Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SCAN-068589.pdf.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template:
Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved
Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer
XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
C:\Users\user\AppData\Local\AdobeFontPack\main.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\x86\5507.nls
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Config.Msi\6ecb58.rbs
|
data
|
modified
|
||
C:\Users\user\AppData\Local\AdobeFontPack\notify.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\6ecb57.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template:
Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved
Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer
XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\6ecb59.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template:
Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved
Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer
XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSID0D5.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{CC038BA5-7236-4713-8948-DFF082243638}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF32CC1CCDA67698BF.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF451B68AA611F0002.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF554ED6AEAE1695CB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5D62286770078C98.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAE475F7BF35B51FF.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB6CC71FD7302A57F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB854D5FFFE3393EB.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFBD7FC4C706A2923E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC1AF1F970900AA0D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFD360B2FB883B3EA4.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF1FA149FB9109A5F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFEC5387194B3D4A9.TMP
|
data
|
dropped
|
||
C:\Config.Msi\68bd59.rbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF275DF4B13EC3E34F.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF6CBE8E5B62F6E221.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF84F6DE3826C4FEB0.TMP
|
data
|
dropped
|
||
C:\Windows\Installer\68bd57.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template:
Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved
Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer
XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\68bd58.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\68bd5a.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Adobe Font Pack 3.0.12.9, Author: Adobe Inc., Keywords: Installer, Comments: Adobe Font Pack, Template:
Intel;1033, Revision Number: {717A1233-ED34-40D0-B14C-98BF5C0B90FE}, Create Time/Date: Thu Jun 16 10:54:52 2022, Last Saved
Time/Date: Thu Jun 16 10:54:52 2022, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer
XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI7D9A.tmp
|
data
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe -n -i:"Install" C:\Users\user\AppData\Local\AdobeFontPack\main.dll
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
-n -i:"Install" C:\Users\user\AppData\Local\AdobeFontPack\main.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe -n -i:"Update?heck" "C:\Users\user\AppData\Local\x86\5507.nls"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
-n -i:"Update?heck" "C:\Users\user\AppData\Local\x86\5507.nls"
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SCAN-068589.pdf.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\wscript.exe
|
wscript.exe C:\Users\user\AppData\Local\AdobeFontPack\notify.vbs
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {4CFB7DD2-D1A8-412D-8316-3EFD3FFEBE4B} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://telemetrysystemcollection.com/m8YYdu/mCQ2U9/home.aspx
|
213.226.114.15
|
||
http://collectiontelemetrysystem.com/cAUtfkUDaptk/ZRSeiy/requets/index.php
|
213.226.114.15
|
||
https://telemetrysystemcollection.com/m8YYdu/mCQ2U9/auth.aspx
|
213.226.114.15
|
||
http://telemetrysystemcollection.com/m8YYdu/mCQ2U9/home.aspx
|
unknown
|
||
https://collectiontelemetrysystem.com/m8YYdu/mCQ2U9/auth.aspx
|
unknown
|
||
http://collectiontelemetrysystem.com/m8YYdu/mCQ2U9/home.aspx
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
telemetrysystemcollection.com
|
213.226.114.15
|
||
collectiontelemetrysystem.com
|
213.226.114.15
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
213.226.114.15
|
telemetrysystemcollection.com
|
Russian Federation
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6ecb58.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6ecb58.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Components\DF2B5B287322BA24F9303B9BAE3B0000
|
5AB830CC632731749884FD0F28426383
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\AdobeFontPack\
|
||
HKEY_CURRENT_USER\Software\AdobeFontPack
|
AdobeFontPack
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\100000007322BA24F9303B9BAE3B509A
|
5AB830CC632731749884FD0F28426383
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
DisplayName
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Features\5AB830CC632731749884FD0F28426383
|
MainProgram
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\Features
|
MainProgram
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Features\5AB830CC632731749884FD0F28426383
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\Features
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-3853321935-2125563209-4053062332-1002\Products\5AB830CC632731749884FD0F28426383\Patches
|
AllPatches
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
ProductName
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
PackageCode
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
Language
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
Version
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
Assignment
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
AdvertiseFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
InstanceType
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
AuthorizedLUAApp
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
DeploymentFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\UpgradeCodes\100000007322BA24F9303B9BAE3B509A
|
5AB830CC632731749884FD0F28426383
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList
|
PackageName
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList\Net
|
1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList\Media
|
1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383
|
Clients
|
||
HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\5AB830CC632731749884FD0F28426383\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\InProgress
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\68bd59.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\68bd59.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Components\DF2B5B287322BA24F9303B9BAE3B0000
|
5AB830CC632731749884FD0F28426383
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{CC038BA5-7236-4713-8948-DFF082243638}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\Features
|
MainProgram
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\Features
|
Complete
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-966771315-3019405637-367336477-1006\Products\5AB830CC632731749884FD0F28426383\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppCreate (Enter)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppGatherWriterMetadata (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppGatherWriterMetadata (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppAddInterestingComponents (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppAddInterestingComponents (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppCreate (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppCreate (Enter)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppGatherWriterMetadata (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppGatherWriterMetadata (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppAddInterestingComponents (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppAddInterestingComponents (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
|
SppCreate (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
|
@%SystemRoot%\system32\p2pcollab.dll,-8042
|
||
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\151\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake\{4CFB7DD2-D1A8-412D-8316-3EFD3FFEBE4B}
|
data
|
There are 157 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1323C700000
|
heap
|
page read and write
|
||
13241260000
|
trusted library allocation
|
page read and write
|
||
29925578000
|
heap
|
page read and write
|
||
21A5585E000
|
heap
|
page read and write
|
||
186D6902000
|
heap
|
page read and write
|
||
186305FD000
|
heap
|
page read and write
|
||
2083E0BA000
|
heap
|
page read and write
|
||
29925A1A000
|
heap
|
page read and write
|
||
186D688D000
|
heap
|
page read and write
|
||
77B92FE000
|
stack
|
page read and write
|
||
4D24778000
|
stack
|
page read and write
|
||
21EBD6D0000
|
heap
|
page read and write
|
||
2F9F9FF000
|
stack
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
19686C20000
|
heap
|
page read and write
|
||
2083E802000
|
heap
|
page read and write
|
||
900877E000
|
stack
|
page read and write
|
||
1323C5F0000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
8E899FF000
|
stack
|
page read and write
|
||
19686CE0000
|
heap
|
page read and write
|
||
18631FF0000
|
heap
|
page read and write
|
||
5509000
|
trusted library allocation
|
page read and write
|
||
299255B2000
|
heap
|
page read and write
|
||
1A8FF913000
|
heap
|
page read and write
|
||
8E892FF000
|
stack
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
21A55813000
|
heap
|
page read and write
|
||
4D247FF000
|
stack
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
29925582000
|
heap
|
page read and write
|
||
6DAF4000
|
unkown
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
18630634000
|
heap
|
page read and write
|
||
52DA000
|
trusted library allocation
|
page read and write
|
||
39D57FE000
|
stack
|
page read and write
|
||
29925585000
|
heap
|
page read and write
|
||
19686C23000
|
heap
|
page read and write
|
||
299255D9000
|
heap
|
page read and write
|
||
18630530000
|
heap
|
page read and write
|
||
2083E000000
|
heap
|
page read and write
|
||
5509000
|
trusted library allocation
|
page read and write
|
||
19686C12000
|
heap
|
page read and write
|
||
29924E13000
|
heap
|
page read and write
|
||
F2AB4FF000
|
stack
|
page read and write
|
||
2992551E000
|
heap
|
page read and write
|
||
2992557A000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
29924EEF000
|
heap
|
page read and write
|
||
299255BC000
|
heap
|
page read and write
|
||
18630550000
|
heap
|
page read and write
|
||
1A8FF6B0000
|
heap
|
page read and write
|
||
132416A3000
|
heap
|
page read and write
|
||
186305E8000
|
heap
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
29924E80000
|
heap
|
page read and write
|
||
19686C27000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
13241704000
|
heap
|
page read and write
|
||
13242000000
|
heap
|
page read and write
|
||
A80F2FE000
|
stack
|
page read and write
|
||
18630604000
|
heap
|
page read and write
|
||
2992557C000
|
heap
|
page read and write
|
||
9FD747E000
|
stack
|
page read and write
|
||
13241530000
|
trusted library allocation
|
page read and write
|
||
21A55827000
|
heap
|
page read and write
|
||
1323BD30000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
132412D0000
|
trusted library allocation
|
page read and write
|
||
19686BF7000
|
heap
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
2F9F87B000
|
stack
|
page read and write
|
||
29925531000
|
heap
|
page read and write
|
||
DF6515E000
|
stack
|
page read and write
|
||
4BB000
|
stack
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
A80F17F000
|
stack
|
page read and write
|
||
299255BC000
|
heap
|
page read and write
|
||
8E895FD000
|
stack
|
page read and write
|
||
13241663000
|
heap
|
page read and write
|
||
DF654FB000
|
stack
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
1323C713000
|
heap
|
page read and write
|
||
24B21013000
|
heap
|
page read and write
|
||
DF65979000
|
stack
|
page read and write
|
||
29925580000
|
heap
|
page read and write
|
||
29924C10000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
186D6862000
|
heap
|
page read and write
|
||
29924E4E000
|
heap
|
page read and write
|
||
29924E57000
|
heap
|
page read and write
|
||
51CA000
|
trusted library allocation
|
page read and write
|
||
186D6610000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
51D3000
|
trusted library allocation
|
page read and write
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
21EBD670000
|
heap
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
1323CEE0000
|
trusted library section
|
page readonly
|
||
2F53000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
1A8FF813000
|
heap
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
900837F000
|
stack
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
8E894FE000
|
stack
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
18ADA668000
|
heap
|
page read and write
|
||
A80F27D000
|
stack
|
page read and write
|
||
DF656F7000
|
stack
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
19686C09000
|
heap
|
page read and write
|
||
132416FB000
|
heap
|
page read and write
|
||
2992551E000
|
heap
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
132413F0000
|
trusted library allocation
|
page read and write
|
||
21A5587E000
|
heap
|
page read and write
|
||
2F9F97E000
|
stack
|
page read and write
|
||
4C60000
|
remote allocation
|
page read and write
|
||
5503000
|
trusted library allocation
|
page read and write
|
||
1323D260000
|
trusted library allocation
|
page read and write
|
||
2992557B000
|
heap
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
55C5000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
21A55861000
|
heap
|
page read and write
|
||
1323BE70000
|
heap
|
page read and write
|
||
18ADA702000
|
heap
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
remote allocation
|
page read and write
|
||
18ADAD30000
|
trusted library allocation
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
299255A9000
|
heap
|
page read and write
|
||
19686C02000
|
heap
|
page read and write
|
||
1A8FF881000
|
heap
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
5503000
|
trusted library allocation
|
page read and write
|
||
2083E013000
|
heap
|
page read and write
|
||
215D0660000
|
heap
|
page read and write
|
||
18630965000
|
heap
|
page read and write
|
||
1A900002000
|
trusted library allocation
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
186D6908000
|
heap
|
page read and write
|
||
29925593000
|
heap
|
page read and write
|
||
29925527000
|
heap
|
page read and write
|
||
19686D25000
|
heap
|
page read and write
|
||
11637E000
|
stack
|
page read and write
|
||
186D6770000
|
trusted library allocation
|
page read and write
|
||
21EBD85B000
|
heap
|
page read and write
|
||
55C5000
|
trusted library allocation
|
page read and write
|
||
19686C04000
|
heap
|
page read and write
|
||
1863062C000
|
heap
|
page read and write
|
||
2083E680000
|
trusted library allocation
|
page read and write
|
||
21A5587A000
|
heap
|
page read and write
|
||
1323BE93000
|
heap
|
page read and write
|
||
299255B1000
|
heap
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
5302000
|
trusted library allocation
|
page read and write
|
||
24B2103C000
|
heap
|
page read and write
|
||
1A8FF829000
|
heap
|
page read and write
|
||
18ADAE02000
|
trusted library allocation
|
page read and write
|
||
DF651DE000
|
stack
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
C9C000
|
heap
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
29925586000
|
heap
|
page read and write
|
||
29924E89000
|
heap
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
1863062C000
|
heap
|
page read and write
|
||
29925584000
|
heap
|
page read and write
|
||
4D2487C000
|
stack
|
page read and write
|
||
29924E55000
|
heap
|
page read and write
|
||
24B20E00000
|
heap
|
page read and write
|
||
24B21590000
|
remote allocation
|
page read and write
|
||
29925561000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
29924EC7000
|
heap
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
2F85000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
29925596000
|
heap
|
page read and write
|
||
186D6813000
|
heap
|
page read and write
|
||
2F46000
|
heap
|
page read and write
|
||
29924E48000
|
heap
|
page read and write
|
||
9FD79FC000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
18630635000
|
heap
|
page read and write
|
||
24B21602000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
24B21102000
|
heap
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
299255CD000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
29925584000
|
heap
|
page read and write
|
||
132416B7000
|
heap
|
page read and write
|
||
186D6913000
|
heap
|
page read and write
|
||
21A5585C000
|
heap
|
page read and write
|
||
13241706000
|
heap
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
19686C0A000
|
heap
|
page read and write
|
||
900857B000
|
stack
|
page read and write
|
||
1A8FF900000
|
heap
|
page read and write
|
||
39D5BFF000
|
stack
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
DF655F8000
|
stack
|
page read and write
|
||
29924E4B000
|
heap
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
299255B2000
|
heap
|
page read and write
|
||
55B8000
|
trusted library allocation
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
1A8FF875000
|
heap
|
page read and write
|
||
215D0600000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
567D000
|
trusted library allocation
|
page read and write
|
||
3055000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
186304C0000
|
heap
|
page read and write
|
||
19686C23000
|
heap
|
page read and write
|
||
21EBD837000
|
heap
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
11607B000
|
stack
|
page read and write
|
||
132416E3000
|
heap
|
page read and write
|
||
8E89AFF000
|
stack
|
page read and write
|
||
A80EFFE000
|
stack
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
564F000
|
trusted library allocation
|
page read and write
|
||
5689000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
1863096B000
|
heap
|
page read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
29924E00000
|
heap
|
page read and write
|
||
299255B1000
|
heap
|
page read and write
|
||
6DAF6000
|
unkown
|
page readonly
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
18630619000
|
heap
|
page read and write
|
||
21A55831000
|
heap
|
page read and write
|
||
90083FC000
|
stack
|
page read and write
|
||
E37000
|
stack
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
13241420000
|
trusted library allocation
|
page read and write
|
||
18ADA63C000
|
heap
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
1323BF26000
|
heap
|
page read and write
|
||
186305FD000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
F2AB0FE000
|
stack
|
page read and write
|
||
21A55866000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
1863062F000
|
heap
|
page read and write
|
||
186D6900000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
F2AB27C000
|
stack
|
page read and write
|
||
21EBD913000
|
heap
|
page read and write
|
||
21A5587B000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
55AC000
|
trusted library allocation
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
215D05F0000
|
heap
|
page read and write
|
||
1323BE8C000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
215D1002000
|
trusted library allocation
|
page read and write
|
||
2083E029000
|
heap
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
2083E064000
|
heap
|
page read and write
|
||
55AC000
|
trusted library allocation
|
page read and write
|
||
29925593000
|
heap
|
page read and write
|
||
18630613000
|
heap
|
page read and write
|
||
C9B000
|
stack
|
page read and write
|
||
1323C615000
|
heap
|
page read and write
|
||
18633B50000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
trusted library allocation
|
page read and write
|
||
13241414000
|
trusted library allocation
|
page read and write
|
||
900867D000
|
stack
|
page read and write
|
||
1323BE59000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
1A8FF86F000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
186D6800000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
29924EAC000
|
heap
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
19686BE0000
|
heap
|
page read and write
|
||
29924F08000
|
heap
|
page read and write
|
||
21EBD813000
|
heap
|
page read and write
|
||
29925573000
|
heap
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
299255B2000
|
heap
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
29925589000
|
heap
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
5323000
|
trusted library allocation
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
19686C23000
|
heap
|
page read and write
|
||
215D082A000
|
heap
|
page read and write
|
||
21A55884000
|
heap
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
9FD74FE000
|
stack
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
19686C05000
|
heap
|
page read and write
|
||
1323CDE0000
|
trusted library allocation
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
2F9F67B000
|
stack
|
page read and write
|
||
29925594000
|
heap
|
page read and write
|
||
186D6874000
|
heap
|
page read and write
|
||
5503000
|
trusted library allocation
|
page read and write
|
||
186305E0000
|
heap
|
page read and write
|
||
21A5586D000
|
heap
|
page read and write
|
||
186D684F000
|
heap
|
page read and write
|
||
900807C000
|
stack
|
page read and write
|
||
2083E102000
|
heap
|
page read and write
|
||
BCC000
|
stack
|
page read and write
|
||
19686C23000
|
heap
|
page read and write
|
||
299255A9000
|
heap
|
page read and write
|
||
55C7000
|
trusted library allocation
|
page read and write
|
||
29924E49000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
18630608000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
9FD7AFE000
|
stack
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
21A5582F000
|
heap
|
page read and write
|
||
F2AB07B000
|
stack
|
page read and write
|
||
29925589000
|
heap
|
page read and write
|
||
1A8FF84A000
|
heap
|
page read and write
|
||
2083DEB0000
|
heap
|
page read and write
|
||
1324164A000
|
heap
|
page read and write
|
||
215D0913000
|
heap
|
page read and write
|
||
19686C02000
|
heap
|
page read and write
|
||
186D6802000
|
heap
|
page read and write
|
||
215D0760000
|
trusted library allocation
|
page read and write
|
||
215D085A000
|
heap
|
page read and write
|
||
21A55849000
|
heap
|
page read and write
|
||
132416AC000
|
heap
|
page read and write
|
||
186D685D000
|
heap
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
186D7002000
|
trusted library allocation
|
page read and write
|
||
900827F000
|
stack
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
1A8FF908000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
18ADA629000
|
heap
|
page read and write
|
||
1863062C000
|
heap
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
299255C2000
|
heap
|
page read and write
|
||
900887F000
|
stack
|
page read and write
|
||
1323BE00000
|
heap
|
page read and write
|
||
13241610000
|
heap
|
page read and write
|
||
2F9FBFA000
|
stack
|
page read and write
|
||
5069000
|
trusted library allocation
|
page read and write
|
||
215D0861000
|
heap
|
page read and write
|
||
19686AA0000
|
heap
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
1323BE13000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
1A8FF866000
|
heap
|
page read and write
|
||
29925585000
|
heap
|
page read and write
|
||
2083E912000
|
heap
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
132414C0000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
21A55800000
|
heap
|
page read and write
|
||
13241510000
|
trusted library allocation
|
page read and write
|
||
215D083C000
|
heap
|
page read and write
|
||
215D0900000
|
heap
|
page read and write
|
||
186D6600000
|
heap
|
page read and write
|
||
24B21000000
|
heap
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
2F73000
|
heap
|
page read and write
|
||
39D54F9000
|
stack
|
page read and write
|
||
18632500000
|
heap
|
page read and write
|
||
21A5585F000
|
heap
|
page read and write
|
||
2992550E000
|
heap
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
29925561000
|
heap
|
page read and write
|
||
18ADA713000
|
heap
|
page read and write
|
||
537457E000
|
stack
|
page read and write
|
||
299255B1000
|
heap
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
1323C702000
|
heap
|
page read and write
|
||
132416EA000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
39D5CFF000
|
stack
|
page read and write
|
||
29925597000
|
heap
|
page read and write
|
||
21A557C0000
|
trusted library allocation
|
page read and write
|
||
9FD75FB000
|
stack
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
29924EE8000
|
heap
|
page read and write
|
||
2083E088000
|
heap
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
19686C12000
|
heap
|
page read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
29925576000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
518C000
|
trusted library allocation
|
page read and write
|
||
29924E6D000
|
heap
|
page read and write
|
||
DF65AFF000
|
unkown
|
page read and write
|
||
4C60000
|
remote allocation
|
page read and write
|
||
21A5584E000
|
heap
|
page read and write
|
||
29924EB6000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
21A5582E000
|
heap
|
page read and write
|
||
24B21590000
|
remote allocation
|
page read and write
|
||
13241430000
|
trusted library allocation
|
page read and write
|
||
2992551C000
|
heap
|
page read and write
|
||
29924EDB000
|
heap
|
page read and write
|
||
1A8FF83C000
|
heap
|
page read and write
|
||
21EBD902000
|
heap
|
page read and write
|
||
18ADA66A000
|
heap
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
21A55902000
|
heap
|
page read and write
|
||
132413F8000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
29925582000
|
heap
|
page read and write
|
||
21A55841000
|
heap
|
page read and write
|
||
6DA90000
|
unkown
|
page readonly
|
||
2F75000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
F2AB17E000
|
stack
|
page read and write
|
||
29924BA0000
|
heap
|
page read and write
|
||
1323C5C1000
|
trusted library allocation
|
page read and write
|
||
215D0865000
|
heap
|
page read and write
|
||
1323BE29000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
1863064A000
|
heap
|
page read and write
|
||
2F9FF7F000
|
stack
|
page read and write
|
||
21A556C0000
|
heap
|
page read and write
|
||
5295000
|
trusted library allocation
|
page read and write
|
||
9007E7C000
|
stack
|
page read and write
|
||
19686BE7000
|
heap
|
page read and write
|
||
13241600000
|
heap
|
page read and write
|
||
24B2102C000
|
heap
|
page read and write
|
||
1323BE75000
|
heap
|
page read and write
|
||
52EF000
|
trusted library allocation
|
page read and write
|
||
1323CEF0000
|
trusted library section
|
page readonly
|
||
5217000
|
trusted library allocation
|
page read and write
|
||
55D3000
|
trusted library allocation
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
A80F4FD000
|
stack
|
page read and write
|
||
53744FE000
|
stack
|
page read and write
|
||
13241434000
|
trusted library allocation
|
page read and write
|
||
29925A21000
|
heap
|
page read and write
|
||
29924E3C000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
18630628000
|
heap
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
heap
|
page read and write
|
||
501D000
|
trusted library allocation
|
page read and write
|
||
29924E51000
|
heap
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
2992557C000
|
heap
|
page read and write
|
||
215D085B000
|
heap
|
page read and write
|
||
13241540000
|
trusted library allocation
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
F2AB477000
|
stack
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
18631FF4000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
29925598000
|
heap
|
page read and write
|
||
2F6E000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
29925587000
|
heap
|
page read and write
|
||
518F000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
537477B000
|
stack
|
page read and write
|
||
2F9FA7F000
|
stack
|
page read and write
|
||
4D243DE000
|
stack
|
page read and write
|
||
21A55846000
|
heap
|
page read and write
|
||
29925598000
|
heap
|
page read and write
|
||
2F9F3F8000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
18ADA613000
|
heap
|
page read and write
|
||
8E891FB000
|
stack
|
page read and write
|
||
29924F16000
|
heap
|
page read and write
|
||
29924E29000
|
heap
|
page read and write
|
||
21A5582A000
|
heap
|
page read and write
|
||
11627E000
|
stack
|
page read and write
|
||
2992557A000
|
heap
|
page read and write
|
||
18630609000
|
heap
|
page read and write
|
||
8E897FF000
|
stack
|
page read and write
|
||
21EBD802000
|
heap
|
page read and write
|
||
29924E4A000
|
heap
|
page read and write
|
||
29925A00000
|
heap
|
page read and write
|
||
1A8FF84F000
|
heap
|
page read and write
|
||
29924E71000
|
heap
|
page read and write
|
||
2992557A000
|
heap
|
page read and write
|
||
18630634000
|
heap
|
page read and write
|
||
215D0870000
|
heap
|
page read and write
|
||
1323BDD0000
|
trusted library section
|
page read and write
|
||
4D246FF000
|
stack
|
page read and write
|
||
2F71000
|
heap
|
page read and write
|
||
21A55869000
|
heap
|
page read and write
|
||
4E37000
|
trusted library allocation
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
2083DF20000
|
heap
|
page read and write
|
||
2F9FD7B000
|
stack
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
2992551C000
|
heap
|
page read and write
|
||
2F9FC7E000
|
stack
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
29925A18000
|
heap
|
page read and write
|
||
19686C25000
|
heap
|
page read and write
|
||
186305F8000
|
heap
|
page read and write
|
||
1323C600000
|
heap
|
page read and write
|
||
29925A21000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
21EBD868000
|
heap
|
page read and write
|
||
29925565000
|
heap
|
page read and write
|
||
21A5583D000
|
heap
|
page read and write
|
||
29924EA5000
|
heap
|
page read and write
|
||
215D0813000
|
heap
|
page read and write
|
||
29924E6D000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
29924E52000
|
heap
|
page read and write
|
||
18ADA570000
|
heap
|
page read and write
|
||
52EF000
|
trusted library allocation
|
page read and write
|
||
2F6C000
|
heap
|
page read and write
|
||
1323BE9E000
|
heap
|
page read and write
|
||
9FD76FB000
|
stack
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
29924EB2000
|
heap
|
page read and write
|
||
29925586000
|
heap
|
page read and write
|
||
215D0908000
|
heap
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
1323BE7A000
|
heap
|
page read and write
|
||
29925557000
|
heap
|
page read and write
|
||
4960000
|
remote allocation
|
page read and write
|
||
5914000
|
unkown
|
page read and write
|
||
18630617000
|
heap
|
page read and write
|
||
299255C4000
|
heap
|
page read and write
|
||
39D56FE000
|
stack
|
page read and write
|
||
132414F0000
|
remote allocation
|
page read and write
|
||
4D2435A000
|
stack
|
page read and write
|
||
13241550000
|
trusted library allocation
|
page read and write
|
||
4D2467E000
|
stack
|
page read and write
|
||
19686BF2000
|
heap
|
page read and write
|
||
19686D20000
|
heap
|
page read and write
|
||
1A8FF710000
|
heap
|
page read and write
|
||
1323C5E3000
|
trusted library allocation
|
page read and write
|
||
18630634000
|
heap
|
page read and write
|
||
299255C2000
|
heap
|
page read and write
|
||
9FD78FF000
|
stack
|
page read and write
|
||
55B1000
|
trusted library allocation
|
page read and write
|
||
1323C602000
|
heap
|
page read and write
|
||
2992557A000
|
heap
|
page read and write
|
||
1A8FF827000
|
heap
|
page read and write
|
||
115ACB000
|
stack
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
19686C01000
|
heap
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
299255A9000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
9FD77F7000
|
stack
|
page read and write
|
||
215D082F000
|
heap
|
page read and write
|
||
29924BB0000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
21A55660000
|
heap
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
F2AB5FF000
|
stack
|
page read and write
|
||
18630634000
|
heap
|
page read and write
|
||
215D085E000
|
heap
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
4F99000
|
trusted library allocation
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
2083E0C4000
|
heap
|
page read and write
|
||
2083E044000
|
heap
|
page read and write
|
||
1323CF00000
|
trusted library section
|
page readonly
|
||
5191000
|
trusted library allocation
|
page read and write
|
||
4FCA000
|
trusted library allocation
|
page read and write
|
||
A80EB1B000
|
stack
|
page read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
29924F02000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
1323CEC0000
|
trusted library section
|
page readonly
|
||
215D0800000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
1323BEA0000
|
heap
|
page read and write
|
||
1323BEFE000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
21A55877000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
18ADA602000
|
heap
|
page read and write
|
||
1323BE3E000
|
heap
|
page read and write
|
||
29925568000
|
heap
|
page read and write
|
||
55C1000
|
trusted library allocation
|
page read and write
|
||
18ADA658000
|
heap
|
page read and write
|
||
1323CED0000
|
trusted library section
|
page readonly
|
||
1863062C000
|
heap
|
page read and write
|
||
29924E4C000
|
heap
|
page read and write
|
||
21EBD7D0000
|
trusted library allocation
|
page read and write
|
||
18630613000
|
heap
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
6DA91000
|
unkown
|
page execute read
|
||
55DE000
|
trusted library allocation
|
page read and write
|
||
8E896FE000
|
stack
|
page read and write
|
||
55BF000
|
trusted library allocation
|
page read and write
|
||
52E9000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
537467C000
|
stack
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
1323BF13000
|
heap
|
page read and write
|
||
186D6867000
|
heap
|
page read and write
|
||
29925589000
|
heap
|
page read and write
|
||
DF6577E000
|
stack
|
page read and write
|
||
F2AB37B000
|
stack
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
19686BF7000
|
heap
|
page read and write
|
||
186D6670000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
186D6860000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
29925585000
|
heap
|
page read and write
|
||
215D0882000
|
heap
|
page read and write
|
||
21A5586B000
|
heap
|
page read and write
|
||
19686C02000
|
heap
|
page read and write
|
||
21EBD829000
|
heap
|
page read and write
|
||
DF65A77000
|
stack
|
page read and write
|
||
132416A0000
|
heap
|
page read and write
|
||
215D0902000
|
heap
|
page read and write
|
||
2F85000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
5595000
|
trusted library allocation
|
page read and write
|
||
DF650DB000
|
stack
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
21A55842000
|
heap
|
page read and write
|
||
29924ECE000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
132414F0000
|
remote allocation
|
page read and write
|
||
A80F07E000
|
stack
|
page read and write
|
||
2083E06E000
|
heap
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
132416B6000
|
heap
|
page read and write
|
||
2F9F57A000
|
stack
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
13241702000
|
heap
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
1A8FF800000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
299253E0000
|
remote allocation
|
page read and write
|
||
21A55864000
|
heap
|
page read and write
|
||
5601000
|
trusted library allocation
|
page read and write
|
||
18630613000
|
heap
|
page read and write
|
||
4E42000
|
trusted library allocation
|
page read and write
|
||
77B94FE000
|
stack
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
6DAEC000
|
unkown
|
page readonly
|
||
1324161D000
|
heap
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
55DD000
|
trusted library allocation
|
page read and write
|
||
1A8FF6A0000
|
heap
|
page read and write
|
||
2F76000
|
heap
|
page read and write
|
||
13241500000
|
trusted library allocation
|
page read and write
|
||
1323CF10000
|
trusted library section
|
page readonly
|
||
299255A0000
|
heap
|
page read and write
|
||
4E3B000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
19686C12000
|
heap
|
page read and write
|
||
1323BD20000
|
heap
|
page read and write
|
||
2992557B000
|
heap
|
page read and write
|
||
2083E0CB000
|
heap
|
page read and write
|
||
21A55858000
|
heap
|
page read and write
|
||
29924E53000
|
heap
|
page read and write
|
||
77B937E000
|
stack
|
page read and write
|
||
5302000
|
trusted library allocation
|
page read and write
|
||
18630609000
|
heap
|
page read and write
|
||
8E893FD000
|
stack
|
page read and write
|
||
29925584000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
29925527000
|
heap
|
page read and write
|
||
186D683C000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
1A8FFE70000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
51D4000
|
trusted library allocation
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
24B20FD0000
|
trusted library allocation
|
page read and write
|
||
DF6587E000
|
stack
|
page read and write
|
||
77B97FF000
|
stack
|
page read and write
|
||
5509000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
24B2105C000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
18631FA0000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
29925575000
|
heap
|
page read and write
|
||
1A8FF902000
|
heap
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
5374A7F000
|
stack
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
29925560000
|
heap
|
page read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
D12000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
29925A3E000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1A8FF866000
|
heap
|
page read and write
|
||
52FB000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2992557C000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
299255C3000
|
heap
|
page read and write
|
||
A80EEFE000
|
stack
|
page read and write
|
||
19686C21000
|
heap
|
page read and write
|
||
13241420000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
trusted library allocation
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
52FC000
|
trusted library allocation
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
1323BE8E000
|
heap
|
page read and write
|
||
21EBD800000
|
heap
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
537447C000
|
stack
|
page read and write
|
||
21A56002000
|
trusted library allocation
|
page read and write
|
||
13241410000
|
trusted library allocation
|
page read and write
|
||
18632502000
|
heap
|
page read and write
|
||
2083DEC0000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
9FD71DB000
|
stack
|
page read and write
|
||
29924E58000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
21EBD875000
|
heap
|
page read and write
|
||
2083E113000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
21A5583A000
|
heap
|
page read and write
|
||
1323C5E0000
|
trusted library allocation
|
page read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
215D0895000
|
heap
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
2F9F77E000
|
stack
|
page read and write
|
||
52A8000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
29924E4F000
|
heap
|
page read and write
|
||
F2AB6FF000
|
stack
|
page read and write
|
||
1323BE78000
|
heap
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
537497E000
|
stack
|
page read and write
|
||
2083E0E0000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
186D6857000
|
heap
|
page read and write
|
||
13241520000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
21EBE002000
|
trusted library allocation
|
page read and write
|
||
29925A18000
|
heap
|
page read and write
|
||
21A5585A000
|
heap
|
page read and write
|
||
19686D00000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
29925582000
|
heap
|
page read and write
|
||
51FB000
|
trusted library allocation
|
page read and write
|
||
4960000
|
remote allocation
|
page read and write
|
||
2F9FAFF000
|
stack
|
page read and write
|
||
215D0862000
|
heap
|
page read and write
|
||
21A55650000
|
heap
|
page read and write
|
||
186D6829000
|
heap
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
77B927B000
|
stack
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
24B20DA0000
|
heap
|
page read and write
|
||
24B20D90000
|
heap
|
page read and write
|
||
51E1000
|
trusted library allocation
|
page read and write
|
||
18ADA700000
|
heap
|
page read and write
|
||
559D000
|
trusted library allocation
|
page read and write
|
||
52EF000
|
trusted library allocation
|
page read and write
|
||
18630634000
|
heap
|
page read and write
|
||
2083E066000
|
heap
|
page read and write
|
||
2083E900000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
21EBD660000
|
heap
|
page read and write
|
||
2992557A000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
29925582000
|
heap
|
page read and write
|
||
21A55857000
|
heap
|
page read and write
|
||
299255C4000
|
heap
|
page read and write
|
||
29925586000
|
heap
|
page read and write
|
||
A80F3FD000
|
stack
|
page read and write
|
||
1323C718000
|
heap
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
29925402000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
1324163D000
|
heap
|
page read and write
|
||
2EF9000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
77B95FE000
|
stack
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
8E88D9C000
|
stack
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
529E000
|
trusted library allocation
|
page read and write
|
||
24B21066000
|
heap
|
page read and write
|
||
1A8FF855000
|
heap
|
page read and write
|
||
8E898FF000
|
stack
|
page read and write
|
||
1323C718000
|
heap
|
page read and write
|
||
2992557A000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
29925589000
|
heap
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
215D0870000
|
heap
|
page read and write
|
||
5374877000
|
stack
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
39D55FE000
|
stack
|
page read and write
|
||
29925576000
|
heap
|
page read and write
|
||
52A5000
|
trusted library allocation
|
page read and write
|
||
564E000
|
trusted library allocation
|
page read and write
|
||
39D59FF000
|
stack
|
page read and write
|
||
5045000
|
trusted library allocation
|
page read and write
|
||
29925A1A000
|
heap
|
page read and write
|
||
4F01000
|
trusted library allocation
|
page read and write
|
||
299253E0000
|
remote allocation
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
29925583000
|
heap
|
page read and write
|
||
132413F0000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
29924DE0000
|
trusted library allocation
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
1323BF02000
|
heap
|
page read and write
|
||
569D000
|
trusted library allocation
|
page read and write
|
||
18ADA600000
|
heap
|
page read and write
|
||
77B96FE000
|
stack
|
page read and write
|
||
299255C2000
|
heap
|
page read and write
|
||
132414F0000
|
remote allocation
|
page read and write
|
||
299255B1000
|
heap
|
page read and write
|
||
18ADA5D0000
|
heap
|
page read and write
|
||
90084FD000
|
stack
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
4960000
|
remote allocation
|
page read and write
|
||
29925500000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
21EBD841000
|
heap
|
page read and write
|
||
1323BD90000
|
heap
|
page read and write
|
||
51F6000
|
trusted library allocation
|
page read and write
|
||
55D9000
|
trusted library allocation
|
page read and write
|
||
29925584000
|
heap
|
page read and write
|
||
18630960000
|
heap
|
page read and write
|
||
29925525000
|
heap
|
page read and write
|
||
21A5582D000
|
heap
|
page read and write
|
||
24B21002000
|
heap
|
page read and write
|
||
29924EFE000
|
heap
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
2F9EFAB000
|
stack
|
page read and write
|
||
18630605000
|
heap
|
page read and write
|
||
4FB1000
|
trusted library allocation
|
page read and write
|
||
5151000
|
trusted library allocation
|
page read and write
|
||
1324162B000
|
heap
|
page read and write
|
||
29924F13000
|
heap
|
page read and write
|
||
132412E0000
|
trusted library allocation
|
page read and write
|
||
29925528000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
24B2102A000
|
heap
|
page read and write
|
||
21A55844000
|
heap
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
1323BEAE000
|
heap
|
page read and write
|
||
299255A0000
|
heap
|
page read and write
|
||
299255B1000
|
heap
|
page read and write
|
||
2F9F8FF000
|
stack
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
29925A02000
|
heap
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
29925575000
|
heap
|
page read and write
|
||
186D6882000
|
heap
|
page read and write
|
||
13241411000
|
trusted library allocation
|
page read and write
|
||
24B21590000
|
remote allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
5625000
|
trusted library allocation
|
page read and write
|
||
53C7000
|
trusted library allocation
|
page read and write
|
||
18ADA560000
|
heap
|
page read and write
|
||
1323BDC0000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
heap
|
page read and write
|
||
29925582000
|
heap
|
page read and write
|
||
4E0D000
|
stack
|
page read and write
|
||
132413FE000
|
trusted library allocation
|
page read and write
|
||
21A55845000
|
heap
|
page read and write
|
||
299253E0000
|
remote allocation
|
page read and write
|
||
535C000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
299255C3000
|
heap
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
18ADA67B000
|
heap
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
11617E000
|
stack
|
page read and write
|
There are 966 hidden memdumps, click here to show them.