IOC Report
d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi.zip

loading gif

Files

File Path
Type
Category
Malicious
d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi.zip
Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Coolmuster PDF Image Extractor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\5f925f.rbs
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Programs\Network MPluginManager\API-MS-Win-core-xstate-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Containers\Temp.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\DGBCDX64.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Error.raw
data
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\GuardEassosRestoreBoot,1.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\GuardEassosRestoreBoot,2.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\ImageUtility.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Module.Helper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Module.View.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\OfflineReg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Support\Client.db
data
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-console-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-console-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-datetime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-debug-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-errorhandling-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-file-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-file-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-file-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-handle-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-interlocked-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-libraryloader-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-louserzation-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-memory-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-namedpipe-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-processenvironment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-processthreads-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-processthreads-l1-1-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-profile-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-synch-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-synch-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-sysinfo-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-timezone-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-core-util-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-conio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-convert-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-environment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-filesystem-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-locale-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-math-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-multibyte-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-private-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-process-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-runtime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-time-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\api-ms-win-crt-utility-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\concrt140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\curl-ca-bundle.crt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\groceryc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libBasic.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libI18n.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libIPC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libRG.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libUpdate.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libcrypto-1_1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libcurl.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libdrive.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libexpat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libgccfree.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libglog.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libpng14-14.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libssl-1_1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\libxml2-2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\license_En.txt
Unicode text, UTF-16, little-endian text, with very long lines (948), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_atomic_wait.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\msvcp140_codecvt_ids.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\pthreadGC2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\vccorlib140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Network MPluginManager\zlib1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0bfve4qa.4da.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arwntn0c.mv2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0bxoce5.cxv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ksynebg1.etj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvtazs4x.yhz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_raghmy3b.zpd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ANSWA0EUVFUTOWB89JZF.temp
data
dropped
C:\Users\user\Desktop\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Network MPluginManager, Author: MeldaProduction, Keywords: Installer, Comments: This installer database contains the logic and data required to install Network MPluginManager., Template: Intel;1033, Revision Number: {29FF04AE-EC3E-484A-BDA9-9EFFD6567EDB}, Create Time/Date: Wed Aug 14 23:53:36 2024, Last Saved Time/Date: Wed Aug 14 23:53:36 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
dropped
C:\Windows\Installer\5f925e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Network MPluginManager, Author: MeldaProduction, Keywords: Installer, Comments: This installer database contains the logic and data required to install Network MPluginManager., Template: Intel;1033, Revision Number: {29FF04AE-EC3E-484A-BDA9-9EFFD6567EDB}, Create Time/Date: Wed Aug 14 23:53:36 2024, Last Saved Time/Date: Wed Aug 14 23:53:36 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
dropped
C:\Windows\Installer\5f9260.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Network MPluginManager, Author: MeldaProduction, Keywords: Installer, Comments: This installer database contains the logic and data required to install Network MPluginManager., Template: Intel;1033, Revision Number: {29FF04AE-EC3E-484A-BDA9-9EFFD6567EDB}, Create Time/Date: Wed Aug 14 23:53:36 2024, Last Saved Time/Date: Wed Aug 14 23:53:36 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
dropped
C:\Windows\Installer\MSI9665.tmp
data
dropped
C:\Windows\Installer\SourceHash{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF1EA527CFE639A4FA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3F9C7D1DA5072CF6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4373894EECD42FC3.TMP
data
dropped
C:\Windows\Temp\~DF69B1BBB13B50E0E4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF70352A30D1C5B994.TMP
data
dropped
C:\Windows\Temp\~DF87CF483E6DA02B20.TMP
data
dropped
C:\Windows\Temp\~DF8CBC165542D2A308.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF9FA0ADB470962148.TMP
data
dropped
C:\Windows\Temp\~DFA5BB92E24269FE3F.TMP
data
dropped
C:\Windows\Temp\~DFC39ED6EEB1200EA2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD1EAF73F2BC975AF.TMP
data
dropped
C:\Windows\Temp\~DFFB5D0CE104C656FA.TMP
data
dropped
\Device\ConDrv
ASCII text, with very long lines (445), with no line terminators, with escape sequences
dropped
There are 105 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Coolmuster PDF Image Extractor.exe
"C:\Users\user\AppData\Local\Programs\Network MPluginManager\Coolmuster PDF Image Extractor.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c powershell -ep bypass
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -ep bypass
malicious
C:\Windows\System32\whoami.exe
"C:\Windows\system32\whoami.exe" /all
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zG.exe
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi\" -spe -an -ai#7zMap15499:192:7zEvent20179
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi\d7816ba6ddda0c4e833d9bba85864de6b1bd289246fcedae84b8a6581db3f5b6.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 1228
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.133.74.183
malicious
http://www.typography.nethi
unknown
http://www.jiyu-kobo.co.jp/8E
unknown
http://www.apache.org/licenses/LICENSE-2.0.htmlp4(
unknown
http://www.fontbureau.com/designers
unknown
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD
unknown
http://www.fonts.comnt
unknown
http://www.fontbureau.comF8E
unknown
http://www.ascc.net/xml/schematron
unknown
http://www.sajatypeworks.com
unknown
https://curl.se/docs/hsts.html
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.jiyu-kobo.co.jp/yE
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.fontbureau.com2
unknown
http://www.fontbureau.comoJER
unknown
http://www.jiyu-kobo.co.jp//
unknown
https://nuget.org/nuget.exe
unknown
http://www.fontbureau.com/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.jiyu-kobo.co.jp/Y0
unknown
http://www.jiyu-kobo.co.jp/jp/vE.
unknown
http://www.fontbureau.comgrito
unknown
http://www.ascendercorp.com/typedesigners.html
unknown
http://www.ascc.net/xml/schematronL
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.fontbureau.comalsd
unknown
http://www.galapagosdesign.com/
unknown
http://www.fontbureau.comsiefdE
unknown
http://www.carterandcone.comd
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.carterandcone.comX
unknown
http://www.carterandcone.comde0)
unknown
https://go.micro
unknown
http://relaxng.org/ns/structure/1.0Use
unknown
https://contoso.com/Icon
unknown
http://www.fontbureau.comcomo
unknown
https://curl.se/docs/alt-svc.html
unknown
https://github.com/Pester/Pester
unknown
http://en.w
unknown
http://www.carterandcone.coml
unknown
http://www.jiyu-kobo.co.jp/CE
unknown
http://www.zhongyicts.com.cnk
unknown
http://sourceware.org/pthreads-win32/DVarFileInfo$
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.jiyu-kobo.co.jp/Y0/
unknown
http://www.carterandcone.comTCU)
unknown
http://www.galapagosdesign.com/oE7
unknown
http://www.fontbureau.comrita
unknown
http://www.fontbureau.comitu
unknown
http://www.carterandcone.combli
unknown
http://www.jiyu-kobo.co.jp/jp/oE7
unknown
http://www.fontbureau.comtas
unknown
http://www.fontbureau.com/designers/cabarga.html8z
unknown
http://www.winimage.com/zLibDll0123456789ABCDEFuuuuuuuubtnufruuuuuuuuuuuuuuuuuu
unknown
https://curl.se/V
unknown
http://html4/loose.dtd
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.jiyu-kobo.co.jp/JER
unknown
http://www.fontbureau.com/designers?
unknown
http://pesterbdd.com/images/Pester.pngp4(
unknown
https://contoso.com/License
unknown
http://www.fontbureau.como.jp/
unknown
http://www.galapagosdesign.com/staff/dennis.htmY=
unknown
http://www.tiro.com
unknown
http://www.goodfont.co.kr
unknown
http://.css
unknown
http://purl.oclc.org/dsdl/schematron
unknown
http://www.carterandcone.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designersDLr
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.typography.net
unknown
http://www.fontbureau.comased
unknown
http://www.fontbureau.comonyd
unknown
http://www.fontbureau.com/designerse
unknown
http://www.fontbureau.com/designersd
unknown
https://contoso.com/
unknown
http://www.jiyu-kobo.co.jp/oE7
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.sakkal.com
unknown
http://.jpg
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.comF
unknown
https://curl.se/docs/http-cookies.html
unknown
http://www.carterandcone.comTC
unknown
http://www.fontbureau.com/designers/r
unknown
http://www.urwpp.deO
unknown
http://www.fontbureau.comF.Ev
unknown
http://www.fonts.comn-u
unknown
http://www.jiyu-kobo.co.jp/1Ei
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5f925f.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5f925f.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F85D802A421C8ABFE5269D3F908A987F
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5D29A7187FB86BB89851394C29A9CBB9
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1CE203BCE18B2BB429DB83C323CA0DC0
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\180E7EE3D5246E487FA5811AB17B091D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\77194369AD0D0F00979356BAEE9A694E
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AB2D7CAF292E8CDB5F5872A3BB257BDD
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F12BFE1BFA05A4906F43AEDB74CFB8B6
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\632314826A74D7CED8B8D351F9584B50
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2438EA595E90BCFF99FA93BC83568A5D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\E4AC6EDF2BA337DE08B4B66F50E6C2AF
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\95D6E699CA5B873EF14ACE7D33EABA3A
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\29FA69830F41DDA2EF4080A0BFA93D86
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BD75C9ED009365C7BC17B1FCFD455716
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\0CD261CD88ECC463219735C988CB90FC
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\276EEB1CC3C1045012DF16E33776B2E6
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1475C53893E51D2AEAFE49E25F369AC9
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\53509F3D6F6AD21BA984E869BB9E534F
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2257A5CB7459888CCD06865AD5923A66
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BD2D470B1BC6FC820CFB7718E67A6BCF
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\E6CEDFA064AD4EBC2F8AE28B90531908
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8FAACA690A3FE69B8F89D769D6F2D7BF
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\EF79CA4B6645ADA7885615A31DB9CAE5
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\3C0FB570664954F382CB1431E6FAFE60
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A4C65418D29DD0D4B641D2C113F927AB
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\235CE3EE3448A364574D710055093DF5
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8273DF74E5968396BA47B1EF18445C45
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5505F55E7DCCBB99E37A6D91EAEEBD56
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\D11247F63D720A56FDF16807614FCDE5
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\DD71EBC9D9EA8FE478FAF6D2B1ADC60D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5529641F4C3C551C1E3511C9AD4A9F74
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9B88E633A5388F8583598C475997EE0A
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9F76F934F3B1FCEE732CD6DEA0C45CD9
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9AB042FDDABF71CB6E313583448EF714
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\CB5B38F4AD053B6F959EF89D8BFC182E
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\502540899B167C7542A4097FF6F6F7AC
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\0CBA3C9919D4308A365E8CD90839A86D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\D6535E465ED5CFD3A1D5A0ACFDD463A9
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\FDEA555ECC96E66EE7BCDA455E4E00EC
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\4724499B91BDACDAF0170111014BBFE5
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\83273570EB15E04801CF8A38EE1078F0
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9C35CCB1837D296F598949DB5BC8B806
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1C4A5F29124AB2713705F278BB3BE325
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\B6C175A181A34074E3D1BD47ECC7B78B
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\DA35A074E2C7B3B1D6DE88F12E1E4748
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\434D6E37F27A848504A151B453173D59
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BDF5E39D57FC485E2E6A38C2EEDF17A0
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F88D6B121373BD058B11E8D2A644279D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\105845F1BA41E84B97B3663AC937C782
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AE2EE789425F26E524BF425D5B5BABF8
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2D894C3542778D62ECB24AA6EB002EAB
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\B389EC7837D1EBFA6A88DAE99EDED58F
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8328452AFEE3BB7E87B76BB4855B2F11
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A086F2E9A91BD2ACDBF8D272A8B86095
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\98BB45E135CD728C4CCFA24AC86114EA
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\50A78D570A6215E289E4108515A0BF31
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\620AFE6FB2ADB64CA345A13967F350E4
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AA9F9820A2855B8AC010F68567158E64
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\94B0B2C3523B891208F120004D41ACCC
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\061913D0B9111FA94C3DB60ECCA34F2A
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\15A6CE2BC6594820D8C052C686D02634
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C9E9E0CE857B9D0C0A46ACA09D9B30D1
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\219ABBA03D14EBA4AA4238C25FD72578
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\FFD2919E0D842D5C0EC72F671C7074BB
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\42D1E8D09D4A054CA326CF3C9FF45F26
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A505C0794BC25279F91D71DC84E43157
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8BACED2970FD81975931A55DB3D2E5D6
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\60AC1AAAFFFDEE4BEDF047407F7D5110
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\03F679D7994EA13477C5179CEAB1FDE2
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C804C6B801F83B6154547C48710A4AE3
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\34ED4FD7868551BB7596BD793CF95E8C
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\0E5C97773C3EF001379E089C4F5628BC
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C6CEBBCCECDC789D8D0C7264F0708CC3
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\E963067064E158B590B46D4E0BA3F30B
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\247D2FC70B8D64E334B6D8C28BB7EF0D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\CDC36CF03C2EB71EBCB2C8BB3162B33D
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\CFC0AB9D31DDF6E0B98DDB553CEAF461
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\1A2C47FF1FB080FDEDCBB5A921240EF4
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F148591C77125ABB264FC7A785CD3DF8
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\56538859377FD1BF884EDF27E587A5FF
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\258F368C91AF7C06A46296E186137C2E
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9B3A4D6E4DF40B21AEB53F28E211C5F2
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Programs\Network MPluginManager\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Programs\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Programs\Network MPluginManager\Containers\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\76885C20F226248409FEE76F56DC3A8A
CDF491A47CF5C82438ACCBA457D035B0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A194FDC-5FC7-428C-83CA-BC4A750D530B}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CDF491A47CF5C82438ACCBA457D035B0
f
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\Features
f
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\CDF491A47CF5C82438ACCBA457D035B0\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\76885C20F226248409FEE76F56DC3A8A
CDF491A47CF5C82438ACCBA457D035B0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CDF491A47CF5C82438ACCBA457D035B0\SourceList
LastUsedSource
There are 147 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33A1000
heap
page read and write
malicious
3418000
heap
page read and write
malicious
51C1000
heap
page read and write
malicious
3418000
heap
page read and write
malicious
52AD000
heap
page read and write
malicious
57F3000
heap
page read and write
malicious
33A0000
heap
page read and write
malicious
5778000
heap
page read and write
malicious
532A000
heap
page read and write
malicious
3895000
heap
page read and write
3897000
heap
page read and write
38A0000
heap
page read and write
388F000
heap
page read and write
55BE000
stack
page read and write
19138630000
heap
page read and write
38AE000
heap
page read and write
215CE1F9000
trusted library allocation
page read and write
76B000
stack
page read and write
7FFEC8340000
trusted library allocation
page read and write
5778000
heap
page read and write
AC9EAF9000
stack
page read and write
38B2000
heap
page read and write
6C1F5000
unkown
page readonly
3897000
heap
page read and write
7FFEC87B3000
trusted library allocation
page read and write
3897000
heap
page read and write
9E8000
heap
page read and write
5293000
heap
page read and write
38AC000
heap
page read and write
215CA5F2000
heap
page read and write
38AA000
heap
page read and write
3894000
heap
page read and write
388F000
heap
page read and write
7FFEC8430000
trusted library allocation
page read and write
38A3000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
215CDFA7000
trusted library allocation
page read and write
388F000
heap
page read and write
389A000
heap
page read and write
3896000
heap
page read and write
9A3000
heap
page read and write
97F000
heap
page read and write
38AE000
heap
page read and write
7FFEC8380000
trusted library allocation
page read and write
388F000
heap
page read and write
38B3000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
977000
heap
page read and write
6BC6F000
unkown
page read and write
22350B95000
heap
page read and write
3895000
heap
page read and write
388F000
heap
page read and write
215E45E5000
heap
page read and write
38AA000
heap
page read and write
388F000
heap
page read and write
3893000
heap
page read and write
264B000
stack
page read and write
388F000
heap
page read and write
38A3000
heap
page read and write
38B2000
heap
page read and write
7FFEC7E90000
trusted library allocation
page read and write
6C193000
unkown
page readonly
9AA000
heap
page read and write
DD7FA4E000
stack
page read and write
387E000
heap
page read and write
387E000
heap
page read and write
53A0000
heap
page read and write
22350B64000
heap
page read and write
3893000
heap
page read and write
9F8000
heap
page read and write
3891000
heap
page read and write
38AA000
heap
page read and write
7FFEC87A0000
trusted library allocation
page read and write
9AE000
heap
page read and write
3887000
heap
page read and write
82D000
stack
page read and write
3897000
heap
page read and write
73DE1000
unkown
page execute read
4A3E000
stack
page read and write
1A43E540000
heap
page read and write
388F000
heap
page read and write
3892000
heap
page read and write
3894000
heap
page read and write
7FFEC85B0000
trusted library allocation
page read and write
3893000
heap
page read and write
223524A0000
heap
page read and write
388F000
heap
page read and write
38AA000
heap
page read and write
3897000
heap
page read and write
38B2000
heap
page read and write
389E000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
9B0000
heap
page read and write
966000
heap
page read and write
38B2000
heap
page read and write
22350B8D000
heap
page read and write
73D8B000
unkown
page read and write
7FFEC8030000
trusted library allocation
page read and write
388F000
heap
page read and write
1A43E6E4000
heap
page read and write
5778000
heap
page read and write
7FFEC8023000
trusted library allocation
page read and write
3891000
heap
page read and write
215CA625000
heap
page read and write
388F000
heap
page read and write
DD7EFFE000
stack
page read and write
3895000
heap
page read and write
388F000
heap
page read and write
DD7EC7E000
stack
page read and write
38A3000
heap
page read and write
3893000
heap
page read and write
96C000
heap
page read and write
38A6000
heap
page read and write
7FFEC7E9C000
trusted library allocation
page execute and read and write
389B000
heap
page read and write
38B2000
heap
page read and write
5245000
heap
page read and write
38A6000
heap
page read and write
388F000
heap
page read and write
9EA000
heap
page read and write
7FFEC8630000
trusted library allocation
page read and write
3897000
heap
page read and write
215CA730000
heap
page read and write
3891000
heap
page read and write
38AF000
heap
page read and write
3892000
heap
page read and write
5265000
heap
page read and write
96C000
heap
page read and write
9B4000
heap
page read and write
38AB000
heap
page read and write
388F000
heap
page read and write
38B4000
heap
page read and write
215CC490000
trusted library allocation
page read and write
388F000
heap
page read and write
38AD000
heap
page read and write
3894000
heap
page read and write
9AC000
heap
page read and write
7FFEC82E0000
trusted library allocation
page read and write
388F000
heap
page read and write
7FFEC8740000
trusted library allocation
page read and write
6BC01000
unkown
page execute and read and write
388F000
heap
page read and write
FDA000
heap
page read and write
9F8000
heap
page read and write
38B0000
heap
page read and write
389B000
heap
page read and write
6BF40000
unkown
page readonly
3899000
heap
page read and write
7FFEC85F0000
trusted library allocation
page read and write
38A8000
heap
page read and write
3899000
heap
page read and write
3891000
heap
page read and write
6BC81000
unkown
page execute read
388F000
heap
page read and write
215E4A6D000
heap
page read and write
3892000
heap
page read and write
38AA000
heap
page read and write
96C000
heap
page read and write
7FFEC85A0000
trusted library allocation
page read and write
6C9B0000
unkown
page readonly
7FFEC8245000
trusted library allocation
page read and write
7FFEC7DF7000
trusted library allocation
page read and write
57F1000
heap
page read and write
7FFEC8280000
trusted library allocation
page read and write
3897000
heap
page read and write
6BC00000
unkown
page readonly
38B5000
heap
page read and write
38A3000
heap
page read and write
388F000
heap
page read and write
7FFEC86F0000
trusted library allocation
page read and write
38A0000
heap
page read and write
38A6000
heap
page read and write
38AE000
heap
page read and write
9D7000
heap
page read and write
215E4BF0000
heap
page read and write
6C9BC000
unkown
page readonly
7FFEC8410000
trusted library allocation
page read and write
963000
heap
page read and write
9D7000
heap
page read and write
6CB90000
unkown
page readonly
7FFEC8820000
trusted library allocation
page read and write
6CA94000
unkown
page read and write
389E000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
25F0000
heap
page read and write
9D7000
heap
page read and write
850000
heap
page read and write
3897000
heap
page read and write
3891000
heap
page read and write
38AA000
heap
page read and write
38AD000
heap
page read and write
3895000
heap
page read and write
DD7EB7E000
stack
page read and write
999000
heap
page read and write
22350B60000
heap
page read and write
9AC000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
215E4A6F000
heap
page read and write
935000
heap
page read and write
3897000
heap
page read and write
5277000
heap
page read and write
35F0000
heap
page read and write
3894000
heap
page read and write
22350B67000
heap
page read and write
3895000
heap
page read and write
3897000
heap
page read and write
215E47E5000
heap
page read and write
38AA000
heap
page read and write
388F000
heap
page read and write
19138840000
heap
page read and write
7FFEC7F00000
trusted library allocation
page execute and read and write
388F000
heap
page read and write
3893000
heap
page read and write
7FFEC8600000
trusted library allocation
page read and write
38AD000
heap
page read and write
7FFEC80E0000
trusted library allocation
page read and write
71040000
unkown
page readonly
3891000
heap
page read and write
38A7000
heap
page read and write
38B2000
heap
page read and write
38AD000
heap
page read and write
4A60000
trusted library allocation
page read and write
3897000
heap
page read and write
38B0000
heap
page read and write
73D7C000
unkown
page readonly
388F000
heap
page read and write
9A4000
heap
page read and write
38AA000
heap
page read and write
38B2000
heap
page read and write
9ED000
heap
page read and write
215CDA36000
trusted library allocation
page read and write
388F000
heap
page read and write
6CB50000
unkown
page readonly
FDC000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
9A2000
heap
page read and write
38B3000
heap
page read and write
977000
heap
page read and write
38AE000
heap
page read and write
22350B79000
heap
page read and write
22350B78000
heap
page read and write
7FFEC80A0000
trusted library allocation
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
3370000
heap
page read and write
38AD000
heap
page read and write
38AA000
heap
page read and write
3897000
heap
page read and write
22350B6E000
heap
page read and write
7FFEC8200000
trusted library allocation
page execute and read and write
38AA000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
97E000
heap
page read and write
38AA000
heap
page read and write
6CAE9000
unkown
page readonly
388F000
heap
page read and write
3891000
heap
page read and write
6C972000
unkown
page readonly
215CA61F000
heap
page read and write
9A3000
heap
page read and write
388F000
heap
page read and write
7FFEC800A000
trusted library allocation
page read and write
38A3000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
73CE1000
unkown
page execute read
215CBF10000
heap
page read and write
38AA000
heap
page read and write
5241000
heap
page read and write
73DE0000
unkown
page readonly
2C4707E000
stack
page read and write
7FFEC7DED000
trusted library allocation
page execute and read and write
1C0000
unkown
page readonly
3891000
heap
page read and write
97D000
heap
page read and write
388F000
heap
page read and write
7FFEC8080000
trusted library allocation
page read and write
9D7000
heap
page read and write
38A3000
heap
page read and write
19138970000
heap
page read and write
9F6000
heap
page read and write
7FFEC7DE3000
trusted library allocation
page execute and read and write
9AA000
heap
page read and write
A0298FE000
stack
page read and write
3890000
heap
page read and write
3894000
heap
page read and write
215E48D7000
heap
page execute and read and write
7FFEC8480000
trusted library allocation
page read and write
3895000
heap
page read and write
38A3000
heap
page read and write
388F000
heap
page read and write
6C192000
unkown
page read and write
7FFEC8060000
trusted library allocation
page read and write
9E8000
heap
page read and write
38A3000
heap
page read and write
389B000
heap
page read and write
963000
heap
page read and write
62499000
unkown
page readonly
215E4BD0000
heap
page read and write
855000
heap
page read and write
3890000
heap
page read and write
38B2000
heap
page read and write
38A3000
heap
page read and write
38B2000
heap
page read and write
38AE000
heap
page read and write
997000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
95C000
heap
page read and write
38B2000
heap
page read and write
7FFEC8750000
trusted library allocation
page read and write
215CBF35000
heap
page read and write
38B3000
heap
page read and write
983000
heap
page read and write
33A1000
heap
page read and write
3876000
heap
page read and write
388F000
heap
page read and write
3895000
heap
page read and write
7FFEC8660000
trusted library allocation
page read and write
3899000
heap
page read and write
DD7EBFF000
stack
page read and write
9AE000
heap
page read and write
56FE000
stack
page read and write
9B5000
heap
page read and write
7FFEC8730000
trusted library allocation
page read and write
3894000
heap
page read and write
5DAA000
direct allocation
page read and write
38A5000
heap
page read and write
529C000
heap
page read and write
3754000
heap
page read and write
387A000
heap
page read and write
389D000
heap
page read and write
38AD000
heap
page read and write
3890000
heap
page read and write
38A0000
heap
page read and write
35C29FF000
stack
page read and write
5701000
heap
page read and write
3892000
heap
page read and write
4A82000
trusted library allocation
page read and write
388F000
heap
page read and write
27CE000
stack
page read and write
388F000
heap
page read and write
7FFEC80D0000
trusted library allocation
page read and write
3887000
heap
page read and write
389B000
heap
page read and write
388F000
heap
page read and write
9EB000
heap
page read and write
38AA000
heap
page read and write
388F000
heap
page read and write
9F8000
heap
page read and write
215CA558000
heap
page read and write
22352CAC000
trusted library allocation
page read and write
38B5000
heap
page read and write
954000
heap
page read and write
38AD000
heap
page read and write
9AF000
heap
page read and write
38A3000
heap
page read and write
38AE000
heap
page read and write
388F000
heap
page read and write
38AA000
heap
page read and write
3895000
heap
page read and write
985000
heap
page read and write
38B2000
heap
page read and write
3897000
heap
page read and write
3894000
heap
page read and write
9AA000
heap
page read and write
995000
heap
page read and write
9AC000
heap
page read and write
38B1000
heap
page read and write
283E6710000
heap
page read and write
38AA000
heap
page read and write
7FFEC8250000
trusted library allocation
page read and write
388F000
heap
page read and write
981000
heap
page read and write
6CAE1000
unkown
page read and write
9E8000
heap
page read and write
9FC000
heap
page read and write
54BE000
stack
page read and write
3897000
heap
page read and write
3878000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
38B4000
heap
page read and write
99C000
heap
page read and write
977000
heap
page read and write
215CCB21000
trusted library allocation
page read and write
9D7000
heap
page read and write
38AE000
heap
page read and write
3893000
heap
page read and write
7FFEC8040000
trusted library allocation
page read and write
972000
heap
page read and write
7FFEC8900000
trusted library allocation
page read and write
973000
heap
page read and write
38AA000
heap
page read and write
387C000
heap
page read and write
22350B81000
heap
page read and write
73D44000
unkown
page read and write
6CC01000
unkown
page execute read
7FFEC7DE0000
trusted library allocation
page read and write
96F000
heap
page read and write
38AD000
heap
page read and write
9E8000
heap
page read and write
38B0000
heap
page read and write
387C000
heap
page read and write
215CA562000
heap
page read and write
995000
heap
page read and write
FDE000
heap
page read and write
7FFEC7DFB000
trusted library allocation
page read and write
999000
heap
page read and write
7FFEC8330000
trusted library allocation
page read and write
7FFEC8160000
trusted library allocation
page read and write
3896000
heap
page read and write
388F000
heap
page read and write
389E000
heap
page read and write
389A000
heap
page read and write
9F8000
heap
page read and write
6BF9F000
unkown
page write copy
38AD000
heap
page read and write
7FFEC8020000
trusted library allocation
page read and write
215DC78E000
trusted library allocation
page read and write
38AD000
heap
page read and write
5285000
heap
page read and write
388F000
heap
page read and write
215CA617000
heap
page read and write
7FFEC8640000
trusted library allocation
page read and write
38A5000
heap
page read and write
4F66000
heap
page read and write
38B3000
heap
page read and write
6248F000
unkown
page readonly
389B000
heap
page read and write
389B000
heap
page read and write
7FFEC8710000
trusted library allocation
page read and write
3897000
heap
page read and write
52A8000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
A0295BE000
stack
page read and write
38AA000
heap
page read and write
7FFEC88D0000
trusted library allocation
page read and write
38AA000
heap
page read and write
7FFEC80C0000
trusted library allocation
page execute and read and write
7FFEC8370000
trusted library allocation
page read and write
990000
heap
page read and write
989000
heap
page read and write
9E9000
heap
page read and write
38AD000
heap
page read and write
389E000
heap
page read and write
215CC040000
heap
page read and write
388F000
heap
page read and write
38A0000
heap
page read and write
6CBE9000
unkown
page read and write
6C260000
unkown
page readonly
389A000
heap
page read and write
389B000
heap
page read and write
22350B6F000
heap
page read and write
38B5000
heap
page read and write
38AA000
heap
page read and write
3894000
heap
page read and write
6BC04000
unkown
page execute and write copy
7FFEC8070000
trusted library allocation
page read and write
9B2000
heap
page read and write
5265000
heap
page read and write
3893000
heap
page read and write
3876000
heap
page read and write
22352430000
trusted library allocation
page read and write
389B000
heap
page read and write
3891000
heap
page read and write
9B0000
heap
page read and write
7FFEC8310000
trusted library allocation
page read and write
9F8000
heap
page read and write
3894000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
38A0000
heap
page read and write
3897000
heap
page read and write
22352490000
heap
page read and write
22350B65000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
19138820000
heap
page read and write
FD5000
heap
page read and write
38B7000
heap
page read and write
215DC5E1000
trusted library allocation
page read and write
6BFC0000
unkown
page readonly
3897000
heap
page read and write
71005000
unkown
page readonly
215E4988000
heap
page read and write
38AA000
heap
page read and write
3870000
heap
page read and write
3897000
heap
page read and write
22350B85000
heap
page read and write
9AA000
heap
page read and write
9F6000
heap
page read and write
3897000
heap
page read and write
6CB30000
unkown
page readonly
38B1000
heap
page read and write
223523D0000
trusted library allocation
page read and write
7FFEC8490000
trusted library allocation
page read and write
3894000
heap
page read and write
3897000
heap
page read and write
3894000
heap
page read and write
3750000
heap
page read and write
966000
heap
page read and write
9AE000
heap
page read and write
3899000
heap
page read and write
215CCA58000
trusted library allocation
page read and write
38B2000
heap
page read and write
7D0000
heap
page read and write
6CB00000
unkown
page readonly
38AE000
heap
page read and write
7FFEC8500000
trusted library allocation
page read and write
75C000
stack
page read and write
22350B60000
heap
page read and write
9EF000
heap
page read and write
3897000
heap
page read and write
38B2000
heap
page read and write
96F000
heap
page read and write
7FFEC8390000
trusted library allocation
page execute and read and write
3892000
heap
page read and write
38B2000
heap
page read and write
38AE000
heap
page read and write
388F000
heap
page read and write
38AD000
heap
page read and write
22350A60000
heap
page read and write
7FFEC8290000
trusted library allocation
page read and write
38AD000
heap
page read and write
9AB000
heap
page read and write
62E9D000
unkown
page read and write
3893000
heap
page read and write
9B4000
heap
page read and write
3894000
heap
page read and write
96C000
heap
page read and write
339F000
heap
page read and write
7103D000
unkown
page read and write
38AD000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
3897000
heap
page read and write
3887000
heap
page read and write
38A5000
heap
page read and write
7FFEC8220000
trusted library allocation
page read and write
38A6000
heap
page read and write
3890000
heap
page read and write
389D000
heap
page read and write
3897000
heap
page read and write
215DC5E9000
trusted library allocation
page read and write
22350B6F000
heap
page read and write
52A5000
heap
page read and write
3897000
heap
page read and write
38A3000
heap
page read and write
9AE000
heap
page read and write
38B2000
heap
page read and write
38AA000
heap
page read and write
1A43E640000
heap
page read and write
7FFEC8050000
trusted library allocation
page read and write
3892000
heap
page read and write
283E68B0000
heap
page read and write
55FC000
stack
page read and write
6CB91000
unkown
page execute read
3890000
heap
page read and write
3897000
heap
page read and write
38B3000
heap
page read and write
DD7EA7E000
stack
page read and write
38AE000
heap
page read and write
38AE000
heap
page read and write
38AA000
heap
page read and write
3897000
heap
page read and write
38AA000
heap
page read and write
38A3000
heap
page read and write
3899000
heap
page read and write
5778000
heap
page read and write
22352AB0000
trusted library allocation
page read and write
38A0000
heap
page read and write
389B000
heap
page read and write
3891000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
3893000
heap
page read and write
96F000
heap
page read and write
9AE000
heap
page read and write
215CA520000
heap
page read and write
215E4A65000
heap
page read and write
388F000
heap
page read and write
38AE000
heap
page read and write
7FFEC87BA000
trusted library allocation
page read and write
5277000
heap
page read and write
38B2000
heap
page read and write
3893000
heap
page read and write
38AA000
heap
page read and write
98F000
heap
page read and write
FDA000
heap
page read and write
38AD000
heap
page read and write
9F9000
heap
page read and write
6CB31000
unkown
page execute read
22350B93000
heap
page read and write
7FFEC8130000
trusted library allocation
page read and write
389E000
heap
page read and write
348E000
heap
page read and write
215CA530000
heap
page read and write
7FFEC8026000
trusted library allocation
page read and write
6C21A000
unkown
page readonly
999000
heap
page read and write
388F000
heap
page read and write
38A4000
heap
page read and write
7FFEC8590000
trusted library allocation
page read and write
215E4772000
heap
page read and write
388F000
heap
page read and write
9F8000
heap
page read and write
22350B7D000
heap
page read and write
388F000
heap
page read and write
7FFEC88E0000
trusted library allocation
page read and write
38B7000
heap
page read and write
999000
heap
page read and write
388F000
heap
page read and write
38AE000
heap
page read and write
388F000
heap
page read and write
7FFEC8260000
trusted library allocation
page read and write
7FFEC82D0000
trusted library allocation
page read and write
9ED000
heap
page read and write
38A3000
heap
page read and write
388F000
heap
page read and write
62481000
unkown
page execute read
3894000
heap
page read and write
7FFEC8085000
trusted library allocation
page read and write
996000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
96C000
heap
page read and write
38A4000
heap
page read and write
3891000
heap
page read and write
3894000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
9F6000
heap
page read and write
3897000
heap
page read and write
6BFA1000
unkown
page readonly
FDA000
heap
page read and write
71004000
unkown
page read and write
50C0000
heap
page read and write
3897000
heap
page read and write
7FFEC8300000
trusted library allocation
page read and write
38B6000
heap
page read and write
38AA000
heap
page read and write
6BF9E000
unkown
page read and write
96F000
heap
page read and write
3892000
heap
page read and write
9FD000
heap
page read and write
6CB21000
unkown
page readonly
292E000
stack
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
274B000
stack
page read and write
215CC430000
trusted library section
page read and write
7FFEC87F0000
trusted library allocation
page read and write
38B6000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
389F000
heap
page read and write
7DF4098D0000
trusted library allocation
page execute and read and write
6CB85000
unkown
page readonly
215E4A41000
heap
page read and write
3897000
heap
page read and write
7FFEC8360000
trusted library allocation
page read and write
38AA000
heap
page read and write
71030000
unkown
page readonly
388F000
heap
page read and write
7FFEC829B000
trusted library allocation
page read and write
38B2000
heap
page read and write
388F000
heap
page read and write
7FFEC8620000
trusted library allocation
page read and write
999000
heap
page read and write
38AD000
heap
page read and write
5281000
heap
page read and write
215CBF30000
heap
page read and write
9E8000
heap
page read and write
74AC0000
unkown
page readonly
5700000
heap
page read and write
6BF41000
unkown
page execute read
3897000
heap
page read and write
995000
heap
page read and write
3892000
heap
page read and write
3392000
heap
page read and write
38A3000
heap
page read and write
388F000
heap
page read and write
215E4A4C000
heap
page read and write
38B7000
heap
page read and write
388F000
heap
page read and write
215CC030000
trusted library allocation
page read and write
3894000
heap
page read and write
2DAE000
stack
page read and write
9F6000
heap
page read and write
35C27FE000
unkown
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
38AA000
heap
page read and write
7FFEC82B0000
trusted library allocation
page read and write
3897000
heap
page read and write
3894000
heap
page read and write
3891000
heap
page read and write
CCE000
stack
page read and write
7FFEC87A2000
trusted library allocation
page read and write
215CE198000
trusted library allocation
page read and write
38B6000
heap
page read and write
38AA000
heap
page read and write
38B6000
heap
page read and write
38AD000
heap
page read and write
3710000
heap
page read and write
215CCB1D000
trusted library allocation
page read and write
70F41000
unkown
page execute read
22350B78000
heap
page read and write
38A4000
heap
page read and write
3897000
heap
page read and write
7FFEC85E0000
trusted library allocation
page read and write
7FFEC8830000
trusted library allocation
page read and write
74AC1000
unkown
page execute read
388F000
heap
page read and write
3390000
heap
page read and write
3897000
heap
page read and write
3893000
heap
page read and write
95C000
heap
page read and write
9F6000
heap
page read and write
9B5000
heap
page read and write
38AD000
heap
page read and write
38AA000
heap
page read and write
38A5000
heap
page read and write
22350B6B000
heap
page read and write
3886000
heap
page read and write
38AA000
heap
page read and write
5281000
heap
page read and write
3895000
heap
page read and write
7FFEC84B0000
trusted library allocation
page read and write
7102E000
unkown
page read and write
A02953C000
stack
page read and write
3893000
heap
page read and write
38A3000
heap
page read and write
215CC450000
trusted library allocation
page read and write
38AA000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
73D47000
unkown
page readonly
22352CB0000
trusted library allocation
page read and write
981000
heap
page read and write
215E47E7000
heap
page read and write
3897000
heap
page read and write
7FFEC82F0000
trusted library allocation
page read and write
FDA000
heap
page read and write
5275000
heap
page read and write
38B3000
heap
page read and write
38AD000
heap
page read and write
7FFEC8770000
trusted library allocation
page read and write
7FFEC8850000
trusted library allocation
page execute and read and write
389B000
heap
page read and write
3897000
heap
page read and write
96C000
heap
page read and write
6C9D0000
unkown
page readonly
388F000
heap
page read and write
3897000
heap
page read and write
38AA000
heap
page read and write
6249B000
unkown
page readonly
AC9EFFE000
stack
page read and write
388E000
heap
page read and write
7FFEC7DE4000
trusted library allocation
page read and write
9E8000
heap
page read and write
38AD000
heap
page read and write
3899000
heap
page read and write
7FFEC8460000
trusted library allocation
page read and write
9A6000
heap
page read and write
38AD000
heap
page read and write
38B4000
heap
page read and write
6CB40000
unkown
page read and write
388F000
heap
page read and write
995000
heap
page read and write
389F000
heap
page read and write
215E48D0000
heap
page execute and read and write
70F40000
unkown
page readonly
BCD000
stack
page read and write
38B2000
heap
page read and write
3896000
heap
page read and write
388F000
heap
page read and write
387E000
heap
page read and write
3897000
heap
page read and write
7FFEC8790000
trusted library allocation
page read and write
5D79000
direct allocation
page readonly
999000
heap
page read and write
2F2E000
stack
page read and write
3892000
heap
page read and write
3889000
heap
page read and write
38AA000
heap
page read and write
3894000
heap
page read and write
302F000
stack
page read and write
38AA000
heap
page read and write
966000
heap
page read and write
3892000
heap
page read and write
8DD000
stack
page read and write
7FFEC8065000
trusted library allocation
page read and write
FDA000
heap
page read and write
38A0000
heap
page read and write
38AA000
heap
page read and write
5328000
heap
page read and write
3892000
heap
page read and write
388F000
heap
page read and write
38A3000
heap
page read and write
3895000
heap
page read and write
DD7E9FD000
stack
page read and write
388F000
heap
page read and write
38AE000
heap
page read and write
3896000
heap
page read and write
3895000
heap
page read and write
38A3000
heap
page read and write
3897000
heap
page read and write
DD7E581000
stack
page read and write
999000
heap
page read and write
7FFEC8420000
trusted library allocation
page read and write
6CC24000
unkown
page readonly
388F000
heap
page read and write
38B2000
heap
page read and write
990000
heap
page read and write
7FFEC7E0B000
trusted library allocation
page execute and read and write
FDA000
heap
page read and write
223524A9000
heap
page read and write
961000
heap
page read and write
215E4880000
heap
page execute and read and write
6C79F000
unkown
page readonly
7FFEC8270000
trusted library allocation
page read and write
7FFEC85D0000
trusted library allocation
page read and write
215E4A99000
heap
page read and write
9A3000
heap
page read and write
9B4000
heap
page read and write
38AD000
heap
page read and write
62EA0000
unkown
page write copy
388F000
heap
page read and write
388F000
heap
page read and write
73CE0000
unkown
page readonly
9FC000
heap
page read and write
3892000
heap
page read and write
38A5000
heap
page read and write
38A6000
heap
page read and write
387C000
heap
page read and write
38A6000
heap
page read and write
38AA000
heap
page read and write
38AD000
heap
page read and write
389B000
heap
page read and write
38AD000
heap
page read and write
38AD000
heap
page read and write
52A8000
heap
page read and write
3416000
heap
page read and write
7FFEC84A0000
trusted library allocation
page read and write
7FFEC8450000
trusted library allocation
page read and write
38B7000
heap
page read and write
6CC00000
unkown
page readonly
38A3000
heap
page read and write
527F000
heap
page read and write
227000
unkown
page read and write
3893000
heap
page read and write
3897000
heap
page read and write
215CC4C0000
trusted library allocation
page read and write
38AE000
heap
page read and write
38AD000
heap
page read and write
38A6000
heap
page read and write
3895000
heap
page read and write
388F000
heap
page read and write
5291000
heap
page read and write
7FFEC7E0D000
trusted library allocation
page execute and read and write
3897000
heap
page read and write
388F000
heap
page read and write
3896000
heap
page read and write
95D000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
7FFEC7E00000
trusted library allocation
page read and write
22350B8C000
heap
page read and write
938000
heap
page read and write
7FFEC8350000
trusted library allocation
page read and write
3894000
heap
page read and write
2DEE000
stack
page read and write
A02987F000
stack
page read and write
7FFEC84E0000
trusted library allocation
page read and write
38A0000
heap
page read and write
3872000
heap
page read and write
38A7000
heap
page read and write
7FFEC8720000
trusted library allocation
page read and write
6C9B1000
unkown
page execute read
38B7000
heap
page read and write
283E6810000
heap
page read and write
3875000
heap
page read and write
9F1000
heap
page read and write
3895000
heap
page read and write
365B000
stack
page read and write
3891000
heap
page read and write
388F000
heap
page read and write
62480000
unkown
page readonly
3897000
heap
page read and write
7FFEC8320000
trusted library allocation
page read and write
9EA000
heap
page read and write
97B000
heap
page read and write
214000
unkown
page readonly
389A000
heap
page read and write
3896000
heap
page read and write
5289000
heap
page read and write
388F000
heap
page read and write
988000
heap
page read and write
3895000
heap
page read and write
38B6000
heap
page read and write
215CE1BE000
trusted library allocation
page read and write
3897000
heap
page read and write
62E81000
unkown
page execute read
6BFD1000
unkown
page execute read
38B2000
heap
page read and write
3897000
heap
page read and write
7FFEC8440000
trusted library allocation
page read and write
3897000
heap
page read and write
9AC000
heap
page read and write
9F1000
heap
page read and write
3898000
heap
page read and write
2C46DFE000
stack
page read and write
5C61000
direct allocation
page execute read
3892000
heap
page read and write
388F000
heap
page read and write
6CB41000
unkown
page readonly
38AD000
heap
page read and write
22350B6C000
heap
page read and write
38B2000
heap
page read and write
38AD000
heap
page read and write
22350B59000
heap
page read and write
62EA1000
unkown
page readonly
3899000
heap
page read and write
388F000
heap
page read and write
52AD000
heap
page read and write
3897000
heap
page read and write
38A8000
heap
page read and write
38AD000
heap
page read and write
7FFEC87D0000
trusted library allocation
page read and write
38AD000
heap
page read and write
1A43E6E6000
heap
page read and write
3897000
heap
page read and write
215CC480000
heap
page execute and read and write
3898000
heap
page read and write
3896000
heap
page read and write
389B000
heap
page read and write
7FFEC88D2000
trusted library allocation
page read and write
6BC5F000
unkown
page readonly
747FF000
unkown
page read and write
38AA000
heap
page read and write
9AC000
heap
page read and write
38AD000
heap
page read and write
3891000
heap
page read and write
3894000
heap
page read and write
499C000
stack
page read and write
9E9000
heap
page read and write
1A43E8F0000
heap
page read and write
388F000
heap
page read and write
6BD1E000
unkown
page read and write
3893000
heap
page read and write
73DEF000
unkown
page readonly
388F000
heap
page read and write
3899000
heap
page read and write
3899000
heap
page read and write
3892000
heap
page read and write
38AD000
heap
page read and write
7FFEC80B0000
trusted library allocation
page read and write
38A3000
heap
page read and write
3897000
heap
page read and write
529C000
heap
page read and write
3892000
heap
page read and write
6CBEC000
unkown
page readonly
38AE000
heap
page read and write
215CA5FB000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
3893000
heap
page read and write
3897000
heap
page read and write
9F8000
heap
page read and write
38AE000
heap
page read and write
38A7000
heap
page read and write
6C95D000
unkown
page write copy
74AC9000
unkown
page readonly
388F000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
38B3000
heap
page read and write
6CAE0000
unkown
page readonly
38A0000
heap
page read and write
6CBD6000
unkown
page readonly
215E4A72000
heap
page read and write
38B3000
heap
page read and write
3895000
heap
page read and write
3897000
heap
page read and write
38AE000
heap
page read and write
DD7EF7E000
stack
page read and write
215CA637000
heap
page read and write
38AE000
heap
page read and write
2C46CFC000
stack
page read and write
7FFEC80F0000
trusted library allocation
page read and write
215E4715000
heap
page read and write
38AE000
heap
page read and write
3897000
heap
page read and write
215E497E000
heap
page read and write
DD7F079000
stack
page read and write
981000
heap
page read and write
215DC8C5000
trusted library allocation
page read and write
9F6000
heap
page read and write
3895000
heap
page read and write
387E000
heap
page read and write
38B7000
heap
page read and write
215CDFDF000
trusted library allocation
page read and write
38B2000
heap
page read and write
387E000
heap
page read and write
22350B75000
heap
page read and write
33A1000
heap
page read and write
74AC6000
unkown
page readonly
7FFEC8090000
trusted library allocation
page read and write
3894000
heap
page read and write
3897000
heap
page read and write
961000
heap
page read and write
215CE1B8000
trusted library allocation
page read and write
9EB000
heap
page read and write
747F0000
unkown
page readonly
38AD000
heap
page read and write
38AD000
heap
page read and write
6BFA0000
unkown
page read and write
1C1000
unkown
page execute read
3891000
heap
page read and write
215CC669000
trusted library allocation
page read and write
99B000
heap
page read and write
96F000
heap
page read and write
9AC000
heap
page read and write
3899000
heap
page read and write
DD7E97E000
stack
page read and write
6BFB4000
unkown
page readonly
987000
heap
page read and write
38A0000
heap
page read and write
19138654000
heap
page read and write
38B2000
heap
page read and write
35C26FC000
stack
page read and write
388F000
heap
page read and write
935000
heap
page read and write
528E000
heap
page read and write
747F1000
unkown
page execute read
389B000
heap
page read and write
3897000
heap
page read and write
38A3000
heap
page read and write
215CDFE3000
trusted library allocation
page read and write
38A3000
heap
page read and write
7FFEC87E0000
trusted library allocation
page read and write
3895000
heap
page read and write
7FFEC82C0000
trusted library allocation
page read and write
7FFEC7E3C000
trusted library allocation
page execute and read and write
1A43E7C0000
heap
page read and write
DD7FB4A000
stack
page read and write
3894000
heap
page read and write
387E000
heap
page read and write
3897000
heap
page read and write
38A0000
heap
page read and write
22350B91000
heap
page read and write
935000
heap
page read and write
980000
heap
page read and write
FD0000
heap
page read and write
38B2000
heap
page read and write
7FFEC87AD000
trusted library allocation
page read and write
283E6718000
heap
page read and write
38AD000
heap
page read and write
73DEB000
unkown
page readonly
9D7000
heap
page read and write
5277000
heap
page read and write
3897000
heap
page read and write
215CC460000
heap
page readonly
9B7000
heap
page read and write
7FFEC8610000
trusted library allocation
page read and write
3876000
heap
page read and write
7FFEC8800000
trusted library allocation
page read and write
3897000
heap
page read and write
979000
heap
page read and write
38AE000
heap
page read and write
9AA000
heap
page read and write
50CE000
heap
page read and write
2C46D7E000
stack
page read and write
1A43E620000
heap
page read and write
6BC80000
unkown
page readonly
388F000
heap
page read and write
38AA000
heap
page read and write
7FFEC8170000
trusted library allocation
page execute and read and write
38B2000
heap
page read and write
6BFD0000
unkown
page readonly
38A3000
heap
page read and write
3892000
heap
page read and write
5289000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
38A3000
heap
page read and write
38AE000
heap
page read and write
528D000
heap
page read and write
964000
heap
page read and write
215CA550000
heap
page read and write
7FFEC87C0000
trusted library allocation
page read and write
38AE000
heap
page read and write
215CC8C4000
trusted library allocation
page read and write
90A000
heap
page read and write
3897000
heap
page read and write
215CA588000
heap
page read and write
6C219000
unkown
page write copy
3897000
heap
page read and write
2A2E000
stack
page read and write
3895000
heap
page read and write
3897000
heap
page read and write
215CC470000
trusted library allocation
page read and write
9A3000
heap
page read and write
3893000
heap
page read and write
7FFEC8470000
trusted library allocation
page read and write
7FFEC8120000
trusted library allocation
page read and write
387B000
heap
page read and write
3892000
heap
page read and write
227000
unkown
page write copy
3897000
heap
page read and write
3897000
heap
page read and write
38A6000
heap
page read and write
6C9C1000
unkown
page readonly
7FFEC8840000
trusted library allocation
page read and write
389B000
heap
page read and write
38B0000
heap
page read and write
9E8000
heap
page read and write
53C8000
heap
page read and write
3897000
heap
page read and write
6BD21000
unkown
page readonly
388F000
heap
page read and write
3897000
heap
page read and write
38A0000
heap
page read and write
389A000
heap
page read and write
388F000
heap
page read and write
22350B6E000
heap
page read and write
3897000
heap
page read and write
38B1000
heap
page read and write
3897000
heap
page read and write
38A0000
heap
page read and write
7FFEC8140000
trusted library allocation
page read and write
388F000
heap
page read and write
38AA000
heap
page read and write
38AA000
heap
page read and write
215E4A9D000
heap
page read and write
38B7000
heap
page read and write
3886000
heap
page read and write
4F5D000
stack
page read and write
2820000
heap
page read and write
38AD000
heap
page read and write
7FFEC84F0000
trusted library allocation
page read and write
7FFEC82A0000
trusted library allocation
page read and write
38B6000
heap
page read and write
38AA000
heap
page read and write
7FFEC8780000
trusted library allocation
page execute and read and write
3897000
heap
page read and write
3897000
heap
page read and write
6BD0F000
unkown
page readonly
38AA000
heap
page read and write
6C9D1000
unkown
page execute read
389D000
heap
page read and write
6CBE7000
unkown
page write copy
3897000
heap
page read and write
5281000
heap
page read and write
215CA740000
heap
page read and write
6CB82000
unkown
page read and write
3892000
heap
page read and write
38AA000
heap
page read and write
3897000
heap
page read and write
7FFEC8110000
trusted library allocation
page read and write
98D000
heap
page read and write
38B2000
heap
page read and write
6CB77000
unkown
page readonly
9B2000
heap
page read and write
38AD000
heap
page read and write
38AA000
heap
page read and write
99E000
heap
page read and write
5293000
heap
page read and write
215E4A91000
heap
page read and write
935000
heap
page read and write
215CC500000
trusted library allocation
page read and write
529C000
heap
page read and write
7FFEC8670000
trusted library allocation
page execute and read and write
3897000
heap
page read and write
7FFEC8760000
trusted library allocation
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
215E477A000
heap
page read and write
38A3000
heap
page read and write
388F000
heap
page read and write
3610000
heap
page read and write
38B2000
heap
page read and write
967000
heap
page read and write
388F000
heap
page read and write
6BFBF000
unkown
page write copy
9EB000
heap
page read and write
38A4000
heap
page read and write
7FFEC7DF0000
trusted library allocation
page read and write
6C215000
unkown
page read and write
388F000
heap
page read and write
5DAE000
direct allocation
page readonly
388F000
heap
page read and write
38AD000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
215E47A0000
heap
page read and write
9ED000
heap
page read and write
38AD000
heap
page read and write
215E4998000
heap
page read and write
73D51000
unkown
page execute read
3897000
heap
page read and write
38A4000
heap
page read and write
73D8D000
unkown
page readonly
5C60000
direct allocation
page readonly
7FFEC8920000
trusted library allocation
page read and write
9F2000
heap
page read and write
3894000
heap
page read and write
62498000
unkown
page write copy
388F000
heap
page read and write
2EEF000
stack
page read and write
3891000
heap
page read and write
3892000
heap
page read and write
5239000
heap
page read and write
5265000
heap
page read and write
668000
stack
page read and write
6C960000
unkown
page read and write
3893000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
9EB000
heap
page read and write
98D000
heap
page read and write
9E8000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
283E66E0000
heap
page read and write
3897000
heap
page read and write
9B0000
heap
page read and write
7FFEC87A4000
trusted library allocation
page read and write
388F000
heap
page read and write
387C000
heap
page read and write
38AD000
heap
page read and write
38A0000
heap
page read and write
6BFB9000
unkown
page read and write
6CB1A000
unkown
page readonly
975000
heap
page read and write
215E49C1000
heap
page read and write
7FFEC84C0000
trusted library allocation
page read and write
3897000
heap
page read and write
3891000
heap
page read and write
62E80000
unkown
page readonly
389B000
heap
page read and write
900000
heap
page read and write
38A0000
heap
page read and write
38B7000
heap
page read and write
19138647000
heap
page read and write
38AA000
heap
page read and write
38A4000
heap
page read and write
19138740000
heap
page read and write
990000
heap
page read and write
3876000
heap
page read and write
385E000
stack
page read and write
38AA000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
7FFEC88F0000
trusted library allocation
page read and write
387D000
heap
page read and write
3897000
heap
page read and write
38AA000
heap
page read and write
389A000
heap
page read and write
7FFEC8000000
trusted library allocation
page read and write
89D000
stack
page read and write
388F000
heap
page read and write
9AA000
heap
page read and write
3890000
heap
page read and write
9FC000
heap
page read and write
3895000
heap
page read and write
3891000
heap
page read and write
3899000
heap
page read and write
38AD000
heap
page read and write
6C261000
unkown
page execute read
7FFEC7F90000
trusted library allocation
page read and write
38AD000
heap
page read and write
38A3000
heap
page read and write
FDA000
heap
page read and write
215CC5D0000
heap
page read and write
38B2000
heap
page read and write
389F000
heap
page read and write
7FFEC7EC6000
trusted library allocation
page execute and read and write
7FFEC8100000
trusted library allocation
page execute and read and write
2C6E000
stack
page read and write
38A0000
heap
page read and write
3391000
heap
page read and write
215DC64E000
trusted library allocation
page read and write
22350B93000
heap
page read and write
19138975000
heap
page read and write
38AD000
heap
page read and write
38B2000
heap
page read and write
5239000
heap
page read and write
3897000
heap
page read and write
38AE000
heap
page read and write
6CC21000
unkown
page read and write
3897000
heap
page read and write
38AA000
heap
page read and write
73D50000
unkown
page readonly
19138637000
heap
page read and write
38AE000
heap
page read and write
38AA000
heap
page read and write
38AA000
heap
page read and write
389D000
heap
page read and write
22350960000
heap
page read and write
3890000
heap
page read and write
3893000
heap
page read and write
389B000
heap
page read and write
3897000
heap
page read and write
FDA000
heap
page read and write
5293000
heap
page read and write
38B2000
heap
page read and write
3897000
heap
page read and write
6CAE8000
unkown
page write copy
3895000
heap
page read and write
22350B8A000
heap
page read and write
6C9C0000
unkown
page read and write
215CCA15000
trusted library allocation
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
3876000
heap
page read and write
3893000
heap
page read and write
22350B81000
heap
page read and write
215CA5E7000
heap
page read and write
215CC503000
trusted library allocation
page read and write
22350B79000
heap
page read and write
215CE16D000
trusted library allocation
page read and write
3895000
heap
page read and write
73D4A000
unkown
page readonly
3897000
heap
page read and write
38AA000
heap
page read and write
2B6E000
stack
page read and write
215E4A75000
heap
page read and write
3897000
heap
page read and write
38B2000
heap
page read and write
6C216000
unkown
page write copy
35C28FE000
stack
page read and write
AC9EBFD000
stack
page read and write
38B1000
heap
page read and write
38A6000
heap
page read and write
7FFEC8910000
trusted library allocation
page read and write
7FFEC8150000
trusted library allocation
page read and write
7FFEC8510000
trusted library allocation
page execute and read and write
3897000
heap
page read and write
215CC5E1000
trusted library allocation
page read and write
389E000
heap
page read and write
388F000
heap
page read and write
387C000
heap
page read and write
388F000
heap
page read and write
3899000
heap
page read and write
283E69A0000
heap
page read and write
388F000
heap
page read and write
9F8000
heap
page read and write
38A3000
heap
page read and write
7FFEC8240000
trusted library allocation
page read and write
7FFEC8211000
trusted library allocation
page read and write
3897000
heap
page read and write
6CB3C000
unkown
page readonly
9B4000
heap
page read and write
62E95000
unkown
page readonly
3897000
heap
page read and write
215E46F0000
heap
page read and write
2B2F000
stack
page read and write
3897000
heap
page read and write
38A3000
heap
page read and write
3860000
heap
page read and write
982000
heap
page read and write
995000
heap
page read and write
74AC8000
unkown
page read and write
975000
heap
page read and write
5289000
heap
page read and write
3892000
heap
page read and write
3899000
heap
page read and write
62494000
unkown
page readonly
22352BB0000
trusted library allocation
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
38B2000
heap
page read and write
1A43E6CC000
heap
page read and write
57F1000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
AC9F0FF000
stack
page read and write
22350B00000
heap
page read and write
FDC000
heap
page read and write
38B2000
heap
page read and write
38AA000
heap
page read and write
38AD000
heap
page read and write
3894000
heap
page read and write
98F000
heap
page read and write
6BC74000
unkown
page readonly
38AD000
heap
page read and write
7FFEC87CA000
trusted library allocation
page read and write
38AD000
heap
page read and write
9E8000
heap
page read and write
38AE000
heap
page read and write
3897000
heap
page read and write
3894000
heap
page read and write
38AE000
heap
page read and write
6BC73000
unkown
page write copy
52AD000
heap
page read and write
38AD000
heap
page read and write
9FC000
heap
page read and write
99B000
heap
page read and write
388F000
heap
page read and write
22350A80000
heap
page read and write
215CC440000
trusted library section
page read and write
215CDFA3000
trusted library allocation
page read and write
9AA000
heap
page read and write
999000
heap
page read and write
38A6000
heap
page read and write
DD7FA00000
stack
page read and write
22352493000
heap
page read and write
38B2000
heap
page read and write
3897000
heap
page read and write
9B2000
heap
page read and write
38AA000
heap
page read and write
5285000
heap
page read and write
7E0000
heap
page read and write
22350B8B000
heap
page read and write
38AA000
heap
page read and write
3895000
heap
page read and write
387E000
heap
page read and write
3897000
heap
page read and write
9A2000
heap
page read and write
38A0000
heap
page read and write
38A6000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
214000
unkown
page readonly
38AA000
heap
page read and write
388F000
heap
page read and write
38AE000
heap
page read and write
3892000
heap
page read and write
3897000
heap
page read and write
7FFEC85C0000
trusted library allocation
page read and write
3895000
heap
page read and write
99C000
heap
page read and write
278E000
stack
page read and write
3892000
heap
page read and write
3891000
heap
page read and write
283E69A5000
heap
page read and write
6CC0D000
unkown
page readonly
280E000
stack
page read and write
7FFEC8810000
trusted library allocation
page read and write
3895000
heap
page read and write
388F000
heap
page read and write
52A5000
heap
page read and write
38AA000
heap
page read and write
3876000
heap
page read and write
388F000
heap
page read and write
3891000
heap
page read and write
22350B30000
heap
page read and write
3897000
heap
page read and write
FDA000
heap
page read and write
7FFEC8650000
trusted library allocation
page read and write
38B2000
heap
page read and write
22354230000
trusted library allocation
page read and write
3875000
heap
page read and write
388F000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
9AA000
heap
page read and write
215E4A63000
heap
page read and write
38A0000
heap
page read and write
38AD000
heap
page read and write
AC9ECFE000
stack
page read and write
977000
heap
page read and write
3878000
heap
page read and write
3897000
heap
page read and write
5255000
heap
page read and write
DCE000
stack
page read and write
38B4000
heap
page read and write
38AA000
heap
page read and write
6CB01000
unkown
page execute read
7FFEC815E000
trusted library allocation
page read and write
62E9C000
unkown
page readonly
9F2000
heap
page read and write
3897000
heap
page read and write
215CA735000
heap
page read and write
7FFEC7F80000
trusted library allocation
page read and write
3899000
heap
page read and write
389E000
heap
page read and write
229000
unkown
page read and write
6CA95000
unkown
page readonly
94A000
heap
page read and write
388F000
heap
page read and write
3891000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
7FFEC8230000
trusted library allocation
page read and write
215DC63C000
trusted library allocation
page read and write
73DEE000
unkown
page read and write
FDA000
heap
page read and write
388F000
heap
page read and write
38AD000
heap
page read and write
388F000
heap
page read and write
3894000
heap
page read and write
3890000
heap
page read and write
38AE000
heap
page read and write
3897000
heap
page read and write
388F000
heap
page read and write
3897000
heap
page read and write
38AD000
heap
page read and write
38AD000
heap
page read and write
49FE000
stack
page read and write
388F000
heap
page read and write
9F7000
heap
page read and write
3897000
heap
page read and write
983000
heap
page read and write
961000
heap
page read and write
38A7000
heap
page read and write
388F000
heap
page read and write
3895000
heap
page read and write
3897000
heap
page read and write
38A3000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
3897000
heap
page read and write
7FFEC81F2000
trusted library allocation
page read and write
388F000
heap
page read and write
3891000
heap
page read and write
38AD000
heap
page read and write
215DC5F1000
trusted library allocation
page read and write
3894000
heap
page read and write
215CC79D000
trusted library allocation
page read and write
38AE000
heap
page read and write
6CA93000
unkown
page write copy
388F000
heap
page read and write
3897000
heap
page read and write
7FFEC84D0000
trusted library allocation
page read and write
38B1000
heap
page read and write
979000
heap
page read and write
990000
heap
page read and write
38AA000
heap
page read and write
38AE000
heap
page read and write
38B6000
heap
page read and write
3896000
heap
page read and write
38B2000
heap
page read and write
38AD000
heap
page read and write
74800000
unkown
page readonly
DD7E87E000
unkown
page read and write
3897000
heap
page read and write
7FFEC8700000
trusted library allocation
page read and write
57F1000
heap
page read and write
215CA61D000
heap
page read and write
971000
heap
page read and write
215CDFDD000
trusted library allocation
page read and write
9EB000
heap
page read and write
22350B7B000
heap
page read and write
38AD000
heap
page read and write
1A43E6C0000
heap
page read and write
2CAE000
stack
page read and write
38AA000
heap
page read and write
AC9EDFE000
stack
page read and write
6CB51000
unkown
page execute read
22350B37000
heap
page read and write
973000
heap
page read and write
388F000
heap
page read and write
38AA000
heap
page read and write
9AA000
heap
page read and write
22350A40000
heap
page read and write
6BFBA000
unkown
page write copy
96F000
heap
page read and write
98B000
heap
page read and write
62495000
unkown
page read and write
38AD000
heap
page read and write
215E4920000
heap
page read and write
3417000
heap
page read and write
38AD000
heap
page read and write
38A6000
heap
page read and write
3897000
heap
page read and write
9E8000
heap
page read and write
38A6000
heap
page read and write
38AA000
heap
page read and write
38AD000
heap
page read and write
7FFEC7FE6000
trusted library allocation
page read and write
979000
heap
page read and write
3895000
heap
page read and write
3894000
heap
page read and write
3895000
heap
page read and write
51C0000
heap
page read and write
389B000
heap
page read and write
3892000
heap
page read and write
6CBE6000
unkown
page read and write
388F000
heap
page read and write
38AA000
heap
page read and write
3890000
heap
page read and write
22A000
unkown
page readonly
38A6000
heap
page read and write
3897000
heap
page read and write
38A0000
heap
page read and write
9A2000
heap
page read and write
6CB1F000
unkown
page read and write
38B2000
heap
page read and write
6CAE3000
unkown
page write copy
971000
heap
page read and write
6C96D000
unkown
page read and write
38AA000
heap
page read and write
9F8000
heap
page read and write
3876000
heap
page read and write
283E6600000
heap
page read and write
DD7E8FE000
stack
page read and write
215CD521000
trusted library allocation
page read and write
90E000
heap
page read and write
38AA000
heap
page read and write
9A4000
heap
page read and write
7FFEC7FFB000
trusted library allocation
page read and write
38AA000
heap
page read and write
3899000
heap
page read and write
22350A85000
heap
page read and write
98B000
heap
page read and write
388F000
heap
page read and write
38AD000
heap
page read and write
9F2000
heap
page read and write
22354230000
trusted library allocation
page read and write
38AD000
heap
page read and write
38B7000
heap
page read and write
6C961000
unkown
page write copy
3891000
heap
page read and write
215E4754000
heap
page read and write
5281000
heap
page read and write
There are 1629 hidden memdumps, click here to show them.