IOC Report
g77dRQ1Csm.exe

loading gif

Files

File Path
Type
Category
Malicious
g77dRQ1Csm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FCBAECGIEB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\cqecfsbe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\oyskbsuqgrwdg
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u42w.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u42w.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u42w.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u42w.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u42w.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFCFHJJECAEHJJKEHIDBKEHJKJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGIDAAFIEHIEHJKFHCAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIIDBKJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDDHMPCDUJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KEBGHCBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KEBGHCBAEGDHIDGCBAECGIECGH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJDHCAFCGDAAKEBFIJDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_g77dRQ1Csm.exe_c27590204cdb8caa148f294268888955467f75_ea797714_03cc3712-f0d0-42c7-ba65-ac1003aef5a6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u42w.0.exe_9ca665a2aca7b1713185c9d969304ec8326e3781_956f251b_e6c17e3e-f7b4-4b07-8b9e-dd4e3ae25acd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94E4.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 07:04:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96B9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96E9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFAE1.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 07:04:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFCC6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFCF6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SUAVTZKNFL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\ozld1q5e.5tn
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\6bc4c0fb
data
dropped
C:\Users\user\AppData\Local\Temp\7a23b9ff
data
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3B62.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\u42w.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u42w.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u42w.2\whale.dbf
data
dropped
C:\Users\user\AppData\Local\Temp\vks
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Thu Apr 25 06:04:03 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 57 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\g77dRQ1Csm.exe
"C:\Users\user\Desktop\g77dRQ1Csm.exe"
malicious
C:\Users\user\AppData\Local\Temp\u42w.0.exe
"C:\Users\user\AppData\Local\Temp\u42w.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u42w.2\run.exe
"C:\Users\user\AppData\Local\Temp\u42w.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u42w.3.exe
"C:\Users\user\AppData\Local\Temp\u42w.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Users\user\AppData\Local\Temp\u42w.2\run.exe
"C:\Users\user\AppData\Local\Temp\u42w.2\run.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\FCBAECGIEB.exe"
malicious
C:\Users\user\AppData\Local\Temp\FCBAECGIEB.exe
"C:\Users\user\AppData\Local\Temp\FCBAECGIEB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 1180
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 2332
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php639c1ec5fdf4178fa648df7975496release92036e868a3837ab3d0e58
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dll5
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://pastebin.com/raw/z9pYkqPQPO
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllUK
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
http://185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
185.172.128.90
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllI
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://185.172.128.203/tiktok.exeq
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/microsoft/ApplicationInsights-dotnet/issues/2560
unknown
http://www.vmware.com/0/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpt
unknown
http://185.172.128.76/15f649199f40275b/sqlite3.dll9
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
iolo0.b-cdn.net
169.150.236.97
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.90
unknown
Russian Federation
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
TypesSupported
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
ProgramId
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
FileId
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
LowerCaseLongPath
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
LongPathHash
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
Name
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
OriginalFileName
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
Publisher
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
Version
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
BinFileVersion
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
BinaryType
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
ProductName
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
ProductVersion
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
LinkDate
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
BinProductVersion
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
AppxPackageFullName
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
AppxPackageRelativeId
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
Size
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
Language
\REGISTRY\A\{08e66de2-59a3-8f34-c8da-a256ad1bb982}\Root\InventoryApplicationFile\g77drq1csm.exe|c26141a9ec94f23d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
ProgramId
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
FileId
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
LowerCaseLongPath
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
LongPathHash
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
Name
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
OriginalFileName
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
Publisher
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
Version
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
BinFileVersion
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
BinaryType
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
ProductName
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
ProductVersion
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
LinkDate
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
BinProductVersion
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
AppxPackageFullName
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
AppxPackageRelativeId
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
Size
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
Language
\REGISTRY\A\{2d5ca52b-c55e-f5d2-16f2-f7c6fdf31532}\Root\InventoryApplicationFile\u42w.0.exe|51bff1b61f6481d8
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000FFED261FB
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 70 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
173F191B000
unkown
page readonly
malicious
5428000
trusted library allocation
page read and write
malicious
2F5C000
heap
page read and write
malicious
5E10000
direct allocation
page read and write
malicious
2F00000
direct allocation
page read and write
malicious
5A00000
direct allocation
page read and write
malicious
5421000
trusted library allocation
page read and write
malicious
2ED0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
3E4B000
heap
page read and write
malicious
173EE71B000
unkown
page readonly
malicious
1102000
unkown
page readonly
malicious
173F4860000
trusted library section
page read and write
malicious
173F4640000
trusted library section
page read and write
malicious
39E4000
heap
page read and write
malicious
63B44BE000
stack
page read and write
2EA2000
heap
page read and write
63B36FE000
stack
page read and write
4AAE000
heap
page read and write
173F46A2000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
2F98000
trusted library allocation
page read and write
173F8997000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
4AAE000
heap
page read and write
557B000
trusted library allocation
page read and write
173F3CD6000
heap
page read and write
231D8000
heap
page read and write
624000
unkown
page execute and read and write
4A4E000
heap
page read and write
314F000
stack
page read and write
2FC4000
unkown
page read and write
7FFD9B706000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
2EA7000
heap
page read and write
70CE000
stack
page read and write
143C000
heap
page read and write
4719000
unkown
page read and write
2F5E000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
173F8BF3000
heap
page read and write
6535000
trusted library allocation
page read and write
E00000
heap
page read and write
31A0000
heap
page read and write
173F50D0000
trusted library allocation
page read and write
1368000
heap
page read and write
2F00000
unkown
page readonly
7FFD9B7B0000
trusted library allocation
page read and write
232A4000
heap
page read and write
11E0000
heap
page read and write
2F10000
unkown
page readonly
D04000
heap
page read and write
2F3E000
unkown
page read and write
7FFD9B710000
trusted library allocation
page read and write
5DDF000
stack
page read and write
4271000
trusted library allocation
page read and write
401000
unkown
page execute read
7FFD9B890000
trusted library allocation
page read and write
5BA0000
heap
page read and write
173F3CE3000
heap
page read and write
2641000
direct allocation
page read and write
6CA6F000
unkown
page readonly
33EC000
trusted library allocation
page read and write
BD5000
heap
page read and write
6539000
trusted library allocation
page read and write
329E000
unkown
page read and write
173F2060000
heap
page read and write
BD0000
heap
page read and write
654F000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
4A73000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
17380395000
trusted library allocation
page read and write
33A0000
heap
page read and write
7FF4E1DD1000
trusted library allocation
page execute read
6741000
trusted library allocation
page read and write
5910000
unkown
page read and write
173F8AD0000
heap
page read and write
708E000
stack
page read and write
4A82000
heap
page read and write
25AB000
direct allocation
page read and write
1130000
heap
page read and write
AB0000
unkown
page readonly
5DEF000
stack
page read and write
4A82000
heap
page read and write
632E000
stack
page read and write
3220000
heap
page execute and read and write
83C000
unkown
page readonly
173F884F000
heap
page read and write
6C0E0000
unkown
page readonly
3A61000
heap
page read and write
34B5000
unkown
page read and write
2FF4000
unkown
page read and write
2D8D000
stack
page read and write
7350000
trusted library allocation
page execute and read and write
179E000
stack
page read and write
4A22000
heap
page read and write
3480000
heap
page read and write
301D0000
heap
page read and write
2EB9000
heap
page read and write
3398000
trusted library allocation
page read and write
4A57000
heap
page read and write
29308000
heap
page read and write
2F5A000
heap
page read and write
55CE000
trusted library allocation
page read and write
4A69000
heap
page read and write
6C850000
unkown
page readonly
2B58000
heap
page read and write
173F22F0000
trusted library allocation
page read and write
3C3D000
heap
page read and write
D04000
heap
page read and write
173F47A0000
trusted library section
page read and write
3236000
heap
page read and write
334B000
trusted library allocation
page read and write
4450000
unkown
page read and write
3F99000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
D04000
heap
page read and write
CB4000
heap
page read and write
7FFD9B77C000
trusted library allocation
page read and write
2FF4000
unkown
page read and write
231B8000
heap
page read and write
2614000
direct allocation
page read and write
2BCC000
stack
page read and write
173F8C2E000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
264F000
direct allocation
page read and write
173F3C1D000
heap
page read and write
2FC4000
unkown
page read and write
6CAB0000
unkown
page read and write
329A000
trusted library allocation
page read and write
231CD000
heap
page read and write
173F2280000
heap
page read and write
63B42BE000
stack
page read and write
7FFD9B775000
trusted library allocation
page read and write
11D0000
heap
page read and write
3A60000
heap
page read and write
7FFD9B54C000
trusted library allocation
page execute and read and write
30C6000
trusted library allocation
page read and write
300B000
heap
page read and write
12B0000
heap
page read and write
5689000
direct allocation
page read and write
173F8B9C000
heap
page read and write
11D5000
heap
page read and write
12B5000
heap
page read and write
3271000
trusted library allocation
page read and write
33E0000
heap
page read and write
14A0000
trusted library allocation
page read and write
2682000
direct allocation
page read and write
4A71000
heap
page read and write
292B1000
heap
page read and write
173F8AF3000
heap
page read and write
105F000
stack
page read and write
173F8890000
heap
page read and write
2EA7000
heap
page read and write
5C72000
trusted library allocation
page read and write
B20000
heap
page read and write
2F70000
trusted library allocation
page read and write
292FA000
heap
page read and write
3517000
trusted library allocation
page read and write
173F21A5000
heap
page read and write
173F3CE8000
heap
page read and write
4117000
trusted library allocation
page read and write
231B8000
heap
page read and write
34A0000
unkown
page read and write
56A0000
trusted library allocation
page read and write
40C000
unkown
page readonly
46D1000
unkown
page read and write
D04000
heap
page read and write
2EAB000
heap
page read and write
4A74000
heap
page read and write
7FFD9B4FD000
trusted library allocation
page execute and read and write
265E000
direct allocation
page read and write
B7D000
heap
page read and write
2FA0000
trusted library allocation
page read and write
25F4000
direct allocation
page read and write
2E9F000
heap
page read and write
1CD2F000
stack
page read and write
5071000
heap
page read and write
8AC000
unkown
page read and write
400000
unkown
page readonly
4A5E000
heap
page read and write
173F8BEB000
heap
page read and write
4A69000
heap
page read and write
4A30000
heap
page read and write
B9D000
heap
page read and write
766000
unkown
page read and write
4A51000
heap
page read and write
25DE000
direct allocation
page read and write
1380000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
4A8A000
heap
page read and write
5194000
heap
page read and write
C3E000
stack
page read and write
333E000
trusted library allocation
page read and write
D1F000
stack
page read and write
2E8F000
stack
page read and write
8A0000
unkown
page read and write
1314000
trusted library allocation
page read and write
30D4000
trusted library allocation
page read and write
8AA000
unkown
page read and write
2943000
heap
page read and write
335E000
trusted library allocation
page read and write
AB1000
unkown
page execute read
7FFD9B9D0000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
173F3D30000
trusted library allocation
page read and write
1153000
heap
page read and write
173F89E4000
heap
page read and write
61ED0000
direct allocation
page read and write
2FC4000
unkown
page read and write
4215000
trusted library allocation
page read and write
3010000
heap
page read and write
33AE000
trusted library allocation
page read and write
26B4000
direct allocation
page read and write
231B9000
heap
page read and write
97000
stack
page read and write
173F50B0000
heap
page execute and read and write
32FF000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
2674000
direct allocation
page read and write
1CFAE000
stack
page read and write
173F8A9F000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1CE6E000
stack
page read and write
173F8DF1000
heap
page read and write
4A57000
heap
page read and write
2FA0000
heap
page read and write
3222000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
231BD000
heap
page read and write
CB4000
heap
page read and write
173F3CDB000
heap
page read and write
1130000
heap
page read and write
231BD000
heap
page read and write
DDE000
heap
page read and write
10E0000
heap
page read and write
4A8A000
heap
page read and write
2DA0000
heap
page read and write
231C0000
heap
page read and write
3595000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
4AAE000
heap
page read and write
363C000
trusted library allocation
page read and write
19C000
stack
page read and write
2698000
direct allocation
page read and write
7FFD9BA06000
trusted library allocation
page read and write
7FFD9B8C7000
trusted library allocation
page read and write
150E000
stack
page read and write
4A08000
heap
page read and write
592E000
stack
page read and write
691000
unkown
page execute read
4A82000
heap
page read and write
133A000
trusted library allocation
page execute and read and write
367E000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
29264000
heap
page read and write
231BB000
heap
page read and write
61FA000
heap
page read and write
CB0000
heap
page read and write
1CF6D000
stack
page read and write
2FF4000
unkown
page read and write
4A57000
heap
page read and write
549000
unkown
page execute and read and write
53D8000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
2596000
heap
page read and write
2FC4000
unkown
page read and write
2EAF000
heap
page read and write
B2B000
unkown
page write copy
4AAE000
heap
page read and write
32F2000
trusted library allocation
page read and write
4A5D000
heap
page read and write
63B38FB000
stack
page read and write
6548000
trusted library allocation
page read and write
25AD000
direct allocation
page read and write
7FFD9B610000
trusted library allocation
page execute and read and write
29E0000
heap
page read and write
A10000
heap
page read and write
2EAF000
heap
page read and write
7FF4E1DE7000
trusted library allocation
page execute read
5A0B000
unkown
page read and write
61E01000
direct allocation
page execute read
7FFD9B8A0000
trusted library allocation
page read and write
691000
unkown
page execute read
353C000
trusted library allocation
page read and write
4A8C000
heap
page read and write
34CD000
trusted library allocation
page read and write
690000
unkown
page readonly
55D1000
trusted library allocation
page read and write
46EF000
unkown
page read and write
3B65000
heap
page read and write
9B000
stack
page read and write
3560000
heap
page read and write
17380393000
trusted library allocation
page read and write
18C0000
heap
page read and write
1332000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
4B50000
heap
page read and write
2FF4000
unkown
page read and write
2C3C000
unkown
page readonly
567D000
direct allocation
page read and write
173F46BA000
heap
page read and write
A5C000
stack
page read and write
173F226B000
heap
page read and write
4A86000
heap
page read and write
31AB000
heap
page read and write
4A88000
heap
page read and write
2FC4000
unkown
page read and write
3592000
heap
page read and write
1373000
trusted library allocation
page execute and read and write
173F5080000
trusted library allocation
page read and write
173F4AB0000
trusted library section
page read and write
4A52000
heap
page read and write
6C07D000
unkown
page readonly
63B3AF4000
stack
page read and write
9CE000
stack
page read and write
231D2000
heap
page read and write
4A6F000
heap
page read and write
173F45D0000
trusted library section
page read and write
4A60000
heap
page read and write
2FC4000
unkown
page read and write
B74000
heap
page read and write
2E99000
heap
page read and write
2E90000
heap
page read and write
7FFD9B503000
trusted library allocation
page read and write
231CD000
heap
page read and write
B8A000
heap
page read and write
3035000
heap
page read and write
4A05000
heap
page read and write
6820000
trusted library allocation
page read and write
173F8ACA000
heap
page read and write
4AAE000
heap
page read and write
231B0000
heap
page read and write
357E000
unkown
page read and write
3297000
trusted library allocation
page read and write
55ED000
stack
page read and write
6C1F7000
unkown
page readonly
4AB2000
heap
page read and write
4A88000
heap
page read and write
33F8000
trusted library allocation
page read and write
3F80000
trusted library allocation
page read and write
5A0E000
unkown
page read and write
5900000
unkown
page read and write
BAC000
heap
page read and write
173F88F6000
heap
page read and write
26C3000
direct allocation
page read and write
2BC0000
unkown
page readonly
13C7000
heap
page read and write
173F23A0000
heap
page read and write
231B8000
heap
page read and write
63B33FA000
stack
page read and write
173F4CC0000
trusted library section
page read and write
16F0000
trusted library allocation
page execute and read and write
32FC000
trusted library allocation
page read and write
31CF000
unkown
page read and write
2FC4000
unkown
page read and write
231A6000
heap
page read and write
33A3000
trusted library allocation
page read and write
40AD000
trusted library allocation
page read and write
2D7E000
stack
page read and write
2EBA000
heap
page read and write
4A60000
heap
page read and write
3358000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
4A71000
heap
page read and write
35AE000
trusted library allocation
page read and write
173F4850000
heap
page read and write
E49000
heap
page read and write
173F4614000
heap
page execute and read and write
56EE000
direct allocation
page read and write
4A63000
heap
page read and write
D04000
heap
page read and write
2FC4000
unkown
page read and write
231B4000
heap
page read and write
74D0000
trusted library allocation
page execute and read and write
77B000
unkown
page write copy
341F000
trusted library allocation
page read and write
1570000
heap
page read and write
2B54000
heap
page read and write
118E000
stack
page read and write
B28000
heap
page read and write
6C244000
unkown
page read and write
CEB000
stack
page read and write
173F3BF0000
heap
page read and write
10F8000
stack
page read and write
7FF4E1DE5000
trusted library allocation
page execute read
9B000
stack
page read and write
231AA000
heap
page read and write
173F8C95000
heap
page read and write
4A10000
heap
page read and write
173F8884000
heap
page read and write
169F000
stack
page read and write
173F8A50000
heap
page read and write
231C0000
heap
page read and write
4A52000
heap
page read and write
2690000
direct allocation
page read and write
173F4B60000
trusted library section
page read and write
2C50000
heap
page read and write
231DA000
heap
page read and write
2FC4000
unkown
page read and write
173F4683000
heap
page read and write
61ECD000
direct allocation
page readonly
BA3000
heap
page read and write
3130000
heap
page read and write
1470000
heap
page read and write
25D6000
direct allocation
page read and write
3100000
heap
page execute and read and write
B1C000
unkown
page readonly
63B4ABE000
stack
page read and write
29659000
heap
page read and write
690000
unkown
page readonly
4A61000
heap
page read and write
4A69000
heap
page read and write
28D0000
heap
page read and write
173F8BA1000
heap
page read and write
D04000
heap
page read and write
B76000
heap
page read and write
13DF000
heap
page read and write
B1C000
unkown
page readonly
12B0000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page execute and read and write
231A6000
heap
page read and write
1340000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
FFE000
stack
page read and write
31EE000
stack
page read and write
173F8B0B000
heap
page read and write
4A60000
heap
page read and write
420D000
trusted library allocation
page read and write
459000
unkown
page write copy
14AB000
trusted library allocation
page execute and read and write
25F8000
direct allocation
page read and write
11CE000
stack
page read and write
4A8A000
heap
page read and write
2656000
direct allocation
page read and write
5911000
unkown
page read and write
4A88000
heap
page read and write
4AB2000
heap
page read and write
13C9000
heap
page read and write
2FC4000
unkown
page read and write
582E000
stack
page read and write
2EA2000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
34B3000
trusted library allocation
page read and write
4A50000
heap
page read and write
6C001000
unkown
page execute read
2F90000
trusted library allocation
page read and write
5901000
unkown
page read and write
7FFD9B86F000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
173F8D70000
heap
page read and write
32CC000
trusted library allocation
page read and write
C3A000
stack
page read and write
2E8F000
stack
page read and write
25CF000
direct allocation
page read and write
1457000
heap
page read and write
B8D000
heap
page read and write
D30000
heap
page read and write
5560000
direct allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
173F2303000
trusted library allocation
page read and write
7FF4E1DE4000
trusted library allocation
page readonly
652C000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
173F5090000
trusted library allocation
page read and write
29250000
heap
page read and write
2FC4000
unkown
page read and write
2EA5000
heap
page read and write
1409000
heap
page read and write
345E000
trusted library allocation
page read and write
2FD0000
direct allocation
page read and write
3551000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2FDC000
heap
page read and write
2F67000
heap
page execute and read and write
2D87000
heap
page read and write
3210000
trusted library allocation
page read and write
231BD000
heap
page read and write
778000
unkown
page read and write
30CF2000
heap
page read and write
581E000
stack
page read and write
7FFD9B714000
trusted library allocation
page read and write
41F000
unkown
page readonly
7FF4E1DEE000
trusted library allocation
page readonly
34CD000
unkown
page read and write
30C70000
heap
page read and write
30DE000
trusted library allocation
page read and write
3DF5000
heap
page read and write
3427000
trusted library allocation
page read and write
4A88000
heap
page read and write
34C3000
unkown
page read and write
231B8000
heap
page read and write
435000
unkown
page write copy
7360000
trusted library allocation
page read and write
4A88000
heap
page read and write
1360000
trusted library allocation
page read and write
4A72000
heap
page read and write
BDF000
heap
page read and write
3364000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
4A57000
heap
page read and write
3469000
trusted library allocation
page read and write
30763000
heap
page read and write
4ACD000
stack
page read and write
5920000
unkown
page read and write
2B50000
heap
page read and write
55B6000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
7FFD9B6EA000
trusted library allocation
page read and write
33E2000
heap
page read and write
4A86000
heap
page read and write
29210000
heap
page read and write
4A4E000
heap
page read and write
3401000
heap
page read and write
2965E000
heap
page read and write
18AB000
trusted library allocation
page read and write
1CE2F000
stack
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
173F89C7000
heap
page read and write
322F000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
6C967000
unkown
page readonly
6A50000
trusted library allocation
page read and write
636000
unkown
page execute and read and write
7FFD9B846000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5830000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
8A9000
unkown
page write copy
354A000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
CB4000
heap
page read and write
2FC4000
unkown
page read and write
173F2180000
heap
page read and write
33E7000
heap
page read and write
574C000
heap
page read and write
173F2140000
heap
page read and write
2F50000
heap
page read and write
5560000
trusted library allocation
page read and write
4A56000
heap
page read and write
41F000
unkown
page readonly
173F21BE000
heap
page read and write
63B37FB000
stack
page read and write
2E9E000
heap
page read and write
6750000
trusted library allocation
page execute and read and write
7FFD9B4F0000
trusted library allocation
page read and write
1140000
heap
page read and write
6532000
trusted library allocation
page read and write
231B6000
heap
page read and write
2FC4000
unkown
page read and write
2A50000
heap
page read and write
3019000
heap
page read and write
CB4000
heap
page read and write
2F80000
unkown
page read and write
2F3E000
heap
page read and write
19E000
stack
page read and write
2F10000
heap
page read and write
173F21E5000
heap
page read and write
75E000
unkown
page read and write
14C0000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
292A3000
heap
page read and write
2FC4000
unkown
page read and write
31EB000
heap
page read and write
6C9B4000
unkown
page read and write
D04000
heap
page read and write
B2E000
unkown
page readonly
4A64000
heap
page read and write
1590000
heap
page read and write
BB0000
heap
page read and write
2D87000
heap
page read and write
4339000
unkown
page read and write
29252000
heap
page read and write
7FFD9B692000
trusted library allocation
page read and write
BBA000
heap
page read and write
7FFD9B6E7000
trusted library allocation
page read and write
4A75000
heap
page read and write
1310000
trusted library allocation
page read and write
3490000
unkown
page read and write
3220000
heap
page read and write
33C5000
unkown
page read and write
CB4000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
454E000
unkown
page read and write
63B39F1000
stack
page read and write
2FF4000
unkown
page read and write
2B92000
heap
page read and write
295BF000
stack
page read and write
194000
stack
page read and write
1D120000
heap
page read and write
173F8927000
heap
page read and write
4A51000
heap
page read and write
2FC4000
unkown
page read and write
4A6A000
heap
page read and write
2946E000
stack
page read and write
7FFD9B5AC000
trusted library allocation
page execute and read and write
3230000
trusted library allocation
page read and write
3475000
trusted library allocation
page read and write
75E000
unkown
page write copy
7FF4E1DEB000
trusted library allocation
page execute read
173F3C86000
heap
page read and write
173F8C05000
heap
page read and write
2C51000
heap
page read and write
173F46D5000
heap
page read and write
7370000
trusted library allocation
page read and write
6580000
trusted library allocation
page execute and read and write
BB4000
heap
page read and write
400000
unkown
page execute and read and write
4A59000
heap
page read and write
6CAB5000
unkown
page readonly
455F000
unkown
page read and write
5CEE000
stack
page read and write
173F8D28000
heap
page read and write
269F000
direct allocation
page read and write
173EFB1B000
unkown
page readonly
2FC4000
unkown
page read and write
26BC000
direct allocation
page read and write
4A63000
heap
page read and write
401000
unkown
page execute read
173F8C4C000
heap
page read and write
231B8000
heap
page read and write
1D230000
trusted library allocation
page read and write
25E5000
direct allocation
page read and write
56B0000
trusted library allocation
page read and write
322E000
stack
page read and write
49E0000
heap
page read and write
3526000
trusted library allocation
page read and write
173F8A40000
trusted library allocation
page read and write
2C51000
heap
page read and write
35BA000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
173EF11B000
unkown
page readonly
D00000
heap
page read and write
2FC4000
unkown
page read and write
E3B000
heap
page read and write
173F8B08000
heap
page read and write
173F5380000
trusted library section
page read and write
173F21BB000
heap
page read and write
5A9000
stack
page read and write
400000
unkown
page readonly
3395000
trusted library allocation
page read and write
4A6D000
heap
page read and write
173F8C5F000
heap
page read and write
4B3E000
stack
page read and write
4A61000
heap
page read and write
3035C000
stack
page read and write
2FC4000
unkown
page read and write
7FFD9B772000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
3491000
heap
page read and write
4AAE000
heap
page read and write
2EA2000
heap
page read and write
34BF000
trusted library allocation
page read and write
2A53000
heap
page read and write
1347000
trusted library allocation
page execute and read and write
2926B000
heap
page read and write
35B5000
trusted library allocation
page read and write
8B3000
unkown
page readonly
173F883C000
heap
page read and write
322D000
trusted library allocation
page read and write
87E000
unkown
page readonly
231DA000
heap
page read and write
189E000
stack
page read and write
17390001000
trusted library allocation
page read and write
4A0F000
heap
page read and write
3406000
trusted library allocation
page read and write
173EE6E0000
unkown
page readonly
31A3000
trusted library allocation
page read and write
4A6B000
heap
page read and write
2974000
heap
page read and write
3531000
trusted library allocation
page read and write
2E9F000
heap
page read and write
55D8000
trusted library allocation
page read and write
CB4000
heap
page read and write
1330000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
173F3CD8000
heap
page read and write
173F4680000
heap
page read and write
173F5030000
trusted library allocation
page read and write
173F8AD2000
heap
page read and write
4A6E000
heap
page read and write
2FC4000
unkown
page read and write
DD0000
heap
page read and write
26D1000
direct allocation
page read and write
CB4000
heap
page read and write
417000
unkown
page execute read
562E000
stack
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
173F888B000
heap
page read and write
173F8939000
heap
page read and write
30CCA000
heap
page read and write
688D000
heap
page read and write
29656000
heap
page read and write
4111000
trusted library allocation
page read and write
2EAD000
heap
page read and write
63B49B8000
stack
page read and write
524C000
stack
page read and write
25ED000
direct allocation
page read and write
3150000
direct allocation
page execute and read and write
4A81000
heap
page read and write
1550000
heap
page read and write
2940000
heap
page read and write
660000
heap
page read and write
2BB1000
heap
page read and write
2FC0000
heap
page read and write
34C2000
trusted library allocation
page read and write
2DC5000
heap
page read and write
5679000
direct allocation
page read and write
13A8000
heap
page read and write
7FF4E1DD2000
trusted library allocation
page readonly
5570000
trusted library allocation
page read and write
327E000
stack
page read and write
173F2440000
heap
page read and write
4A60000
heap
page read and write
29661000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
41C000
unkown
page execute read
3111000
trusted library allocation
page read and write
51A2000
heap
page read and write
61ED4000
direct allocation
page readonly
BC2000
heap
page read and write
568D000
direct allocation
page read and write
348A000
trusted library allocation
page read and write
4A1F000
heap
page read and write
B8A000
heap
page read and write
173F8AA2000
heap
page read and write
231BD000
heap
page read and write
57EF000
stack
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
2FC4000
unkown
page read and write
DC0000
heap
page read and write
339B000
trusted library allocation
page read and write
25FD000
direct allocation
page read and write
173F8AC7000
heap
page read and write
4A11000
heap
page read and write
173F8AC2000
heap
page read and write
4A70000
heap
page read and write
D04000
heap
page read and write
231DC000
heap
page read and write
231BD000
heap
page read and write
7FF4E1DE9000
trusted library allocation
page execute read
173F8AE8000
heap
page read and write
3348000
trusted library allocation
page read and write
4A88000
heap
page read and write
173F3C31000
heap
page read and write
655F000
trusted library allocation
page read and write
4A8C000
heap
page read and write
2632000
direct allocation
page read and write
173F8CD5000
heap
page read and write
2FC4000
unkown
page read and write
231A0000
heap
page read and write
2639000
direct allocation
page read and write
173F8B5F000
heap
page read and write
26D8000
direct allocation
page read and write
13DB000
heap
page read and write
4AAE000
heap
page read and write
761000
unkown
page read and write
3623000
trusted library allocation
page read and write
63B43B7000
stack
page read and write
17380001000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
4AAE000
heap
page read and write
4A6D000
heap
page read and write
30C0000
trusted library allocation
page read and write
173F4610000
heap
page execute and read and write
313E000
stack
page read and write
6848000
heap
page read and write
774000
unkown
page read and write
1739007C000
trusted library allocation
page read and write
733D000
stack
page read and write
173F3C4C000
heap
page read and write
ECD000
heap
page read and write
4A8D000
heap
page read and write
596E000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
67CE000
stack
page read and write
2EAF000
heap
page read and write
5566000
trusted library allocation
page read and write
173F3CA2000
heap
page read and write
1399000
heap
page read and write
7FF4E1DD3000
trusted library allocation
page execute read
5580000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
562E000
stack
page read and write
8B3000
unkown
page readonly
34AA000
heap
page read and write
2590000
heap
page read and write
173F3C9E000
heap
page read and write
231DC000
heap
page read and write
2EA4000
heap
page read and write
2D4E000
stack
page read and write
29257000
heap
page read and write
B63000
heap
page read and write
3248000
trusted library allocation
page read and write
6555000
trusted library allocation
page read and write
CB4000
heap
page read and write
61EB4000
direct allocation
page read and write
231A7000
heap
page read and write
2F20000
unkown
page readonly
B71000
heap
page read and write
A45000
heap
page read and write
5C6E000
stack
page read and write
30BE000
stack
page read and write
173F8874000
heap
page read and write
13C5000
heap
page read and write
63B3D36000
stack
page read and write
16EC000
stack
page read and write
56C0000
heap
page read and write
12FE000
stack
page read and write
231CD000
heap
page read and write
6530000
trusted library allocation
page read and write
1F0000
heap
page read and write
33EE000
trusted library allocation
page read and write
131D000
trusted library allocation
page execute and read and write
2FC4000
unkown
page read and write
31C0000
direct allocation
page read and write
7FFD9B878000
trusted library allocation
page read and write
3006C000
stack
page read and write
2648000
direct allocation
page read and write
8AC000
unkown
page read and write
8A0000
unkown
page write copy
DF0000
heap
page read and write
6C0E1000
unkown
page execute read
25A0000
direct allocation
page read and write
4A60000
heap
page read and write
173F47D0000
trusted library section
page read and write
4A59000
heap
page read and write
173F2430000
trusted library section
page read and write
231D9000
heap
page read and write
12C0000
heap
page read and write
2FF4000
unkown
page read and write
1290000
heap
page read and write
6840000
heap
page read and write
173F8ADA000
heap
page read and write
2FB5000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
25C3000
direct allocation
page read and write
231B3000
heap
page read and write
173F2445000
heap
page read and write
445C000
unkown
page read and write
173F8AEF000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
4A63000
heap
page read and write
E08000
heap
page read and write
173F50F0000
trusted library allocation
page read and write
12B6000
heap
page read and write
267B000
direct allocation
page read and write
1D0AE000
stack
page read and write
173F8AE6000
heap
page read and write
7FFD9B514000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
34DF000
stack
page read and write
25CC000
direct allocation
page read and write
8B3000
unkown
page readonly
301B000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
4A62000
heap
page read and write
1120000
heap
page read and write
1460000
heap
page read and write
345B000
trusted library allocation
page read and write
231A6000
heap
page read and write
173EE6E2000
unkown
page readonly
57DF000
stack
page read and write
534E000
stack
page read and write
2BF0000
unkown
page read and write
B2E000
unkown
page readonly
301DA000
heap
page read and write
4A5D000
heap
page read and write
610000
heap
page read and write
5911000
unkown
page read and write
398E000
heap
page read and write
312F000
stack
page read and write
7FF4E1DD0000
trusted library allocation
page readonly
7FFD9B7B6000
trusted library allocation
page read and write
63B3BF7000
stack
page read and write
4A82000
heap
page read and write
34B0000
unkown
page read and write
2FD0000
heap
page read and write
3619000
trusted library allocation
page read and write
25B0000
direct allocation
page read and write
173F8A30000
trusted library allocation
page read and write
7FFD9B867000
trusted library allocation
page read and write
8B0000
heap
page read and write
173F8DBC000
heap
page read and write
7FF4E1DE3000
trusted library allocation
page execute read
7FF4E1DE8000
trusted library allocation
page readonly
4A8D000
heap
page read and write
2F7E000
unkown
page read and write
31E0000
heap
page read and write
29230000
heap
page read and write
173F90D0000
trusted library section
page readonly
18A0000
trusted library allocation
page read and write
D7B000
stack
page read and write
3239000
trusted library allocation
page read and write
7FF4E1DEF000
trusted library allocation
page execute read
294BE000
stack
page read and write
5DF3000
heap
page read and write
447000
unkown
page execute and read and write
173F46CD000
heap
page read and write
2C8C000
heap
page read and write
35A0000
trusted library allocation
page read and write
1738033C000
trusted library allocation
page read and write
40C000
unkown
page readonly
2F30000
heap
page read and write
8B3000
unkown
page readonly
55BC000
trusted library allocation
page read and write
5BAE000
stack
page read and write
12A0000
heap
page read and write
2F7E000
unkown
page read and write
66F0000
trusted library allocation
page read and write
4AB3000
heap
page read and write
2925E000
heap
page read and write
2FCB000
heap
page read and write
31F2000
trusted library allocation
page read and write
154D000
stack
page read and write
6C239000
unkown
page write copy
6CAAF000
unkown
page write copy
AA0000
heap
page read and write
26A6000
direct allocation
page read and write
DE9000
heap
page read and write
71D0000
trusted library section
page read and write
173F3CED000
heap
page read and write
2FB0000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
CB4000
heap
page read and write
2C18000
unkown
page readonly
4E20000
heap
page read and write
63B343E000
stack
page read and write
2B90000
heap
page read and write
B2B000
unkown
page read and write
7FFD9BA70000
trusted library allocation
page read and write
3A61000
heap
page read and write
337F000
stack
page read and write
DE0000
heap
page read and write
173F1F90000
unkown
page readonly
13CD000
heap
page read and write
173F3C7D000
heap
page read and write
5911000
unkown
page read and write
25B6000
direct allocation
page read and write
4A52000
heap
page read and write
173F8834000
heap
page read and write
4AB1000
heap
page read and write
BC0000
heap
page read and write
292FC000
heap
page read and write
4A88000
heap
page read and write
4A88000
heap
page read and write
173F88A3000
heap
page read and write
231DA000
heap
page read and write
29BE000
stack
page read and write
27DF000
stack
page read and write
6700000
trusted library allocation
page execute and read and write
2F0E000
stack
page read and write
7FFD9B80B000
trusted library allocation
page read and write
173F2260000
heap
page read and write
5C2E000
stack
page read and write
33FB000
trusted library allocation
page read and write
173F3CAA000
heap
page read and write
7FF4E1DE2000
trusted library allocation
page readonly
143F000
heap
page read and write
1300000
trusted library allocation
page read and write
159E000
stack
page read and write
61E00000
direct allocation
page execute and read and write
3482000
trusted library allocation
page read and write
4A71000
heap
page read and write
30CC000
trusted library allocation
page read and write
173F4690000
heap
page read and write
4A81000
heap
page read and write
A40000
heap
page read and write
49FE000
heap
page read and write
F1E000
stack
page read and write
11E6000
heap
page read and write
8A0000
unkown
page write copy
F5E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
4A22000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
2F60000
trusted library allocation
page read and write
56FE000
direct allocation
page read and write
4A13000
heap
page read and write
4A6B000
heap
page read and write
4A4E000
heap
page read and write
2BE0000
heap
page read and write
8AA000
unkown
page read and write
31C0000
heap
page read and write
4A5D000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
4A02000
heap
page read and write
323F000
stack
page read and write
2FC4000
unkown
page read and write
44E0000
unkown
page read and write
173F886B000
heap
page read and write
173F4620000
heap
page read and write
594E000
stack
page read and write
13A0000
heap
page read and write
3233000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
231A8000
heap
page read and write
231B7000
heap
page read and write
B60000
heap
page read and write
7FFD9B6A2000
trusted library allocation
page read and write
D20000
heap
page read and write
642E000
stack
page read and write
2EAF000
heap
page read and write
30E6000
trusted library allocation
page read and write
1D131000
heap
page read and write
4AAE000
heap
page read and write
7FFD9B4F3000
trusted library allocation
page execute and read and write
4A51000
heap
page read and write
231D8000
heap
page read and write
7FFD9B4F4000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
6C092000
unkown
page readonly
7FFD9B6BE000
trusted library allocation
page read and write
B67000
heap
page read and write
4A88000
heap
page read and write
173F45E0000
trusted library section
page read and write
538E000
stack
page read and write
260B000
direct allocation
page read and write
4AFF000
stack
page read and write
6C247000
unkown
page readonly
173F3C75000
heap
page read and write
173F89B3000
heap
page read and write
D20000
heap
page read and write
65E000
stack
page read and write
173F8BA4000
heap
page read and write
BB7000
heap
page read and write
7FFD9B740000
trusted library allocation
page read and write
2BD0000
unkown
page readonly
1360000
heap
page read and write
2689000
direct allocation
page read and write
2978000
heap
page read and write
813000
unkown
page readonly
2EAC000
heap
page read and write
4220000
unkown
page read and write
4A8A000
heap
page read and write
13CB000
heap
page read and write
2FC4000
unkown
page read and write
411E000
trusted library allocation
page read and write
3E70000
trusted library allocation
page read and write
1396000
heap
page read and write
292DF000
heap
page read and write
4A69000
heap
page read and write
2B7C000
stack
page read and write
173F2263000
heap
page read and write
7FFD9B5A6000
trusted library allocation
page read and write
314F000
stack
page read and write
55E5000
trusted library allocation
page read and write
34D8000
trusted library allocation
page read and write
400E000
trusted library allocation
page read and write
2FF4000
unkown
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
5B4E000
stack
page read and write
5A10000
trusted library allocation
page read and write
17380347000
trusted library allocation
page read and write
1150000
heap
page read and write
44D0000
unkown
page read and write
2F30000
heap
page read and write
30D8000
trusted library allocation
page read and write
8A0000
unkown
page read and write
4A66000
heap
page read and write
4AAE000
heap
page read and write
76A000
unkown
page read and write
3587000
trusted library allocation
page read and write
26AD000
direct allocation
page read and write
6C08E000
unkown
page read and write
4A5A000
heap
page read and write
4A16000
heap
page read and write
2FF0000
heap
page read and write
2FF4000
unkown
page read and write
301BC000
stack
page read and write
1313000
trusted library allocation
page execute and read and write
7FFD9B51B000
trusted library allocation
page execute and read and write
10FF000
stack
page read and write
2EB1000
heap
page read and write
63B3E3B000
stack
page read and write
65A0000
trusted library allocation
page read and write
DDA000
heap
page read and write
1374000
trusted library allocation
page read and write
173F22D0000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
2EAD000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
49E1000
heap
page read and write
2FC4000
unkown
page read and write
173F88A7000
heap
page read and write
2F47000
heap
page execute and read and write
5CDE000
stack
page read and write
2FC4000
unkown
page read and write
173F53B0000
trusted library section
page read and write
BC6000
heap
page read and write
6C9A9000
unkown
page write copy
3CB7000
heap
page read and write
30F2000
trusted library allocation
page read and write
173F8AA8000
heap
page read and write
DB0000
heap
page read and write
2EB5000
heap
page read and write
1100000
unkown
page readonly
4A82000
heap
page read and write
3016B000
stack
page read and write
4A84000
heap
page read and write
4A88000
heap
page read and write
2FC4000
unkown
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
7FFD9B7E0000
trusted library allocation
page read and write
63B3E7E000
stack
page read and write
2D85000
heap
page read and write
231A6000
heap
page read and write
5BB0000
heap
page read and write
4A57000
heap
page read and write
660000
heap
page read and write
30F5000
trusted library allocation
page read and write
173F8C08000
heap
page read and write
2FCE000
unkown
page read and write
7FF4E1DF0000
trusted library allocation
page execute and read and write
2ECF000
stack
page read and write
4A70000
heap
page read and write
173F894D000
heap
page read and write
71CE000
stack
page read and write
B76000
heap
page read and write
3529000
trusted library allocation
page read and write
173F2370000
trusted library section
page read and write
7FFD9B7C8000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
362E000
trusted library allocation
page read and write
173F8BAB000
heap
page read and write
509E000
stack
page read and write
2FC4000
unkown
page read and write
173F8830000
heap
page read and write
173F9164000
trusted library allocation
page read and write
4A85000
heap
page read and write
76F000
unkown
page read and write
4A87000
heap
page read and write
4A66000
heap
page read and write
7FFD9B50D000
trusted library allocation
page execute and read and write
2E95000
heap
page read and write
6C9B7000
unkown
page readonly
5C70000
trusted library allocation
page read and write
83C000
unkown
page readonly
173F23A5000
heap
page read and write
CB4000
heap
page read and write
173F9182000
trusted library allocation
page read and write
400000
unkown
page readonly
548F000
stack
page read and write
6590000
trusted library allocation
page read and write
5C50000
unkown
page read and write
5840000
heap
page execute and read and write
4A61000
heap
page read and write
BA9000
heap
page read and write
7FFD9B5D6000
trusted library allocation
page execute and read and write
2FC4000
unkown
page read and write
2F80000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
63B35FD000
stack
page read and write
2936E000
stack
page read and write
173F2242000
heap
page read and write
A8E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
231D2000
heap
page read and write
680E000
stack
page read and write
E3D000
heap
page read and write
B84000
heap
page read and write
5C4E000
stack
page read and write
2604000
direct allocation
page read and write
2FB0000
direct allocation
page read and write
5A6E000
stack
page read and write
34E6000
trusted library allocation
page read and write
2E9E000
heap
page read and write
173F3CF0000
heap
page execute and read and write
7FFD9B6BB000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
11B0000
heap
page read and write
358A000
trusted library allocation
page read and write
63B45BD000
stack
page read and write
507F000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2E9D000
heap
page read and write
33C0000
unkown
page read and write
670000
heap
page read and write
7FF4E1DE6000
trusted library allocation
page readonly
2F6A0000
trusted library allocation
page read and write
173F0F1B000
unkown
page readonly
4A8C000
heap
page read and write
16AE000
stack
page read and write
723C000
stack
page read and write
339F000
unkown
page read and write
4A66000
heap
page read and write
4AB1000
heap
page read and write
231C0000
heap
page read and write
173F8BE0000
heap
page read and write
2E97000
heap
page read and write
31F5000
heap
page read and write
2EAF000
heap
page read and write
173F3CCF000
heap
page read and write
5690000
trusted library allocation
page execute and read and write
19B000
stack
page read and write
173F8934000
heap
page read and write
170B000
trusted library allocation
page read and write
25B4000
direct allocation
page read and write
2FC4000
unkown
page read and write
2EFA000
stack
page read and write
63B32FE000
stack
page read and write
32C6000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
432D000
unkown
page read and write
173F8AD8000
heap
page read and write
55CC000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
173F4083000
heap
page read and write
4A57000
heap
page read and write
3230000
heap
page read and write
4A63000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
5550000
direct allocation
page read and write
4A69000
heap
page read and write
2FC4000
unkown
page read and write
23240000
heap
page read and write
4A69000
heap
page read and write
4A57000
heap
page read and write
5563000
trusted library allocation
page read and write
6C8D1000
unkown
page execute read
323B000
trusted library allocation
page read and write
2B50000
heap
page read and write
173F3C72000
heap
page read and write
4A6D000
heap
page read and write
9FB000
stack
page read and write
231AC000
heap
page read and write
6C851000
unkown
page execute read
D5B000
heap
page read and write
231D2000
heap
page read and write
231D3000
heap
page read and write
32B0000
trusted library allocation
page read and write
519E000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
3260000
heap
page read and write
2C50000
heap
page read and write
17380359000
trusted library allocation
page read and write
1384000
trusted library allocation
page read and write
2E95000
heap
page read and write
9FB000
stack
page read and write
3461000
trusted library allocation
page read and write
63B38FD000
stack
page read and write
173F8D2B000
heap
page read and write
2665000
direct allocation
page read and write
17390099000
trusted library allocation
page read and write
DA0000
heap
page read and write
83C000
unkown
page readonly
4AAE000
heap
page read and write
231DC000
heap
page read and write
6760000
trusted library allocation
page read and write
4A71000
heap
page read and write
173F8A84000
heap
page read and write
4275000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
173900DB000
trusted library allocation
page read and write
231B3000
heap
page read and write
49F0000
heap
page read and write
35EA000
trusted library allocation
page read and write
33DF000
unkown
page read and write
7FFD9B7B8000
trusted library allocation
page read and write
4A4E000
heap
page read and write
134B000
trusted library allocation
page execute and read and write
173F2160000
heap
page read and write
4A6C000
heap
page read and write
4A66000
heap
page read and write
26CA000
direct allocation
page read and write
320E000
stack
page read and write
3523000
trusted library allocation
page read and write
5F9000
stack
page read and write
2B69000
heap
page read and write
5AAE000
stack
page read and write
8A9000
unkown
page write copy
4A5D000
heap
page read and write
401000
unkown
page execute read
3250000
trusted library allocation
page read and write
173F8DAE000
heap
page read and write
53DF000
trusted library allocation
page read and write
173F5390000
trusted library section
page read and write
2BB0000
unkown
page readonly
173F225E000
heap
page read and write
4A5D000
heap
page read and write
358D000
trusted library allocation
page read and write
ECA000
heap
page read and write
13DE000
heap
page read and write
3293000
trusted library allocation
page read and write
2FF4000
unkown
page read and write
1CC2F000
stack
page read and write
295F0000
heap
page read and write
33DE000
stack
page read and write
2E98000
heap
page read and write
173F2420000
trusted library section
page read and write
4A61000
heap
page read and write
1345000
trusted library allocation
page execute and read and write
2FC4000
unkown
page read and write
2EA8000
heap
page read and write
2EB0000
heap
page read and write
6C8D0000
unkown
page readonly
4737000
unkown
page read and write
231A4000
heap
page read and write
AB0000
direct allocation
page execute and read and write
3389000
trusted library allocation
page read and write
231CD000
heap
page read and write
5E0E000
heap
page read and write
2FC4000
unkown
page read and write
4A8E000
heap
page read and write
266C000
direct allocation
page read and write
173F2360000
trusted library allocation
page read and write
2D80000
heap
page read and write
690000
unkown
page readonly
1336000
trusted library allocation
page execute and read and write
1700000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
173F2300000
trusted library allocation
page read and write
173F5480000
trusted library allocation
page read and write
AB0000
unkown
page readonly
D04000
heap
page read and write
231B5000
heap
page read and write
C40000
heap
page read and write
6A3F000
stack
page read and write
4A59000
heap
page read and write
2FC4000
unkown
page read and write
83C000
unkown
page readonly
655A000
trusted library allocation
page read and write
783000
unkown
page readonly
173F88B6000
heap
page read and write
7FF4E1DEA000
trusted library allocation
page readonly
34C5000
trusted library allocation
page read and write
63B3F79000
stack
page read and write
6830000
trusted library allocation
page execute and read and write
231B8000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
C7E000
stack
page read and write
3F9D000
trusted library allocation
page read and write
3580000
heap
page read and write
173F3C99000
heap
page read and write
3318000
trusted library allocation
page read and write
231A7000
heap
page read and write
76D000
unkown
page read and write
49CC000
stack
page read and write
33C4000
trusted library allocation
page read and write
1739007F000
trusted library allocation
page read and write
4A78000
heap
page read and write
2FB7000
heap
page read and write
68BC000
heap
page read and write
D28000
heap
page read and write
61D9000
heap
page read and write
173F8DB2000
heap
page read and write
29664000
heap
page read and write
2570000
heap
page read and write
231CF000
heap
page read and write
3411000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
B6B000
heap
page read and write
3579000
heap
page read and write
231AE000
heap
page read and write
1D130000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
173F88B1000
heap
page read and write
4FB0000
heap
page read and write
63B2EEB000
stack
page read and write
2DC0000
heap
page read and write
231CD000
heap
page read and write
691000
unkown
page execute read
231D2000
heap
page read and write
173F051B000
unkown
page readonly
173F3CD3000
heap
page read and write
4A6F000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
54CC000
stack
page read and write
1710000
heap
page read and write
2D00000
heap
page read and write
173F8ADE000
heap
page read and write
56A4000
trusted library allocation
page read and write
173EE6E0000
unkown
page readonly
7FFD9B6E2000
trusted library allocation
page read and write
6C23D000
unkown
page read and write
5B0E000
unkown
page read and write
6863000
heap
page read and write
6CAAE000
unkown
page read and write
1320000
trusted library allocation
page read and write
173F50A0000
trusted library allocation
page read and write
40A9000
trusted library allocation
page read and write
690000
unkown
page readonly
10F0000
heap
page read and write
1739001C000
trusted library allocation
page read and write
DE8000
stack
page read and write
3240000
trusted library allocation
page read and write
2E9A000
heap
page read and write
173F2320000
heap
page read and write
141F000
heap
page read and write
17380233000
trusted library allocation
page read and write
572F000
stack
page read and write
32B3000
trusted library allocation
page read and write
71F0000
trusted library allocation
page execute and read and write
6C9AD000
unkown
page read and write
3312000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
2D5E000
heap
page read and write
2ECE000
stack
page read and write
18B0000
trusted library allocation
page read and write
63B3FBE000
stack
page read and write
2970000
heap
page read and write
4A70000
heap
page read and write
6C000000
unkown
page readonly
133E000
stack
page read and write
4A69000
heap
page read and write
4A8C000
heap
page read and write
1D23A000
heap
page read and write
231D9000
heap
page read and write
4A1F000
heap
page read and write
173F8895000
heap
page read and write
AB1000
unkown
page execute read
B1C000
stack
page read and write
7FFD9B500000
trusted library allocation
page read and write
17380355000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1D131000
heap
page read and write
7FFD9B6FD000
trusted library allocation
page read and write
2F3A000
heap
page read and write
4A62000
heap
page read and write
173806CB000
trusted library allocation
page read and write
3250000
heap
page read and write
7FF4E1DE1000
trusted library allocation
page execute read
4A50000
heap
page read and write
4AAE000
heap
page read and write
D04000
heap
page read and write
173F5020000
trusted library allocation
page read and write
261C000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
3B1A000
heap
page read and write
318E000
stack
page read and write
DEE000
heap
page read and write
34ED000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
2FC4000
unkown
page read and write
520E000
stack
page read and write
4A62000
heap
page read and write
2C3C000
unkown
page readonly
1580000
trusted library allocation
page execute and read and write
691000
unkown
page execute read
364E000
trusted library allocation
page read and write
193000
stack
page read and write
173F2189000
heap
page read and write
2BA2000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
2D30000
heap
page read and write
6730000
trusted library allocation
page execute and read and write
250E000
stack
page read and write
B97000
heap
page read and write
173F45F0000
trusted library section
page read and write
4A57000
heap
page read and write
2C18000
unkown
page readonly
2EC0000
unkown
page read and write
198000
stack
page read and write
FF400000
trusted library allocation
page execute and read and write
BDD000
heap
page read and write
4A8D000
heap
page read and write
4A8A000
heap
page read and write
2EFA000
stack
page read and write
5901000
unkown
page read and write
7FFD9B730000
trusted library allocation
page read and write
B71000
heap
page read and write
2F97000
heap
page read and write
2FC4000
unkown
page read and write
There are 1463 hidden memdumps, click here to show them.