IOC Report
ylUZYIm2Lx.exe

loading gif

Files

File Path
Type
Category
Malicious
ylUZYIm2Lx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4xo.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4xo.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AQRFEVRTGL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ATJBEMHSSB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DUUDTUBZFW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFGRWFCUWS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EHDBGDHDAECBGDHJKFID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EOWRVPQCCS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FIJDGIJJKEGIEBGCGDHCFIDAAE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHCAAAAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\JJDBAAEGDBKKECBGIJEBGDAEBF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JJJJKEHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJJKEHCAKFBFHJKEHCFIIDAEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\JKKKJJJKJKFHJJJJECBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKKKJJJKJKFHJJJJECBFCGHJDH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u4xo.0.exe_902e75ce2fad997becf8a5cfb8eaa92ab31ff9e9_ae615613_25ef64b0-15c9-47ac-8548-4accb9d9f2f2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ylUZYIm2Lx.exe_a8aca34e591f1333c836570b4f4b9ff9bd1919b_6e0797e9_d461c1ca-feeb-47f8-be42-abd0e0a7a8d6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER283.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 16 09:31:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER87D4.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 16 09:31:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88CF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER892E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NIRMEKAMZH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\5031d305a611656da7ab8203ae6a6b12e704f90cc3b1d89a8de243f466cad47b\bjw4kuq5.ga1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ylUZYIm2Lx.exe
"C:\Users\user\Desktop\ylUZYIm2Lx.exe"
malicious
C:\Users\user\AppData\Local\Temp\u4xo.0.exe
"C:\Users\user\AppData\Local\Temp\u4xo.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u4xo.1.exe
"C:\Users\user\AppData\Local\Temp\u4xo.1.exe"
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 1124
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 2204

URLs

Name
IP
Malicious
185.172.128.209/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.209/15f649199f40275b/freebl3.dll
185.172.128.209
malicious
http://185.172.128.209
unknown
malicious
http://185.172.128.209/15f649199f40275b/nss3.dll
185.172.128.209
malicious
http://185.172.128.209/15f649199f40275b/vcruntime140.dll
185.172.128.209
malicious
http://185.172.128.209/15f649199f40275b/softokn3.dll
185.172.128.209
malicious
http://185.172.128.209/15f649199f40275b/mozglue.dll
185.172.128.209
malicious
http://185.172.128.90/cpa/ping.php?substr=seven&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.209/15f649199f40275b/sqlite3.dll
185.172.128.209
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpC&
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
https://mozilla.org0/
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://dc.services.visualstudio.com/
unknown
http://185.172.128.209/15f649199f40275b/mozglue.dllU
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://185.172.128.209/3cd2b41cbde8fc9c.phpQ?
unknown
https://support.iolo.com/support/solutions/articles/44
unknown
https://github.com/itfoundry/Poppins)$
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpa?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpxy
unknown
https://scripts.sil.org/OFLThis
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpY
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
http://westus2-2.in.applicationinsights.azure.com
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://github.com/itfoundry/Poppins)=
unknown
https://www.iolo.com/company/legal/eula/
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpE?
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpM
unknown
http://google.com
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.php=?
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://github.com/itfoundry/Poppins)d
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.209/15f649199f40275b/freebl3.dllo
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.php%?
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpi
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.06
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpu
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpm?
unknown
https://github.com/microsoft/ApplicationInsights-dotnet/issues/2560
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
svc.iolo.com
20.157.87.45
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
185.172.128.209
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
ProgramId
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
FileId
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
LowerCaseLongPath
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
LongPathHash
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
Name
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
OriginalFileName
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
Publisher
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
Version
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
BinFileVersion
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
BinaryType
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
ProductName
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
ProductVersion
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
LinkDate
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
BinProductVersion
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
AppxPackageFullName
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
AppxPackageRelativeId
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
Size
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
Language
\REGISTRY\A\{bcbfc63c-f9d1-6591-c773-4b9ad600053f}\Root\InventoryApplicationFile\yluzyim2lx.exe|10fab85a1a8f8f18
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
ProgramId
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
FileId
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
LowerCaseLongPath
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
LongPathHash
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
Name
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
OriginalFileName
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
Publisher
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
Version
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
BinFileVersion
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
BinaryType
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
ProductName
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
ProductVersion
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
LinkDate
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
BinProductVersion
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
AppxPackageFullName
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
AppxPackageRelativeId
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
Size
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
Language
\REGISTRY\A\{cf054270-44b1-cb3b-2152-85815e997426}\Root\InventoryApplicationFile\u4xo.0.exe|271c308f5804cc8e
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00D9FF42AE5
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 53 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23863C83000
trusted library allocation
page read and write
malicious
2386C500000
trusted library section
page read and write
malicious
400000
unkown
page execute and read and write
malicious
BB8000
heap
page read and write
malicious
9F0000
direct allocation
page read and write
malicious
2386C610000
trusted library section
page read and write
malicious
2384E4BB000
unkown
page readonly
malicious
238516BB000
unkown
page readonly
malicious
9C0000
direct allocation
page execute and read and write
malicious
23853AB0000
heap
page read and write
2386C3B0000
trusted library section
page read and write
7FF8487B8000
trusted library allocation
page read and write
7FF848682000
trusted library allocation
page read and write
7FF848600000
trusted library allocation
page execute and read and write
ACA000
heap
page read and write
2384E480000
unkown
page readonly
61EB7000
direct allocation
page readonly
7FF8488F0000
trusted library allocation
page read and write
DCF72FE000
stack
page read and write
DCF6C37000
stack
page read and write
7FF8489A0000
trusted library allocation
page read and write
23870D2E000
heap
page read and write
21052000
heap
page read and write
26D0000
heap
page read and write
23870B8C000
heap
page read and write
7FF848720000
trusted library allocation
page read and write
23873E9B000
heap
page read and write
7FF8487D0000
trusted library allocation
page read and write
7FF8489F0000
trusted library allocation
page read and write
AD2000
heap
page read and write
7FF486F83000
trusted library allocation
page execute read
2D1E5000
heap
page read and write
23870BA1000
heap
page read and write
2104A000
heap
page read and write
7FF486F93000
trusted library allocation
page execute read
2386C344000
heap
page read and write
B1E000
stack
page read and write
2D1ED000
heap
page read and write
76D000
unkown
page read and write
7FF848A10000
trusted library allocation
page read and write
323B000
heap
page read and write
7FF848730000
trusted library allocation
page read and write
23870C40000
heap
page read and write
21060000
heap
page read and write
2386C300000
heap
page read and write
2E20000
heap
page read and write
289E000
stack
page read and write
2386C412000
heap
page read and write
26F6000
heap
page read and write
21075000
heap
page read and write
AD6000
heap
page read and write
2386C35A000
heap
page read and write
23870BC3000
heap
page read and write
3621000
heap
page read and write
7FF848A00000
trusted library allocation
page execute and read and write
7FF84853C000
trusted library allocation
page execute and read and write
2E4F000
heap
page read and write
6C00F000
unkown
page write copy
7FF84885F000
trusted library allocation
page read and write
23870BC5000
heap
page read and write
25B8000
direct allocation
page read and write
21055000
heap
page read and write
400000
unkown
page readonly
1AF91000
heap
page read and write
7FF8486F6000
trusted library allocation
page read and write
23870D7A000
heap
page read and write
254E000
direct allocation
page read and write
2510000
direct allocation
page read and write
AE9000
heap
page read and write
7FF8487A6000
trusted library allocation
page read and write
7FF848980000
trusted library allocation
page read and write
4B7E000
stack
page read and write
2384EEBB000
unkown
page readonly
21054000
heap
page read and write
23853BC1000
trusted library allocation
page read and write
23852047000
heap
page read and write
4A1E000
stack
page read and write
1ABCE000
stack
page read and write
AEE000
heap
page read and write
2D0D000
stack
page read and write
2386BBF0000
trusted library allocation
page read and write
A25000
heap
page read and write
2106B000
heap
page read and write
23870BA7000
heap
page read and write
2384F8BB000
unkown
page readonly
61ED3000
direct allocation
page read and write
7FF8487E0000
trusted library allocation
page read and write
23873E17000
heap
page read and write
21053000
heap
page read and write
40C000
unkown
page readonly
2E4B000
heap
page read and write
270D0000
heap
page read and write
2386CE60000
trusted library allocation
page read and write
DCF6EFE000
stack
page read and write
21055000
heap
page read and write
26DC000
heap
page read and write
A83000
heap
page read and write
A6E000
heap
page read and write
261A000
heap
page read and write
D30000
direct allocation
page execute and read and write
A30000
heap
page read and write
253C000
direct allocation
page read and write
25D1000
heap
page read and write
23870644000
heap
page read and write
23854170000
trusted library allocation
page read and write
21053000
heap
page read and write
23870DAF000
heap
page read and write
23850CBB000
unkown
page readonly
1ACCE000
stack
page read and write
A74000
heap
page read and write
7FF8489D0000
trusted library allocation
page read and write
B50000
heap
page read and write
23873E28000
heap
page read and write
2386BBC0000
trusted library allocation
page read and write
3642000
heap
page read and write
6BE30000
unkown
page readonly
28B0000
heap
page read and write
342DC000
heap
page read and write
2387077C000
heap
page read and write
258C000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
23854112000
trusted library allocation
page read and write
836000
unkown
page readonly
BF7000
heap
page read and write
33230000
trusted library allocation
page read and write
2106B000
heap
page read and write
2F8F000
stack
page read and write
7FF8484E4000
trusted library allocation
page read and write
7FF848704000
trusted library allocation
page read and write
23853F48000
trusted library allocation
page read and write
264D000
heap
page read and write
2608000
direct allocation
page read and write
7FF8486D7000
trusted library allocation
page read and write
23870685000
heap
page read and write
7FF486F9A000
trusted library allocation
page readonly
23870633000
heap
page read and write
280C000
stack
page read and write
2386CED0000
trusted library allocation
page read and write
23873E66000
heap
page read and write
25ED000
heap
page read and write
2E4F000
heap
page read and write
7FF848740000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
4B1F000
stack
page read and write
7FF8486A0000
trusted library allocation
page read and write
DCF6B3F000
unkown
page read and write
23853F1E000
trusted library allocation
page read and write
23852210000
heap
page execute and read and write
23853F0C000
trusted library allocation
page read and write
A83000
heap
page read and write
DCF6FFA000
stack
page read and write
4C7F000
stack
page read and write
2107C000
heap
page read and write
7FF848780000
trusted library allocation
page execute and read and write
21066000
heap
page read and write
238541A6000
trusted library allocation
page read and write
7FF848750000
trusted library allocation
page read and write
B43000
heap
page execute and read and write
2386C36D000
heap
page read and write
21058000
heap
page read and write
23870BD2000
heap
page read and write
2E35000
heap
page read and write
AAD000
heap
page read and write
AFA000
heap
page read and write
21056000
heap
page read and write
23852214000
heap
page execute and read and write
2E4C000
heap
page read and write
2386D160000
trusted library section
page read and write
AFE000
heap
page read and write
2386C30A000
heap
page read and write
2386CEC0000
trusted library section
page read and write
26D6000
heap
page read and write
21060000
heap
page read and write
A84000
heap
page read and write
75E000
unkown
page read and write
21046000
heap
page read and write
A27000
heap
page read and write
2386C780000
trusted library section
page read and write
A88000
heap
page read and write
23870E43000
heap
page read and write
23873E2E000
heap
page read and write
2F30000
heap
page read and write
A97000
heap
page read and write
21060000
heap
page read and write
23853DF7000
trusted library allocation
page read and write
2386C2EE000
heap
page read and write
6C010000
unkown
page read and write
2387078B000
heap
page read and write
7FF848A50000
trusted library allocation
page read and write
AD8000
heap
page read and write
D2F000
stack
page read and write
2717F000
heap
page read and write
DA0000
direct allocation
page read and write
33CC000
stack
page read and write
21060000
heap
page read and write
2E0F000
stack
page read and write
2584000
direct allocation
page read and write
7FF8484ED000
trusted library allocation
page execute and read and write
2387061D000
heap
page read and write
61ECC000
direct allocation
page read and write
A38000
heap
page read and write
23851F00000
heap
page read and write
2386C44B000
heap
page read and write
25D0000
heap
page read and write
DCF78F7000
stack
page read and write
A8B000
heap
page read and write
2107C000
heap
page read and write
2E4D000
heap
page read and write
2386C323000
heap
page read and write
AE2000
heap
page read and write
7FF8486F0000
trusted library allocation
page read and write
BE4000
heap
page read and write
7FF486F9B000
trusted library allocation
page execute read
23853F1A000
trusted library allocation
page read and write
2386C2EB000
heap
page read and write
7FF848836000
trusted library allocation
page read and write
6BD90000
unkown
page readonly
ADE000
heap
page read and write
859000
unkown
page readonly
C2F000
stack
page read and write
26C0000
heap
page read and write
23853FF2000
trusted library allocation
page read and write
2E55000
heap
page read and write
21040000
heap
page read and write
2386C7C0000
trusted library section
page read and write
7FF8487FD000
trusted library allocation
page read and write
23873DC8000
heap
page read and write
2386C280000
heap
page read and write
23870B90000
heap
page read and write
7FF848500000
trusted library allocation
page read and write
23873DDC000
heap
page read and write
624000
unkown
page execute and read and write
23852020000
heap
page read and write
7FF848900000
trusted library allocation
page execute and read and write
21060000
heap
page read and write
813000
unkown
page readonly
21060000
heap
page read and write
6BE22000
unkown
page readonly
20F08000
heap
page read and write
252F000
stack
page read and write
23870CDF000
heap
page read and write
7FF486F99000
trusted library allocation
page execute read
19B000
stack
page read and write
7FF848590000
trusted library allocation
page read and write
AD0000
heap
page read and write
2386C2F8000
heap
page read and write
238706B7000
heap
page read and write
251B000
direct allocation
page read and write
7FF8487A0000
trusted library allocation
page read and write
401000
unkown
page execute read
2105C000
heap
page read and write
7FF486F97000
trusted library allocation
page execute read
2386C299000
heap
page read and write
2105A000
heap
page read and write
2384E480000
unkown
page readonly
7FF8484F3000
trusted library allocation
page read and write
7FF848762000
trusted library allocation
page read and write
97000
stack
page read and write
1AA2F000
stack
page read and write
23853BB0000
heap
page execute and read and write
C6E000
stack
page read and write
23870ECD000
heap
page read and write
2385410A000
trusted library allocation
page read and write
2717A000
heap
page read and write
2E44000
heap
page read and write
2386CEB0000
trusted library section
page read and write
19B000
stack
page read and write
2386C429000
heap
page read and write
23851D30000
unkown
page readonly
7FF8484FD000
trusted library allocation
page execute and read and write
DCF81BD000
stack
page read and write
7FF8486ED000
trusted library allocation
page read and write
23873E2B000
heap
page read and write
2386C447000
heap
page read and write
262E000
heap
page read and write
41F000
unkown
page readonly
1A7DE000
stack
page read and write
9B0000
heap
page read and write
6C00E000
unkown
page read and write
7FF848857000
trusted library allocation
page read and write
549000
unkown
page execute and read and write
21046000
heap
page read and write
238707D0000
heap
page read and write
2633000
direct allocation
page read and write
21051000
heap
page read and write
23873E8F000
heap
page read and write
21057000
heap
page read and write
21078000
heap
page read and write
DCF7B7E000
stack
page read and write
2386CE50000
trusted library allocation
page read and write
260F000
direct allocation
page read and write
7FF8487F0000
trusted library allocation
page read and write
DCF6AEB000
stack
page read and write
310C000
stack
page read and write
7FF848770000
trusted library allocation
page read and write
23852250000
heap
page read and write
2CEE000
stack
page read and write
401000
unkown
page execute read
DCF74FB000
stack
page read and write
23852230000
trusted library allocation
page read and write
766000
unkown
page read and write
262C000
direct allocation
page read and write
23851FC3000
trusted library allocation
page read and write
2E39000
heap
page read and write
2386C367000
heap
page read and write
23853AA0000
trusted library section
page read and write
A70000
heap
page read and write
2386CE70000
heap
page execute and read and write
192000
stack
page read and write
28F0000
heap
page read and write
2E42000
heap
page read and write
AC1000
heap
page read and write
76F000
unkown
page read and write
23851FE9000
heap
page read and write
21055000
heap
page read and write
7FF8487A8000
trusted library allocation
page read and write
2555000
direct allocation
page read and write
1AF90000
trusted library allocation
page read and write
23870CD7000
heap
page read and write
23851FA0000
trusted library allocation
page read and write
DCF84BB000
stack
page read and write
23870ED7000
heap
page read and write
2D1F6000
heap
page read and write
21055000
heap
page read and write
23870622000
heap
page read and write
49CF000
stack
page read and write
2386C362000
heap
page read and write
DCF76F4000
stack
page read and write
2E4F000
heap
page read and write
DCF75F1000
stack
page read and write
2106B000
heap
page read and write
6BE0D000
unkown
page readonly
2385201D000
heap
page read and write
B90000
heap
page read and write
347E0000
heap
page read and write
2E3E000
heap
page read and write
DCF6D3E000
stack
page read and write
7FF8484E0000
trusted library allocation
page read and write
7FF84850B000
trusted library allocation
page execute and read and write
263A000
direct allocation
page read and write
7FF8488A0000
trusted library allocation
page read and write
2E47000
heap
page read and write
23870BEF000
heap
page read and write
2E8E000
stack
page read and write
1AE91000
heap
page read and write
23854036000
trusted library allocation
page read and write
2106E000
heap
page read and write
23851FE0000
heap
page read and write
23851EE0000
heap
page read and write
400000
unkown
page readonly
2106B000
heap
page read and write
C2E000
heap
page read and write
21058000
heap
page read and write
7FF486F91000
trusted library allocation
page execute read
23870AEC000
heap
page read and write
23870D6B000
heap
page read and write
AC7000
heap
page read and write
23870DF6000
heap
page read and write
21054000
heap
page read and write
7FF8486B0000
trusted library allocation
page read and write
636000
unkown
page execute and read and write
DCF7DBD000
stack
page read and write
2386C9F0000
trusted library allocation
page read and write
2E37000
heap
page read and write
7FF84859C000
trusted library allocation
page execute and read and write
23870AEA000
heap
page read and write
21059000
heap
page read and write
7FF848710000
trusted library allocation
page read and write
251D000
direct allocation
page read and write
6BFCF000
unkown
page readonly
401000
unkown
page execute read
7FF8486AB000
trusted library allocation
page read and write
7FF8488D0000
trusted library allocation
page read and write
2386C7F0000
trusted library section
page read and write
2E50000
heap
page read and write
61EB4000
direct allocation
page read and write
870000
heap
page read and write
41C000
unkown
page execute read
2680000
heap
page read and write
2E3F000
heap
page read and write
7FF8487B0000
trusted library allocation
page read and write
23870B93000
heap
page read and write
21142000
heap
page read and write
2386CE40000
trusted library allocation
page read and write
9B0000
heap
page read and write
23853EFF000
trusted library allocation
page read and write
ADF000
stack
page read and write
AF1000
heap
page read and write
2386C3A0000
trusted library section
page read and write
2386CDE0000
trusted library allocation
page read and write
21046000
heap
page read and write
21053000
heap
page read and write
2106A000
heap
page read and write
C29000
heap
page read and write
270B0000
heap
page read and write
7FF8488E0000
trusted library allocation
page read and write
21066000
heap
page read and write
34CD000
stack
page read and write
2E4F000
heap
page read and write
7FF848890000
trusted library allocation
page read and write
23870E34000
heap
page read and write
23852006000
heap
page read and write
2386C347000
heap
page read and write
D6F000
stack
page read and write
25F9000
direct allocation
page read and write
2105F000
heap
page read and write
238706D3000
heap
page read and write
BA2000
heap
page execute and read and write
1AE80000
heap
page read and write
7FF8486DA000
trusted library allocation
page read and write
238520E1000
heap
page read and write
7FF486F82000
trusted library allocation
page readonly
25CE000
direct allocation
page read and write
2E42000
heap
page read and write
A90000
heap
page read and write
28C3000
heap
page read and write
A7E000
heap
page read and write
21056000
heap
page read and write
3220000
heap
page read and write
2107C000
heap
page read and write
7FF8487FA000
trusted library allocation
page read and write
9FE000
stack
page read and write
AC4000
heap
page read and write
23853A70000
trusted library section
page read and write
DCF73FB000
stack
page read and write
21048000
heap
page read and write
7FF848790000
trusted library allocation
page read and write
7FF486F98000
trusted library allocation
page readonly
2386C380000
trusted library section
page read and write
400000
unkown
page execute and read and write
B9A000
heap
page read and write
2E42000
heap
page read and write
25A9000
direct allocation
page read and write
2105A000
heap
page read and write
2105D000
heap
page read and write
210E9000
heap
page read and write
23851F50000
heap
page read and write
AA7000
heap
page read and write
23870C82000
heap
page read and write
20FA3000
heap
page read and write
DCF7EBE000
stack
page read and write
2386C8A0000
trusted library section
page read and write
1F0000
heap
page read and write
256D000
direct allocation
page read and write
2386D240000
trusted library allocation
page read and write
2E3A000
heap
page read and write
A20000
heap
page read and write
7FF848880000
trusted library allocation
page read and write
25F2000
direct allocation
page read and write
2E3F000
heap
page read and write
6BE31000
unkown
page execute read
2386C3C0000
heap
page read and write
238707E0000
trusted library allocation
page read and write
210EA000
heap
page read and write
DCF7FBE000
stack
page read and write
23870707000
heap
page read and write
23870AF7000
heap
page read and write
A27000
heap
page read and write
2107C000
heap
page read and write
21060000
heap
page read and write
23870E77000
heap
page read and write
7FF486F9E000
trusted library allocation
page readonly
2CAE000
stack
page read and write
7FF848870000
trusted library allocation
page read and write
2E51000
heap
page read and write
2FCE000
stack
page read and write
23863F8D000
trusted library allocation
page read and write
C82000
heap
page read and write
75E000
unkown
page write copy
23863C24000
trusted library allocation
page read and write
2650000
heap
page read and write
7FF848990000
trusted library allocation
page execute and read and write
267F000
stack
page read and write
2616000
direct allocation
page read and write
ABB000
heap
page read and write
9B5000
heap
page read and write
7FF848A60000
trusted library allocation
page read and write
2570000
heap
page read and write
2386CDF0000
trusted library allocation
page read and write
C14000
heap
page read and write
458000
unkown
page write copy
26CB000
heap
page read and write
A92000
heap
page read and write
2386C319000
heap
page read and write
6BD91000
unkown
page execute read
9D5000
heap
page read and write
21056000
heap
page read and write
2E4F000
heap
page read and write
2386C377000
heap
page read and write
23863C21000
trusted library allocation
page read and write
25E4000
direct allocation
page read and write
1AB7E000
stack
page read and write
E20000
heap
page read and write
7FF486F95000
trusted library allocation
page execute read
23853AB3000
heap
page read and write
320C000
stack
page read and write
21060000
heap
page read and write
1AE91000
heap
page read and write
23863BC1000
trusted library allocation
page read and write
B3E000
heap
page read and write
836000
unkown
page readonly
23851FC0000
trusted library allocation
page read and write
23870BB7000
heap
page read and write
2641000
direct allocation
page read and write
7FF848504000
trusted library allocation
page read and write
25A2000
direct allocation
page read and write
41F000
unkown
page readonly
2106C000
heap
page read and write
2386CA80000
trusted library section
page read and write
7FF848765000
trusted library allocation
page read and write
25EB000
direct allocation
page read and write
23870B70000
heap
page read and write
2574000
direct allocation
page read and write
23854024000
trusted library allocation
page read and write
23870C7E000
heap
page read and write
30CF000
stack
page read and write
AA8000
heap
page read and write
23872B60000
trusted library allocation
page read and write
7FF486F92000
trusted library allocation
page readonly
2E47000
heap
page read and write
A81000
heap
page read and write
21060000
heap
page read and write
7FF486FA0000
trusted library allocation
page execute and read and write
198000
stack
page read and write
859000
unkown
page readonly
B3A000
heap
page read and write
1AE90000
heap
page read and write
7FF8489F6000
trusted library allocation
page read and write
238705E0000
heap
page read and write
23851FB0000
heap
page read and write
23852255000
heap
page read and write
27132000
heap
page read and write
2387073C000
heap
page read and write
990000
heap
page read and write
AB8000
heap
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
23863C3E000
trusted library allocation
page read and write
C3B000
heap
page read and write
96E000
stack
page read and write
2D80000
heap
page read and write
2107C000
heap
page read and write
7FF8484E3000
trusted library allocation
page execute and read and write
77B000
unkown
page write copy
7FF848A20000
trusted library allocation
page read and write
2107C000
heap
page read and write
C25000
heap
page read and write
238706CB000
heap
page read and write
23870F64000
trusted library allocation
page read and write
7FF486F81000
trusted library allocation
page execute read
2564000
direct allocation
page read and write
23870BC8000
heap
page read and write
7FF848700000
trusted library allocation
page read and write
7FF8488B7000
trusted library allocation
page read and write
7FF486F9F000
trusted library allocation
page execute read
7FF8486E0000
trusted library allocation
page read and write
950000
heap
page read and write
2568000
direct allocation
page read and write
B9E000
heap
page read and write
7FF848690000
trusted library allocation
page read and write
21068000
heap
page read and write
23870C8C000
heap
page read and write
2D1F3000
heap
page read and write
2520000
direct allocation
page read and write
21060000
heap
page read and write
2624000
direct allocation
page read and write
2526000
direct allocation
page read and write
23851F55000
heap
page read and write
2386C3F0000
heap
page read and write
7FF8485C6000
trusted library allocation
page execute and read and write
1AE1D000
stack
page read and write
B2F000
stack
page read and write
25B1000
direct allocation
page read and write
2652000
heap
page read and write
1A8DF000
stack
page read and write
447000
unkown
page execute and read and write
21060000
heap
page read and write
21048000
heap
page read and write
2386C296000
heap
page read and write
435000
unkown
page write copy
2524000
direct allocation
page read and write
AD3000
heap
page read and write
7FF8487C0000
trusted library allocation
page read and write
2105C000
heap
page read and write
7FF848596000
trusted library allocation
page read and write
2E30000
heap
page read and write
2E48000
heap
page read and write
238705F1000
heap
page read and write
261D000
direct allocation
page read and write
2E4D000
heap
page read and write
2386CE90000
trusted library allocation
page read and write
23870CC1000
heap
page read and write
2533000
direct allocation
page read and write
6BE1E000
unkown
page read and write
23870AE4000
heap
page read and write
48CE000
stack
page read and write
2F37000
heap
page read and write
253F000
direct allocation
page read and write
774000
unkown
page read and write
7FF8485A0000
trusted library allocation
page execute and read and write
21060000
heap
page read and write
7FF848A30000
trusted library allocation
page execute and read and write
4C90000
trusted library allocation
page read and write
6C015000
unkown
page readonly
417000
unkown
page execute read
194000
stack
page read and write
33C4A000
heap
page read and write
A97000
heap
page read and write
783000
unkown
page readonly
23853F0E000
trusted library allocation
page read and write
7FF8488C0000
trusted library allocation
page read and write
87E000
unkown
page readonly
2D200000
heap
page read and write
C41000
heap
page read and write
2386C920000
trusted library section
page read and write
DCF7CBA000
stack
page read and write
A98000
heap
page read and write
C34000
heap
page read and write
2E38000
heap
page read and write
7FF486F80000
trusted library allocation
page readonly
7FF8486D2000
trusted library allocation
page read and write
778000
unkown
page read and write
1A79F000
stack
page read and write
7FF84876C000
trusted library allocation
page read and write
400000
unkown
page readonly
23870BE2000
heap
page read and write
257B000
direct allocation
page read and write
23870AE0000
heap
page read and write
61E00000
direct allocation
page execute and read and write
25D5000
direct allocation
page read and write
23853FAC000
trusted library allocation
page read and write
2107B000
heap
page read and write
21043000
heap
page read and write
2384E482000
unkown
page readonly
AAA000
heap
page read and write
2E59000
heap
page read and write
23870C85000
heap
page read and write
23870626000
heap
page read and write
2690000
direct allocation
page execute and read and write
23863BDC000
trusted library allocation
page read and write
8B0000
heap
page read and write
2E45000
heap
page read and write
B30000
heap
page read and write
2387060D000
heap
page read and write
23870BC1000
heap
page read and write
3100000
heap
page read and write
BA8000
heap
page read and write
21060000
heap
page read and write
2386C400000
heap
page read and write
DCF7BBE000
stack
page read and write
238706C4000
heap
page read and write
920000
heap
page read and write
23851F20000
heap
page read and write
23851E00000
heap
page read and write
761000
unkown
page read and write
2386C34C000
heap
page read and write
26F0000
heap
page read and write
61ED0000
direct allocation
page read and write
7FF8489E0000
trusted library allocation
page read and write
2107C000
heap
page read and write
2546000
direct allocation
page read and write
7FF8489B0000
trusted library allocation
page read and write
23873E02000
heap
page read and write
238502BB000
unkown
page readonly
7FF848692000
trusted library allocation
page read and write
25BF000
direct allocation
page read and write
7FF486F96000
trusted library allocation
page readonly
26BE000
stack
page read and write
DCF86BE000
stack
page read and write
23870F82000
trusted library allocation
page read and write
2386C34A000
heap
page read and write
2E3D000
heap
page read and write
7FF848868000
trusted library allocation
page read and write
23870B50000
heap
page read and write
A9E000
heap
page read and write
21055000
heap
page read and write
21060000
heap
page read and write
2D1FE000
heap
page read and write
256E000
stack
page read and write
25C6000
direct allocation
page read and write
7FF848754000
trusted library allocation
page read and write
C12000
heap
page read and write
7FF8486C0000
trusted library allocation
page read and write
7FF8486AE000
trusted library allocation
page read and write
28C0000
heap
page read and write
9BE000
stack
page read and write
76A000
unkown
page read and write
7FF486F94000
trusted library allocation
page readonly
2386C31F000
heap
page read and write
25DC000
direct allocation
page read and write
9B000
stack
page read and write
61E01000
direct allocation
page execute read
1A92E000
stack
page read and write
7FF8489C0000
trusted library allocation
page read and write
23870642000
heap
page read and write
99E000
stack
page read and write
2E35000
heap
page read and write
DCF71FD000
stack
page read and write
3256000
heap
page read and write
238707F0000
trusted library section
page readonly
2600000
direct allocation
page read and write
23873DC0000
heap
page read and write
33C40000
heap
page read and write
B60000
heap
page read and write
9C000
stack
page read and write
21060000
heap
page read and write
23870639000
heap
page read and write
1AD1E000
stack
page read and write
23851F80000
trusted library allocation
page read and write
A80000
heap
page read and write
7FF8484F0000
trusted library allocation
page read and write
B7B000
heap
page read and write
1AA7E000
stack
page read and write
DCF77FB000
stack
page read and write
40C000
unkown
page readonly
262E000
heap
page read and write
255D000
direct allocation
page read and write
7FF8486B4000
trusted library allocation
page read and write
2648000
direct allocation
page read and write
9D0000
heap
page read and write
2E3E000
heap
page read and write
There are 710 hidden memdumps, click here to show them.