|
||
3875000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
215E4A63000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
AC9ECFE000
|
stack
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
3878000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
5255000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
38B4000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
6CB01000
|
unkown
|
page execute read
|
||
7FFEC815E000
|
trusted library allocation
|
page read and write
|
||
62E9C000
|
unkown
|
page readonly
|
||
9F2000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
215CA735000
|
heap
|
page read and write
|
||
7FFEC7F80000
|
trusted library allocation
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
389E000
|
heap
|
page read and write
|
||
229000
|
unkown
|
page read and write
|
||
6CA95000
|
unkown
|
page readonly
|
||
94A000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
7FFEC8230000
|
trusted library allocation
|
page read and write
|
||
215DC63C000
|
trusted library allocation
|
page read and write
|
||
73DEE000
|
unkown
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
983000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
38A7000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC81F2000
|
trusted library allocation
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
3891000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
215DC5F1000
|
trusted library allocation
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
215CC79D000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
6CA93000
|
unkown
|
page write copy
|
||
388F000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC84D0000
|
trusted library allocation
|
page read and write
|
||
38B1000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AE000
|
heap
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
3896000
|
heap
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
74800000
|
unkown
|
page readonly
|
||
DD7E87E000
|
unkown
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
7FFEC8700000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
heap
|
page read and write
|
||
215CA61D000
|
heap
|
page read and write
|
||
971000
|
heap
|
page read and write
|
||
215CDFDD000
|
trusted library allocation
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
22350B7B000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
1A43E6C0000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
AC9EDFE000
|
stack
|
page read and write
|
||
6CB51000
|
unkown
|
page execute read
|
||
22350B37000
|
heap
|
page read and write
|
||
973000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
22350A40000
|
heap
|
page read and write
|
||
6BFBA000
|
unkown
|
page write copy
|
||
96F000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
62495000
|
unkown
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
215E4920000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
38A6000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
7FFEC7FE6000
|
trusted library allocation
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
3894000
|
heap
|
page read and write
|
||
3895000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
389B000
|
heap
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
6CBE6000
|
unkown
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
22A000
|
unkown
|
page readonly
|
||
38A6000
|
heap
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
6CB1F000
|
unkown
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
6CAE3000
|
unkown
|
page write copy
|
||
971000
|
heap
|
page read and write
|
||
6C96D000
|
unkown
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
283E6600000
|
heap
|
page read and write
|
||
DD7E8FE000
|
stack
|
page read and write
|
||
215CD521000
|
trusted library allocation
|
page read and write
|
||
90E000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
7FFEC7FFB000
|
trusted library allocation
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
3899000
|
heap
|
page read and write
|
||
22350A85000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
388F000
|
heap
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
22354230000
|
trusted library allocation
|
page read and write
|
||
38AD000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
6C961000
|
unkown
|
page write copy
|
||
3891000
|
heap
|
page read and write
|
||
215E4754000
|
heap
|
page read and write
|
||
5281000
|
heap
|
page read and write
|
There are 1629 hidden memdumps, click here to show them.