IOC Report
amneziawg-amd64-1.0.0.msi

loading gif

Files

File Path
Type
Category
Malicious
amneziawg-amd64-1.0.0.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AmneziaWG: Fast, Modern, Secure VPN Tunnel, Author: Amnezia, Keywords: Installer, Comments: This installer database contains the logic and data required to install AmneziaWG., Template: x64;1033, Revision Number: {A2D5D019-9934-4179-80B6-2BC1DC113919}, Create Time/Date: Wed Aug 21 23:07:50 2024, Last Saved Time/Date: Wed Aug 21 23:07:50 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4
initial sample
malicious
C:\Program Files\AmneziaWG\amneziawg.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Config.Msi\5cf629.rbs
data
dropped
C:\Config.Msi\5cf62b.rbs
data
modified
C:\Program Files\AmneziaWG\Data\log.bin
data
dropped
C:\Program Files\AmneziaWG\awg.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\AmneziaWG\wintun.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AmneziaWG.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Aug 22 04:05:40 2024, mtime=Sun Oct 13 12:35:06 2024, atime=Thu Aug 22 04:05:40 2024, length=8231576, window=hide
dropped
C:\Windows\Installer\5cf628.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AmneziaWG: Fast, Modern, Secure VPN Tunnel, Author: Amnezia, Keywords: Installer, Comments: This installer database contains the logic and data required to install AmneziaWG., Template: x64;1033, Revision Number: {A2D5D019-9934-4179-80B6-2BC1DC113919}, Create Time/Date: Wed Aug 21 23:07:50 2024, Last Saved Time/Date: Wed Aug 21 23:07:50 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4
dropped
C:\Windows\Installer\5cf62a.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AmneziaWG: Fast, Modern, Secure VPN Tunnel, Author: Amnezia, Keywords: Installer, Comments: This installer database contains the logic and data required to install AmneziaWG., Template: x64;1033, Revision Number: {A2D5D019-9934-4179-80B6-2BC1DC113919}, Create Time/Date: Wed Aug 21 23:07:50 2024, Last Saved Time/Date: Wed Aug 21 23:07:50 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4
dropped
C:\Windows\Installer\MSI31F.tmp
data
dropped
C:\Windows\Installer\MSIF78F.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSIF7DE.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSIF83D.tmp
data
dropped
C:\Windows\Installer\MSIF83E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSIFEE6.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSIFF35.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSIFF55.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\SourceHash{58E70232-B95D-465F-878C-918D5D3FD706}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{58E70232-B95D-465F-878C-918D5D3FD706}\wireguard.ico
MS Windows icon resource - 11 icons, 256x256 with PNG image data, 256 x 256, 16-bit/color RGBA, non-interlaced, 32 bits/pixel, -64x-64, 32 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF171E38FEF6C7A7BE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF19A44DD9D7690F1F.TMP
data
dropped
C:\Windows\Temp\~DF27D36527F66F01F3.TMP
data
dropped
C:\Windows\Temp\~DF2B40DB00FD8C43C1.TMP
data
dropped
C:\Windows\Temp\~DF3054A7DEFC3B566B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF32FB9BB0FF2C5BDB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5120C57685445DB6.TMP
data
dropped
C:\Windows\Temp\~DF6FA7B47A9E598523.TMP
data
dropped
C:\Windows\Temp\~DF8537266379416B14.TMP
data
dropped
C:\Windows\Temp\~DFA9A777426A3B86CC.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFAFDA2FDFEB2CB0CC.TMP
data
dropped
C:\Windows\Temp\~DFB07866E82BACF370.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF2E9B7069D91F4A0.TMP
data
dropped
C:\Windows\Temp\~DFFA6536A0857EB04D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\AmneziaWG\amneziawg.exe
"C:\Program Files\AmneziaWG\amneziawg.exe"
malicious
C:\Program Files\AmneziaWG\amneziawg.exe
"C:\Program Files\AmneziaWG\amneziawg.exe" /installmanagerservice
malicious
C:\Program Files\AmneziaWG\amneziawg.exe
"C:\Program Files\AmneziaWG\amneziawg.exe" /managerservice
malicious
C:\Program Files\AmneziaWG\amneziawg.exe
"C:\Program Files\AmneziaWG\amneziawg.exe" /ui 768 764 776 784
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\amneziawg-amd64-1.0.0.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 737408F332C72DA581C627ECA815EDF4
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 038BD3729F1160F66BF25AB2649B1B39 E Global\MSI0000

URLs

Name
IP
Malicious
https://www.wintun.net/D
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://sectigo.com/CPS
unknown
https://amnezia.org/D
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://amnezia.org/wireguard-log-%s.txtTaskbarButtonCreatedreflect.Value.IsZeroreflect.Value.SetInt
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://www.wireguard.com/D
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://git.zx2c4.com/wireguard-tools/
unknown
https://www.wintun.net/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://amnezia.org/
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://sectigo.com/CPS2.23.140.1.4.1
unknown
There are 9 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5cf629.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5cf629.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\32D8053C2633EC74290223B1BDA1A1CC
23207E85D59BF56478C819D8D5F37D60
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\644FC0453CCF25449BBFBEC420872015
23207E85D59BF56478C819D8D5F37D60
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\804E88CA87B93BE4D9A29903F5E2A515
23207E85D59BF56478C819D8D5F37D60
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\AmneziaWG\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{58E70232-B95D-465F-878C-918D5D3FD706}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\4E75B678094424449A3827E11E140BD0
23207E85D59BF56478C819D8D5F37D60
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{58E70232-B95D-465F-878C-918D5D3FD706}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\23207E85D59BF56478C819D8D5F37D60
WireGuardFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\Features
WireGuardFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\23207E85D59BF56478C819D8D5F37D60\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4E75B678094424449A3827E11E140BD0
23207E85D59BF56478C819D8D5F37D60
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\23207E85D59BF56478C819D8D5F37D60\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5cf62b.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5cf62b.rbsLow
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Environment
PATH
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 86 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
412000
unkown
page readonly
malicious
1BD79951000
direct allocation
page read and write
C000148000
direct allocation
page read and write
C00019C000
direct allocation
page read and write
C000018000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
C000025000
direct allocation
page read and write
C000018000
direct allocation
page read and write
1BD54490000
heap
page read and write
C0001DE000
direct allocation
page read and write
80B000
unkown
page read and write
C0000BE000
direct allocation
page read and write
1BD545CA000
direct allocation
page read and write
C0001AE000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C00017E000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
1F4E76C0000
direct allocation
page read and write
89C000
unkown
page readonly
C000060000
direct allocation
page read and write
808000
unkown
page write copy
C00000E000
direct allocation
page read and write
C000134000
direct allocation
page read and write
C0004DF000
direct allocation
page read and write
C000031000
direct allocation
page read and write
267420F0000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C000242000
direct allocation
page read and write
1F4E7714000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
26742098000
direct allocation
page read and write
C000031000
direct allocation
page read and write
1F4A25B0000
heap
page read and write
C00005E000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000208000
direct allocation
page read and write
C000018000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
1F4A2399000
heap
page read and write
FBC5FE000
stack
page read and write
C000094000
direct allocation
page read and write
8B5000
unkown
page readonly
C000084000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C000218000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C000196000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000292000
direct allocation
page read and write
8B5000
unkown
page readonly
C000172000
direct allocation
page read and write
1BD54652000
heap
page read and write
C000014000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
C000046000
direct allocation
page read and write
1F4E7716000
direct allocation
page read and write
FBD1FB000
stack
page read and write
C0000B0000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C0001DC000
direct allocation
page read and write
C000138000
direct allocation
page read and write
1F4E770B000
direct allocation
page read and write
C000216000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C00015A000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
1F4ECB7A000
heap
page read and write
C00001A000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
1F4A25BC000
heap
page read and write
FBCDFE000
stack
page read and write
C00008A000
direct allocation
page read and write
C000062000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
C000051000
direct allocation
page read and write
7CA000
unkown
page write copy
C00010E000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C0001D6000
direct allocation
page read and write
C0001F2000
direct allocation
page read and write
80D000
unkown
page write copy
C000188000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000149000
direct allocation
page read and write
121000
unkown
page execute read
C000100000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
8C8000
unkown
page readonly
C00001E000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
95025FE000
stack
page read and write
121000
unkown
page execute read
C00000E000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
8B4000
unkown
page write copy
C00002C000
direct allocation
page read and write
C00023B000
direct allocation
page read and write
7F7000
unkown
page write copy
C00003F000
direct allocation
page read and write
C0002BC000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
1F4A23A1000
heap
page read and write
C00019C000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C000156000
direct allocation
page read and write
8B2E5FF000
stack
page read and write
C00003A000
direct allocation
page read and write
7CE000
unkown
page write copy
C0001A4000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
C000228000
direct allocation
page read and write
E7DC5FE000
stack
page read and write
C000010000
direct allocation
page read and write
7FA000
unkown
page write copy
8C8000
unkown
page readonly
C0002B8000
direct allocation
page read and write
1F4A2300000
direct allocation
page read and write
7C5000
unkown
page read and write
7F8000
unkown
page read and write
C0001FB000
direct allocation
page read and write
1F4A22B0000
heap
page read and write
C0001A8000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C0001F9000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
E7DCFFE000
stack
page read and write
95033FF000
stack
page read and write
C0000DA000
direct allocation
page read and write
20222104000
heap
page read and write
8B4000
unkown
page write copy
C00008B000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C0001A6000
direct allocation
page read and write
7CA000
unkown
page write copy
C000058000
direct allocation
page read and write
26741F60000
heap
page read and write
C000170000
direct allocation
page read and write
1F4A23A9000
heap
page read and write
C00011E000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000246000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0000F8000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000154000
direct allocation
page read and write
C00029E000
direct allocation
page read and write
1F4E9470000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
202221FA000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C0001CC000
direct allocation
page read and write
C000024000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
7F8000
unkown
page read and write
C000186000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C000290000
direct allocation
page read and write
8B2E7FE000
stack
page read and write
C000041000
direct allocation
page read and write
E7DD3FE000
stack
page read and write
1F4A239F000
heap
page read and write
C000016000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
95021FE000
stack
page read and write
E7DD5FE000
stack
page read and write
C0000BC000
direct allocation
page read and write
121000
unkown
page execute read
C0000CA000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
C00008D000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
1F4E76C8000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
7F7000
unkown
page write copy
FBBFFF000
stack
page read and write
E7DCDFC000
stack
page read and write
7C5000
unkown
page read and write
80E000
unkown
page read and write
FBCFFF000
stack
page read and write
1F4A238E000
heap
page read and write
C0000F4000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
120000
unkown
page readonly
120000
unkown
page readonly
C000031000
direct allocation
page read and write
C000222000
direct allocation
page read and write
7C5000
unkown
page write copy
C0001DA000
direct allocation
page read and write
C000060000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
C000088000
direct allocation
page read and write
202679E0000
unkown
page read and write
8B5000
unkown
page readonly
C00003F000
direct allocation
page read and write
897000
unkown
page read and write
C000008000
direct allocation
page read and write
82F000
unkown
page read and write
2674209A000
direct allocation
page read and write
FBBDFE000
stack
page read and write
C00003A000
direct allocation
page read and write
202220C0000
heap
page read and write
89C000
unkown
page readonly
C000016000
direct allocation
page read and write
1F4A239A000
heap
page read and write
C000064000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
829000
unkown
page read and write
1F4E9510000
direct allocation
page read and write
C000158000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
7C5000
unkown
page write copy
C000058000
direct allocation
page read and write
120000
unkown
page readonly
C0000EA000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
1F4A2376000
heap
page read and write
C000033000
direct allocation
page read and write
C000068000
direct allocation
page read and write
C00008F000
direct allocation
page read and write
9502DFD000
stack
page read and write
C000012000
direct allocation
page read and write
7CD000
unkown
page read and write
7FB000
unkown
page read and write
8B2E3FD000
stack
page read and write
E7DC9FA000
stack
page read and write
C000080000
direct allocation
page read and write
8C8000
unkown
page readonly
C0000F0000
direct allocation
page read and write
1F4A21D0000
heap
page read and write
8B2E9FF000
stack
page read and write
202221F8000
direct allocation
page read and write
C000108000
direct allocation
page read and write
C000256000
direct allocation
page read and write
7CA000
unkown
page write copy
1F4ECB75000
heap
page read and write
8B4000
unkown
page write copy
20267530000
direct allocation
page read and write
C0001E4000
direct allocation
page read and write
C00019E000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
202220E8000
heap
page read and write
C0001CE000
direct allocation
page read and write
7FB000
unkown
page read and write
8C8000
unkown
page readonly
E7DC1FD000
stack
page read and write
7F5000
unkown
page read and write
C000186000
direct allocation
page read and write
7C5000
unkown
page write copy
C00003A000
direct allocation
page read and write
26742110000
direct allocation
page read and write
C00022A000
direct allocation
page read and write
9502BFE000
stack
page read and write
C0000FC000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
8B4000
unkown
page write copy
7F6000
unkown
page read and write
C000186000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000150000
direct allocation
page read and write
1F4A2308000
direct allocation
page read and write
80D000
unkown
page write copy
1F4E91A0000
heap
page read and write
8B5000
unkown
page readonly
C0000BE000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
C000164000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C0000F6000
direct allocation
page read and write
121000
unkown
page execute read
267421B0000
heap
page read and write
95031FE000
stack
page read and write
7CE000
unkown
page write copy
C000046000
direct allocation
page read and write
C0000F6000
direct allocation
page read and write
C000128000
direct allocation
page read and write
E7DC7FF000
stack
page read and write
C00029A000
direct allocation
page read and write
80D000
unkown
page write copy
20222290000
direct allocation
page read and write
C00019E000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
20221FE0000
heap
page read and write
C0001D4000
direct allocation
page read and write
C000078000
direct allocation
page read and write
1BD54830000
heap
page read and write
E7DCBFF000
stack
page read and write
C0002B4000
direct allocation
page read and write
FBC3FF000
stack
page read and write
89C000
unkown
page readonly
1BD545C0000
direct allocation
page read and write
C000004000
direct allocation
page read and write
26742040000
heap
page read and write
1F4A237B000
heap
page read and write
89C000
unkown
page readonly
89C000
unkown
page readonly
897000
unkown
page read and write
C00003F000
direct allocation
page read and write
8C8000
unkown
page readonly
26742060000
heap
page read and write
1F4ECB83000
heap
page read and write
1F4A23BE000
heap
page read and write
1F4A23B6000
heap
page read and write
8B5000
unkown
page readonly
C0001B2000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C000178000
direct allocation
page read and write
1BD54608000
heap
page read and write
89C000
unkown
page readonly
C000094000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C00005E000
direct allocation
page read and write
1F4ECB81000
heap
page read and write
9501FFF000
stack
page read and write
7CE000
unkown
page write copy
C000004000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
7F8000
unkown
page read and write
C000041000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C000182000
direct allocation
page read and write
7FB000
unkown
page read and write
808000
unkown
page write copy
C000080000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
7F9000
unkown
page write copy
95035FE000
stack
page read and write
26741E67000
heap
page read and write
C000147000
direct allocation
page read and write
202222E0000
heap
page read and write
80E000
unkown
page read and write
C000089000
direct allocation
page read and write
82F000
unkown
page read and write
FBC7FF000
stack
page read and write
1BD54590000
heap
page read and write
C000056000
direct allocation
page read and write
26742090000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000108000
direct allocation
page read and write
7C5000
unkown
page write copy
1F4A2304000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
1F4A235E000
heap
page read and write
C0002BA000
direct allocation
page read and write
1F4ECA56000
heap
page read and write
2674209C000
direct allocation
page read and write
C0000EC000
direct allocation
page read and write
C0001B4000
direct allocation
page read and write
121000
unkown
page execute read
C000130000
direct allocation
page read and write
1F4A2340000
direct allocation
page read and write
C00022E000
direct allocation
page read and write
C000014000
direct allocation
page read and write
8B2EDFF000
stack
page read and write
C000112000
direct allocation
page read and write
C0000FA000
direct allocation
page read and write
C00023D000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C00028A000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
C000018000
direct allocation
page read and write
7F6000
unkown
page read and write
7CD000
unkown
page read and write
80B000
unkown
page read and write
C000004000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
8B5000
unkown
page readonly
C000162000
direct allocation
page read and write
C000232000
direct allocation
page read and write
7FB000
unkown
page read and write
7C5000
unkown
page read and write
C000288000
direct allocation
page read and write
C000014000
direct allocation
page read and write
202221F4000
direct allocation
page read and write
1BD7B620000
heap
page read and write
C000080000
direct allocation
page read and write
1BD54570000
heap
page read and write
C00001A000
direct allocation
page read and write
C000239000
direct allocation
page read and write
1BD545C4000
direct allocation
page read and write
1BD79990000
direct allocation
page read and write
120000
unkown
page readonly
808000
unkown
page write copy
80B000
unkown
page read and write
1F4A2396000
heap
page read and write
C000014000
direct allocation
page read and write
897000
unkown
page read and write
95027FF000
stack
page read and write
1F4E9140000
heap
page read and write
7F9000
unkown
page write copy
C00014E000
direct allocation
page read and write
1F4E9490000
direct allocation
page read and write
202221F0000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C000198000
direct allocation
page read and write
1F4A2358000
heap
page read and write
C0000E8000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
FBBBF7000
stack
page read and write
26741E60000
heap
page read and write
C0001B4000
direct allocation
page read and write
1F4E7852000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
C000248000
direct allocation
page read and write
1BD54600000
heap
page read and write
C000186000
direct allocation
page read and write
C000143000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
7F6000
unkown
page read and write
C000138000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000046000
direct allocation
page read and write
8B4000
unkown
page write copy
80E000
unkown
page read and write
120000
unkown
page readonly
C00002A000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
26768B60000
direct allocation
page read and write
120000
unkown
page readonly
C0002B0000
direct allocation
page read and write
121000
unkown
page execute read
C000096000
direct allocation
page read and write
FBC9FE000
stack
page read and write
C00001C000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
1F4EBC10000
trusted library allocation
page read and write
C000284000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
C00029C000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
267421B5000
heap
page read and write
82F000
unkown
page read and write
121000
unkown
page execute read
C0003DB000
direct allocation
page read and write
897000
unkown
page read and write
8B4000
unkown
page write copy
C00002F000
direct allocation
page read and write
7CA000
unkown
page write copy
120000
unkown
page readonly
C000020000
direct allocation
page read and write
7F9000
unkown
page write copy
C000088000
direct allocation
page read and write
8B5000
unkown
page readonly
121000
unkown
page execute read
8B2EBFF000
stack
page read and write
C0000B3000
direct allocation
page read and write
C000086000
direct allocation
page read and write
1F4E7706000
direct allocation
page read and write
95023FE000
stack
page read and write
80D000
unkown
page write copy
C000010000
direct allocation
page read and write
1BD54835000
heap
page read and write
C000041000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
C000124000
direct allocation
page read and write
202220E0000
heap
page read and write
C0001DC000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
1F4A236F000
heap
page read and write
C0000A2000
direct allocation
page read and write
8B4000
unkown
page write copy
C0000A6000
direct allocation
page read and write
C0002D8000
direct allocation
page read and write
C0002A0000
direct allocation
page read and write
7F7000
unkown
page write copy
C00014E000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
8C8000
unkown
page readonly
C0001F7000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C000096000
direct allocation
page read and write
7CE000
unkown
page write copy
121000
unkown
page execute read
26742094000
direct allocation
page read and write
C000066000
direct allocation
page read and write
20222250000
direct allocation
page read and write
8C8000
unkown
page readonly
C0000CE000
direct allocation
page read and write
80E000
unkown
page read and write
829000
unkown
page read and write
C00004A000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
C000102000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C000046000
direct allocation
page read and write
808000
unkown
page write copy
829000
unkown
page read and write
1BD545C8000
direct allocation
page read and write
120000
unkown
page readonly
C000012000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
121000
unkown
page execute read
C0000E4000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
8B5000
unkown
page readonly
C000196000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
1F4E91A3000
heap
page read and write
121000
unkown
page execute read
1F4A22D0000
heap
page read and write
121000
unkown
page execute read
C0001AC000
direct allocation
page read and write
7C5000
unkown
page read and write
C00003F000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
C00021A000
direct allocation
page read and write
FBC1FF000
stack
page read and write
1F4A25B5000
heap
page read and write
C00017D000
direct allocation
page read and write
7F7000
unkown
page write copy
C00015C000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C000033000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C000020000
direct allocation
page read and write
C000020000
direct allocation
page read and write
8B2F1FD000
stack
page read and write
C0000D2000
direct allocation
page read and write
C000090000
direct allocation
page read and write
89C000
unkown
page readonly
20222270000
heap
page read and write
C0000C8000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
1F4E7740000
unkown
page readonly
1F4E7850000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C0001F5000
direct allocation
page read and write
C00016A000
direct allocation
page read and write
C000206000
direct allocation
page read and write
8B2EFFE000
stack
page read and write
8B4000
unkown
page write copy
7CD000
unkown
page read and write
FBCBFE000
stack
page read and write
1BD545CC000
direct allocation
page read and write
202222E5000
heap
page read and write
C000000000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
1F4A2350000
heap
page read and write
8C8000
unkown
page readonly
C00000A000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
1BD54820000
direct allocation
page read and write
C000144000
direct allocation
page read and write
C000244000
direct allocation
page read and write
8B2F3FE000
stack
page read and write
C00000A000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
C0001D2000
direct allocation
page read and write
C000230000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
202221FC000
direct allocation
page read and write
1F4E91B0000
heap
page read and write
C000100000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
82F000
unkown
page read and write
9501BCE000
stack
page read and write
89C000
unkown
page readonly
80B000
unkown
page read and write
1F4A2399000
heap
page read and write
C00002F000
direct allocation
page read and write
829000
unkown
page read and write
C0000B2000
direct allocation
page read and write
C000072000
direct allocation
page read and write
7CD000
unkown
page read and write
C00000A000
direct allocation
page read and write
7F8000
unkown
page read and write
There are 612 hidden memdumps, click here to show them.