IOC Report
R0hb7jyBcv.exe

loading gif

Files

File Path
Type
Category
Malicious
R0hb7jyBcv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IIIJECAEGD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\phtshfcnnluilu
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qbji
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5g0.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5g0.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5g0.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5g0.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5g0.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGHIIJDGHCBFIECBKEGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CGDBFBGI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EGHJKFHJJJKJJJJKEHCB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIIIIJKFCAAECAKFIEHCGDHIEG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IJEBKKEGDBFIIEBFHIEHCBKJJK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJJJEBFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_R0hb7jyBcv.exe_a5f048da7d633f1d02755f37f56d6beff18e56d_230e433d_85a00bb9-205f-404e-b024-213515deefdd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5g0.0.exe_bd391344649266707147ac67cf7cb2db622e1c57_285a76b8_f061121c-63fa-454f-8102-8a04dd9f5552\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1349.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 10:16:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1473.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14A3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6244.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 10:16:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62F1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6311.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\SQSJKEBWDT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\WKXEWIOTXI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\WKXEWIOTXI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\YPSIACHYXW.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\wb2oigpz.xj2
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\88194644
data
dropped
C:\Users\user\AppData\Local\Temp\95dda64a
data
dropped
C:\Users\user\AppData\Local\Temp\hdpinc
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Thu Apr 25 09:16:13 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp917D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\u5g0.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5g0.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u5g0.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 53 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\R0hb7jyBcv.exe
"C:\Users\user\Desktop\R0hb7jyBcv.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5g0.0.exe
"C:\Users\user\AppData\Local\Temp\u5g0.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5g0.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5g0.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u5g0.3.exe
"C:\Users\user\AppData\Local\Temp\u5g0.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5g0.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5g0.2\run.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\IIIJECAEGD.exe"
malicious
C:\Users\user\AppData\Local\Temp\IIIJECAEGD.exe
"C:\Users\user\AppData\Local\Temp\IIIJECAEGD.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 1144
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 2364
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.215.85.66:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
91.215.85.66
malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://185.172.128.76/15f649199f40275b/freebl3.dll$
unknown
http://185.172.128.76/15f649199f40275b/vcruntime140.dllXqF~
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
http://91.215.85.66:9000t-dq
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://91.215.85.66:
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
https://westus2-2.in.applicationinsights.azure.com.
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dlln
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php4
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpQ
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpX
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
http://91.215.85.66:9000
unknown
http://91.215.85.66:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08F
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
iolo0.b-cdn.net
169.150.236.98
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
ProgramId
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
FileId
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
LowerCaseLongPath
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
LongPathHash
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
Name
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
OriginalFileName
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
Publisher
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
Version
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
BinFileVersion
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
BinaryType
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
ProductName
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
ProductVersion
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
LinkDate
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
BinProductVersion
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
AppxPackageFullName
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
AppxPackageRelativeId
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
Size
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
Language
\REGISTRY\A\{ec30068d-9328-efce-ab14-ed19879df3f9}\Root\InventoryApplicationFile\r0hb7jybcv.exe|5a5b12d32f918874
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
ProgramId
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
FileId
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
LowerCaseLongPath
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
LongPathHash
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
Name
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
OriginalFileName
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
Publisher
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
Version
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
BinFileVersion
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
BinaryType
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
ProductName
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
ProductVersion
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
LinkDate
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
BinProductVersion
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
AppxPackageFullName
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
AppxPackageRelativeId
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
Size
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
Language
\REGISTRY\A\{5d1a96bc-9c60-891c-9e85-255d75884123}\Root\InventoryApplicationFile\u5g0.0.exe|564f2bd1a5df75d6
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400E1AF21C2E
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 73 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
5210000
direct allocation
page read and write
malicious
5D60000
direct allocation
page read and write
malicious
1481A580000
trusted library section
page read and write
malicious
2F4C000
heap
page read and write
malicious
2ED0000
direct allocation
page execute and read and write
malicious
14811E93000
trusted library allocation
page read and write
malicious
4C2A000
trusted library allocation
page read and write
malicious
1481A850000
trusted library section
page read and write
malicious
4212000
heap
page read and write
malicious
1487C95B000
unkown
page readonly
malicious
3020000
direct allocation
page read and write
malicious
52A8000
trusted library allocation
page read and write
malicious
702000
unkown
page readonly
malicious
1487FB5B000
unkown
page readonly
malicious
2FF9000
heap
page read and write
malicious
154E000
stack
page read and write
6BC0000
trusted library allocation
page read and write
C97000
heap
page read and write
1481EAF9000
heap
page read and write
14802008000
trusted library allocation
page read and write
32E1000
unkown
page read and write
BB0000
direct allocation
page execute and read and write
19C000
stack
page read and write
CC4000
heap
page read and write
14811DD1000
trusted library allocation
page read and write
C3F000
stack
page read and write
1481EAF2000
heap
page read and write
2D83000
heap
page read and write
271D000
heap
page read and write
1481219C000
trusted library allocation
page read and write
14802142000
trusted library allocation
page read and write
7FFD9B700000
trusted library allocation
page read and write
1481A6F9000
heap
page read and write
35FE000
trusted library allocation
page read and write
1487C922000
unkown
page readonly
CB5000
heap
page read and write
3D20000
heap
page read and write
231A8000
heap
page read and write
F70000
heap
page read and write
2550000
heap
page read and write
4EF4000
heap
page read and write
2E14000
unkown
page read and write
6A6E000
stack
page read and write
4E9E000
stack
page read and write
17A0000
trusted library allocation
page read and write
7FFD9B720000
trusted library allocation
page read and write
7FF4B4CF1000
trusted library allocation
page execute read
78FD000
stack
page read and write
1481B2B0000
trusted library allocation
page read and write
14801C50000
trusted library section
page read and write
30FB000
heap
page read and write
C4F000
stack
page read and write
7FFD9B4EC000
trusted library allocation
page execute and read and write
231A8000
heap
page read and write
2C1A000
unkown
page readonly
8B0000
heap
page read and write
2CC0000
unkown
page read and write
2FD8000
heap
page read and write
6BDD5000
unkown
page readonly
2790000
trusted library allocation
page read and write
1510000
heap
page read and write
3344000
trusted library allocation
page read and write
4261000
trusted library allocation
page read and write
231AD000
heap
page read and write
7FFD9B690000
trusted library allocation
page read and write
368A000
trusted library allocation
page read and write
1481EAA0000
heap
page read and write
2ACC000
stack
page read and write
2FCA000
heap
page read and write
27A0000
heap
page read and write
26CC000
heap
page read and write
26C8000
heap
page read and write
30CE000
stack
page read and write
35A2000
trusted library allocation
page read and write
19B000
stack
page read and write
3F6000
heap
page read and write
2706000
direct allocation
page read and write
5D3F000
stack
page read and write
1481EA44000
heap
page read and write
38AF000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
1410000
heap
page read and write
F34000
heap
page read and write
1481B027000
heap
page read and write
1481A72D000
heap
page read and write
A6C000
unkown
page readonly
2FB0000
heap
page read and write
76BA000
stack
page read and write
57E0000
trusted library allocation
page read and write
6D054000
unkown
page read and write
F84000
heap
page read and write
2CAD000
stack
page read and write
13A50FD000
stack
page read and write
7FF4B4CF0000
trusted library allocation
page readonly
26D9000
heap
page read and write
14801D50000
trusted library section
page read and write
3627000
trusted library allocation
page read and write
27A4000
unkown
page read and write
3E20000
heap
page read and write
778000
unkown
page read and write
14800300000
heap
page read and write
370000
heap
page read and write
23193000
heap
page read and write
6720000
trusted library allocation
page read and write
7FFD9B4AD000
trusted library allocation
page execute and read and write
231BD000
heap
page read and write
6BBF0000
unkown
page readonly
3558000
trusted library allocation
page read and write
14802178000
trusted library allocation
page read and write
2936E000
stack
page read and write
77C0000
heap
page read and write
5B9F000
stack
page read and write
1515000
heap
page read and write
2FC5000
heap
page read and write
7FFD9B4A3000
trusted library allocation
page read and write
2F2A000
heap
page read and write
2951F000
heap
page read and write
231A3000
heap
page read and write
26D6000
heap
page read and write
2E14000
unkown
page read and write
57A1000
unkown
page read and write
1481AB50000
trusted library section
page read and write
110E000
heap
page read and write
2950F000
heap
page read and write
1481A6DE000
heap
page read and write
23196000
heap
page read and write
14D5000
heap
page read and write
333A000
trusted library allocation
page read and write
37AE000
stack
page read and write
271C000
heap
page read and write
400000
unkown
page readonly
2810000
trusted library allocation
page read and write
2FCD000
heap
page read and write
27D9000
direct allocation
page read and write
1481EC1F000
heap
page read and write
CCC000
heap
page read and write
231CA000
heap
page read and write
231C2000
heap
page read and write
D3F000
stack
page read and write
2F74D000
stack
page read and write
1481B10D000
heap
page read and write
271C000
heap
page read and write
2881000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
5017000
heap
page read and write
501E000
stack
page read and write
33AF000
stack
page read and write
CC9000
heap
page read and write
1481A750000
heap
page read and write
2E14000
unkown
page read and write
2E90000
unkown
page read and write
271D000
heap
page read and write
26DF000
heap
page read and write
7DE0000
trusted library allocation
page read and write
1481A6C6000
heap
page read and write
1481AFF1000
heap
page read and write
2E14000
unkown
page read and write
273D000
direct allocation
page read and write
2870000
heap
page execute and read and write
56EB000
trusted library allocation
page read and write
400000
unkown
page readonly
3461000
trusted library allocation
page read and write
7FFD9B704000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
2650000
heap
page read and write
26D9000
heap
page read and write
13AE000
stack
page read and write
140F000
stack
page read and write
44DE000
trusted library allocation
page read and write
231C8000
heap
page read and write
1481EBC0000
heap
page read and write
81CD000
stack
page read and write
310C000
stack
page read and write
2FED000
heap
page read and write
231C1000
heap
page read and write
231AD000
heap
page read and write
4827000
unkown
page read and write
2A90000
heap
page read and write
7FFD9B6A6000
trusted library allocation
page read and write
271B000
heap
page read and write
3E51000
heap
page read and write
ADA000
unkown
page read and write
C74000
heap
page read and write
1CF5E000
stack
page read and write
148020E7000
trusted library allocation
page read and write
26E3000
heap
page read and write
231AD000
heap
page read and write
2F590000
trusted library allocation
page read and write
11000
unkown
page execute read
2E14000
unkown
page read and write
36CE000
trusted library allocation
page read and write
2E14000
unkown
page read and write
1480211F000
trusted library allocation
page read and write
276C000
direct allocation
page read and write
17B0000
heap
page read and write
30FE000
stack
page read and write
5E02000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
2FB7000
heap
page read and write
27A4000
unkown
page read and write
7FF4B4D0A000
trusted library allocation
page readonly
3CC7000
heap
page read and write
1481B280000
trusted library allocation
page read and write
2F2E000
heap
page read and write
2E14000
unkown
page read and write
231C2000
heap
page read and write
49CC000
stack
page read and write
11000
unkown
page execute read
29501000
heap
page read and write
1481EB26000
heap
page read and write
12AE000
stack
page read and write
33DF000
trusted library allocation
page read and write
1F0000
heap
page read and write
271C000
heap
page read and write
2E54000
heap
page read and write
48BE000
unkown
page read and write
52C000
stack
page read and write
2E14000
unkown
page read and write
3F54000
heap
page read and write
2E00000
unkown
page readonly
2E14000
unkown
page read and write
57F0000
trusted library allocation
page read and write
2CA0000
unkown
page read and write
1481A735000
heap
page read and write
2E14000
unkown
page read and write
2E14000
unkown
page read and write
6BD8F000
unkown
page readonly
320C000
stack
page read and write
E2F000
stack
page read and write
30F0000
heap
page read and write
2FDB000
heap
page read and write
322A000
heap
page read and write
1481EB04000
heap
page read and write
1481B2D0000
trusted library allocation
page read and write
26DD000
heap
page read and write
33D4000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
C7E000
heap
page read and write
7FF4B4CF3000
trusted library allocation
page execute read
401000
unkown
page execute read
2E14000
unkown
page read and write
2F640000
heap
page read and write
4ACD000
stack
page read and write
30D0000
heap
page read and write
26D6000
heap
page read and write
26E5000
heap
page read and write
14E0000
heap
page read and write
7B7E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
2FDC000
heap
page read and write
7FFD9B490000
trusted library allocation
page read and write
2870000
heap
page read and write
CFD000
heap
page read and write
A20000
heap
page read and write
26D1000
heap
page read and write
339E000
stack
page read and write
41F000
unkown
page readonly
7FFD9B870000
trusted library allocation
page read and write
CD3000
heap
page read and write
231A3000
heap
page read and write
43EE000
trusted library allocation
page read and write
2748000
direct allocation
page read and write
1481A79C000
heap
page read and write
325C000
stack
page read and write
2735000
direct allocation
page read and write
27A0000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
813000
unkown
page readonly
26D9000
heap
page read and write
2DC7000
heap
page read and write
26E0000
heap
page read and write
194000
stack
page read and write
5A5E000
unkown
page read and write
26C9000
heap
page read and write
1481AFF3000
heap
page read and write
56D0000
trusted library allocation
page read and write
910000
heap
page read and write
23230000
heap
page read and write
73D0000
trusted library allocation
page execute and read and write
1481EBC5000
heap
page read and write
2FDD000
heap
page read and write
6C967000
unkown
page readonly
27DE000
trusted library allocation
page read and write
7FF4B4D09000
trusted library allocation
page execute read
292EC000
heap
page read and write
12A0000
heap
page read and write
300B000
trusted library allocation
page read and write
26DD000
heap
page read and write
2F60000
trusted library allocation
page read and write
26D4000
heap
page read and write
163A000
trusted library allocation
page execute and read and write
7FFD9B670000
trusted library allocation
page read and write
4E89000
direct allocation
page read and write
1D130000
heap
page read and write
26D3000
heap
page read and write
97000
stack
page read and write
CEA000
heap
page read and write
400000
unkown
page execute and read and write
7FFD9B6F0000
trusted library allocation
page read and write
1481B190000
trusted library section
page readonly
2E14000
unkown
page read and write
231B0000
heap
page read and write
38C0000
heap
page read and write
1481AFB4000
heap
page read and write
4D9E000
stack
page read and write
5509000
direct allocation
page read and write
ADC000
unkown
page read and write
61ED4000
direct allocation
page readonly
5730000
trusted library allocation
page read and write
26D6000
heap
page read and write
6BDD0000
unkown
page read and write
1481B310000
heap
page execute and read and write
68FE000
stack
page read and write
2FE0000
heap
page read and write
8E4000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
2EAC000
heap
page read and write
26E6000
heap
page read and write
5860000
heap
page execute and read and write
26DD000
heap
page read and write
61ECD000
direct allocation
page readonly
C80000
heap
page read and write
348D000
trusted library allocation
page read and write
F30000
heap
page read and write
7C000
unkown
page readonly
FFB30000
trusted library allocation
page execute and read and write
928000
heap
page read and write
C6D000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
358A000
trusted library allocation
page read and write
1481A77E000
heap
page read and write
27BC000
direct allocation
page read and write
1613000
trusted library allocation
page execute and read and write
2828000
direct allocation
page read and write
1660000
trusted library allocation
page read and write
11000
unkown
page execute read
1481B2A0000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
109D000
stack
page read and write
27FE000
unkown
page read and write
2F5A0000
heap
page read and write
56B0000
trusted library allocation
page read and write
3690000
heap
page read and write
C70000
heap
page read and write
1481A728000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
14D0000
heap
page read and write
31AE000
unkown
page read and write
550D000
direct allocation
page read and write
105B000
stack
page read and write
5DFE000
stack
page read and write
130E000
stack
page read and write
1481AF81000
heap
page read and write
1481A5C0000
trusted library section
page read and write
870000
heap
page read and write
7FFD9B867000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
2FE9000
heap
page read and write
57A0000
unkown
page read and write
2660000
heap
page read and write
27CB000
direct allocation
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
2BCA000
stack
page read and write
7FF4B4D08000
trusted library allocation
page readonly
5A0000
heap
page read and write
287C000
heap
page read and write
3D72000
heap
page read and write
6C9B4000
unkown
page read and write
AD9000
unkown
page write copy
271C000
heap
page read and write
3718000
trusted library allocation
page read and write
A65000
heap
page read and write
8EF000
heap
page execute and read and write
1481A74A000
heap
page read and write
14802112000
trusted library allocation
page read and write
401000
unkown
page execute read
2791000
direct allocation
page read and write
7FFD9B650000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
1481B0C1000
heap
page read and write
3676000
heap
page read and write
918000
heap
page read and write
26D9000
heap
page read and write
F84000
heap
page read and write
14801D14000
heap
page execute and read and write
2E14000
unkown
page read and write
2E14000
unkown
page read and write
557E000
direct allocation
page read and write
1481B290000
trusted library allocation
page read and write
2740000
unkown
page readonly
1481AFDF000
heap
page read and write
231BD000
heap
page read and write
5E00000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
231A8000
heap
page read and write
13A42FB000
stack
page read and write
4FDE000
stack
page read and write
3F0000
heap
page read and write
1498000
heap
page read and write
5E05000
trusted library allocation
page read and write
BB9000
stack
page read and write
148F000
heap
page read and write
3724000
trusted library allocation
page read and write
14820A10000
trusted library allocation
page read and write
27D2000
direct allocation
page read and write
1CE1F000
stack
page read and write
4884000
heap
page read and write
C97000
heap
page read and write
271C000
heap
page read and write
2F86000
heap
page read and write
73A0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
1418000
heap
page read and write
F34000
heap
page read and write
2550000
direct allocation
page read and write
4EFE000
direct allocation
page read and write
94A000
heap
page read and write
1481EC66000
heap
page read and write
3850000
heap
page read and write
CF2000
heap
page read and write
7FFD9B715000
trusted library allocation
page read and write
30F0000
unkown
page read and write
7FFD9B990000
trusted library allocation
page read and write
3030000
heap
page read and write
CDB000
heap
page read and write
344C000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
27A4000
unkown
page read and write
2E14000
unkown
page read and write
2C1A000
unkown
page readonly
2E14000
unkown
page read and write
4365000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FF4B4CF2000
trusted library allocation
page readonly
2ECE000
stack
page read and write
4EDE000
stack
page read and write
9B000
stack
page read and write
2E58000
heap
page read and write
5A9E000
stack
page read and write
6BAD000
stack
page read and write
C90000
heap
page read and write
32D4000
unkown
page read and write
2E14000
unkown
page read and write
378B000
trusted library allocation
page read and write
26FB000
direct allocation
page read and write
2946F000
stack
page read and write
26E0000
heap
page read and write
27FD000
direct allocation
page read and write
808E000
stack
page read and write
2713000
direct allocation
page read and write
F20000
heap
page read and write
8C0000
unkown
page readonly
67B0000
trusted library allocation
page execute and read and write
2F8D000
stack
page read and write
AE3000
unkown
page readonly
2651000
heap
page read and write
3683000
trusted library allocation
page read and write
1D131000
heap
page read and write
4250000
trusted library allocation
page read and write
3834000
heap
page read and write
26D9000
heap
page read and write
13A4AFA000
stack
page read and write
CFB000
heap
page read and write
2FC8000
heap
page read and write
2E14000
unkown
page read and write
41BC000
heap
page read and write
2FE5000
heap
page read and write
23190000
heap
page read and write
8C1000
unkown
page execute read
26E7000
heap
page read and write
26F2000
heap
page read and write
F34000
heap
page read and write
75E000
unkown
page read and write
13A4BFB000
stack
page read and write
268A000
heap
page read and write
26C5000
heap
page read and write
27A4000
unkown
page read and write
354A000
trusted library allocation
page read and write
4704000
unkown
page read and write
3732000
trusted library allocation
page read and write
231BD000
heap
page read and write
34FF000
trusted library allocation
page read and write
161D000
trusted library allocation
page execute and read and write
14B0000
heap
page read and write
2E14000
unkown
page read and write
7FFD9B840000
trusted library allocation
page read and write
3DA2000
heap
page read and write
14800180000
heap
page read and write
231AD000
heap
page read and write
2E14000
unkown
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
4386000
trusted library allocation
page read and write
36C3000
trusted library allocation
page read and write
757E000
stack
page read and write
1CE5E000
stack
page read and write
1670000
heap
page read and write
2FD4000
heap
page read and write
3B0000
heap
page read and write
2E14000
unkown
page read and write
3498000
trusted library allocation
page read and write
2610000
heap
page read and write
7FFD9B65B000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
148002F0000
trusted library allocation
page read and write
2646000
heap
page read and write
2E14000
unkown
page read and write
7FFD9B760000
trusted library allocation
page read and write
31FF000
stack
page read and write
26F2000
heap
page read and write
5870000
trusted library allocation
page execute and read and write
3E21000
heap
page read and write
6790000
trusted library allocation
page read and write
AE3000
unkown
page readonly
7FFD9B9B0000
trusted library allocation
page execute and read and write
34F9000
trusted library allocation
page read and write
1481EBCF000
heap
page read and write
2D4E000
stack
page read and write
13A37FE000
stack
page read and write
34E7000
trusted library allocation
page read and write
C83000
heap
page read and write
1481A6D7000
heap
page read and write
26C5000
heap
page read and write
4D5F000
stack
page read and write
61ED3000
direct allocation
page read and write
26BE000
heap
page read and write
76A000
unkown
page read and write
158E000
stack
page read and write
1481EB02000
heap
page read and write
5590000
heap
page read and write
2680000
heap
page read and write
2FCE000
heap
page read and write
17B7000
heap
page read and write
13A43FB000
stack
page read and write
2FA3000
heap
page read and write
2FCF000
heap
page read and write
1481EC45000
heap
page read and write
26E5000
heap
page read and write
6D007000
unkown
page readonly
991000
heap
page read and write
231C2000
heap
page read and write
27E8000
direct allocation
page read and write
27A4000
unkown
page read and write
30B000
stack
page read and write
27B0000
heap
page read and write
2750000
heap
page read and write
4A9F000
stack
page read and write
2D00000
heap
page read and write
7FFD9B687000
trusted library allocation
page read and write
3680000
heap
page read and write
2FD2000
heap
page read and write
14A0000
heap
page read and write
2FDF000
heap
page read and write
5880000
trusted library allocation
page read and write
A60000
heap
page read and write
2925C000
heap
page read and write
35EB000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
40C000
unkown
page readonly
595D000
stack
page read and write
36B4000
trusted library allocation
page read and write
345C000
trusted library allocation
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
729B000
stack
page read and write
3881000
trusted library allocation
page read and write
A6C000
unkown
page readonly
CF0000
heap
page read and write
292A6000
heap
page read and write
26DE000
heap
page read and write
6D057000
unkown
page readonly
26D3000
heap
page read and write
1481EC25000
heap
page read and write
2C90000
heap
page read and write
24E0000
direct allocation
page execute and read and write
231BA000
heap
page read and write
725E000
stack
page read and write
F84000
heap
page read and write
4469000
trusted library allocation
page read and write
7FFD9B640000
trusted library allocation
page read and write
26EC000
heap
page read and write
36E7000
trusted library allocation
page read and write
67C0000
heap
page read and write
2813000
direct allocation
page read and write
2D80000
heap
page read and write
880000
heap
page read and write
1481AFC4000
heap
page read and write
2FC7000
heap
page read and write
56D6000
trusted library allocation
page read and write
2319C000
heap
page read and write
CC7000
heap
page read and write
C30000
heap
page read and write
271C000
heap
page read and write
2FCE000
stack
page read and write
7A3D000
stack
page read and write
56A8000
trusted library allocation
page read and write
2E14000
unkown
page read and write
1487DD5B000
unkown
page readonly
67F5000
heap
page read and write
9A0000
heap
page read and write
2FE8000
heap
page read and write
F84000
heap
page read and write
279F000
direct allocation
page read and write
85B000
unkown
page readonly
1480000
heap
page read and write
26E8000
heap
page read and write
2E14000
unkown
page read and write
23230000
heap
page read and write
353E000
trusted library allocation
page read and write
87E000
unkown
page readonly
2EA6000
heap
page read and write
BF3000
heap
page read and write
2CC4000
unkown
page read and write
1494000
heap
page read and write
1481B390000
trusted library allocation
page read and write
271C000
heap
page read and write
26CB000
heap
page read and write
1487E75B000
unkown
page readonly
27E0000
direct allocation
page read and write
1677000
heap
page read and write
231CC000
heap
page read and write
2FE1000
heap
page read and write
26F0000
direct allocation
page read and write
1610000
trusted library allocation
page read and write
1481A72A000
heap
page read and write
CBE000
heap
page read and write
F84000
heap
page read and write
CD9000
heap
page read and write
2E14000
unkown
page read and write
34AD000
trusted library allocation
page read and write
271C000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
76F000
unkown
page read and write
30CF000
stack
page read and write
271C000
heap
page read and write
26E5000
heap
page read and write
271F000
direct allocation
page read and write
7FFD9B818000
trusted library allocation
page read and write
F84000
heap
page read and write
7C7D000
stack
page read and write
26F2000
heap
page read and write
26C3000
heap
page read and write
27A4000
unkown
page read and write
13A48F6000
stack
page read and write
26D1000
heap
page read and write
32AF000
unkown
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
26F2000
heap
page read and write
2FDC000
heap
page read and write
3E3000
trusted library allocation
page execute and read and write
830C000
stack
page read and write
14800305000
heap
page read and write
F80000
heap
page read and write
AD0000
unkown
page write copy
7FFD9B71C000
trusted library allocation
page read and write
2782000
direct allocation
page read and write
C8B000
heap
page read and write
1260000
heap
page read and write
4600000
unkown
page read and write
34E4000
trusted library allocation
page read and write
2818000
trusted library allocation
page read and write
3612000
trusted library allocation
page read and write
148001DE000
heap
page read and write
CA7000
heap
page read and write
ADC000
unkown
page read and write
26F2000
heap
page read and write
1481EAA7000
heap
page read and write
1481EA47000
heap
page read and write
C81000
heap
page read and write
FE0000
heap
page read and write
37A5000
trusted library allocation
page read and write
F34000
heap
page read and write
280C000
direct allocation
page read and write
26C3000
heap
page read and write
26C3000
heap
page read and write
1481EAE8000
heap
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
2E67000
heap
page read and write
C60000
trusted library allocation
page read and write
3E21000
heap
page read and write
1481A740000
heap
page read and write
271C000
heap
page read and write
1481EAE1000
heap
page read and write
271C000
heap
page read and write
3536000
trusted library allocation
page read and write
26CE000
heap
page read and write
359A000
trusted library allocation
page read and write
90B000
trusted library allocation
page execute and read and write
14800080000
heap
page read and write
193000
stack
page read and write
6710000
trusted library allocation
page read and write
A6C000
unkown
page readonly
117C000
heap
page read and write
7FFD9B4BB000
trusted library allocation
page execute and read and write
1445000
heap
page read and write
1481AAA0000
trusted library section
page read and write
26DA000
heap
page read and write
97F000
heap
page read and write
1645000
trusted library allocation
page execute and read and write
35ED000
trusted library allocation
page read and write
7FF4B4D05000
trusted library allocation
page execute read
14800440000
trusted library allocation
page read and write
26C8000
heap
page read and write
14801D20000
trusted library section
page read and write
148801D0000
unkown
page readonly
67D0000
heap
page read and write
6BBF1000
unkown
page execute read
13BE000
stack
page read and write
2FD3000
heap
page read and write
267D000
heap
page read and write
3780000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
14811E4E000
trusted library allocation
page read and write
231AD000
heap
page read and write
1481EB17000
heap
page read and write
30C70000
heap
page read and write
3050000
heap
page execute and read and write
26ED000
heap
page read and write
2FDF000
heap
page read and write
6771000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
231BA000
heap
page read and write
2800000
trusted library allocation
page read and write
2789000
direct allocation
page read and write
26C5000
heap
page read and write
4D60000
direct allocation
page read and write
FE3000
heap
page read and write
40E000
unkown
page readonly
6CB1E000
unkown
page read and write
301E000
trusted library allocation
page read and write
14802140000
trusted library allocation
page read and write
AE3000
unkown
page readonly
3D62000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
14800160000
heap
page read and write
5724000
trusted library allocation
page read and write
B60000
heap
page read and write
1636000
trusted library allocation
page execute and read and write
26E0000
heap
page read and write
2E14000
unkown
page read and write
AD0000
heap
page read and write
8C0000
unkown
page readonly
CE3000
heap
page read and write
624000
unkown
page execute and read and write
2E14000
unkown
page read and write
35FB000
trusted library allocation
page read and write
2693000
heap
page read and write
6BDCF000
unkown
page write copy
23197000
heap
page read and write
26C8000
heap
page read and write
B4D000
stack
page read and write
8C0000
unkown
page readonly
D10000
trusted library allocation
page execute and read and write
148001A9000
heap
page read and write
1481A650000
heap
page read and write
2CC4000
unkown
page read and write
2726000
direct allocation
page read and write
35AD000
trusted library allocation
page read and write
2640000
heap
page read and write
1481B2E0000
trusted library section
page read and write
313E000
heap
page read and write
73E0000
trusted library allocation
page execute and read and write
26CB000
heap
page read and write
2FD7000
heap
page read and write
2E14000
unkown
page read and write
94B000
heap
page read and write
5800000
trusted library allocation
page execute and read and write
7FFD9B730000
trusted library allocation
page execute and read and write
56E0000
trusted library allocation
page read and write
3D60000
heap
page read and write
26DD000
heap
page read and write
481A000
unkown
page read and write
231CC000
heap
page read and write
4D90000
trusted library allocation
page read and write
2E14000
unkown
page read and write
3F29000
heap
page read and write
BBA000
stack
page read and write
525F000
trusted library allocation
page read and write
26C8000
heap
page read and write
77B000
unkown
page write copy
271C000
heap
page read and write
13A37BE000
stack
page read and write
26D7000
heap
page read and write
177C000
stack
page read and write
2804000
direct allocation
page read and write
27D4000
trusted library allocation
page read and write
8DE000
heap
page read and write
1647000
trusted library allocation
page execute and read and write
2E14000
unkown
page read and write
2F37000
heap
page execute and read and write
1481EB39000
heap
page read and write
271B000
heap
page read and write
26E0000
heap
page read and write
26E5000
heap
page read and write
14801D80000
heap
page execute and read and write
BA0000
heap
page read and write
26F2000
heap
page read and write
700000
unkown
page readonly
26DC000
heap
page read and write
6BF0000
trusted library allocation
page execute and read and write
30763000
heap
page read and write
3D82000
heap
page read and write
2730000
unkown
page readonly
14801C83000
heap
page read and write
67DF000
heap
page read and write
231C9000
heap
page read and write
198000
stack
page read and write
14A0000
heap
page read and write
35F7000
trusted library allocation
page read and write
65FD000
stack
page read and write
3606000
trusted library allocation
page read and write
365C000
trusted library allocation
page read and write
271C000
heap
page read and write
1481EAF7000
heap
page read and write
8E0000
trusted library allocation
page read and write
3882000
heap
page read and write
2E50000
heap
page read and write
9B000
stack
page read and write
1481B07F000
heap
page read and write
7FFD9B576000
trusted library allocation
page execute and read and write
27B0000
unkown
page read and write
1481AFED000
heap
page read and write
26C8000
heap
page read and write
14801D30000
trusted library section
page read and write
13A52F8000
stack
page read and write
26C8000
heap
page read and write
C9D000
heap
page read and write
1D09D000
stack
page read and write
231BD000
heap
page read and write
371A000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2E15000
unkown
page read and write
27A4000
unkown
page read and write
110A000
heap
page read and write
5E09000
trusted library allocation
page read and write
3312000
trusted library allocation
page read and write
30CD2000
heap
page read and write
9D0000
heap
page read and write
3E51000
heap
page read and write
280B000
trusted library allocation
page read and write
4ADE000
stack
page read and write
CAE000
stack
page read and write
2E14000
unkown
page read and write
2E14000
unkown
page read and write
7FFD9B4B4000
trusted library allocation
page read and write
16BE000
stack
page read and write
8CE000
stack
page read and write
AE3000
unkown
page readonly
31FF000
stack
page read and write
8DE000
stack
page read and write
1481EAED000
heap
page read and write
301A000
trusted library allocation
page read and write
231A0000
heap
page read and write
2EA0000
heap
page read and write
7FFD9B758000
trusted library allocation
page read and write
26C7000
heap
page read and write
CC2000
heap
page read and write
272E000
direct allocation
page read and write
2FDF000
heap
page read and write
36EE000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
333F000
stack
page read and write
1481AFBF000
heap
page read and write
35C2000
trusted library allocation
page read and write
57A1000
unkown
page read and write
1481EA4B000
heap
page read and write
231A8000
heap
page read and write
1481EAA5000
heap
page read and write
2E14000
unkown
page read and write
14811E34000
trusted library allocation
page read and write
231C2000
heap
page read and write
5882000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
4340000
trusted library allocation
page read and write
26EC000
heap
page read and write
417000
unkown
page execute read
2671000
heap
page read and write
7FF4B4D0F000
trusted library allocation
page execute read
26D1000
heap
page read and write
1481EA10000
heap
page read and write
85B000
unkown
page readonly
7FF4B4D06000
trusted library allocation
page readonly
57B1000
unkown
page read and write
2319C000
heap
page read and write
4379000
trusted library allocation
page read and write
3DB2000
heap
page read and write
178B000
trusted library allocation
page read and write
1481A677000
heap
page read and write
281A000
direct allocation
page read and write
29509000
heap
page read and write
7FFD9B546000
trusted library allocation
page read and write
8B000
unkown
page write copy
C96000
heap
page read and write
5890000
heap
page read and write
46F7000
unkown
page read and write
2B3F000
unkown
page read and write
1481AFBB000
heap
page read and write
271C000
heap
page read and write
34B3000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
26C0000
heap
page read and write
231A8000
heap
page read and write
1481EC6C000
heap
page read and write
26E5000
heap
page read and write
26DD000
heap
page read and write
41C000
unkown
page execute read
231CA000
heap
page read and write
1490000
heap
page read and write
5D3C000
stack
page read and write
F34000
heap
page read and write
AD0000
unkown
page write copy
1481ECC2000
heap
page read and write
266F000
heap
page read and write
301B000
heap
page read and write
B4F000
stack
page read and write
26CC000
heap
page read and write
26E5000
heap
page read and write
1481A640000
heap
page read and write
315E000
stack
page read and write
148001C6000
heap
page read and write
435D000
trusted library allocation
page read and write
2E00000
heap
page read and write
13A44F1000
stack
page read and write
27A6000
direct allocation
page read and write
316F000
unkown
page read and write
26D4000
heap
page read and write
7FFD9B54C000
trusted library allocation
page execute and read and write
A6C000
unkown
page readonly
26D4000
heap
page read and write
231C9000
heap
page read and write
FCD000
stack
page read and write
693E000
stack
page read and write
2FA2000
heap
page read and write
302D000
trusted library allocation
page read and write
2E20000
unkown
page readonly
5DBC000
stack
page read and write
2C3F000
unkown
page read and write
3760000
heap
page read and write
73F0000
trusted library allocation
page read and write
5111000
unkown
page read and write
636000
unkown
page execute and read and write
7FF4B4D04000
trusted library allocation
page readonly
231AD000
heap
page read and write
26C8000
heap
page read and write
3675000
trusted library allocation
page read and write
27B5000
direct allocation
page read and write
F84000
heap
page read and write
1040000
heap
page read and write
6BDCE000
unkown
page read and write
26EC000
heap
page read and write
26D1000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
10EB000
heap
page read and write
380000
heap
page read and write
1481EACF000
heap
page read and write
323E000
stack
page read and write
57A1000
unkown
page read and write
1481AF9D000
heap
page read and write
1481EBC8000
heap
page read and write
6950000
trusted library allocation
page read and write
2E14000
unkown
page read and write
767E000
stack
page read and write
6C851000
unkown
page execute read
7FFD9B6E0000
trusted library allocation
page read and write
2FC0000
heap
page read and write
26C3000
heap
page read and write
13A3DFE000
stack
page read and write
349B000
trusted library allocation
page read and write
7FFD9B642000
trusted library allocation
page read and write
231B0000
heap
page read and write
2FD5000
heap
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
8C1000
unkown
page execute read
1481EAEF000
heap
page read and write
53E0000
direct allocation
page read and write
7B3C000
stack
page read and write
1481EACB000
heap
page read and write
13A46FE000
stack
page read and write
8FA000
stack
page read and write
2E14000
unkown
page read and write
3467000
trusted library allocation
page read and write
26EC000
heap
page read and write
1481EA49000
heap
page read and write
590000
heap
page read and write
F84000
heap
page read and write
3441000
trusted library allocation
page read and write
2E30000
unkown
page readonly
F34000
heap
page read and write
26EC000
heap
page read and write
3E50000
heap
page read and write
1481B330000
trusted library section
page read and write
682C000
heap
page read and write
14801DD1000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
2E8E000
unkown
page read and write
26E5000
heap
page read and write
401000
unkown
page execute read
7FFD9B768000
trusted library allocation
page read and write
1487D35B000
unkown
page readonly
27D1000
trusted library allocation
page read and write
1D131000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
271C000
heap
page read and write
231A6000
heap
page read and write
1D120000
heap
page read and write
1481B2F0000
trusted library section
page read and write
D20000
heap
page read and write
8D0000
heap
page read and write
6C9B7000
unkown
page readonly
2FC9000
heap
page read and write
1050000
heap
page read and write
286E000
stack
page read and write
27E1000
trusted library allocation
page read and write
C7E000
heap
page read and write
143A000
heap
page read and write
49A7000
heap
page read and write
27C6000
trusted library allocation
page read and write
26DD000
heap
page read and write
7FFD9B756000
trusted library allocation
page read and write
4B00000
heap
page read and write
231A6000
heap
page read and write
231A8000
heap
page read and write
1487C920000
unkown
page readonly
1620000
trusted library allocation
page read and write
33E0000
heap
page read and write
5E2A000
trusted library allocation
page read and write
820E000
stack
page read and write
231C8000
heap
page read and write
1481A795000
heap
page read and write
267B000
heap
page read and write
2FFF000
heap
page read and write
29240000
heap
page read and write
13A4EFE000
stack
page read and write
4E8D000
direct allocation
page read and write
2E14000
unkown
page read and write
2FE3000
heap
page read and write
1490000
heap
page read and write
6B6F000
stack
page read and write
278B000
trusted library allocation
page read and write
271C000
heap
page read and write
7FFD9B494000
trusted library allocation
page read and write
13A41FE000
stack
page read and write
73B0000
heap
page read and write
1614000
trusted library allocation
page read and write
27F5000
trusted library allocation
page read and write
4071000
heap
page read and write
32D4000
unkown
page read and write
3525000
trusted library allocation
page read and write
F84000
heap
page read and write
2F60000
heap
page read and write
3750000
heap
page read and write
279E000
unkown
page read and write
14B3000
heap
page read and write
2FCE000
heap
page read and write
573B000
trusted library allocation
page read and write
2E14000
unkown
page read and write
2F58E000
stack
page read and write
14800206000
heap
page read and write
2E14000
unkown
page read and write
14801DC0000
heap
page read and write
7FFD9B632000
trusted library allocation
page read and write
1481EC68000
heap
page read and write
2E14000
unkown
page read and write
C78000
heap
page read and write
30CAA000
heap
page read and write
1481A739000
heap
page read and write
27F6000
direct allocation
page read and write
2DC5000
heap
page read and write
8E000
unkown
page readonly
F34000
heap
page read and write
277E000
stack
page read and write
3021000
trusted library allocation
page read and write
2720000
unkown
page readonly
595E000
unkown
page read and write
33C6000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
13A377F000
stack
page read and write
7FF4B4D0E000
trusted library allocation
page readonly
48A6000
unkown
page read and write
61E01000
direct allocation
page execute read
26D9000
heap
page read and write
2E8E000
stack
page read and write
147B000
heap
page read and write
437D000
trusted library allocation
page read and write
14802132000
trusted library allocation
page read and write
3D62000
heap
page read and write
3534000
trusted library allocation
page read and write
2FC5000
heap
page read and write
26D9000
heap
page read and write
2BAC000
stack
page read and write
ADA000
heap
page read and write
766000
unkown
page read and write
34F4000
trusted library allocation
page read and write
13A54FE000
stack
page read and write
1CD1E000
stack
page read and write
1481AF70000
heap
page read and write
F6E000
stack
page read and write
26D9000
heap
page read and write
421000
unkown
page readonly
7FFD9B550000
trusted library allocation
page execute and read and write
308E000
stack
page read and write
29255000
heap
page read and write
AD9000
unkown
page write copy
7FF4B4D07000
trusted library allocation
page execute read
13A4FFE000
stack
page read and write
3049000
trusted library allocation
page read and write
274D000
direct allocation
page read and write
2CEE000
stack
page read and write
8DA000
heap
page read and write
1481ABD0000
trusted library section
page read and write
16E0000
trusted library allocation
page execute and read and write
6CB0D000
unkown
page readonly
14801D90000
heap
page read and write
117F000
heap
page read and write
26E1000
heap
page read and write
26ED000
heap
page read and write
1780000
trusted library allocation
page read and write
2D70000
heap
page read and write
3D0000
trusted library allocation
page read and write
7FFD9B68A000
trusted library allocation
page read and write
8C0000
unkown
page readonly
2690000
heap
page read and write
549000
unkown
page execute and read and write
1481B2C0000
trusted library allocation
page read and write
7C000
unkown
page readonly
26BE000
heap
page read and write
935000
heap
page read and write
6846000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
231A9000
heap
page read and write
2FCF000
heap
page read and write
48EE000
unkown
page read and write
361F000
trusted library allocation
page read and write
CAB000
heap
page read and write
13C0000
heap
page read and write
27A4000
unkown
page read and write
2704000
direct allocation
page read and write
13A47FE000
stack
page read and write
76D000
unkown
page read and write
2329A000
heap
page read and write
80CD000
stack
page read and write
7DB0000
heap
page read and write
AD0000
unkown
page read and write
CB0000
heap
page read and write
271B000
heap
page read and write
26CE000
heap
page read and write
26BB000
heap
page read and write
231A7000
heap
page read and write
3727000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
26E6000
heap
page read and write
1481EAC1000
heap
page read and write
6C9A9000
unkown
page write copy
1481B170000
trusted library allocation
page read and write
14801D10000
heap
page execute and read and write
1481A6CD000
heap
page read and write
35BB000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B7E6000
trusted library allocation
page read and write
511E000
stack
page read and write
7FF4B4D10000
trusted library allocation
page execute and read and write
2E10000
heap
page read and write
400000
unkown
page readonly
107B000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
3730000
direct allocation
page read and write
1481B270000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page execute and read and write
67D3000
heap
page read and write
148002A0000
heap
page read and write
26ED000
heap
page read and write
14811DEC000
trusted library allocation
page read and write
16C0000
heap
page read and write
14801C80000
heap
page read and write
2DC7000
heap
page read and write
1048000
heap
page read and write
CDF000
heap
page read and write
2DC0000
heap
page read and write
CED000
stack
page read and write
920000
heap
page read and write
3D62000
heap
page read and write
6760000
trusted library allocation
page execute and read and write
5893000
heap
page read and write
7FFD9B493000
trusted library allocation
page execute and read and write
3CA6000
heap
page read and write
1481EAA9000
heap
page read and write
1CCDF000
stack
page read and write
A0E000
stack
page read and write
26ED000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
1481B058000
heap
page read and write
93C000
heap
page read and write
1475000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1481AC30000
trusted library section
page read and write
1480212E000
trusted library allocation
page read and write
1481A743000
heap
page read and write
437000
unkown
page write copy
7FFD9B970000
trusted library allocation
page read and write
26C7000
heap
page read and write
1CF9E000
stack
page read and write
26CD000
heap
page read and write
271C000
heap
page read and write
164B000
trusted library allocation
page execute and read and write
23196000
heap
page read and write
2780000
trusted library allocation
page read and write
231CC000
heap
page read and write
3D67000
heap
page read and write
7FFD9B69D000
trusted library allocation
page read and write
7FFD9B682000
trusted library allocation
page read and write
26C3000
heap
page read and write
F34000
heap
page read and write
23197000
heap
page read and write
331B000
trusted library allocation
page read and write
2E14000
unkown
page read and write
26CB000
heap
page read and write
5E18000
trusted library allocation
page read and write
6F9000
stack
page read and write
365F000
trusted library allocation
page read and write
67C7000
heap
page read and write
2E14000
unkown
page read and write
5BA0000
unkown
page read and write
7FF4B4D01000
trusted library allocation
page execute read
7FF4B4D0B000
trusted library allocation
page execute read
10000
unkown
page readonly
6CEF0000
unkown
page readonly
26ED000
heap
page read and write
7FF4B4D03000
trusted library allocation
page execute read
535E000
stack
page read and write
1D230000
heap
page read and write
3040000
trusted library allocation
page read and write
292A3000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
29200000
heap
page read and write
2F5CC000
stack
page read and write
2820000
trusted library allocation
page read and write
1481A762000
heap
page read and write
5110000
unkown
page read and write
7FFD9B49D000
trusted library allocation
page execute and read and write
13A3AEB000
stack
page read and write
1265000
heap
page read and write
3597000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
2670000
heap
page read and write
14811E31000
trusted library allocation
page read and write
231AB000
heap
page read and write
447000
unkown
page execute and read and write
1481AFE3000
heap
page read and write
4906000
unkown
page read and write
8C1000
unkown
page execute read
231CA000
heap
page read and write
1481EB83000
heap
page read and write
6C00000
trusted library allocation
page read and write
32AE000
stack
page read and write
2821000
direct allocation
page read and write
355F000
trusted library allocation
page read and write
F34000
heap
page read and write
6CEF1000
unkown
page execute read
2679000
heap
page read and write
26ED000
heap
page read and write
384D000
heap
page read and write
92D000
heap
page read and write
26ED000
heap
page read and write
26CE000
heap
page read and write
6C9AD000
unkown
page read and write
26E0000
heap
page read and write
A45000
heap
page read and write
1448000
heap
page read and write
2CB0000
unkown
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B712000
trusted library allocation
page read and write
26F4000
heap
page read and write
8C1000
unkown
page execute read
79FD000
stack
page read and write
F84000
heap
page read and write
EFB000
stack
page read and write
29220000
heap
page read and write
26C8000
heap
page read and write
300E000
trusted library allocation
page read and write
38DB000
heap
page read and write
5A5D000
stack
page read and write
5720000
trusted library allocation
page read and write
36C6000
trusted library allocation
page read and write
5111000
unkown
page read and write
26FA000
stack
page read and write
3026000
trusted library allocation
page read and write
2830000
direct allocation
page read and write
58A9000
unkown
page read and write
7FFD9B807000
trusted library allocation
page read and write
7FFD9B740000
trusted library allocation
page read and write
231A8000
heap
page read and write
2E14000
unkown
page read and write
1642000
trusted library allocation
page read and write
26C3000
heap
page read and write
1481B0D1000
heap
page read and write
3869000
heap
page read and write
301DB000
stack
page read and write
2700000
direct allocation
page read and write
2E40000
heap
page read and write
67E3000
heap
page read and write
26D6000
heap
page read and write
10B8000
heap
page read and write
2754000
direct allocation
page read and write
ADE000
heap
page read and write
1481B180000
trusted library allocation
page read and write
26E5000
heap
page read and write
13A3EFA000
stack
page read and write
149F000
heap
page read and write
25CE000
stack
page read and write
148001DC000
heap
page read and write
26C8000
heap
page read and write
2688000
heap
page read and write
26E0000
heap
page read and write
7E00000
heap
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
F20000
heap
page read and write
23195000
heap
page read and write
13A40FD000
stack
page read and write
6CA90000
unkown
page readonly
26CD000
heap
page read and write
2FD2000
heap
page read and write
14800320000
trusted library allocation
page read and write
19E000
stack
page read and write
599E000
stack
page read and write
3004000
heap
page read and write
2DEF000
stack
page read and write
3752000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
33BB000
trusted library allocation
page read and write
4BE1000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
783000
unkown
page readonly
CAD000
heap
page read and write
3530000
trusted library allocation
page read and write
14800335000
heap
page read and write
5E25000
trusted library allocation
page read and write
10000
unkown
page readonly
2D5C000
stack
page read and write
2F60C000
stack
page read and write
3D90000
heap
page read and write
27C4000
direct allocation
page read and write
2E14000
unkown
page read and write
292F1000
heap
page read and write
2E14000
unkown
page read and write
2FFA000
heap
page read and write
1487F15B000
unkown
page readonly
61EB7000
direct allocation
page readonly
2FF4000
heap
page read and write
5C3E000
stack
page read and write
14801D60000
trusted library section
page read and write
32D0000
unkown
page read and write
26D7000
heap
page read and write
2924F000
heap
page read and write
73C0000
trusted library allocation
page execute and read and write
7F8E000
stack
page read and write
8E000
unkown
page readonly
23196000
heap
page read and write
372A000
trusted library allocation
page read and write
26C9000
heap
page read and write
8B000
unkown
page read and write
26E0000
heap
page read and write
1D230000
trusted library allocation
page read and write
6C850000
unkown
page readonly
3594000
trusted library allocation
page read and write
3035C000
stack
page read and write
148021AC000
trusted library allocation
page read and write
148001A0000
heap
page read and write
14800443000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
9CE000
stack
page read and write
446D000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
1481EE32000
trusted library allocation
page read and write
2CAE000
stack
page read and write
1481A725000
heap
page read and write
2FD2000
heap
page read and write
C38000
heap
page read and write
336D000
trusted library allocation
page read and write
231B0000
heap
page read and write
3349000
trusted library allocation
page read and write
29248000
heap
page read and write
5E2F000
trusted library allocation
page read and write
16F0000
heap
page read and write
37AB000
trusted library allocation
page read and write
1481EAC4000
heap
page read and write
7FFD9B65E000
trusted library allocation
page read and write
2F5AA000
heap
page read and write
2809000
trusted library allocation
page read and write
1481EE14000
trusted library allocation
page read and write
7FF4B4D02000
trusted library allocation
page readonly
2764000
direct allocation
page read and write
3306000
trusted library allocation
page read and write
14800455000
heap
page read and write
373D000
trusted library allocation
page read and write
300C000
heap
page read and write
1CBDF000
stack
page read and write
C92000
heap
page read and write
29517000
heap
page read and write
14801C40000
trusted library allocation
page read and write
349F000
stack
page read and write
6CB22000
unkown
page readonly
1487C920000
unkown
page readonly
1158000
stack
page read and write
14819DD0000
trusted library allocation
page read and write
2744000
direct allocation
page read and write
23196000
heap
page read and write
26FD000
direct allocation
page read and write
231C1000
heap
page read and write
14801D40000
trusted library section
page read and write
27EF000
direct allocation
page read and write
EFB000
stack
page read and write
1481A721000
heap
page read and write
2671000
heap
page read and write
A1E000
stack
page read and write
739D000
stack
page read and write
3588000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
26DD000
heap
page read and write
1481A71A000
heap
page read and write
2D8E000
stack
page read and write
F34000
heap
page read and write
23199000
heap
page read and write
459000
unkown
page write copy
14800208000
heap
page read and write
6D049000
unkown
page write copy
147F000
heap
page read and write
27A4000
unkown
page read and write
2E14000
unkown
page read and write
A40000
heap
page read and write
6BD0000
trusted library section
page read and write
A50000
heap
page read and write
6CA91000
unkown
page execute read
75E000
unkown
page write copy
7FFD9B664000
trusted library allocation
page read and write
26EC000
heap
page read and write
271C000
direct allocation
page read and write
2F20000
heap
page read and write
1481B062000
heap
page read and write
6960000
trusted library allocation
page execute and read and write
56F0000
trusted library allocation
page read and write
1480030C000
heap
page read and write
231A4000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
14819E00000
trusted library allocation
page read and write
BF0000
heap
page read and write
10B0000
heap
page read and write
13A45F4000
stack
page read and write
231CC000
heap
page read and write
3E4000
trusted library allocation
page read and write
13A49F6000
stack
page read and write
56D3000
trusted library allocation
page read and write
1481A6FD000
heap
page read and write
AD0000
unkown
page read and write
29243000
heap
page read and write
761000
unkown
page read and write
1630000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
231BD000
heap
page read and write
1481EC04000
heap
page read and write
2E14000
unkown
page read and write
104D000
stack
page read and write
CD6000
heap
page read and write
344F000
trusted library allocation
page read and write
ADA000
unkown
page read and write
2E14000
unkown
page read and write
7FFD9B540000
trusted library allocation
page read and write
3D50000
heap
page read and write
66FC000
stack
page read and write
14800450000
heap
page read and write
26DD000
heap
page read and write
26C5000
heap
page read and write
3D92000
heap
page read and write
2EFE000
heap
page read and write
77B9000
stack
page read and write
162D000
trusted library allocation
page execute and read and write
374B000
trusted library allocation
page read and write
6D04D000
unkown
page read and write
2FDD000
heap
page read and write
27AE000
direct allocation
page read and write
2E14000
unkown
page read and write
36B6000
trusted library allocation
page read and write
23EC000
stack
page read and write
275B000
direct allocation
page read and write
3261000
heap
page read and write
23232000
heap
page read and write
61EB4000
direct allocation
page read and write
26CB000
heap
page read and write
B0F000
stack
page read and write
3820000
heap
page read and write
2798000
direct allocation
page read and write
26D7000
heap
page read and write
774000
unkown
page read and write
2FD7000
heap
page read and write
14802641000
trusted library allocation
page read and write
1481EC70000
heap
page read and write
There are 1494 hidden memdumps, click here to show them.