IOC Report
SCAN-068589.pdf.msi

loading gif

Files

File Path
Type
Category
Malicious
SCAN-068589.pdf.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template: Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Users\user\AppData\Local\AdobeFontPack\main.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\x86\5507.nls
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\6ecb58.rbs
data
modified
C:\Users\user\AppData\Local\AdobeFontPack\notify.vbs
ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\6ecb57.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template: Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6ecb59.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template: Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSID0D5.tmp
data
dropped
C:\Windows\Installer\SourceHash{CC038BA5-7236-4713-8948-DFF082243638}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\~DF32CC1CCDA67698BF.TMP
data
dropped
C:\Windows\Temp\~DF451B68AA611F0002.TMP
data
dropped
C:\Windows\Temp\~DF554ED6AEAE1695CB.TMP
data
dropped
C:\Windows\Temp\~DF5D62286770078C98.TMP
data
dropped
C:\Windows\Temp\~DFAE475F7BF35B51FF.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB6CC71FD7302A57F.TMP
data
dropped
C:\Windows\Temp\~DFB854D5FFFE3393EB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFBD7FC4C706A2923E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC1AF1F970900AA0D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD360B2FB883B3EA4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF1FA149FB9109A5F.TMP
data
dropped
C:\Windows\Temp\~DFFEC5387194B3D4A9.TMP
data
dropped
C:\Config.Msi\68bd59.rbs
data
dropped
C:\Users\user\AppData\Local\Temp\~DF275DF4B13EC3E34F.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF6CBE8E5B62F6E221.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF84F6DE3826C4FEB0.TMP
data
dropped
C:\Windows\Installer\68bd57.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template: Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\68bd58.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\68bd5a.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template: Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI7D9A.tmp
data
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe -n -i:"Install" C:\Users\user\AppData\Local\AdobeFontPack\main.dll
malicious
C:\Windows\SysWOW64\regsvr32.exe
-n -i:"Install" C:\Users\user\AppData\Local\AdobeFontPack\main.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe -n -i:"Update?heck" "C:\Users\user\AppData\Local\x86\5507.nls"
malicious
C:\Windows\SysWOW64\regsvr32.exe
-n -i:"Update?heck" "C:\Users\user\AppData\Local\x86\5507.nls"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SCAN-068589.pdf.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\wscript.exe
wscript.exe C:\Users\user\AppData\Local\AdobeFontPack\notify.vbs
C:\Windows\System32\taskeng.exe
taskeng.exe {4CFB7DD2-D1A8-412D-8316-3EFD3FFEBE4B} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]

URLs

Name
IP
Malicious
https://telemetrysystemcollection.com/m8YYdu/mCQ2U9/home.aspx
213.226.114.15
malicious
http://collectiontelemetrysystem.com/cAUtfkUDaptk/ZRSeiy/requets/index.php
213.226.114.15
malicious
https://telemetrysystemcollection.com/m8YYdu/mCQ2U9/auth.aspx
213.226.114.15
malicious
http://telemetrysystemcollection.com/m8YYdu/mCQ2U9/home.aspx
unknown
https://collectiontelemetrysystem.com/m8YYdu/mCQ2U9/auth.aspx
unknown
http://collectiontelemetrysystem.com/m8YYdu/mCQ2U9/home.aspx
unknown

Domains

Name
IP
Malicious
telemetrysystemcollection.com
213.226.114.15
malicious
collectiontelemetrysystem.com
213.226.114.15
malicious

IPs

IP
Domain
Country
Malicious
213.226.114.15
telemetrysystemcollection.com
Russian Federation
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6ecb58.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6ecb58.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Components\DF2B5B287322BA24F9303B9BAE3B0000
5AB830CC632731749884FD0F28426383
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\AdobeFontPack\
HKEY_CURRENT_USER\Software\AdobeFontPack
AdobeFontPack
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\100000007322BA24F9303B9BAE3B509A
5AB830CC632731749884FD0F28426383
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
DisplayName
HKEY_CURRENT_USER\Software\Microsoft\Installer\Features\5AB830CC632731749884FD0F28426383
MainProgram
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\Features
MainProgram
HKEY_CURRENT_USER\Software\Microsoft\Installer\Features\5AB830CC632731749884FD0F28426383
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\Features
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\Patches
AllPatches
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
ProductName
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
PackageCode
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
Language
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
Version
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
Assignment
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
AdvertiseFlags
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
InstanceType
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
AuthorizedLUAApp
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
DeploymentFlags
HKEY_CURRENT_USER\Software\Microsoft\Installer\UpgradeCodes\100000007322BA24F9303B9BAE3B509A
5AB830CC632731749884FD0F28426383
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList
PackageName
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList\Net
1
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList\Media
1
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
Clients
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\InProgress
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\68bd59.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\68bd59.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Components\DF2B5B287322BA24F9303B9BAE3B0000
5AB830CC632731749884FD0F28426383
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\Features
MainProgram
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\Features
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\Patches
AllPatches
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppCreate (Enter)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
LastIndex
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppGatherWriterMetadata (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppGatherWriterMetadata (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppAddInterestingComponents (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppAddInterestingComponents (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppCreate (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppCreate (Enter)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
LastIndex
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppGatherWriterMetadata (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppGatherWriterMetadata (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppAddInterestingComponents (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppAddInterestingComponents (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppCreate (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\p2pcollab.dll,-8042
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{4CFB7DD2-D1A8-412D-8316-3EFD3FFEBE4B}
data
There are 157 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1323C700000
heap
page read and write
13241260000
trusted library allocation
page read and write
29925578000
heap
page read and write
21A5585E000
heap
page read and write
186D6902000
heap
page read and write
186305FD000
heap
page read and write
2083E0BA000
heap
page read and write
29925A1A000
heap
page read and write
186D688D000
heap
page read and write
77B92FE000
stack
page read and write
4D24778000
stack
page read and write
21EBD6D0000
heap
page read and write
2F9F9FF000
stack
page read and write
5596000
trusted library allocation
page read and write
5506000
trusted library allocation
page read and write
19686C20000
heap
page read and write
2083E802000
heap
page read and write
900877E000
stack
page read and write
1323C5F0000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
8E899FF000
stack
page read and write
19686CE0000
heap
page read and write
18631FF0000
heap
page read and write
5509000
trusted library allocation
page read and write
299255B2000
heap
page read and write
1A8FF913000
heap
page read and write
8E892FF000
stack
page read and write
5151000
trusted library allocation
page read and write
514F000
stack
page read and write
299255A0000
heap
page read and write
21A55813000
heap
page read and write
4D247FF000
stack
page read and write
6CA000
heap
page read and write
55A3000
trusted library allocation
page read and write
29925582000
heap
page read and write
6DAF4000
unkown
page read and write
550B000
trusted library allocation
page read and write
18630634000
heap
page read and write
52DA000
trusted library allocation
page read and write
39D57FE000
stack
page read and write
29925585000
heap
page read and write
19686C23000
heap
page read and write
299255D9000
heap
page read and write
18630530000
heap
page read and write
2083E000000
heap
page read and write
5509000
trusted library allocation
page read and write
19686C12000
heap
page read and write
29924E13000
heap
page read and write
F2AB4FF000
stack
page read and write
2992551E000
heap
page read and write
2992557A000
heap
page read and write
5101000
trusted library allocation
page read and write
29924EEF000
heap
page read and write
299255BC000
heap
page read and write
18630550000
heap
page read and write
1A8FF6B0000
heap
page read and write
132416A3000
heap
page read and write
186305E8000
heap
page read and write
550F000
trusted library allocation
page read and write
29924E80000
heap
page read and write
19686C27000
heap
page read and write
2F5B000
heap
page read and write
13241704000
heap
page read and write
13242000000
heap
page read and write
A80F2FE000
stack
page read and write
18630604000
heap
page read and write
2992557C000
heap
page read and write
9FD747E000
stack
page read and write
13241530000
trusted library allocation
page read and write
21A55827000
heap
page read and write
1323BD30000
heap
page read and write
2F5B000
heap
page read and write
132412D0000
trusted library allocation
page read and write
19686BF7000
heap
page read and write
4E4D000
stack
page read and write
2F9F87B000
stack
page read and write
29925531000
heap
page read and write
DF6515E000
stack
page read and write
4BB000
stack
page read and write
5251000
trusted library allocation
page read and write
A80F17F000
stack
page read and write
299255BC000
heap
page read and write
8E895FD000
stack
page read and write
13241663000
heap
page read and write
DF654FB000
stack
page read and write
55CB000
trusted library allocation
page read and write
1323C713000
heap
page read and write
24B21013000
heap
page read and write
DF65979000
stack
page read and write
29925580000
heap
page read and write
29924C10000
heap
page read and write
2F5B000
heap
page read and write
186D6862000
heap
page read and write
29924E4E000
heap
page read and write
29924E57000
heap
page read and write
51CA000
trusted library allocation
page read and write
186D6610000
heap
page read and write
2F5B000
heap
page read and write
51D3000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
21EBD670000
heap
page read and write
CC6000
heap
page read and write
1323CEE0000
trusted library section
page readonly
2F53000
heap
page read and write
50CE000
stack
page read and write
1A8FF813000
heap
page read and write
52DB000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
900837F000
stack
page read and write
5596000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
D2F000
heap
page read and write
8E894FE000
stack
page read and write
5151000
trusted library allocation
page read and write
4F01000
trusted library allocation
page read and write
2F5B000
heap
page read and write
18ADA668000
heap
page read and write
A80F27D000
stack
page read and write
DF656F7000
stack
page read and write
2F5B000
heap
page read and write
19686C09000
heap
page read and write
132416FB000
heap
page read and write
2992551E000
heap
page read and write
51E6000
trusted library allocation
page read and write
C9B000
heap
page read and write
132413F0000
trusted library allocation
page read and write
21A5587E000
heap
page read and write
2F9F97E000
stack
page read and write
4C60000
remote allocation
page read and write
5503000
trusted library allocation
page read and write
1323D260000
trusted library allocation
page read and write
2992557B000
heap
page read and write
4FAB000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
21A55861000
heap
page read and write
1323BE70000
heap
page read and write
18ADA702000
heap
page read and write
29925A02000
heap
page read and write
529C000
trusted library allocation
page read and write
4C60000
remote allocation
page read and write
18ADAD30000
trusted library allocation
page read and write
29925A02000
heap
page read and write
4ECE000
stack
page read and write
299255A9000
heap
page read and write
19686C02000
heap
page read and write
1A8FF881000
heap
page read and write
4E01000
trusted library allocation
page read and write
5503000
trusted library allocation
page read and write
2083E013000
heap
page read and write
215D0660000
heap
page read and write
18630965000
heap
page read and write
1A900002000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
186D6908000
heap
page read and write
29925593000
heap
page read and write
29925527000
heap
page read and write
19686D25000
heap
page read and write
11637E000
stack
page read and write
186D6770000
trusted library allocation
page read and write
21EBD85B000
heap
page read and write
55C5000
trusted library allocation
page read and write
19686C04000
heap
page read and write
1863062C000
heap
page read and write
2083E680000
trusted library allocation
page read and write
21A5587A000
heap
page read and write
1323BE93000
heap
page read and write
299255B1000
heap
page read and write
299255A0000
heap
page read and write
8E0000
heap
page read and write
5302000
trusted library allocation
page read and write
24B2103C000
heap
page read and write
1A8FF829000
heap
page read and write
18ADAE02000
trusted library allocation
page read and write
DF651DE000
stack
page read and write
52D5000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
C9C000
heap
page read and write
5451000
trusted library allocation
page read and write
29925586000
heap
page read and write
29924E89000
heap
page read and write
55C9000
trusted library allocation
page read and write
29925A02000
heap
page read and write
5151000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
1863062C000
heap
page read and write
29925584000
heap
page read and write
4D2487C000
stack
page read and write
29924E55000
heap
page read and write
24B20E00000
heap
page read and write
24B21590000
remote allocation
page read and write
29925561000
heap
page read and write
4E40000
trusted library allocation
page read and write
29924EC7000
heap
page read and write
550A000
trusted library allocation
page read and write
2F85000
heap
page read and write
4F8E000
stack
page read and write
D2F000
heap
page read and write
29925596000
heap
page read and write
186D6813000
heap
page read and write
2F46000
heap
page read and write
29924E48000
heap
page read and write
9FD79FC000
stack
page read and write
B60000
heap
page read and write
18630635000
heap
page read and write
24B21602000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
24B21102000
heap
page read and write
299255A0000
heap
page read and write
299255CD000
heap
page read and write
510E000
stack
page read and write
5502000
trusted library allocation
page read and write
29925584000
heap
page read and write
132416B7000
heap
page read and write
186D6913000
heap
page read and write
21A5585C000
heap
page read and write
13241706000
heap
page read and write
51D4000
trusted library allocation
page read and write
19686C0A000
heap
page read and write
900857B000
stack
page read and write
1A8FF900000
heap
page read and write
39D5BFF000
stack
page read and write
29925A02000
heap
page read and write
D0A000
heap
page read and write
E70000
trusted library allocation
page read and write
DF655F8000
stack
page read and write
29924E4B000
heap
page read and write
4F01000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
5101000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
299255B2000
heap
page read and write
55B8000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
1A8FF875000
heap
page read and write
215D0600000
heap
page read and write
2F5B000
heap
page read and write
567D000
trusted library allocation
page read and write
3055000
heap
page read and write
5101000
trusted library allocation
page read and write
186304C0000
heap
page read and write
19686C23000
heap
page read and write
21EBD837000
heap
page read and write
55CF000
trusted library allocation
page read and write
11607B000
stack
page read and write
132416E3000
heap
page read and write
8E89AFF000
stack
page read and write
A80EFFE000
stack
page read and write
299255A0000
heap
page read and write
564F000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1863096B000
heap
page read and write
55EC000
trusted library allocation
page read and write
2F5B000
heap
page read and write
29924E00000
heap
page read and write
299255B1000
heap
page read and write
6DAF6000
unkown
page readonly
5151000
trusted library allocation
page read and write
18630619000
heap
page read and write
21A55831000
heap
page read and write
90083FC000
stack
page read and write
E37000
stack
page read and write
5506000
trusted library allocation
page read and write
13241420000
trusted library allocation
page read and write
18ADA63C000
heap
page read and write
5505000
trusted library allocation
page read and write
1323BF26000
heap
page read and write
186305FD000
heap
page read and write
CB9000
heap
page read and write
F2AB0FE000
stack
page read and write
21A55866000
heap
page read and write
550D000
trusted library allocation
page read and write
4D8E000
stack
page read and write
1863062F000
heap
page read and write
186D6900000
heap
page read and write
5151000
trusted library allocation
page read and write
F2AB27C000
stack
page read and write
21EBD913000
heap
page read and write
21A5587B000
heap
page read and write
4F9E000
trusted library allocation
page read and write
55AC000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
215D05F0000
heap
page read and write
1323BE8C000
heap
page read and write
2F5B000
heap
page read and write
215D1002000
trusted library allocation
page read and write
2083E029000
heap
page read and write
536E000
trusted library allocation
page read and write
508E000
stack
page read and write
2083E064000
heap
page read and write
55AC000
trusted library allocation
page read and write
29925593000
heap
page read and write
18630613000
heap
page read and write
C9B000
stack
page read and write
1323C615000
heap
page read and write
18633B50000
trusted library allocation
page read and write
51CE000
trusted library allocation
page read and write
13241414000
trusted library allocation
page read and write
900867D000
stack
page read and write
1323BE59000
heap
page read and write
5251000
trusted library allocation
page read and write
1A8FF86F000
heap
page read and write
F80000
heap
page read and write
CB9000
heap
page read and write
186D6800000
heap
page read and write
5151000
trusted library allocation
page read and write
29924EAC000
heap
page read and write
559A000
trusted library allocation
page read and write
19686BE0000
heap
page read and write
29924F08000
heap
page read and write
21EBD813000
heap
page read and write
29925573000
heap
page read and write
C9B000
heap
page read and write
5531000
trusted library allocation
page read and write
299255B2000
heap
page read and write
299255A0000
heap
page read and write
29925589000
heap
page read and write
53B8000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
6AB000
heap
page read and write
19686C23000
heap
page read and write
215D082A000
heap
page read and write
21A55884000
heap
page read and write
550A000
trusted library allocation
page read and write
4F01000
trusted library allocation
page read and write
9FD74FE000
stack
page read and write
5505000
trusted library allocation
page read and write
19686C05000
heap
page read and write
1323CDE0000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
2F9F67B000
stack
page read and write
29925594000
heap
page read and write
186D6874000
heap
page read and write
5503000
trusted library allocation
page read and write
186305E0000
heap
page read and write
21A5586D000
heap
page read and write
186D684F000
heap
page read and write
900807C000
stack
page read and write
2083E102000
heap
page read and write
BCC000
stack
page read and write
19686C23000
heap
page read and write
299255A9000
heap
page read and write
55C7000
trusted library allocation
page read and write
29924E49000
heap
page read and write
5500000
trusted library allocation
page read and write
18630608000
heap
page read and write
5504000
trusted library allocation
page read and write
9FD7AFE000
stack
page read and write
5151000
trusted library allocation
page read and write
21A5582F000
heap
page read and write
F2AB07B000
stack
page read and write
29925589000
heap
page read and write
1A8FF84A000
heap
page read and write
2083DEB0000
heap
page read and write
1324164A000
heap
page read and write
215D0913000
heap
page read and write
19686C02000
heap
page read and write
186D6802000
heap
page read and write
215D0760000
trusted library allocation
page read and write
215D085A000
heap
page read and write
21A55849000
heap
page read and write
132416AC000
heap
page read and write
186D685D000
heap
page read and write
5501000
trusted library allocation
page read and write
2F77000
heap
page read and write
186D7002000
trusted library allocation
page read and write
900827F000
stack
page read and write
5501000
trusted library allocation
page read and write
1A8FF908000
heap
page read and write
2F50000
heap
page read and write
29925A02000
heap
page read and write
5536000
trusted library allocation
page read and write
18ADA629000
heap
page read and write
1863062C000
heap
page read and write
52DB000
trusted library allocation
page read and write
299255C2000
heap
page read and write
900887F000
stack
page read and write
1323BE00000
heap
page read and write
13241610000
heap
page read and write
2F9FBFA000
stack
page read and write
5069000
trusted library allocation
page read and write
215D0861000
heap
page read and write
19686AA0000
heap
page read and write
2F0D000
heap
page read and write
830000
heap
page read and write
1323BE13000
heap
page read and write
5251000
trusted library allocation
page read and write
1A8FF866000
heap
page read and write
29925585000
heap
page read and write
2083E912000
heap
page read and write
29925A02000
heap
page read and write
132414C0000
trusted library allocation
page read and write
CB9000
heap
page read and write
21A55800000
heap
page read and write
13241510000
trusted library allocation
page read and write
215D083C000
heap
page read and write
215D0900000
heap
page read and write
186D6600000
heap
page read and write
24B21000000
heap
page read and write
5395000
trusted library allocation
page read and write
2F73000
heap
page read and write
39D54F9000
stack
page read and write
18632500000
heap
page read and write
21A5585F000
heap
page read and write
2992550E000
heap
page read and write
29925A02000
heap
page read and write
29925561000
heap
page read and write
18ADA713000
heap
page read and write
537457E000
stack
page read and write
299255B1000
heap
page read and write
4F01000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1323C702000
heap
page read and write
132416EA000
heap
page read and write
56BA000
trusted library allocation
page read and write
CBA000
heap
page read and write
39D5CFF000
stack
page read and write
29925597000
heap
page read and write
21A557C0000
trusted library allocation
page read and write
9FD75FB000
stack
page read and write
4F01000
trusted library allocation
page read and write
29924EE8000
heap
page read and write
2083E088000
heap
page read and write
5502000
trusted library allocation
page read and write
F85000
heap
page read and write
19686C12000
heap
page read and write
566F000
trusted library allocation
page read and write
29925576000
heap
page read and write
2F5B000
heap
page read and write
518C000
trusted library allocation
page read and write
29924E6D000
heap
page read and write
DF65AFF000
unkown
page read and write
4C60000
remote allocation
page read and write
21A5584E000
heap
page read and write
29924EB6000
heap
page read and write
5151000
trusted library allocation
page read and write
299255A0000
heap
page read and write
21A5582E000
heap
page read and write
24B21590000
remote allocation
page read and write
13241430000
trusted library allocation
page read and write
2992551C000
heap
page read and write
29924EDB000
heap
page read and write
1A8FF83C000
heap
page read and write
21EBD902000
heap
page read and write
18ADA66A000
heap
page read and write
5507000
trusted library allocation
page read and write
21A55902000
heap
page read and write
132413F8000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
29925582000
heap
page read and write
21A55841000
heap
page read and write
6DA90000
unkown
page readonly
2F75000
heap
page read and write
D29000
heap
page read and write
5B0000
heap
page read and write
2F5B000
heap
page read and write
F2AB17E000
stack
page read and write
29924BA0000
heap
page read and write
1323C5C1000
trusted library allocation
page read and write
215D0865000
heap
page read and write
1323BE29000
heap
page read and write
4DCE000
stack
page read and write
2F7F000
heap
page read and write
1863064A000
heap
page read and write
2F9FF7F000
stack
page read and write
21A556C0000
heap
page read and write
5295000
trusted library allocation
page read and write
9007E7C000
stack
page read and write
19686BE7000
heap
page read and write
13241600000
heap
page read and write
24B2102C000
heap
page read and write
1323BE75000
heap
page read and write
52EF000
trusted library allocation
page read and write
1323CEF0000
trusted library section
page readonly
5217000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
A80F4FD000
stack
page read and write
53744FE000
stack
page read and write
13241434000
trusted library allocation
page read and write
29925A21000
heap
page read and write
29924E3C000
heap
page read and write
5251000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
18630628000
heap
page read and write
55BE000
trusted library allocation
page read and write
2F7A000
heap
page read and write
501D000
trusted library allocation
page read and write
29924E51000
heap
page read and write
5451000
trusted library allocation
page read and write
2992557C000
heap
page read and write
215D085B000
heap
page read and write
13241540000
trusted library allocation
page read and write
299255A0000
heap
page read and write
F2AB477000
stack
page read and write
C9B000
heap
page read and write
18631FF4000
heap
page read and write
2F5B000
heap
page read and write
55A8000
trusted library allocation
page read and write
500E000
stack
page read and write
D2F000
heap
page read and write
299255A0000
heap
page read and write
5504000
trusted library allocation
page read and write
299255A0000
heap
page read and write
2F5B000
heap
page read and write
29925598000
heap
page read and write
2F6E000
heap
page read and write
5637000
trusted library allocation
page read and write
29925587000
heap
page read and write
518F000
trusted library allocation
page read and write
D2C000
heap
page read and write
537477B000
stack
page read and write
2F9FA7F000
stack
page read and write
4D243DE000
stack
page read and write
21A55846000
heap
page read and write
29925598000
heap
page read and write
2F9F3F8000
stack
page read and write
55D0000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
2F5B000
heap
page read and write
18ADA613000
heap
page read and write
8E891FB000
stack
page read and write
29924F16000
heap
page read and write
29924E29000
heap
page read and write
21A5582A000
heap
page read and write
11627E000
stack
page read and write
2992557A000
heap
page read and write
18630609000
heap
page read and write
8E897FF000
stack
page read and write
21EBD802000
heap
page read and write
29924E4A000
heap
page read and write
29925A00000
heap
page read and write
1A8FF84F000
heap
page read and write
29924E71000
heap
page read and write
2992557A000
heap
page read and write
18630634000
heap
page read and write
215D0870000
heap
page read and write
1323BDD0000
trusted library section
page read and write
4D246FF000
stack
page read and write
2F71000
heap
page read and write
21A55869000
heap
page read and write
4E37000
trusted library allocation
page read and write
2EAA000
heap
page read and write
D2F000
heap
page read and write
2083DF20000
heap
page read and write
2F9FD7B000
stack
page read and write
5101000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
2992551C000
heap
page read and write
2F9FC7E000
stack
page read and write
2F5B000
heap
page read and write
29925A18000
heap
page read and write
19686C25000
heap
page read and write
186305F8000
heap
page read and write
1323C600000
heap
page read and write
29925A21000
heap
page read and write
5151000
trusted library allocation
page read and write
21EBD868000
heap
page read and write
29925565000
heap
page read and write
21A5583D000
heap
page read and write
29924EA5000
heap
page read and write
215D0813000
heap
page read and write
29924E6D000
heap
page read and write
2F5B000
heap
page read and write
29924E52000
heap
page read and write
18ADA570000
heap
page read and write
52EF000
trusted library allocation
page read and write
2F6C000
heap
page read and write
1323BE9E000
heap
page read and write
9FD76FB000
stack
page read and write
5101000
trusted library allocation
page read and write
29924EB2000
heap
page read and write
29925586000
heap
page read and write
215D0908000
heap
page read and write
52B1000
trusted library allocation
page read and write
1323BE7A000
heap
page read and write
29925557000
heap
page read and write
4960000
remote allocation
page read and write
5914000
unkown
page read and write
18630617000
heap
page read and write
299255C4000
heap
page read and write
39D56FE000
stack
page read and write
132414F0000
remote allocation
page read and write
4D2435A000
stack
page read and write
13241550000
trusted library allocation
page read and write
4D2467E000
stack
page read and write
19686BF2000
heap
page read and write
19686D20000
heap
page read and write
1A8FF710000
heap
page read and write
1323C5E3000
trusted library allocation
page read and write
18630634000
heap
page read and write
299255C2000
heap
page read and write
9FD78FF000
stack
page read and write
55B1000
trusted library allocation
page read and write
1323C602000
heap
page read and write
2992557A000
heap
page read and write
1A8FF827000
heap
page read and write
115ACB000
stack
page read and write
5501000
trusted library allocation
page read and write
19686C01000
heap
page read and write
559F000
trusted library allocation
page read and write
299255A9000
heap
page read and write
5101000
trusted library allocation
page read and write
9FD77F7000
stack
page read and write
215D082F000
heap
page read and write
29924BB0000
heap
page read and write
3007000
heap
page read and write
550E000
trusted library allocation
page read and write
21A55660000
heap
page read and write
5301000
trusted library allocation
page read and write
F2AB5FF000
stack
page read and write
18630634000
heap
page read and write
215D085E000
heap
page read and write
2F08000
heap
page read and write
4F99000
trusted library allocation
page read and write
CC9000
heap
page read and write
2083E0C4000
heap
page read and write
2083E044000
heap
page read and write
1323CF00000
trusted library section
page readonly
5191000
trusted library allocation
page read and write
4FCA000
trusted library allocation
page read and write
A80EB1B000
stack
page read and write
55D6000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
29924F02000
heap
page read and write
2F5B000
heap
page read and write
1323CEC0000
trusted library section
page readonly
215D0800000
heap
page read and write
5251000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
5508000
trusted library allocation
page read and write
1323BEA0000
heap
page read and write
1323BEFE000
heap
page read and write
E08000
heap
page read and write
4F01000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
21A55877000
heap
page read and write
550D000
trusted library allocation
page read and write
18ADA602000
heap
page read and write
1323BE3E000
heap
page read and write
29925568000
heap
page read and write
55C1000
trusted library allocation
page read and write
18ADA658000
heap
page read and write
1323CED0000
trusted library section
page readonly
1863062C000
heap
page read and write
29924E4C000
heap
page read and write
21EBD7D0000
trusted library allocation
page read and write
18630613000
heap
page read and write
2F77000
heap
page read and write
DB0000
heap
page read and write
D2F000
heap
page read and write
5319000
trusted library allocation
page read and write
6DA91000
unkown
page execute read
55DE000
trusted library allocation
page read and write
8E896FE000
stack
page read and write
55BF000
trusted library allocation
page read and write
52E9000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
537467C000
stack
page read and write
299255A0000
heap
page read and write
1323BF13000
heap
page read and write
186D6867000
heap
page read and write
29925589000
heap
page read and write
DF6577E000
stack
page read and write
F2AB37B000
stack
page read and write
D2F000
heap
page read and write
19686BF7000
heap
page read and write
186D6670000
heap
page read and write
5151000
trusted library allocation
page read and write
28E0000
heap
page read and write
186D6860000
heap
page read and write
5151000
trusted library allocation
page read and write
29925585000
heap
page read and write
215D0882000
heap
page read and write
21A5586B000
heap
page read and write
19686C02000
heap
page read and write
21EBD829000
heap
page read and write
DF65A77000
stack
page read and write
132416A0000
heap
page read and write
215D0902000
heap
page read and write
2F85000
heap
page read and write
D2F000
heap
page read and write
56AF000
trusted library allocation
page read and write
400000
heap
page read and write
5151000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
DF650DB000
stack
page read and write
29925A02000
heap
page read and write
21A55842000
heap
page read and write
29924ECE000
heap
page read and write
2F5B000
heap
page read and write
132414F0000
remote allocation
page read and write
A80F07E000
stack
page read and write
2083E06E000
heap
page read and write
4F01000
trusted library allocation
page read and write
132416B6000
heap
page read and write
2F9F57A000
stack
page read and write
CC9000
heap
page read and write
13241702000
heap
page read and write
5524000
trusted library allocation
page read and write
1A8FF800000
heap
page read and write
5151000
trusted library allocation
page read and write
299253E0000
remote allocation
page read and write
21A55864000
heap
page read and write
5601000
trusted library allocation
page read and write
18630613000
heap
page read and write
4E42000
trusted library allocation
page read and write
77B94FE000
stack
page read and write
4F8A000
trusted library allocation
page read and write
6DAEC000
unkown
page readonly
1324161D000
heap
page read and write
5507000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
1A8FF6A0000
heap
page read and write
2F76000
heap
page read and write
13241500000
trusted library allocation
page read and write
1323CF10000
trusted library section
page readonly
299255A0000
heap
page read and write
4E3B000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
19686C12000
heap
page read and write
1323BD20000
heap
page read and write
2992557B000
heap
page read and write
2083E0CB000
heap
page read and write
21A55858000
heap
page read and write
29924E53000
heap
page read and write
77B937E000
stack
page read and write
5302000
trusted library allocation
page read and write
18630609000
heap
page read and write
8E893FD000
stack
page read and write
29925584000
heap
page read and write
D2F000
heap
page read and write
29925527000
heap
page read and write
186D683C000
heap
page read and write
2F5B000
heap
page read and write
1A8FFE70000
trusted library allocation
page read and write
4E8E000
stack
page read and write
51D4000
trusted library allocation
page read and write
C9B000
heap
page read and write
24B20FD0000
trusted library allocation
page read and write
DF6587E000
stack
page read and write
77B97FF000
stack
page read and write
5509000
trusted library allocation
page read and write
2F5B000
heap
page read and write
24B2105C000
heap
page read and write
2F5B000
heap
page read and write
536D000
trusted library allocation
page read and write
18631FA0000
heap
page read and write
4F0E000
stack
page read and write
5507000
trusted library allocation
page read and write
29925575000
heap
page read and write
1A8FF902000
heap
page read and write
550C000
trusted library allocation
page read and write
5374A7F000
stack
page read and write
299255A0000
heap
page read and write
D2F000
heap
page read and write
29925560000
heap
page read and write
4920000
trusted library allocation
page read and write
D12000
heap
page read and write
3000000
heap
page read and write
29925A3E000
heap
page read and write
D90000
heap
page read and write
1A8FF866000
heap
page read and write
52FB000
trusted library allocation
page read and write
E00000
heap
page read and write
2992557C000
heap
page read and write
5151000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
299255C3000
heap
page read and write
A80EEFE000
stack
page read and write
19686C21000
heap
page read and write
13241420000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
550C000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
52FC000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
1323BE8E000
heap
page read and write
21EBD800000
heap
page read and write
4FCF000
stack
page read and write
537447C000
stack
page read and write
21A56002000
trusted library allocation
page read and write
13241410000
trusted library allocation
page read and write
18632502000
heap
page read and write
2083DEC0000
heap
page read and write
2F5B000
heap
page read and write
9FD71DB000
stack
page read and write
29924E58000
heap
page read and write
2F5B000
heap
page read and write
55BB000
trusted library allocation
page read and write
21EBD875000
heap
page read and write
2083E113000
heap
page read and write
5251000
trusted library allocation
page read and write
21A5583A000
heap
page read and write
1323C5E0000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
215D0895000
heap
page read and write
5451000
trusted library allocation
page read and write
2F9F77E000
stack
page read and write
52A8000
trusted library allocation
page read and write
CB9000
heap
page read and write
29924E4F000
heap
page read and write
F2AB6FF000
stack
page read and write
1323BE78000
heap
page read and write
53B8000
trusted library allocation
page read and write
537497E000
stack
page read and write
2083E0E0000
heap
page read and write
9D0000
heap
page read and write
186D6857000
heap
page read and write
13241520000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
21EBE002000
trusted library allocation
page read and write
29925A18000
heap
page read and write
21A5585A000
heap
page read and write
19686D00000
heap
page read and write
6A0000
heap
page read and write
D2F000
heap
page read and write
563C000
trusted library allocation
page read and write
D0C000
heap
page read and write
559B000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
2F6A000
heap
page read and write
550B000
trusted library allocation
page read and write
29925582000
heap
page read and write
51FB000
trusted library allocation
page read and write
4960000
remote allocation
page read and write
2F9FAFF000
stack
page read and write
215D0862000
heap
page read and write
21A55650000
heap
page read and write
186D6829000
heap
page read and write
567B000
trusted library allocation
page read and write
4A00000
heap
page read and write
77B927B000
stack
page read and write
8E5000
heap
page read and write
24B20DA0000
heap
page read and write
24B20D90000
heap
page read and write
51E1000
trusted library allocation
page read and write
18ADA700000
heap
page read and write
559D000
trusted library allocation
page read and write
52EF000
trusted library allocation
page read and write
18630634000
heap
page read and write
2083E066000
heap
page read and write
2083E900000
heap
page read and write
550D000
trusted library allocation
page read and write
21EBD660000
heap
page read and write
2992557A000
heap
page read and write
5151000
trusted library allocation
page read and write
29925582000
heap
page read and write
21A55857000
heap
page read and write
299255C4000
heap
page read and write
29925586000
heap
page read and write
A80F3FD000
stack
page read and write
1323C718000
heap
page read and write
4F01000
trusted library allocation
page read and write
D06000
heap
page read and write
29925402000
heap
page read and write
2F5B000
heap
page read and write
1324163D000
heap
page read and write
2EF9000
heap
page read and write
5504000
trusted library allocation
page read and write
77B95FE000
stack
page read and write
550E000
trusted library allocation
page read and write
8E88D9C000
stack
page read and write
4E01000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
529E000
trusted library allocation
page read and write
24B21066000
heap
page read and write
1A8FF855000
heap
page read and write
8E898FF000
stack
page read and write
1323C718000
heap
page read and write
2992557A000
heap
page read and write
3050000
heap
page read and write
29925589000
heap
page read and write
55AB000
trusted library allocation
page read and write
215D0870000
heap
page read and write
5374877000
stack
page read and write
5151000
trusted library allocation
page read and write
5D0000
heap
page read and write
39D55FE000
stack
page read and write
29925576000
heap
page read and write
52A5000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
39D59FF000
stack
page read and write
5045000
trusted library allocation
page read and write
29925A1A000
heap
page read and write
4F01000
trusted library allocation
page read and write
299253E0000
remote allocation
page read and write
48D0000
heap
page read and write
29925583000
heap
page read and write
132413F0000
trusted library allocation
page read and write
2F5B000
heap
page read and write
55C6000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
29924DE0000
trusted library allocation
page read and write
4F4F000
stack
page read and write
1323BF02000
heap
page read and write
569D000
trusted library allocation
page read and write
18ADA600000
heap
page read and write
77B96FE000
stack
page read and write
299255C2000
heap
page read and write
132414F0000
remote allocation
page read and write
299255B1000
heap
page read and write
18ADA5D0000
heap
page read and write
90084FD000
stack
page read and write
2F68000
heap
page read and write
4960000
remote allocation
page read and write
29925500000
heap
page read and write
2EA0000
heap
page read and write
21EBD841000
heap
page read and write
1323BD90000
heap
page read and write
51F6000
trusted library allocation
page read and write
55D9000
trusted library allocation
page read and write
29925584000
heap
page read and write
18630960000
heap
page read and write
29925525000
heap
page read and write
21A5582D000
heap
page read and write
24B21002000
heap
page read and write
29924EFE000
heap
page read and write
5151000
trusted library allocation
page read and write
2F9EFAB000
stack
page read and write
18630605000
heap
page read and write
4FB1000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1324162B000
heap
page read and write
29924F13000
heap
page read and write
132412E0000
trusted library allocation
page read and write
29925528000
heap
page read and write
5504000
trusted library allocation
page read and write
24B2102A000
heap
page read and write
21A55844000
heap
page read and write
550C000
trusted library allocation
page read and write
1323BEAE000
heap
page read and write
299255A0000
heap
page read and write
299255B1000
heap
page read and write
2F9F8FF000
stack
page read and write
2F5B000
heap
page read and write
29925A02000
heap
page read and write
2F5B000
heap
page read and write
CB9000
heap
page read and write
29925575000
heap
page read and write
186D6882000
heap
page read and write
13241411000
trusted library allocation
page read and write
24B21590000
remote allocation
page read and write
550B000
trusted library allocation
page read and write
5625000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
18ADA560000
heap
page read and write
1323BDC0000
trusted library allocation
page read and write
2F5B000
heap
page read and write
29925582000
heap
page read and write
4E0D000
stack
page read and write
132413FE000
trusted library allocation
page read and write
21A55845000
heap
page read and write
299253E0000
remote allocation
page read and write
535C000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
D10000
heap
page read and write
299255C3000
heap
page read and write
D2F000
heap
page read and write
18ADA67B000
heap
page read and write
504F000
stack
page read and write
4E84000
trusted library allocation
page read and write
11617E000
stack
page read and write
There are 966 hidden memdumps, click here to show them.