IOC Report
Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe

loading gif

Files

File Path
Type
Category
Malicious
Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\0x0409.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\0x08548.tmp
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\ISS8518.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\ISSetup.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\dat8459.tmp
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\dat846A.tmp
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\data1.cab (copy)
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\data1.hdr (copy)
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\lay8458.tmp
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\layout.bin (copy)
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\set84AA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\set8558.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.ilg (copy)
Composite Document File V2 Document, Cannot read section info
dropped
C:\Program Files (x86)\InstallShield Installation Information\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA TEC\TPCL Printer Driver\Driver Wizard.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA TEC\TPCL Printer Driver\PnP Recovery.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Archive, ctime=Mon Nov 25 08:26:54 2024, mtime=Mon Nov 25 08:26:54 2024, atime=Tue Dec 14 18:58:52 2021, length=3103448, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA TEC\TPCL Printer Driver\TECDRVIn.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Normal, ctime=Mon Nov 25 08:26:51 2024, mtime=Mon Nov 25 08:26:54 2024, atime=Wed Oct 6 15:45:44 2010, length=192512, window=hide
dropped
C:\TEC_DRV\Common\Def8579.tmp
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
dropped
C:\TEC_DRV\Common\Defaults[TT]_2021.3.0.0.sds (copy)
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
dropped
C:\TEC_DRV\Common\t2s8599.tmp
Windows setup INFormation
dropped
C:\TEC_DRV\Common\t2s85AA.tmp
MS Windows HtmlHelp Data
dropped
C:\TEC_DRV\Common\t2sTT_2021.3.0.0.ini (copy)
Windows setup INFormation
dropped
C:\TEC_DRV\Common\t2sTTenu_2021.3.0.0.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\TEC_DRV\Common\tec85CA.tmp
Windows setup INFormation
dropped
C:\TEC_DRV\Common\tec85CB.tmp
MS Windows HtmlHelp Data
dropped
C:\TEC_DRV\Common\tecTT_2021.3.0.0.ini (copy)
Windows setup INFormation
dropped
C:\TEC_DRV\Common\tecTTenu_2021.3.0.0.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\TEC_DRV\Common\tt#85DB.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Common\tt#8698.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Common\tt#86A9.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Common\tt#base_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Common\tt#t2s_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Common\tt#tec_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Dri8749.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\Dri91BA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Dri9276.tmp
ASCII text, with CRLF line terminators
dropped
C:\TEC_DRV\DriverWizard.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\TEC_DRV\DriverWizard.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\DriverWizard.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\TEC_DRV\Ins9277.tmp
HTML document, ASCII text, with CRLF line terminators
dropped
C:\TEC_DRV\Installation_Instructions.html (copy)
HTML document, ASCII text, with CRLF line terminators
dropped
C:\TEC_DRV\Por9288.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\TEC_DRV\PortHelperWow64.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\TEC_DRV\Sea9298.tmp
Certificate, Version=3
dropped
C:\TEC_DRV\SeagullPublisher.cer (copy)
Certificate, Version=3
dropped
C:\TEC_DRV\TEC8717.tmp (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\TEC8718.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\TEC8729.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\TECDRVIn.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\TOS92AA.tmp
Windows setup INFormation
dropped
C:\TEC_DRV\TOSHIBATEC.inf (copy)
Windows setup INFormation
dropped
C:\TEC_DRV\Win32\Sea93E9.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Win32\Sea9418.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Win32\Sea9439.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Win32\Seagull_V3_ConfigDispatcher.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Win32\Seagull_V3_NetMonDispatcher.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Win32\Seagull_V3_PrintDispatcher.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\TEC_DRV\Win32\tt#92CC.tmp
Microsoft Cabinet archive data, many, 5511341 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 387 datablocks, 0x1 compression
dropped
C:\TEC_DRV\Win32\tt#9389.tmp
Microsoft Cabinet archive data, many, 54849 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 4 datablocks, 0x1 compression
dropped
C:\TEC_DRV\Win32\tt#93C8.tmp
Microsoft Cabinet archive data, many, 169505 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\TEC_DRV\Win32\tt#base_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 5511341 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 387 datablocks, 0x1 compression
dropped
C:\TEC_DRV\Win32\tt#t2s_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 54849 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 4 datablocks, 0x1 compression
dropped
C:\TEC_DRV\Win32\tt#tec_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 169505 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\TEC_DRV\lic92AB.tmp
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\TEC_DRV\licTTenu.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\TEC_DRV\tos92BC.tmp
data
dropped
C:\TEC_DRV\toshibatec.cat (copy)
data
dropped
C:\TEC_DRV\x64\Sea970B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\TEC_DRV\x64\Sea97A9.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
modified
C:\TEC_DRV\x64\Sea97D9.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\TEC_DRV\x64\Seagull_V3_ConfigDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\TEC_DRV\x64\Seagull_V3_NetMonDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\TEC_DRV\x64\Seagull_V3_PrintDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\TEC_DRV\x64\tt#9469.tmp
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 436 datablocks, 0x1 compression
dropped
C:\TEC_DRV\x64\tt#95B2.tmp
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 5 datablocks, 0x1 compression
dropped
C:\TEC_DRV\x64\tt#95F1.tmp
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\TEC_DRV\x64\tt#base_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 436 datablocks, 0x1 compression
dropped
C:\TEC_DRV\x64\tt#t2s_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 5 datablocks, 0x1 compression
dropped
C:\TEC_DRV\x64\tt#tec_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\7F7.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\Defaults[TT]_2021.3.0.0.sds (copy)
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9AB2.tmp
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9AF1.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B02.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B22.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B33.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9B53.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9BD1.tmp
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\SET9BE2.tmp
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\t2sTT_2021.3.0.0.ini (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\t2sTTenu_2021.3.0.0.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tecTT_2021.3.0.0.ini (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tecTTenu_2021.3.0.0.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tt#base_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tt#t2s_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\Common\tt#tec_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\SET9DCD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\SET9DED.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\TOSHIBATEC.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\TOSHIBATEC.inf (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9C31.tmp
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 5 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9C70.tmp
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9C91.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9CB1.tmp
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 436 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9D6D.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\SET9D9D.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\Seagull_V3_ConfigDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\Seagull_V3_NetMonDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\Seagull_V3_PrintDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\tt#base_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 436 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\tt#t2s_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 5 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\x64\tt#tec_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISB87C.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\cor84A.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\corecomp.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dot86B.tmp
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dot86C.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dotnetinstaller.exe (copy)
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\dotnetinstaller.exe.config (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\DIF849.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\DIFxData.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\Fon839.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\FontData.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\Lic838.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\License.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\Str89D.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\StringTable_0x0409.ips (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\_is9C8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\_isres_0x0409.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\def9C7.tmp
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\default.pal (copy)
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\isr8CC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\isrt.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\set818.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\{06216D8D-027A-4116-B2E6-32328FA688BC}\setup.inx (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\0x0409.ini
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\0x0409.ini
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\ISSetup.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\data1.cab
InstallShield CAB
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\data1.hdr
InstallShield CAB
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\layout.bin
data
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\ISSetup.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\INF\oem4.inf
Windows setup INFormation
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\Defaults[TT]_2021.3.0.0.sds (copy)
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA5CE.tmp
MS Windows HtmlHelp Data
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA61D.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA63D.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA65D.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA70A.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA759.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA845.tmp
Unicode text, UTF-8 text, with very long lines (361), with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\SETA901.tmp
MS Windows HtmlHelp Data
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\t2sTT_2021.3.0.0.ini (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\t2sTTenu_2021.3.0.0.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tecTT_2021.3.0.0.ini (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tecTTenu_2021.3.0.0.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tt#base_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tt#t2s_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\Common\tt#tec_2021.3.0.0.ddz (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\SETAD6D.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\SETAD7E.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETA960.tmp
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 5 datablocks, 0x1 compression
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETA9FD.tmp
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAA4C.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAA6C.tmp
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 436 datablocks, 0x1 compression
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAB0A.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\SETAD2E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\Seagull_V3_ConfigDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\Seagull_V3_NetMonDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\Seagull_V3_PrintDispatcher.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\tt#base_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 6435532 bytes, 18 files, at 0x2c +A "Seagull_DriverCore.dll" +A "Seagull_ConfigBase.dll", number 1, 436 datablocks, 0x1 compression
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\tt#t2s_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 56090 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_T2S.dll" +A "Seagull_PrintModule_T2S.dll", number 1, 5 datablocks, 0x1 compression
dropped
C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\x64\tt#tec_2021.3.0.0.cab (copy)
Microsoft Cabinet archive data, many, 171484 bytes, 2 files, at 0x2c +A "Seagull_ConfigModule_TEC.dll" +A "Seagull_PrintModule_TEC.dll", number 1, 14 datablocks, 0x1 compression
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
modified
There are 174 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe
"C:\Users\user\Desktop\Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe"
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.exe
C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\setup.exe -package:"C:\Users\user\Desktop\Sterownik do drukarki TPCL-drv_2021.3_M-0_E (1).exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\" -tempdisk1folder:"C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\" -IS_OriginalLauncher:"C:\Users\user\AppData\Local\Temp\{9F7BA959-F754-4698-9ED9-66FC40E61686}\Disk1\setup.exe"
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{44B75239-B0AF-47DD-A0EA-BC7D4A0B17ED}
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5425AD48-0ECD-4EE0-85CD-E51323D6FCF4}
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F2901D81-EC67-4183-B0BC-B0228BC2084C}
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{539B659B-A16F-4977-A999-3AA0E583BB3E}
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0E945D39-A59F-4496-9E17-EAE507F80961}
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{9C3AB17D-33C7-4582-ABDE-BAB8CE8D602E}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BCF05350-BA9A-4EF4-A170-B5E82B942E03}
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\TEC_DRV\TECDRVIn.exe
C:\TEC_DRV\TECDRVIn.exe
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{17e7365f-2fcb-3241-b5ab-a872a4e2c26b}\TOSHIBATEC.inf" "9" "4b7447563" "0000000000000158" "WinSta0\Default" "0000000000000164" "208" "C:\TEC_DRV"
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{4b29340b-77a4-1642-8c1c-e9c6c398ae5b} Global\{95b0d15e-59ba-f945-a362-1292ebab1705} C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.inf C:\Windows\System32\DriverStore\Temp\{ad084959-69d4-2442-9d3d-6604520f436b}\TOSHIBATEC.cat
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://=0x%04x.iniMS
unknown
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://www.certplus.com/CRL/class3.crl0
unknown
http://www.e-me.lv/repository0
unknown
http://www.acabogacia.org/doc0
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://www.postsignum.cz/crl/psrootqca2.crl02
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://www.toshibatec.com_3_M0
unknown
http://repository.swisssign.com/0
unknown
http://www.suscerte.gob.ve/lcr0#
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://postsignum.ttc.cz/crl/psrootqca2.crl0
unknown
http://s.symcb.coW
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
unknown
http://www.certplus.com/CRL/class3P.crl0
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.certeurope.fr/reference/root2.crl0
unknown
http://www.certplus.com/CRL/class2.crl0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
http://www.defence.gov.au/pki0
unknown
http://www.sk.ee/cps/0
unknown
http://www.globaltrust.info0=
unknown
http://www.toshibatec.com;
unknown
http://www.anf.es
unknown
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
unknown
http://crl.postsignum.cz/crl/psrootqca4.crl02
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
http://policy.camerfirma.com0
unknown
http://www.ssc.lt/cps03
unknown
https://d./
unknown
http://ocsp.pki.gva.es0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://ca.mtin.es/mtin/ocsp0
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
unknown
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://www.dnie.es/dpc0
unknown
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
unknown
http://ca.mtin.es/mtin/DPCyPoliticas0
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
https://repository.tsp.zetes.com0
unknown
http://www.globaltrust.info0
unknown
http://certificates.starfieldtech.com/repository/1604
unknown
http://acedicom.edicomgroup.com/doc0
unknown
http://www.certplus.com/CRL/class3TS.crl0
unknown
https://crl.anf.es/AC/ANFServerCA.crl0
unknown
http://www.certeurope.fr/reference/pc-root2.pdf0
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
http://deviis4.installshield.com/NetNirvana/data2.cabDisk1
unknown
https://www.catcert.net/verarrel
unknown
http://www.disig.sk/ca0f
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
http://www.sk.ee/juur/crl/0
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://cacerts.digicert
unknown
http://certs.oati.net/repository/OATICA2.crl0
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
http://www.quovadis.bm0
unknown
http://crl.ssc.lt/root-a/cacrl.crl0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
http://www.toshibatec.com=%ld
unknown
http://www.pkioverheid.nl/policies/root-policy-G20
unknown
https://www.netlock.net/docs
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
http://www.e-trust.be/CPS/QNcerts
unknown
http://ocsp.ncdc.gov.sa0
unknown
https://d.sym
unknown
http://s.symcb.coWVTAsn1SpcMinimalCriteriaInfoEncode-204Dll
unknown
http://ts-crl.ws.syO
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
unknown
http://crl2.postsignum.cz/crl/psrootqca4.crl01
unknown
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
http://www.installshield.coW
unknown
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
unknown
https://repository.luxtrust.lu0
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://www.acabogacia.org0
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.uce.gub.uy/acrn/acrn.crl0
unknown
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
LogFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
ProductGuid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
RegOwner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{06216D8D-027A-4116-B2E6-32328FA688BC}
LogMode
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0ECA937423F01F974CA582BCFC417550BE20B95E
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Blob
There are 154 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B56000
heap
page read and write
27A786BB000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
713000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
7FF62F237000
unkown
page readonly
16E58E30000
trusted library allocation
page read and write
16E58E3C000
trusted library allocation
page read and write
6DE000
heap
page read and write
22398D30000
heap
page read and write
16E56F01000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
16E58E45000
trusted library allocation
page read and write
2A65000
heap
page read and write
669000
heap
page read and write
1A85275E000
heap
page read and write
16E56F03000
heap
page read and write
631000
heap
page read and write
2A18000
heap
page read and write
2BCB000
heap
page read and write
1AC6ED80000
heap
page read and write
22398E3D000
heap
page read and write
27A78840000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E56F01000
heap
page read and write
668000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
6F5000
heap
page read and write
1A85274F000
heap
page read and write
7FF62F220000
unkown
page readonly
540000
heap
page read and write
75A000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
F2A68FE000
stack
page read and write
27A7885C000
heap
page read and write
16E56EF3000
heap
page read and write
7FF62F220000
unkown
page readonly
556B000
heap
page read and write
548F000
heap
page read and write
2B40000
heap
page read and write
66B000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
635000
heap
page read and write
16E56EF1000
heap
page read and write
2795FFE000
stack
page read and write
27A7893E000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
6E8000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
64B000
heap
page read and write
16E56EB0000
heap
page read and write
2239AE5F000
heap
page read and write
55F5000
heap
page read and write
645000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
6FF000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
6EC000
heap
page read and write
2C8D000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
71E000
heap
page read and write
16E56EF1000
heap
page read and write
669000
heap
page read and write
6B1000
heap
page read and write
27A786C0000
heap
page read and write
27A786AD000
heap
page read and write
6EF000
heap
page read and write
27A786A9000
heap
page read and write
2190000
trusted library allocation
page read and write
27A786A9000
heap
page read and write
27A786A5000
heap
page read and write
16E56F03000
heap
page read and write
28CE000
stack
page read and write
55D7000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
22398E02000
heap
page read and write
16E57020000
trusted library allocation
page read and write
16E56EF1000
heap
page read and write
16E57020000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
2BA7000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
29CB000
heap
page read and write
27A786C8000
heap
page read and write
16E56EEF000
heap
page read and write
16E56F03000
heap
page read and write
16E57020000
trusted library allocation
page read and write
2239AE8D000
heap
page read and write
27A786E4000
heap
page read and write
64B000
heap
page read and write
6EF000
heap
page read and write
636000
heap
page read and write
27A78915000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
27A788CB000
heap
page read and write
29E2000
heap
page read and write
5424000
heap
page read and write
75C000
heap
page read and write
2239AED6000
heap
page read and write
2B8B37E000
stack
page read and write
27A7869B000
heap
page read and write
2AB4000
heap
page read and write
16E58E33000
trusted library allocation
page read and write
27A786CE000
heap
page read and write
2BD1000
heap
page read and write
422E000
stack
page read and write
2239AE2D000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
7FF62F246000
unkown
page read and write
1A852720000
heap
page read and write
16E56F01000
heap
page read and write
8C930FE000
stack
page read and write
29EE000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
656000
heap
page read and write
27A786C4000
heap
page read and write
27A78864000
heap
page read and write
639000
heap
page read and write
24344E46000
heap
page read and write
22398E3F000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
16E58E3B000
trusted library allocation
page read and write
5486000
heap
page read and write
640000
heap
page read and write
6D8000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
6F6000
heap
page read and write
1E701F30000
heap
page read and write
22398DE0000
heap
page read and write
7FF62F237000
unkown
page readonly
16E58E44000
trusted library allocation
page read and write
27A786B6000
heap
page read and write
6FF000
heap
page read and write
16E56F01000
heap
page read and write
62C000
heap
page read and write
27A786D2000
heap
page read and write
7FF62F24B000
unkown
page readonly
16E58E45000
trusted library allocation
page read and write
27A786E6000
heap
page read and write
1E702036000
heap
page read and write
16E58E35000
trusted library allocation
page read and write
16E56F01000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
6E6000
heap
page read and write
16E56F03000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
2BD3000
heap
page read and write
2B8B2FE000
stack
page read and write
27961FE000
stack
page read and write
27A786AD000
heap
page read and write
16E56EF5000
heap
page read and write
27A786BB000
heap
page read and write
2239AE3B000
heap
page read and write
7FF62F237000
unkown
page readonly
55F2000
heap
page read and write
6F2000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58B44000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
22398DE5000
heap
page read and write
6BF000
heap
page read and write
2B27000
heap
page read and write
62D000
heap
page read and write
5473000
heap
page read and write
2239AE21000
heap
page read and write
62D000
heap
page read and write
69B000
heap
page read and write
22398E1C000
heap
page read and write
27A786E4000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E58E47000
trusted library allocation
page read and write
55D7000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
2239AEC4000
heap
page read and write
16E56EEE000
heap
page read and write
27A78D41000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
2B63000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
27A786B5000
heap
page read and write
2239AE5E000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
27A786BC000
heap
page read and write
27A786DB000
heap
page read and write
27A786C0000
heap
page read and write
29F5000
heap
page read and write
2239AECC000
heap
page read and write
8C92EFF000
stack
page read and write
650000
heap
page read and write
2994000
heap
page read and write
2244000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
7FF62F221000
unkown
page execute read
27A786BC000
heap
page read and write
54D4000
heap
page read and write
640000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
2B38000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
27A786C4000
heap
page read and write
1F77B964000
heap
page read and write
2A26000
heap
page read and write
27A786A7000
heap
page read and write
27A786E4000
heap
page read and write
1E702110000
heap
page read and write
27A786C8000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58E43000
trusted library allocation
page read and write
27A786B3000
heap
page read and write
6E6000
heap
page read and write
27A786E4000
heap
page read and write
27A789F0000
heap
page read and write
63F000
heap
page read and write
27A78844000
heap
page read and write
27A78907000
heap
page read and write
1F77B94F000
heap
page read and write
27A786C4000
heap
page read and write
16E57020000
trusted library allocation
page read and write
642000
heap
page read and write
7FF62F220000
unkown
page readonly
27A786CE000
heap
page read and write
1F77B956000
heap
page read and write
62D000
heap
page read and write
27A78693000
heap
page read and write
27A78864000
heap
page read and write
2239AE66000
heap
page read and write
16E56EB9000
heap
page read and write
27A786A9000
heap
page read and write
27A7876D000
heap
page read and write
27A786A5000
heap
page read and write
7FF62F246000
unkown
page write copy
69B000
heap
page read and write
27A7869B000
heap
page read and write
27A786AD000
heap
page read and write
2C4F000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
5437000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
7FF62F24A000
unkown
page read and write
1E702022000
heap
page read and write
27A786CE000
heap
page read and write
75A000
heap
page read and write
27A786A9000
heap
page read and write
27A786C4000
heap
page read and write
7FF62F246000
unkown
page read and write
649000
heap
page read and write
2239ACF0000
heap
page read and write
6F4000
heap
page read and write
642000
heap
page read and write
27A78D57000
heap
page read and write
54C2000
heap
page read and write
4D7000
unkown
page write copy
16E58E3E000
trusted library allocation
page read and write
16E58E3A000
trusted library allocation
page read and write
16E58E41000
trusted library allocation
page read and write
16E56F01000
heap
page read and write
27A78910000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
2A65000
heap
page read and write
27A786C0000
heap
page read and write
27A786A5000
heap
page read and write
16E56F3E000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
5595000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
718000
heap
page read and write
55D4000
heap
page read and write
22398D50000
heap
page read and write
27A786A5000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
2C4D000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
62E000
heap
page read and write
55AB000
heap
page read and write
27A785E0000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
660000
heap
page read and write
1C60FC9D000
heap
page read and write
27A786D2000
heap
page read and write
27A786B0000
heap
page read and write
7FF62F246000
unkown
page write copy
27A7869F000
heap
page read and write
6E9000
heap
page read and write
7FF62F221000
unkown
page execute read
1C6117B4000
heap
page read and write
662000
heap
page read and write
65D000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
62C000
heap
page read and write
1A852741000
heap
page read and write
7FF62F237000
unkown
page readonly
16E58E44000
trusted library allocation
page read and write
27A78769000
heap
page read and write
669000
heap
page read and write
2239AE5D000
heap
page read and write
55F7000
heap
page read and write
27A786CE000
heap
page read and write
2A35000
heap
page read and write
45B0000
trusted library allocation
page read and write
69A000
heap
page read and write
2BC3000
heap
page read and write
56E000
stack
page read and write
1A85275E000
heap
page read and write
1C60FC8B000
heap
page read and write
559A000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
27A786C4000
heap
page read and write
1A85276B000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A78D50000
heap
page read and write
647000
heap
page read and write
64E000
heap
page read and write
29D0000
heap
page read and write
55A3000
heap
page read and write
55F9000
heap
page read and write
6FF000
heap
page read and write
1E702031000
heap
page read and write
27A786BB000
heap
page read and write
2A91000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
4AE000
unkown
page readonly
55F7000
heap
page read and write
27A78D95000
heap
page read and write
1F77B946000
heap
page read and write
55F5000
heap
page read and write
63B000
heap
page read and write
515BCFE000
stack
page read and write
1E703A64000
heap
page read and write
16E56F3E000
heap
page read and write
27A78D95000
heap
page read and write
27A786DB000
heap
page read and write
642000
heap
page read and write
6FF000
heap
page read and write
55DA000
heap
page read and write
29D0000
heap
page read and write
16E56EF5000
heap
page read and write
6EC000
heap
page read and write
27C0000
heap
page read and write
2B8B47E000
stack
page read and write
16E58E44000
trusted library allocation
page read and write
8F804F8000
stack
page read and write
6BA000
heap
page read and write
16E56F3E000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
2E00000
heap
page read and write
24344E36000
heap
page read and write
27A786D2000
heap
page read and write
29EC000
heap
page read and write
16E56F3E000
heap
page read and write
713000
heap
page read and write
16E56F2C000
heap
page read and write
2BE9000
heap
page read and write
2BBE000
heap
page read and write
666000
heap
page read and write
5EB000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
27A78D50000
heap
page read and write
6D5000
heap
page read and write
64E000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
2C55000
heap
page read and write
4B72A7E000
stack
page read and write
2239AEA4000
heap
page read and write
16E56F01000
heap
page read and write
2239A9A3000
heap
page read and write
27A786C0000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
24344E30000
heap
page read and write
27A786C4000
heap
page read and write
2239AED0000
heap
page read and write
62A000
heap
page read and write
6E8000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
99000
stack
page read and write
16E57110000
heap
page read and write
656000
heap
page read and write
16E56EE6000
heap
page read and write
54D4000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A78860000
heap
page read and write
632000
heap
page read and write
27A786D2000
heap
page read and write
27A786D2000
heap
page read and write
4DC2000
heap
page read and write
27A786E4000
heap
page read and write
16E56EF5000
heap
page read and write
68B000
heap
page read and write
27A786AB000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
2BBB000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
401000
unkown
page execute read
75A000
heap
page read and write
27A78767000
heap
page read and write
16E56EF5000
heap
page read and write
7FF62F246000
unkown
page write copy
665000
heap
page read and write
27A786BC000
heap
page read and write
27A786E4000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
27A786DB000
heap
page read and write
2239AEE1000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
F2A6A7F000
stack
page read and write
6FF000
heap
page read and write
67C000
heap
page read and write
64B000
heap
page read and write
27A786C4000
heap
page read and write
27A786C0000
heap
page read and write
55C6000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E3B000
trusted library allocation
page read and write
645000
heap
page read and write
16E56F03000
heap
page read and write
6A5000
heap
page read and write
658000
heap
page read and write
7FF62F246000
unkown
page write copy
6F8000
heap
page read and write
4D7000
unkown
page read and write
6CE000
heap
page read and write
6DF000
heap
page read and write
69B000
heap
page read and write
16E57024000
trusted library allocation
page read and write
24344DF4000
heap
page read and write
27A788DD000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
16E56F03000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
6AA000
heap
page read and write
61D000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
55D0000
heap
page read and write
2C06000
heap
page read and write
16E56EEF000
heap
page read and write
6EC000
heap
page read and write
749000
heap
page read and write
54BB000
heap
page read and write
16E57020000
trusted library allocation
page read and write
6E2000
heap
page read and write
27A786DB000
heap
page read and write
4EE0000
trusted library allocation
page read and write
16E58E3D000
trusted library allocation
page read and write
2A53000
heap
page read and write
55F5000
heap
page read and write
27A786B4000
heap
page read and write
29C3000
heap
page read and write
27A786CF000
heap
page read and write
CA5E1B8000
stack
page read and write
645000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A786CB000
heap
page read and write
27A786E4000
heap
page read and write
16E57020000
trusted library allocation
page read and write
6F4000
heap
page read and write
6FF000
heap
page read and write
16E57020000
trusted library allocation
page read and write
645000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
16E56EF1000
heap
page read and write
55F9000
heap
page read and write
28E0000
trusted library allocation
page read and write
16E58E46000
trusted library allocation
page read and write
27A7891F000
heap
page read and write
2C47000
heap
page read and write
6EC000
heap
page read and write
63E000
heap
page read and write
27A78693000
heap
page read and write
6E8000
heap
page read and write
6E8000
heap
page read and write
638000
heap
page read and write
5FF0000
heap
page read and write
27A786CF000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
16E56EF5000
heap
page read and write
27A786CB000
heap
page read and write
27A786BC000
heap
page read and write
7FF62F246000
unkown
page read and write
27A7891B000
heap
page read and write
718000
heap
page read and write
2239AE8B000
heap
page read and write
62C000
heap
page read and write
699000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
509000
unkown
page readonly
2239904C000
heap
page read and write
55F7000
heap
page read and write
1F77B941000
heap
page read and write
65C000
heap
page read and write
27A7885A000
heap
page read and write
22398EBC000
heap
page read and write
27A786C8000
heap
page read and write
27A786C0000
heap
page read and write
2BBB000
heap
page read and write
27A786A9000
heap
page read and write
662000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
4DC0000
heap
page read and write
64B000
heap
page read and write
CA5E5FE000
stack
page read and write
5444000
heap
page read and write
1C60FC66000
heap
page read and write
27A786E4000
heap
page read and write
16E56F01000
heap
page read and write
1A852690000
heap
page read and write
27A786E6000
heap
page read and write
54C2000
heap
page read and write
55FB000
heap
page read and write
540000
heap
page read and write
27A78910000
heap
page read and write
27A786CB000
heap
page read and write
2239AEBE000
heap
page read and write
2AB6000
heap
page read and write
1C6117B0000
heap
page read and write
16E58E4A000
trusted library allocation
page read and write
16E58E3B000
trusted library allocation
page read and write
400000
unkown
page readonly
5473000
heap
page read and write
2239AE33000
heap
page read and write
5598000
heap
page read and write
515B9FE000
stack
page read and write
16E56EF5000
heap
page read and write
45B5000
trusted library section
page read and write
2C4F000
heap
page read and write
6E8000
heap
page read and write
546E000
heap
page read and write
8F80AFE000
stack
page read and write
2239AEA6000
heap
page read and write
27A78907000
heap
page read and write
16E57020000
trusted library allocation
page read and write
2239AE46000
heap
page read and write
2BCB000
heap
page read and write
6F8000
heap
page read and write
2BA0000
heap
page read and write
646000
heap
page read and write
16E56F01000
heap
page read and write
29D3000
heap
page read and write
2C6A000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A78D53000
heap
page read and write
299B000
heap
page read and write
27A786A5000
heap
page read and write
16E56F01000
heap
page read and write
4DC000
unkown
page readonly
16E56EED000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
4D7000
unkown
page write copy
16E56F3E000
heap
page read and write
55F9000
heap
page read and write
29FD000
heap
page read and write
27A7885C000
heap
page read and write
1C60FC85000
heap
page read and write
27A7893E000
heap
page read and write
27A786C4000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A7869B000
heap
page read and write
22398EBE000
heap
page read and write
55F9000
heap
page read and write
2239AE4D000
heap
page read and write
656000
heap
page read and write
645000
heap
page read and write
2239AE5B000
heap
page read and write
27A788C2000
heap
page read and write
671000
heap
page read and write
27A78841000
heap
page read and write
63A000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
2240000
heap
page read and write
16E56EF3000
heap
page read and write
640000
heap
page read and write
647000
heap
page read and write
63B000
heap
page read and write
27A786C4000
heap
page read and write
6FF000
heap
page read and write
27A78D67000
heap
page read and write
27A7876E000
heap
page read and write
4EE0000
trusted library allocation
page read and write
645000
heap
page read and write
697000
heap
page read and write
56A000
heap
page read and write
24344DF0000
heap
page read and write
16E56F01000
heap
page read and write
55F9000
heap
page read and write
16E56F2B000
heap
page read and write
21CE000
stack
page read and write
1C60FC6C000
heap
page read and write
27A7885C000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
2A1B000
heap
page read and write
16E57020000
trusted library allocation
page read and write
721000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
59E000
stack
page read and write
2C7E000
heap
page read and write
16E56F03000
heap
page read and write
27A786DB000
heap
page read and write
27A78D55000
heap
page read and write
27A78D5C000
heap
page read and write
8C92AFB000
stack
page read and write
64C000
heap
page read and write
16E57020000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
29D0000
heap
page read and write
4AE000
unkown
page readonly
16E58E40000
trusted library allocation
page read and write
22399049000
heap
page read and write
646000
heap
page read and write
6E8000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
2239AE61000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
509000
unkown
page readonly
1A8526C0000
heap
page read and write
2B56000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
27A786C4000
heap
page read and write
16E56EEF000
heap
page read and write
16E56F3E000
heap
page read and write
27A786B7000
heap
page read and write
27A786C0000
heap
page read and write
63D000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A786C0000
heap
page read and write
7FF62F221000
unkown
page execute read
1A85276A000
heap
page read and write
54C2000
heap
page read and write
16E56F03000
heap
page read and write
702000
heap
page read and write
1C60FC60000
heap
page read and write
2B38000
heap
page read and write
16E56EE7000
heap
page read and write
27A786C0000
heap
page read and write
2239AEDA000
heap
page read and write
5445000
heap
page read and write
27A786B3000
heap
page read and write
55D0000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
18C000
stack
page read and write
16E58E3D000
trusted library allocation
page read and write
718000
heap
page read and write
656000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
16E58E3A000
trusted library allocation
page read and write
2BA1000
heap
page read and write
7FF62F24B000
unkown
page readonly
27A788C2000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E58B4F000
heap
page read and write
16E56F2B000
heap
page read and write
27A786E6000
heap
page read and write
16E56EEF000
heap
page read and write
16E58E31000
trusted library allocation
page read and write
27A786BB000
heap
page read and write
16E56F01000
heap
page read and write
27A78921000
heap
page read and write
2BFE000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
515B8FC000
stack
page read and write
FFED1FE000
stack
page read and write
691000
heap
page read and write
55DA000
heap
page read and write
692000
heap
page read and write
436E000
stack
page read and write
16E56F01000
heap
page read and write
667000
heap
page read and write
6F4000
heap
page read and write
630000
heap
page read and write
27A786B5000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
2239AE8B000
heap
page read and write
6F8000
heap
page read and write
22398DFC000
heap
page read and write
27A78758000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
16E57020000
trusted library allocation
page read and write
6DD000
heap
page read and write
27A786A5000
heap
page read and write
27A786AD000
heap
page read and write
2B38000
heap
page read and write
55E2000
heap
page read and write
41F0000
trusted library allocation
page read and write
2BC3000
heap
page read and write
55DA000
heap
page read and write
6EF000
heap
page read and write
7FF62F221000
unkown
page execute read
16E56F01000
heap
page read and write
27A786D2000
heap
page read and write
2239AE29000
heap
page read and write
27A786A5000
heap
page read and write
27A786CF000
heap
page read and write
669000
heap
page read and write
1E703BD0000
heap
page read and write
27A786C0000
heap
page read and write
2300000
heap
page read and write
61B000
heap
page read and write
22398E14000
heap
page read and write
16E56F3E000
heap
page read and write
45B0000
trusted library allocation
page read and write
27A786CE000
heap
page read and write
1E702044000
heap
page read and write
67A000
heap
page read and write
55A3000
heap
page read and write
16E58E47000
trusted library allocation
page read and write
27A78D67000
heap
page read and write
400000
unkown
page readonly
16E56EF5000
heap
page read and write
5D0000
direct allocation
page execute and read and write
16E56F2B000
heap
page read and write
27A7874D000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
530000
heap
page read and write
4B72C7F000
stack
page read and write
16E57144000
heap
page read and write
2239AE3A000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A786C4000
heap
page read and write
27A786E4000
heap
page read and write
22398E3F000
heap
page read and write
2A2E000
heap
page read and write
55F5000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
27A786DB000
heap
page read and write
16E57024000
trusted library allocation
page read and write
6BA000
heap
page read and write
73D000
heap
page read and write
7FF62F221000
unkown
page execute read
2B56000
heap
page read and write
520000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
210F000
stack
page read and write
2BCB000
heap
page read and write
27A786CE000
heap
page read and write
2A95000
heap
page read and write
45B0000
trusted library allocation
page read and write
6D3000
heap
page read and write
429000
unkown
page write copy
22398E0E000
heap
page read and write
2993000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
27A786CB000
heap
page read and write
702000
heap
page read and write
68D000
heap
page read and write
55A3000
heap
page read and write
6D8000
heap
page read and write
61B000
heap
page read and write
2C4A000
heap
page read and write
27A786AB000
heap
page read and write
16E56F2B000
heap
page read and write
860000
heap
page read and write
27A786E4000
heap
page read and write
75C000
heap
page read and write
630000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
16E58E3E000
trusted library allocation
page read and write
2239AE43000
heap
page read and write
27A78686000
heap
page read and write
54B8000
heap
page read and write
27A786C0000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
7FF62F220000
unkown
page readonly
27A78D41000
heap
page read and write
5428000
heap
page read and write
645000
heap
page read and write
8F0000
heap
page read and write
55C6000
heap
page read and write
27A788CC000
heap
page read and write
75C000
heap
page read and write
61A000
heap
page read and write
27A786D2000
heap
page read and write
739000
heap
page read and write
6DF000
heap
page read and write
65C000
heap
page read and write
29EC000
heap
page read and write
22398E34000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E56EF5000
heap
page read and write
656000
heap
page read and write
6F3000
heap
page read and write
680000
heap
page read and write
16E56F2B000
heap
page read and write
16E56EE5000
heap
page read and write
713000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
1F77B956000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
8F809FE000
stack
page read and write
16E57140000
heap
page read and write
2239AE94000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
27A786AD000
heap
page read and write
16E56EF1000
heap
page read and write
6E6000
heap
page read and write
22398E13000
heap
page read and write
648000
heap
page read and write
2B27000
heap
page read and write
27A78D4D000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
7FF62F246000
unkown
page read and write
27A786D2000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
55F7000
heap
page read and write
27A786C4000
heap
page read and write
22398DFD000
heap
page read and write
16E56EF5000
heap
page read and write
27A786E4000
heap
page read and write
2239AEDE000
heap
page read and write
1F77B94D000
heap
page read and write
27A786B8000
heap
page read and write
636000
heap
page read and write
63A000
heap
page read and write
2BCB000
heap
page read and write
27A786E4000
heap
page read and write
6AB000
heap
page read and write
22398E3D000
heap
page read and write
2B0B000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
55AC000
heap
page read and write
6FF000
heap
page read and write
5476000
heap
page read and write
65A000
heap
page read and write
2C8D000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
27A786CE000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
16E58E3E000
trusted library allocation
page read and write
666000
heap
page read and write
16E56F03000
heap
page read and write
666000
heap
page read and write
16E56F03000
heap
page read and write
2239AE5D000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
75C000
heap
page read and write
7FF62F24A000
unkown
page read and write
27A78D41000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
27A786D2000
heap
page read and write
2239AEDE000
heap
page read and write
2BE4000
heap
page read and write
29FF000
heap
page read and write
29BC000
heap
page read and write
739000
heap
page read and write
27A786E6000
heap
page read and write
672000
heap
page read and write
55FB000
heap
page read and write
27A78692000
heap
page read and write
2990000
trusted library allocation
page read and write
27A786C4000
heap
page read and write
16E56EF1000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
16E56F01000
heap
page read and write
643000
heap
page read and write
27A788F6000
heap
page read and write
16E56F01000
heap
page read and write
2C8D000
heap
page read and write
6A0000
heap
page read and write
2239AE2E000
heap
page read and write
6F0000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
690000
heap
page read and write
2239AE3B000
heap
page read and write
27A78859000
heap
page read and write
55EB000
heap
page read and write
2239AE9A000
heap
page read and write
27A7891F000
heap
page read and write
650000
heap
page read and write
5427000
heap
page read and write
7FF62F220000
unkown
page readonly
27A7885C000
heap
page read and write
2990000
heap
page read and write
27A78D5C000
heap
page read and write
2B4D000
heap
page read and write
638000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
27A786B7000
heap
page read and write
1F77B946000
heap
page read and write
669000
heap
page read and write
27A78670000
heap
page read and write
67D000
heap
page read and write
27A7874D000
heap
page read and write
718000
heap
page read and write
27A786BB000
heap
page read and write
27A786C4000
heap
page read and write
630000
heap
page read and write
55A8000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
702000
heap
page read and write
27A786A9000
heap
page read and write
2A7D000
heap
page read and write
55F5000
heap
page read and write
27A7876D000
heap
page read and write
6F8000
heap
page read and write
4B727CB000
stack
page read and write
16E58E36000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
65A000
heap
page read and write
27A786A5000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
2239AE81000
heap
page read and write
1E702044000
heap
page read and write
27A786D2000
heap
page read and write
6EF000
heap
page read and write
6E4000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
27A78D55000
heap
page read and write
FFECEFF000
stack
page read and write
16E56F01000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
27A786C0000
heap
page read and write
27A7885C000
heap
page read and write
2BB4000
heap
page read and write
2A29000
heap
page read and write
2239AE85000
heap
page read and write
2239AE94000
heap
page read and write
27A786AD000
heap
page read and write
2BD3000
heap
page read and write
27A786C4000
heap
page read and write
5473000
heap
page read and write
2B0B000
heap
page read and write
6F7000
heap
page read and write
27A78907000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
632000
heap
page read and write
27A786C0000
heap
page read and write
24344E09000
heap
page read and write
27A786C0000
heap
page read and write
7FF62F24B000
unkown
page readonly
429000
unkown
page read and write
27A786C8000
heap
page read and write
7FF62F24B000
unkown
page readonly
7FF62F237000
unkown
page readonly
27A786BB000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
5598000
heap
page read and write
16E56EF3000
heap
page read and write
2190000
trusted library allocation
page read and write
16E56F03000
heap
page read and write
62E000
heap
page read and write
721000
heap
page read and write
27A78686000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
16E58E42000
trusted library allocation
page read and write
695000
heap
page read and write
638000
heap
page read and write
1AC6D150000
heap
page read and write
6B8000
heap
page read and write
16E56EEF000
heap
page read and write
21BF000
stack
page read and write
7FF62F24B000
unkown
page readonly
55FB000
heap
page read and write
28F0000
trusted library allocation
page read and write
1AC6D17E000
heap
page read and write
16E56F2B000
heap
page read and write
16E56F3E000
heap
page read and write
6AF000
stack
page read and write
64A000
heap
page read and write
6F4000
heap
page read and write
16E56F01000
heap
page read and write
1A8541E0000
heap
page read and write
27A786C0000
heap
page read and write
27A7868A000
heap
page read and write
1E70203F000
heap
page read and write
659000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
22398E3F000
heap
page read and write
2A3A000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
2210000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
1C60FC9C000
heap
page read and write
27A78D4D000
heap
page read and write
1C60FBF0000
heap
page read and write
641000
heap
page read and write
1E703A60000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
16E56F01000
heap
page read and write
2C8D000
heap
page read and write
16E56F01000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
1F77B850000
heap
page read and write
661000
heap
page read and write
22398E3D000
heap
page read and write
27A7893E000
heap
page read and write
27A7893E000
heap
page read and write
544C000
heap
page read and write
2BBC000
heap
page read and write
63B000
heap
page read and write
16E57020000
trusted library allocation
page read and write
16E58E3B000
trusted library allocation
page read and write
61D000
heap
page read and write
6DE000
heap
page read and write
27A78685000
heap
page read and write
27A786C0000
heap
page read and write
21CE000
stack
page read and write
27A788D9000
heap
page read and write
1C60FC86000
heap
page read and write
2239AEB7000
heap
page read and write
27A786C0000
heap
page read and write
22398E14000
heap
page read and write
27A786BC000
heap
page read and write
5527000
heap
page read and write
27A786DB000
heap
page read and write
27A786A9000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
2BA1000
heap
page read and write
666000
heap
page read and write
16E58E48000
trusted library allocation
page read and write
540B000
heap
page read and write
27A7869F000
heap
page read and write
27A786B0000
heap
page read and write
509000
unkown
page readonly
6F5000
heap
page read and write
16E56F03000
heap
page read and write
16E56F2B000
heap
page read and write
27A786C4000
heap
page read and write
16E56F01000
heap
page read and write
27A786BC000
heap
page read and write
659000
heap
page read and write
658000
heap
page read and write
29DE000
heap
page read and write
519000
unkown
page readonly
5B6000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E57024000
trusted library allocation
page read and write
2AAB000
heap
page read and write
29D4000
heap
page read and write
16E57024000
trusted library allocation
page read and write
663000
heap
page read and write
669000
heap
page read and write
27A786A5000
heap
page read and write
27A78758000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E56EEF000
heap
page read and write
27A786CE000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
69C000
heap
page read and write
702000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A78693000
heap
page read and write
27A78846000
heap
page read and write
24344D40000
heap
page read and write
739000
heap
page read and write
1AC6EBB0000
heap
page read and write
22398E3D000
heap
page read and write
6F5000
heap
page read and write
5562000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
2BBE000
heap
page read and write
27A786E6000
heap
page read and write
27A786E4000
heap
page read and write
27A786C0000
heap
page read and write
2239AE61000
heap
page read and write
27A7869B000
heap
page read and write
16E56EF5000
heap
page read and write
27A786C4000
heap
page read and write
5549000
heap
page read and write
55F7000
heap
page read and write
65A000
heap
page read and write
27A786CB000
heap
page read and write
27A786BC000
heap
page read and write
27A78D67000
heap
page read and write
16E56F3E000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
27A786BB000
heap
page read and write
2239AE46000
heap
page read and write
29E2000
heap
page read and write
570000
heap
page read and write
27A786E4000
heap
page read and write
16E57020000
trusted library allocation
page read and write
40F0000
heap
page read and write
16E56EF5000
heap
page read and write
549F000
heap
page read and write
648000
heap
page read and write
718000
heap
page read and write
6AF000
heap
page read and write
685000
heap
page read and write
400000
unkown
page readonly
27A786DB000
heap
page read and write
910000
heap
page read and write
1C60FC8B000
heap
page read and write
550E000
heap
page read and write
5FE0000
heap
page read and write
63D000
heap
page read and write
27A7876E000
heap
page read and write
16E56EE7000
heap
page read and write
55F5000
heap
page read and write
2B39000
heap
page read and write
27A786B3000
heap
page read and write
7FF62F24B000
unkown
page readonly
656000
heap
page read and write
4DC000
unkown
page readonly
749000
heap
page read and write
16E56EF5000
heap
page read and write
2C50000
heap
page read and write
16E56F2B000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
7FF62F24B000
unkown
page readonly
662000
heap
page read and write
27A786A8000
heap
page read and write
2239AEC7000
heap
page read and write
195000
stack
page read and write
16E57024000
trusted library allocation
page read and write
631000
heap
page read and write
656000
heap
page read and write
2A8D000
heap
page read and write
2239AEB0000
heap
page read and write
2C4F000
heap
page read and write
658000
heap
page read and write
556B000
heap
page read and write
7FF62F220000
unkown
page readonly
5E0000
heap
page read and write
7FF62F24B000
unkown
page readonly
16E58E3D000
trusted library allocation
page read and write
16E56EF3000
heap
page read and write
701000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
698000
heap
page read and write
16E56F01000
heap
page read and write
27A78D57000
heap
page read and write
61C000
heap
page read and write
519000
unkown
page readonly
648000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
6E2000
heap
page read and write
63F000
heap
page read and write
541B000
heap
page read and write
2199000
heap
page read and write
6B0000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
7FF62F221000
unkown
page execute read
515BDFE000
stack
page read and write
515BEFE000
stack
page read and write
62C000
heap
page read and write
7FF62F220000
unkown
page readonly
16E56EF5000
heap
page read and write
432F000
stack
page read and write
2239AE43000
heap
page read and write
6BE000
heap
page read and write
27A78600000
heap
page read and write
27A788E1000
heap
page read and write
713000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E45000
trusted library allocation
page read and write
2BC3000
heap
page read and write
27A786C0000
heap
page read and write
6CD000
heap
page read and write
630000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
53E0000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
16E58E3D000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
2BBB000
heap
page read and write
1F77B740000
heap
page read and write
27A788D6000
heap
page read and write
27A786CB000
heap
page read and write
6E8000
heap
page read and write
27A786C0000
heap
page read and write
6F5000
heap
page read and write
71E000
heap
page read and write
22398E3D000
heap
page read and write
16E56F2B000
heap
page read and write
73D000
heap
page read and write
16E56EF5000
heap
page read and write
2239AEDF000
heap
page read and write
16E58C70000
heap
page read and write
27A786C4000
heap
page read and write
2BA7000
heap
page read and write
2239AE6D000
heap
page read and write
27A786C4000
heap
page read and write
16E56F03000
heap
page read and write
27A786C8000
heap
page read and write
27A786CB000
heap
page read and write
647000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58E32000
trusted library allocation
page read and write
682000
heap
page read and write
553F000
heap
page read and write
16E57024000
trusted library allocation
page read and write
67B000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
2239AED3000
heap
page read and write
65C000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
638000
heap
page read and write
6E8000
heap
page read and write
16E56EF3000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
6E3000
heap
page read and write
5437000
heap
page read and write
27A786B6000
heap
page read and write
656000
heap
page read and write
61D000
heap
page read and write
2239AE42000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
636000
heap
page read and write
CA5E9FE000
stack
page read and write
2A2C000
heap
page read and write
16E58CE0000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
9B000
stack
page read and write
16E58E3F000
trusted library allocation
page read and write
2239AE30000
heap
page read and write
16E56ED2000
heap
page read and write
16E56F01000
heap
page read and write
6F4000
heap
page read and write
27A786C4000
heap
page read and write
656000
heap
page read and write
400000
unkown
page readonly
16E58E43000
trusted library allocation
page read and write
636000
heap
page read and write
401000
unkown
page execute read
2BF6000
heap
page read and write
27A7869C000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
16E58E4B000
trusted library allocation
page read and write
27A786CB000
heap
page read and write
2B38000
heap
page read and write
656000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A786A6000
heap
page read and write
27A78750000
heap
page read and write
2BFC000
heap
page read and write
16E57020000
trusted library allocation
page read and write
669000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
4101000
heap
page read and write
2BE4000
heap
page read and write
1F77B963000
heap
page read and write
2239AE61000
heap
page read and write
2BBE000
heap
page read and write
6D0000
heap
page read and write
1A852729000
heap
page read and write
27A7869B000
heap
page read and write
6F5000
heap
page read and write
667000
heap
page read and write
22398E00000
heap
page read and write
24344E21000
heap
page read and write
656000
heap
page read and write
16E56F3E000
heap
page read and write
8C92FFE000
stack
page read and write
656000
heap
page read and write
2239AEC0000
heap
page read and write
27A7893E000
heap
page read and write
16E58E4C000
trusted library allocation
page read and write
713000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
64B000
heap
page read and write
22398E07000
heap
page read and write
1AC6D180000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
1AC6EBB4000
heap
page read and write
27A786D2000
heap
page read and write
71E000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E58E3A000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
669000
heap
page read and write
27A786BC000
heap
page read and write
16E56F01000
heap
page read and write
27A78D54000
heap
page read and write
65D000
heap
page read and write
55FB000
heap
page read and write
1A8541E4000
heap
page read and write
16E56F2B000
heap
page read and write
16E57000000
heap
page read and write
55F7000
heap
page read and write
24344E26000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
400000
unkown
page readonly
55F2000
heap
page read and write
54F5000
heap
page read and write
1C60FC97000
heap
page read and write
2C47000
heap
page read and write
16E57020000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
22398E34000
heap
page read and write
61D000
heap
page read and write
7FF62F221000
unkown
page execute read
62F000
heap
page read and write
662000
heap
page read and write
640000
heap
page read and write
27A78869000
heap
page read and write
556B000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
65E000
heap
page read and write
6F5000
heap
page read and write
666000
heap
page read and write
5607000
heap
page read and write
2C47000
heap
page read and write
27A786C8000
heap
page read and write
2239AEBE000
heap
page read and write
6EF000
heap
page read and write
27A786B0000
heap
page read and write
6B1000
heap
page read and write
66E000
heap
page read and write
16E58E34000
trusted library allocation
page read and write
16E57020000
trusted library allocation
page read and write
29D2000
heap
page read and write
27A78907000
heap
page read and write
2A2D000
heap
page read and write
27A78D48000
heap
page read and write
63F000
heap
page read and write
16E56EF5000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
2239AEBE000
heap
page read and write
16E56F2D000
heap
page read and write
55F5000
heap
page read and write
69E000
heap
page read and write
27A786CF000
heap
page read and write
630000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
24344E36000
heap
page read and write
27A78758000
heap
page read and write
27A78D94000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
7FF62F220000
unkown
page readonly
630000
heap
page read and write
2760000
direct allocation
page execute and read and write
16E56F03000
heap
page read and write
27A786B3000
heap
page read and write
16E56F03000
heap
page read and write
2C85000
heap
page read and write
27A786C8000
heap
page read and write
29BF000
heap
page read and write
24344D10000
heap
page read and write
662000
heap
page read and write
16E56F03000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
55F5000
heap
page read and write
27A7891A000
heap
page read and write
6F8000
heap
page read and write
2B8B3FE000
stack
page read and write
64A000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
16E588F0000
heap
page read and write
641000
heap
page read and write
16E57020000
trusted library allocation
page read and write
656000
heap
page read and write
6EE000
heap
page read and write
27959DB000
stack
page read and write
27A786A9000
heap
page read and write
2AD5000
heap
page read and write
16E56F03000
heap
page read and write
27960FE000
stack
page read and write
64B000
heap
page read and write
2A26000
heap
page read and write
27A7869C000
heap
page read and write
7FF62F246000
unkown
page read and write
16E56F03000
heap
page read and write
29C7000
heap
page read and write
16E56EEC000
heap
page read and write
16E57020000
trusted library allocation
page read and write
16E58E42000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
16E58E3F000
trusted library allocation
page read and write
2BC3000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
F2A697F000
stack
page read and write
7FF62F237000
unkown
page readonly
1F77B956000
heap
page read and write
6B1000
heap
page read and write
16E56F3E000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
16E58E3A000
trusted library allocation
page read and write
16E57024000
trusted library allocation
page read and write
22398E3D000
heap
page read and write
5598000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
FFED0FE000
stack
page read and write
16E58E3E000
trusted library allocation
page read and write
2BD0000
heap
page read and write
27A78D94000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
16E56F03000
heap
page read and write
5595000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
2BB5000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
2C54000
heap
page read and write
2239AEE1000
heap
page read and write
16E56F4F000
heap
page read and write
648000
heap
page read and write
1A852750000
heap
page read and write
16E56E70000
heap
page read and write
1AC6D171000
heap
page read and write
718000
heap
page read and write
2239AE8C000
heap
page read and write
6F5000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A786CE000
heap
page read and write
64C000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
16E56ED7000
heap
page read and write
16E56EE8000
heap
page read and write
27A7891B000
heap
page read and write
27A7868A000
heap
page read and write
63C000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
645000
heap
page read and write
656000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
16E58E3C000
trusted library allocation
page read and write
638000
heap
page read and write
6F9000
heap
page read and write
27A786E4000
heap
page read and write
609000
heap
page read and write
656000
heap
page read and write
63E000
heap
page read and write
243467D0000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
27A786C0000
heap
page read and write
27A788C2000
heap
page read and write
16E56F2B000
heap
page read and write
2239AEE1000
heap
page read and write
27A788DB000
heap
page read and write
1F77B920000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
CA5E8FE000
stack
page read and write
656000
heap
page read and write
27A786E4000
heap
page read and write
55F9000
heap
page read and write
5550000
heap
page read and write
16E57020000
trusted library allocation
page read and write
515BAFE000
stack
page read and write
656000
heap
page read and write
1F77B820000
heap
page read and write
718000
heap
page read and write
7FF62F220000
unkown
page readonly
63D000
heap
page read and write
27A786CE000
heap
page read and write
27A7893E000
heap
page read and write
27A7869E000
heap
page read and write
27A7890F000
heap
page read and write
2C8E000
heap
page read and write
27A788C2000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
6EF000
heap
page read and write
27A78D4D000
heap
page read and write
16E56F2B000
heap
page read and write
16E56F2B000
heap
page read and write
55F9000
heap
page read and write
2A8E000
heap
page read and write
6FF000
heap
page read and write
641000
heap
page read and write
27A786CE000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
2230000
heap
page read and write
27A786CE000
heap
page read and write
638000
heap
page read and write
299E000
heap
page read and write
16E56F3E000
heap
page read and write
2239AE61000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
27A7876D000
heap
page read and write
27A78D54000
heap
page read and write
5424000
heap
page read and write
66B000
heap
page read and write
27A786CB000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
27A79080000
heap
page read and write
6D5000
heap
page read and write
641000
heap
page read and write
44AE000
stack
page read and write
27A78681000
heap
page read and write
27A786B2000
heap
page read and write
67B000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
2B75000
heap
page read and write
55E2000
heap
page read and write
16E56F01000
heap
page read and write
6DE000
heap
page read and write
24344C30000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E58E3D000
trusted library allocation
page read and write
16E56EF5000
heap
page read and write
27A786C0000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
27A786A9000
heap
page read and write
637000
heap
page read and write
2239AED3000
heap
page read and write
702000
heap
page read and write
27A7876D000
heap
page read and write
22399045000
heap
page read and write
638000
heap
page read and write
27A78D55000
heap
page read and write
197000
stack
page read and write
27A786B3000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
55DA000
heap
page read and write
27A786D2000
heap
page read and write
1AC6EAC0000
heap
page read and write
68D000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
2BBB000
heap
page read and write
400000
unkown
page readonly
660000
heap
page read and write
2A8E000
heap
page read and write
27A786B6000
heap
page read and write
703000
heap
page read and write
6FA000
heap
page read and write
2239AE3F000
heap
page read and write
27A7891F000
heap
page read and write
6EA000
heap
page read and write
27A786BC000
heap
page read and write
27A786CE000
heap
page read and write
27A786CE000
heap
page read and write
2C68000
heap
page read and write
F2A69FE000
stack
page read and write
27A786AD000
heap
page read and write
27A786CB000
heap
page read and write
2C4A000
heap
page read and write
27A7885A000
heap
page read and write
27A786D2000
heap
page read and write
27A786C8000
heap
page read and write
63E000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
6E2000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
2BCF000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
6F5000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
1C60FC66000
heap
page read and write
16E57020000
trusted library allocation
page read and write
645000
heap
page read and write
27A786CF000
heap
page read and write
6EA000
heap
page read and write
29E4000
heap
page read and write
2196000
heap
page read and write
2BA7000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
656000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
1F77B940000
heap
page read and write
9B000
stack
page read and write
666000
heap
page read and write
29E6000
heap
page read and write
7FF62F237000
unkown
page readonly
27A786CB000
heap
page read and write
27A786E4000
heap
page read and write
2239ADF0000
heap
page read and write
27A7876D000
heap
page read and write
F2A6876000
stack
page read and write
2239AE8A000
heap
page read and write
27A786E4000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
27A786AA000
heap
page read and write
641000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
16E56F2B000
heap
page read and write
27A7874F000
heap
page read and write
27A788DE000
heap
page read and write
63B000
heap
page read and write
820000
heap
page read and write
27A78694000
heap
page read and write
1E702054000
heap
page read and write
702000
heap
page read and write
16E56EED000
heap
page read and write
1E70203D000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
647000
heap
page read and write
27A786A0000
heap
page read and write
2A5C000
heap
page read and write
22398E4F000
heap
page read and write
2C68000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
2BBB000
heap
page read and write
16E56EF5000
heap
page read and write
16E57024000
trusted library allocation
page read and write
64C000
heap
page read and write
658000
heap
page read and write
22398DFB000
heap
page read and write
27A786AC000
heap
page read and write
1E702044000
heap
page read and write
27A7876E000
heap
page read and write
27A78D54000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
55D2000
heap
page read and write
5424000
heap
page read and write
22398DC7000
heap
page read and write
559A000
heap
page read and write
27A786C4000
heap
page read and write
2B63000
heap
page read and write
299A000
heap
page read and write
2B8B278000
stack
page read and write
16E56EF5000
heap
page read and write
27A78687000
heap
page read and write
27A78D94000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
6E9000
heap
page read and write
1F77B929000
heap
page read and write
2A3D000
heap
page read and write
27A786D2000
heap
page read and write
6E4000
heap
page read and write
2A2D000
heap
page read and write
2B40000
heap
page read and write
1AC6D110000
heap
page read and write
55F7000
heap
page read and write
666000
heap
page read and write
2239AE44000
heap
page read and write
519000
unkown
page readonly
75A000
heap
page read and write
29F0000
heap
page read and write
4DC0000
trusted library allocation
page read and write
2A8A000
heap
page read and write
29D1000
heap
page read and write
55F9000
heap
page read and write
16E57024000
trusted library allocation
page read and write
2B74000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A7869F000
heap
page read and write
2BBE000
heap
page read and write
55AB000
heap
page read and write
692000
heap
page read and write
547D000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
27A786C0000
heap
page read and write
6CE000
heap
page read and write
27A786C8000
heap
page read and write
1E702010000
heap
page read and write
16E56EEF000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A786B6000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
6E8000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
55A5000
heap
page read and write
1E702055000
heap
page read and write
16E56F3C000
heap
page read and write
690000
heap
page read and write
2AA8000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
27A786A5000
heap
page read and write
680000
heap
page read and write
27A78869000
heap
page read and write
27A786CB000
heap
page read and write
519000
unkown
page readonly
6DE000
heap
page read and write
16E56F2B000
heap
page read and write
656000
heap
page read and write
16E56E90000
heap
page read and write
6E8000
heap
page read and write
2999000
heap
page read and write
B60000
heap
page read and write
22CF000
stack
page read and write
16E57024000
trusted library allocation
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E4D000
trusted library allocation
page read and write
16E56F03000
heap
page read and write
27A786C0000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
29CC000
heap
page read and write
2BD5000
heap
page read and write
27A786C4000
heap
page read and write
401000
unkown
page execute read
16E56EED000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
6FF000
heap
page read and write
22398DC0000
heap
page read and write
7FF62F24B000
unkown
page readonly
22398E13000
heap
page read and write
7FF62F246000
unkown
page write copy
24344E00000
heap
page read and write
27A786CE000
heap
page read and write
70A000
heap
page read and write
2239AE5E000
heap
page read and write
1F77D320000
heap
page read and write
16E56D90000
heap
page read and write
1C60FC20000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
27A786D2000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
29D5000
heap
page read and write
1E702019000
heap
page read and write
6AA000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
2AA1000
heap
page read and write
CA5E4FE000
stack
page read and write
16E58E45000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
2239AE95000
heap
page read and write
65F000
heap
page read and write
27A78907000
heap
page read and write
5595000
heap
page read and write
29EE000
heap
page read and write
27A786BB000
heap
page read and write
2B56000
heap
page read and write
27A786C8000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
702000
heap
page read and write
27A78D59000
heap
page read and write
643000
heap
page read and write
2B8B4FF000
stack
page read and write
16E58E3F000
trusted library allocation
page read and write
4DC000
unkown
page readonly
54C2000
heap
page read and write
16E56F03000
heap
page read and write
27A786B3000
heap
page read and write
16E57024000
trusted library allocation
page read and write
1A852732000
heap
page read and write
FFECDFF000
stack
page read and write
27A786C4000
heap
page read and write
559A000
heap
page read and write
2C3D000
heap
page read and write
64C000
heap
page read and write
638000
heap
page read and write
546E000
heap
page read and write
713000
heap
page read and write
27A7891A000
heap
page read and write
65B000
heap
page read and write
27A7868F000
heap
page read and write
2190000
trusted library allocation
page read and write
4B72CFF000
stack
page read and write
556B000
heap
page read and write
4DC0000
trusted library allocation
page read and write
27A7876D000
heap
page read and write
16E56F03000
heap
page read and write
27A786E4000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
65A000
heap
page read and write
6E2000
heap
page read and write
632000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
666000
heap
page read and write
61D000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
27A786C4000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A786B2000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
1A852746000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
656000
heap
page read and write
6E2000
heap
page read and write
2C68000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
713000
heap
page read and write
2190000
trusted library allocation
page read and write
16E58E3C000
trusted library allocation
page read and write
656000
heap
page read and write
2239AE3A000
heap
page read and write
16E56EF3000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
915000
heap
page read and write
16E56F03000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
6F5000
heap
page read and write
27A78907000
heap
page read and write
27A78D95000
heap
page read and write
29F5000
heap
page read and write
16E56F3E000
heap
page read and write
16E56ECB000
heap
page read and write
27A786C0000
heap
page read and write
2C68000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
65C000
heap
page read and write
2B63000
heap
page read and write
1C611710000
heap
page read and write
721000
heap
page read and write
2590000
direct allocation
page execute and read and write
69B000
heap
page read and write
27A78860000
heap
page read and write
7FF62F24A000
unkown
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58E3D000
trusted library allocation
page read and write
FFED2FE000
stack
page read and write
16E56F01000
heap
page read and write
2AA8000
heap
page read and write
2B27000
heap
page read and write
27A788D9000
heap
page read and write
27A786BB000
heap
page read and write
1AC6D159000
heap
page read and write
665000
heap
page read and write
2AB5000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
27A786A5000
heap
page read and write
27A786BC000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
70A000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
2239AEBE000
heap
page read and write
27A786C8000
heap
page read and write
16E56F01000
heap
page read and write
27A7876A000
heap
page read and write
27A786B3000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
16E58E3E000
trusted library allocation
page read and write
27A786D2000
heap
page read and write
22398E3F000
heap
page read and write
16E57020000
trusted library allocation
page read and write
2239AE42000
heap
page read and write
1A852740000
heap
page read and write
7FF62F237000
unkown
page readonly
6D9000
heap
page read and write
2C3D000
heap
page read and write
63A000
heap
page read and write
4D00000
trusted library allocation
page read and write
27A78936000
heap
page read and write
1A854100000
heap
page read and write
702000
heap
page read and write
27A786A5000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
4AE000
unkown
page readonly
7EE000
stack
page read and write
22398E02000
heap
page read and write
16E56F01000
heap
page read and write
16E56EF3000
heap
page read and write
649000
heap
page read and write
27A786B1000
heap
page read and write
45AF000
stack
page read and write
2B20000
heap
page read and write
16E56EEF000
heap
page read and write
16E56EEE000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
658000
heap
page read and write
27A7867B000
heap
page read and write
27A786D2000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
27A78909000
heap
page read and write
8EE000
stack
page read and write
27A78D50000
heap
page read and write
19D000
stack
page read and write
16E56EEF000
heap
page read and write
6AE000
heap
page read and write
7FF62F221000
unkown
page execute read
27A78758000
heap
page read and write
656000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
16E58E45000
trusted library allocation
page read and write
683000
heap
page read and write
6F6000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
2239AED3000
heap
page read and write
7FF62F246000
unkown
page write copy
661000
heap
page read and write
656000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
16E58E3F000
trusted library allocation
page read and write
16E58E3A000
trusted library allocation
page read and write
55F5000
heap
page read and write
2239AE2C000
heap
page read and write
2A01000
heap
page read and write
2239AE87000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A786AB000
heap
page read and write
646000
heap
page read and write
42C000
unkown
page read and write
16E58E3B000
trusted library allocation
page read and write
63F000
heap
page read and write
27A786C0000
heap
page read and write
27A786B3000
heap
page read and write
27A786A2000
heap
page read and write
16E56F03000
heap
page read and write
198000
stack
page read and write
27A786C0000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
16E57024000
trusted library allocation
page read and write
22398DF0000
heap
page read and write
401000
unkown
page execute read
27A7891B000
heap
page read and write
553F000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
16E56F01000
heap
page read and write
27A786E4000
heap
page read and write
16E56F3E000
heap
page read and write
669000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
6DE000
heap
page read and write
16E58E39000
trusted library allocation
page read and write
70A000
heap
page read and write
65E000
heap
page read and write
220E000
stack
page read and write
6C6000
heap
page read and write
27A78869000
heap
page read and write
640000
heap
page read and write
22398E02000
heap
page read and write
63C000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
16E58E3C000
trusted library allocation
page read and write
27A786BB000
heap
page read and write
677000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E56F03000
heap
page read and write
27A7868F000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
27A786BC000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
27A78758000
heap
page read and write
664000
heap
page read and write
2BCB000
heap
page read and write
27A786C8000
heap
page read and write
27A786BB000
heap
page read and write
16E56EF5000
heap
page read and write
16E56F03000
heap
page read and write
6E8000
heap
page read and write
65E000
heap
page read and write
16E58AA0000
heap
page read and write
16E56EF5000
heap
page read and write
665000
heap
page read and write
27A7869B000
heap
page read and write
27A786BB000
heap
page read and write
440000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
2C56000
heap
page read and write
FFECCFC000
stack
page read and write
27A78758000
heap
page read and write
278F000
stack
page read and write
16E58E3D000
trusted library allocation
page read and write
73D000
heap
page read and write
27A7868A000
heap
page read and write
6A0000
heap
page read and write
2239AE8E000
heap
page read and write
27A786C0000
heap
page read and write
2239A9A0000
heap
page read and write
1F77D2B0000
heap
page read and write
2239AED0000
heap
page read and write
27A78907000
heap
page read and write
6AB000
heap
page read and write
27A786BC000
heap
page read and write
2A26000
heap
page read and write
2A90000
heap
page read and write
2200000
heap
page read and write
16E56F01000
heap
page read and write
16E56F2B000
heap
page read and write
24344E45000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
16E58E3A000
trusted library allocation
page read and write
16E57020000
trusted library allocation
page read and write
27A7869B000
heap
page read and write
2B7F000
heap
page read and write
6CD000
heap
page read and write
70A000
heap
page read and write
27A78907000
heap
page read and write
2BAB000
heap
page read and write
2C4F000
heap
page read and write
702000
heap
page read and write
16E56F03000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
6F6000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
16E58E3E000
trusted library allocation
page read and write
8F808FF000
stack
page read and write
16E56EED000
heap
page read and write
7FF62F237000
unkown
page readonly
1F77B965000
heap
page read and write
27A786D2000
heap
page read and write
22398EBC000
heap
page read and write
16E57020000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
1F77B932000
heap
page read and write
16E56F01000
heap
page read and write
27A786B0000
heap
page read and write
27A786CE000
heap
page read and write
2239AEA7000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E57024000
trusted library allocation
page read and write
7FF62F220000
unkown
page readonly
55A3000
heap
page read and write
2C4A000
heap
page read and write
2990000
trusted library allocation
page read and write
1AC6D120000
heap
page read and write
55DA000
heap
page read and write
4B72AFF000
stack
page read and write
CA5E7FF000
stack
page read and write
401000
unkown
page execute read
63F000
heap
page read and write
2B10000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
656000
heap
page read and write
641000
heap
page read and write
16E58E38000
trusted library allocation
page read and write
55E1000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
27A786F6000
heap
page read and write
27A786BC000
heap
page read and write
6F6000
heap
page read and write
27A786A4000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
22399040000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
2B5C000
heap
page read and write
60B000
heap
page read and write
643000
heap
page read and write
65B000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
27A786A9000
heap
page read and write
5595000
heap
page read and write
27A786C4000
heap
page read and write
268E000
stack
page read and write
2239AEBC000
heap
page read and write
27A78D5F000
heap
page read and write
27A785D0000
heap
page read and write
669000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
27A786A5000
heap
page read and write
2BEE000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
2C50000
heap
page read and write
63F000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58B40000
heap
page read and write
16E56EED000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
6FF000
heap
page read and write
267F000
stack
page read and write
69F000
heap
page read and write
5598000
heap
page read and write
54B000
heap
page read and write
2B38000
heap
page read and write
24344E47000
heap
page read and write
16E56EEE000
heap
page read and write
6EF000
heap
page read and write
2BBB000
heap
page read and write
16E56F03000
heap
page read and write
64B000
heap
page read and write
16E56EF5000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
695000
heap
page read and write
16E56EF5000
heap
page read and write
6CD000
heap
page read and write
24344E20000
heap
page read and write
27A786BB000
heap
page read and write
6B1000
heap
page read and write
2BCB000
heap
page read and write
16E56EED000
heap
page read and write
16E58E37000
trusted library allocation
page read and write
5408000
heap
page read and write
27A786E6000
heap
page read and write
7FF62F221000
unkown
page execute read
16E56F2B000
heap
page read and write
27A786C8000
heap
page read and write
639000
heap
page read and write
636000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
6E6000
heap
page read and write
7FF62F24B000
unkown
page readonly
16E58E42000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
22398E10000
heap
page read and write
27A7875A000
heap
page read and write
16E57020000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
27A786CE000
heap
page read and write
663000
heap
page read and write
5604000
heap
page read and write
2239AE9C000
heap
page read and write
27A7869B000
heap
page read and write
1A852759000
heap
page read and write
2AB2000
heap
page read and write
27A786E4000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E40000
trusted library allocation
page read and write
16E58E43000
trusted library allocation
page read and write
69F000
heap
page read and write
16E57070000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
55AB000
heap
page read and write
16E56F03000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
630000
heap
page read and write
55F7000
heap
page read and write
27A786B0000
heap
page read and write
27A78767000
heap
page read and write
739000
heap
page read and write
2239AE44000
heap
page read and write
6E8000
heap
page read and write
1AC6D185000
heap
page read and write
632000
heap
page read and write
16E56F2B000
heap
page read and write
27A786C4000
heap
page read and write
55FB000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E58E3F000
trusted library allocation
page read and write
552E000
heap
page read and write
630000
heap
page read and write
27A7885C000
heap
page read and write
2795CFF000
stack
page read and write
7FF62F220000
unkown
page readonly
27A78910000
heap
page read and write
7FF62F237000
unkown
page readonly
2BFC000
heap
page read and write
27A786C4000
heap
page read and write
2239AE61000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
2239AED0000
heap
page read and write
401000
unkown
page execute read
27A786C0000
heap
page read and write
6DC000
heap
page read and write
16E56EED000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
7FF62F246000
unkown
page read and write
421000
unkown
page readonly
673000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E3B000
trusted library allocation
page read and write
27A788D9000
heap
page read and write
63F000
heap
page read and write
16E56F2B000
heap
page read and write
27A786CF000
heap
page read and write
6DE000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
16E57024000
trusted library allocation
page read and write
27A786C4000
heap
page read and write
2239AE43000
heap
page read and write
16E57020000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
636000
heap
page read and write
681000
heap
page read and write
16E57020000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
16E56F01000
heap
page read and write
421000
unkown
page readonly
24344E26000
heap
page read and write
530000
heap
page read and write
2BEC000
heap
page read and write
16E57024000
trusted library allocation
page read and write
548F000
heap
page read and write
5606000
heap
page read and write
1C60FBE0000
heap
page read and write
27A786CE000
heap
page read and write
2239B290000
heap
page read and write
16E56F31000
heap
page read and write
6C2000
heap
page read and write
2B45000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A786CE000
heap
page read and write
16E56F03000
heap
page read and write
2A8D000
heap
page read and write
62E000
heap
page read and write
16E56F2B000
heap
page read and write
22398E07000
heap
page read and write
16E56EF5000
heap
page read and write
16E58E4F000
trusted library allocation
page read and write
1AC6D178000
heap
page read and write
45B0000
trusted library allocation
page read and write
661000
heap
page read and write
7FF62F220000
unkown
page readonly
7FF62F24A000
unkown
page read and write
6FF000
heap
page read and write
16E56F01000
heap
page read and write
16E56F01000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
27A786B0000
heap
page read and write
64C000
heap
page read and write
27A78D57000
heap
page read and write
27A786C0000
heap
page read and write
1A852759000
heap
page read and write
5424000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
65C000
heap
page read and write
6B1000
heap
page read and write
640000
heap
page read and write
2BA6000
heap
page read and write
4AE000
unkown
page readonly
16E58E3A000
trusted library allocation
page read and write
27A786B0000
heap
page read and write
16E57024000
trusted library allocation
page read and write
27A78869000
heap
page read and write
2C55000
heap
page read and write
648000
heap
page read and write
1A85275E000
heap
page read and write
27A786D2000
heap
page read and write
27A786CB000
heap
page read and write
16E56EED000
heap
page read and write
16E56F2B000
heap
page read and write
22398DFC000
heap
page read and write
6AB000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
16E56F2B000
heap
page read and write
6D9000
heap
page read and write
27A786B2000
heap
page read and write
2239DDF0000
trusted library allocation
page read and write
16E56EF5000
heap
page read and write
631000
heap
page read and write
27A786A9000
heap
page read and write
65E000
heap
page read and write
6F5000
heap
page read and write
2239AE8A000
heap
page read and write
6E4000
heap
page read and write
16E56EF5000
heap
page read and write
559A000
heap
page read and write
645000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E58E41000
trusted library allocation
page read and write
2C8E000
heap
page read and write
27A786E6000
heap
page read and write
63C000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
29E3000
heap
page read and write
2239AEBE000
heap
page read and write
546E000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
16E56F2B000
heap
page read and write
5A0000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
702000
heap
page read and write
22398D20000
heap
page read and write
1A852759000
heap
page read and write
277F000
stack
page read and write
27A786C4000
heap
page read and write
22398E01000
heap
page read and write
6A6000
heap
page read and write
2990000
trusted library allocation
page read and write
6F4000
heap
page read and write
4DC000
unkown
page readonly
700000
heap
page read and write
2239AE3A000
heap
page read and write
1A852680000
heap
page read and write
7FF62F237000
unkown
page readonly
2C4E000
heap
page read and write
632000
heap
page read and write
8F805FF000
stack
page read and write
16E56F03000
heap
page read and write
27A7868A000
heap
page read and write
16E56EF5000
heap
page read and write
27A78769000
heap
page read and write
27A786B0000
heap
page read and write
647000
heap
page read and write
2239AE39000
heap
page read and write
22398DF8000
heap
page read and write
27A786C4000
heap
page read and write
6EF000
heap
page read and write
27A786B7000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
63D000
heap
page read and write
22398E1D000
heap
page read and write
4D7000
unkown
page read and write
29E3000
heap
page read and write
27A78D94000
heap
page read and write
7FF62F221000
unkown
page execute read
27A786A5000
heap
page read and write
16E56EED000
heap
page read and write
16E57020000
trusted library allocation
page read and write
27A7893E000
heap
page read and write
656000
heap
page read and write
27A786C0000
heap
page read and write
641000
heap
page read and write
2A9E000
heap
page read and write
27A78910000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
62C000
heap
page read and write
2239AEA7000
heap
page read and write
27A7890F000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E3E000
trusted library allocation
page read and write
16E56EED000
heap
page read and write
27A786C4000
heap
page read and write
16E56ED7000
heap
page read and write
16E58E45000
trusted library allocation
page read and write
671000
heap
page read and write
27A786A6000
heap
page read and write
6F5000
heap
page read and write
27A78D45000
heap
page read and write
2239AE30000
heap
page read and write
63A000
heap
page read and write
645000
heap
page read and write
16E57024000
trusted library allocation
page read and write
6DE000
heap
page read and write
2239AE67000
heap
page read and write
5B0000
heap
page read and write
27A786A9000
heap
page read and write
2C3D000
heap
page read and write
2BFC000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
65C000
heap
page read and write
749000
heap
page read and write
6FF000
heap
page read and write
643000
heap
page read and write
686000
heap
page read and write
63D000
heap
page read and write
22398E3F000
heap
page read and write
27A786A4000
heap
page read and write
8AF000
stack
page read and write
16E56F01000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
16E56F03000
heap
page read and write
4EE0000
trusted library allocation
page read and write
16E56F2B000
heap
page read and write
2239AE7A000
heap
page read and write
5401000
heap
page read and write
16E56F2B000
heap
page read and write
61A000
heap
page read and write
273C000
stack
page read and write
16E58E42000
trusted library allocation
page read and write
4ED5000
heap
page read and write
27A7869F000
heap
page read and write
16E58E40000
trusted library allocation
page read and write
27A786E4000
heap
page read and write
16E56F3E000
heap
page read and write
6EF000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
16E56F03000
heap
page read and write
27A786C4000
heap
page read and write
69A000
heap
page read and write
42F000
unkown
page readonly
55DF000
heap
page read and write
659000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
16E57020000
trusted library allocation
page read and write
1C60FC96000
heap
page read and write
1C60FC6C000
heap
page read and write
27A786CE000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
16E58E46000
trusted library allocation
page read and write
16E56F3E000
heap
page read and write
27A786C4000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
27A786CF000
heap
page read and write
27A78D54000
heap
page read and write
16E58E4E000
trusted library allocation
page read and write
24344E47000
heap
page read and write
2239AE29000
heap
page read and write
27A78D40000
heap
page read and write
2239AEA7000
heap
page read and write
16E56EF5000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
16E58E42000
trusted library allocation
page read and write
2BB5000
heap
page read and write
27A7874D000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
16E58E44000
trusted library allocation
page read and write
16E57020000
trusted library allocation
page read and write
27A78D41000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
6E8000
heap
page read and write
16E56F03000
heap
page read and write
721000
heap
page read and write
656000
heap
page read and write
6BC000
heap
page read and write
4B72BFF000
stack
page read and write
648000
heap
page read and write
24344E31000
heap
page read and write
54C5000
heap
page read and write
6D3000
heap
page read and write
42F000
unkown
page readonly
8C92BFF000
stack
page read and write
2B63000
heap
page read and write
650000
heap
page read and write
16E57024000
trusted library allocation
page read and write
16E58E3F000
trusted library allocation
page read and write
27A786CB000
heap
page read and write
8F806FE000
stack
page read and write
16E56F2B000
heap
page read and write
638000
heap
page read and write
2239AEC4000
heap
page read and write
27A78D42000
heap
page read and write
27A789F5000
heap
page read and write
16E58E46000
trusted library allocation
page read and write
2C4D000
heap
page read and write
63F000
heap
page read and write
2BCF000
heap
page read and write
553F000
heap
page read and write
16E56EED000
heap
page read and write
55AC000
heap
page read and write
27A786C4000
heap
page read and write
27A7890F000
heap
page read and write
16E56F3E000
heap
page read and write
2239AE3A000
heap
page read and write
641000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
718000
heap
page read and write
16E56F3E000
heap
page read and write
1A852746000
heap
page read and write
16E58E44000
trusted library allocation
page read and write
27A786B0000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
16E58E42000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
27A786BC000
heap
page read and write
16E56F2B000
heap
page read and write
1E7038E0000
heap
page read and write
648000
heap
page read and write
6DA000
heap
page read and write
446E000
stack
page read and write
16E58E43000
trusted library allocation
page read and write
1A85276B000
heap
page read and write
27A78766000
heap
page read and write
713000
heap
page read and write
2C7A000
heap
page read and write
2990000
trusted library allocation
page read and write
16E56F2B000
heap
page read and write
16E56EF3000
heap
page read and write
509000
unkown
page readonly
2239AED3000
heap
page read and write
4D00000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
16E58E3F000
trusted library allocation
page read and write
1AC6D185000
heap
page read and write
551E000
heap
page read and write
16E57020000
trusted library allocation
page read and write
55DA000
heap
page read and write
632000
heap
page read and write
28E0000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
632000
heap
page read and write
2239AE5E000
heap
page read and write
7FF62F237000
unkown
page readonly
656000
heap
page read and write
27A786B0000
heap
page read and write
6B1000
heap
page read and write
27A786C4000
heap
page read and write
16E56F3E000
heap
page read and write
27A786A9000
heap
page read and write
1AC6D185000
heap
page read and write
27A78916000
heap
page read and write
6AA000
heap
page read and write
27A786E4000
heap
page read and write
63F000
heap
page read and write
633000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
656000
heap
page read and write
55FC000
heap
page read and write
65F000
heap
page read and write
61A000
heap
page read and write
16E56F03000
heap
page read and write
64C000
heap
page read and write
27A786B7000
heap
page read and write
7FF62F221000
unkown
page execute read
658000
heap
page read and write
16E58E43000
trusted library allocation
page read and write
27A786C8000
heap
page read and write
632000
heap
page read and write
2239AE29000
heap
page read and write
27A78909000
heap
page read and write
16E58E3B000
trusted library allocation
page read and write
16E58E41000
trusted library allocation
page read and write
27A786CB000
heap
page read and write
61D000
heap
page read and write
55FB000
heap
page read and write
16E56EF1000
heap
page read and write
6E8000
heap
page read and write
669000
heap
page read and write
16E56EE8000
heap
page read and write
16E570A0000
heap
page read and write
29D2000
heap
page read and write
6F3000
heap
page read and write
55F5000
heap
page read and write
4A30000
direct allocation
page execute and read and write
16E58E44000
trusted library allocation
page read and write
27A78909000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E3A000
trusted library allocation
page read and write
24344E36000
heap
page read and write
22398E3F000
heap
page read and write
7FF62F221000
unkown
page execute read
6E2000
heap
page read and write
29DB000
heap
page read and write
16E58E3E000
trusted library allocation
page read and write
2239AECC000
heap
page read and write
658000
heap
page read and write
29BE000
heap
page read and write
7FF62F24A000
unkown
page read and write
27A7868A000
heap
page read and write
27A786CE000
heap
page read and write
16E56EF5000
heap
page read and write
2A9E000
heap
page read and write
68A000
heap
page read and write
27A786CB000
heap
page read and write
16E56F2F000
heap
page read and write
6E8000
heap
page read and write
27A78841000
heap
page read and write
16E58E49000
trusted library allocation
page read and write
2BCB000
heap
page read and write
16E56F2B000
heap
page read and write
16E58B30000
heap
page read and write
656000
heap
page read and write
666000
heap
page read and write
7FF62F24A000
unkown
page read and write
16E58E3E000
trusted library allocation
page read and write
645000
heap
page read and write
64C000
heap
page read and write
2C4D000
heap
page read and write
29CD000
heap
page read and write
27A78685000
heap
page read and write
27A786BB000
heap
page read and write
4ED0000
heap
page read and write
16E58E3D000
trusted library allocation
page read and write
61D000
heap
page read and write
7FF62F24B000
unkown
page readonly
69B000
heap
page read and write
27A786CE000
heap
page read and write
7FF62F24B000
unkown
page readonly
2740000
trusted library allocation
page read and write
73D000
heap
page read and write
2C16000
heap
page read and write
27A78D4A000
heap
page read and write
27A786C0000
heap
page read and write
1F77D324000
heap
page read and write
27A786CB000
heap
page read and write
2239AEBE000
heap
page read and write
27A7885D000
heap
page read and write
2BBD000
heap
page read and write
16E58E3F000
trusted library allocation
page read and write
45B0000
trusted library section
page read and write
27A786C8000
heap
page read and write
16E58E3C000
trusted library allocation
page read and write
29BD000
heap
page read and write
692000
heap
page read and write
16E56F2B000
heap
page read and write
16E58E41000
trusted library allocation
page read and write
27A786CB000
heap
page read and write
There are 2532 hidden memdumps, click here to show them.