IOC Report
QPoX60yhZt.exe

loading gif

Files

File Path
Type
Category
Malicious
QPoX60yhZt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BAEBFIIECB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\hwfesovsnabgua
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ougwwmmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5mc.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5mc.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5mc.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5mc.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5mc.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAEBFIIECBGCBGDHCAFC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BAFCFHDHIIIECBGCAKFIJDHJEG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CBKJEGCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBAEHCGHIIIDHIECFHJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DQOFHVHTMG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGIJKEHC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HCGCBFHCFCFBFIEBGHJECGHCFI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HJDBFBKKJDHJKECBGDAKJEGCGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\JDDHMPCDUJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QPoX60yhZt.exe_3b936bee356921bdf0108d87e67df5bf8fe2597_7538cbfb_09039235-f44a-457f-baf2-d0274dc9ff21\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5mc.0.exe_913bb38c7620c34429ee22e7b0d6d5287a24588_6c3f02b4_93ec0ccd-db4a-4426-aa30-c0a60352b272\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1938.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:27:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A52.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A82.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8262.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 08:27:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER839B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83CB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SUAVTZKNFL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
modified
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\lqjrjxav.xxo
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\c5a79f1
data
dropped
C:\Users\user\AppData\Local\Temp\dmcpbyssn
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Fri Apr 26 07:27:09 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\f6572560
data
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8408.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\u5mc.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5mc.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u5mc.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 62 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QPoX60yhZt.exe
"C:\Users\user\Desktop\QPoX60yhZt.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5mc.0.exe
"C:\Users\user\AppData\Local\Temp\u5mc.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5mc.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5mc.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u5mc.3.exe
"C:\Users\user\AppData\Local\Temp\u5mc.3.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\BAEBFIIECB.exe"
malicious
C:\Users\user\AppData\Local\Temp\BAEBFIIECB.exe
"C:\Users\user\AppData\Local\Temp\BAEBFIIECB.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5mc.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5mc.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7284 -s 1132
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 2036
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.215.85.66:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
91.215.85.66
malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=one&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://185.172.128.76/15f649199f40275b/msvcp140.dll1L
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php8a7e6c3bfacd86a45ba1b49cd72a6releasef14ebdac6029838f7530c1
unknown
http://91.215.85.66:
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllx
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllb
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://www.iolo.com/company/legal/eula/
unknown
http://185.172.128.228/ping.php?substr=one
185.172.128.228
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpk
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
http://91.215.85.66:9000
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/microsoft/ApplicationInsights-dotnet/issues/2560
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
iolo0.b-cdn.net
195.181.163.195
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
TypesSupported
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
ProgramId
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
FileId
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
LowerCaseLongPath
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
LongPathHash
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
Name
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
OriginalFileName
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
Publisher
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
Version
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
BinFileVersion
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
BinaryType
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
ProductName
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
ProductVersion
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
LinkDate
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
BinProductVersion
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
AppxPackageFullName
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
AppxPackageRelativeId
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
Size
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
Language
\REGISTRY\A\{c6ac0d5a-fc2e-1499-49f8-0f3f06cfadb6}\Root\InventoryApplicationFile\qpox60yhzt.exe|71eac20c3f240aa0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
ProgramId
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
FileId
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
LowerCaseLongPath
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
LongPathHash
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
Name
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
OriginalFileName
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
Publisher
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
Version
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
BinFileVersion
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
BinaryType
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
ProductName
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
ProductVersion
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
LinkDate
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
BinProductVersion
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
AppxPackageFullName
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
AppxPackageRelativeId
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
Size
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
Language
\REGISTRY\A\{8c273d88-ee00-99cf-abae-3284f3c46a91}\Root\InventoryApplicationFile\u5mc.0.exe|ad092dab2358226c
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400E1DF496B9
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 88 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5010000
direct allocation
page read and write
malicious
1951BD63000
trusted library allocation
page read and write
malicious
51F6000
trusted library allocation
page read and write
malicious
3F89000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
49F3000
trusted library allocation
page read and write
malicious
1950682B000
unkown
page readonly
malicious
5C10000
direct allocation
page read and write
malicious
41B0000
direct allocation
page read and write
malicious
FA2000
unkown
page readonly
malicious
19509A2B000
unkown
page readonly
malicious
3995000
heap
page read and write
malicious
4180000
direct allocation
page execute and read and write
malicious
195248D0000
trusted library section
page read and write
malicious
4286000
heap
page read and write
malicious
19524750000
trusted library section
page read and write
malicious
195269DB000
heap
page read and write
19528E42000
heap
page read and write
4AFE000
unkown
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
314B0000
heap
page read and write
3109000
heap
page read and write
5E0F000
heap
page read and write
1950862B000
unkown
page readonly
2D64000
unkown
page read and write
7FFD9B890000
trusted library allocation
page read and write
350000
unkown
page write copy
D68000
heap
page read and write
3160000
heap
page read and write
2A60000
unkown
page read and write
56D1000
unkown
page read and write
7FF4A1612000
trusted library allocation
page readonly
4AA3C7E000
stack
page read and write
F1E000
stack
page read and write
2DA5000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
195253D0000
trusted library section
page read and write
2454000
direct allocation
page read and write
9FB000
heap
page read and write
2A91E000
heap
page read and write
5E10000
heap
page read and write
6F0A000
stack
page read and write
5450000
trusted library allocation
page read and write
76A000
unkown
page read and write
2D64000
unkown
page read and write
411E000
stack
page read and write
1F0000
heap
page read and write
4097000
heap
page read and write
1E520000
heap
page read and write
7FFD9B580000
trusted library allocation
page read and write
19524815000
heap
page read and write
1950A380000
heap
page read and write
8F0000
heap
page read and write
269F000
stack
page read and write
2EE4000
trusted library allocation
page read and write
5DDB000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
5650000
trusted library allocation
page execute and read and write
2D64000
unkown
page read and write
141000
unkown
page execute read
5DD1000
heap
page read and write
19526972000
heap
page read and write
24E6000
direct allocation
page read and write
5DD9000
heap
page read and write
245A6000
heap
page read and write
5D30000
heap
page read and write
42D4000
heap
page read and write
19528B40000
trusted library allocation
page read and write
3C15000
trusted library allocation
page read and write
6095000
trusted library allocation
page read and write
245B6000
heap
page read and write
639E000
stack
page read and write
6CCB7000
unkown
page readonly
30ED000
heap
page read and write
6CD07000
unkown
page readonly
30E5000
heap
page read and write
2403000
direct allocation
page read and write
A41000
heap
page read and write
11E6000
heap
page read and write
165E000
stack
page read and write
F67000
heap
page read and write
40C4000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
245B4000
heap
page read and write
1951BD01000
trusted library allocation
page read and write
3C0D000
trusted library allocation
page read and write
35AE000
stack
page read and write
19525120000
trusted library allocation
page read and write
2F3F000
unkown
page read and write
5470000
trusted library allocation
page read and write
2D64000
unkown
page read and write
7FFD9B7EB000
trusted library allocation
page read and write
A04000
heap
page read and write
2B72000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
6AD8000
heap
page read and write
56D0000
unkown
page read and write
2A610000
heap
page read and write
8F5000
heap
page read and write
246AC000
heap
page read and write
350000
unkown
page write copy
2D54000
trusted library allocation
page read and write
30FC000
heap
page read and write
2F99000
heap
page read and write
19525130000
trusted library allocation
page read and write
23F4000
direct allocation
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
A08000
heap
page read and write
40C5000
heap
page read and write
7FF4A1611000
trusted library allocation
page execute read
5E0F000
heap
page read and write
1E0BF000
stack
page read and write
5D5D000
heap
page read and write
19526885000
heap
page read and write
D00000
heap
page read and write
2D64000
unkown
page read and write
5DCE000
heap
page read and write
2E52000
trusted library allocation
page read and write
74C000
unkown
page readonly
B94000
heap
page read and write
54BB000
trusted library allocation
page read and write
7FFD9B672000
trusted library allocation
page read and write
E0C000
heap
page read and write
1950C0A5000
trusted library allocation
page read and write
D07000
heap
page read and write
4E45000
heap
page read and write
3285000
unkown
page read and write
6C3AD000
unkown
page read and write
195246F0000
trusted library section
page read and write
5DDA000
heap
page read and write
393F000
heap
page read and write
2511000
direct allocation
page read and write
F60000
heap
page read and write
D20000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
5DC8000
heap
page read and write
245CD000
heap
page read and write
5DD6000
heap
page read and write
1952AF60000
heap
page execute and read and write
2D64000
unkown
page read and write
6170000
trusted library allocation
page execute and read and write
195269E4000
heap
page read and write
13FF000
stack
page read and write
5DA7000
heap
page read and write
19524662000
heap
page read and write
105F000
stack
page read and write
49F6000
unkown
page read and write
1950BBA0000
trusted library allocation
page read and write
5DE8000
heap
page read and write
2D64000
unkown
page read and write
1080000
heap
page read and write
50A3000
heap
page read and write
2590000
heap
page read and write
245B8000
heap
page read and write
195268DE000
heap
page read and write
7FF4A162A000
trusted library allocation
page readonly
4264000
heap
page execute and read and write
2CA7000
trusted library allocation
page read and write
3148C000
stack
page read and write
1951BD1E000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
4B1E000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
2F8B000
trusted library allocation
page read and write
4060000
heap
page read and write
5DDB000
heap
page read and write
61ED0000
direct allocation
page read and write
6CCFD000
unkown
page read and write
241E000
direct allocation
page read and write
400000
unkown
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
7160000
heap
page read and write
2D3E000
unkown
page read and write
19528D82000
heap
page read and write
6C3A9000
unkown
page write copy
3001000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page execute and read and write
7FFD9B84F000
trusted library allocation
page read and write
4AA32F4000
stack
page read and write
2AC0000
heap
page read and write
23DE000
unkown
page read and write
224000
unkown
page read and write
12FE000
stack
page read and write
1463000
trusted library allocation
page execute and read and write
4025000
trusted library allocation
page read and write
5DF0000
heap
page read and write
2DE3000
trusted library allocation
page read and write
7FF4A162F000
trusted library allocation
page execute read
30F2000
heap
page read and write
6072000
trusted library allocation
page read and write
5E11000
heap
page read and write
195247E2000
heap
page read and write
1110000
heap
page read and write
418A000
heap
page read and write
2F50000
heap
page read and write
224000
unkown
page read and write
544D000
direct allocation
page read and write
6BA9E000
unkown
page read and write
24AC000
direct allocation
page read and write
2438000
direct allocation
page read and write
2A84000
unkown
page read and write
5E0F000
heap
page read and write
2EC3000
trusted library allocation
page read and write
24DF000
direct allocation
page read and write
1325000
heap
page read and write
56D1000
unkown
page read and write
679E000
stack
page read and write
2EA9000
trusted library allocation
page read and write
68DE000
stack
page read and write
6220000
trusted library allocation
page execute and read and write
2D64000
unkown
page read and write
2F1F000
trusted library allocation
page read and write
75E000
unkown
page read and write
D49000
heap
page read and write
7FFD9B858000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
2B60000
heap
page read and write
5050000
trusted library allocation
page read and write
7FFD9B52C000
trusted library allocation
page execute and read and write
4AA30FB000
stack
page read and write
2790000
heap
page read and write
4CD0000
unkown
page read and write
5BEF000
stack
page read and write
5D5F000
heap
page read and write
23EB000
direct allocation
page read and write
19524790000
heap
page read and write
245C000
direct allocation
page read and write
417000
unkown
page execute read
56D1000
unkown
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
245D9000
heap
page read and write
30F7000
heap
page read and write
7FFD9B796000
trusted library allocation
page read and write
11B0000
heap
page read and write
2444000
direct allocation
page read and write
2D64000
unkown
page read and write
1950C0BF000
trusted library allocation
page read and write
6BC95000
unkown
page readonly
2B18000
heap
page read and write
2D64000
unkown
page read and write
A19000
heap
page read and write
263C000
heap
page read and write
5DCB000
heap
page read and write
242D000
direct allocation
page read and write
19524BD0000
trusted library section
page read and write
56D1000
unkown
page read and write
2EB5000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
4CBE000
direct allocation
page read and write
2E46000
trusted library allocation
page read and write
A3B000
stack
page read and write
2D64000
unkown
page read and write
149B000
trusted library allocation
page execute and read and write
4AA33FD000
stack
page read and write
30EE000
heap
page read and write
64EF000
stack
page read and write
19528E00000
heap
page read and write
245A6000
heap
page read and write
2D64000
unkown
page read and write
7FFD9B7A8000
trusted library allocation
page read and write
56D1000
unkown
page read and write
30F4000
heap
page read and write
A0B000
heap
page read and write
1950C010000
trusted library allocation
page read and write
28CE000
stack
page read and write
608F000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page read and write
19528F1F000
heap
page read and write
2A3F000
unkown
page read and write
5DC5000
heap
page read and write
1950A3B0000
heap
page read and write
5A50000
unkown
page read and write
C3F000
stack
page read and write
7FF4A1629000
trusted library allocation
page execute read
19524636000
heap
page read and write
195247C4000
heap
page execute and read and write
4097000
heap
page read and write
2CBC000
trusted library allocation
page read and write
7FFD9B8A7000
trusted library allocation
page read and write
595E000
stack
page read and write
2E55000
trusted library allocation
page read and write
245B7000
heap
page read and write
5DE8000
heap
page read and write
2D60000
heap
page read and write
4767000
heap
page read and write
1950A270000
heap
page read and write
2EAB000
trusted library allocation
page read and write
5DB5000
heap
page read and write
143E000
stack
page read and write
19524720000
heap
page read and write
1952461E000
heap
page read and write
5270000
trusted library allocation
page read and write
75E000
unkown
page readonly
7FFD9B755000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
2CF6000
trusted library allocation
page read and write
224000
unkown
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
24BB000
direct allocation
page read and write
5E56000
heap
page read and write
4ACF000
stack
page read and write
2434000
direct allocation
page read and write
7FFD9B586000
trusted library allocation
page read and write
141000
unkown
page execute read
1284000
heap
page read and write
1950A0A0000
unkown
page readonly
5DAA000
heap
page read and write
529F000
stack
page read and write
9C0000
heap
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
240C000
direct allocation
page read and write
60C0000
trusted library allocation
page read and write
44CB000
unkown
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
5E0F000
heap
page read and write
7A0D000
stack
page read and write
4AA33FB000
stack
page read and write
129A000
heap
page read and write
1E531000
heap
page read and write
2E1D000
trusted library allocation
page read and write
4483000
unkown
page read and write
7FF4A1623000
trusted library allocation
page execute read
7FFD9B690000
trusted library allocation
page read and write
7FFD9B4D3000
trusted library allocation
page execute and read and write
5DBA000
heap
page read and write
5160000
trusted library allocation
page read and write
3134C000
stack
page read and write
2C21000
heap
page read and write
594E000
stack
page read and write
2F19000
trusted library allocation
page read and write
2FA5000
heap
page read and write
DF0000
heap
page read and write
245D3000
heap
page read and write
19524B20000
trusted library section
page read and write
2A91C000
heap
page read and write
195246B0000
heap
page read and write
3DF3000
heap
page read and write
54D0000
trusted library allocation
page read and write
245D8000
heap
page read and write
4248000
heap
page read and write
5DC4000
heap
page read and write
125E000
stack
page read and write
1950BFF4000
trusted library allocation
page read and write
5DBA000
heap
page read and write
1280000
heap
page read and write
195269F0000
heap
page read and write
195245C0000
trusted library section
page read and write
5484000
trusted library allocation
page read and write
F55000
trusted library allocation
page execute and read and write
774000
unkown
page read and write
2C2F000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
427A000
heap
page read and write
31F50000
heap
page read and write
1950C023000
trusted library allocation
page read and write
4AA36FB000
stack
page read and write
350000
unkown
page read and write
D3B000
heap
page read and write
41D0000
unkown
page read and write
1952467E000
heap
page read and write
195245E0000
heap
page read and write
5DBA000
heap
page read and write
1DFBF000
stack
page read and write
245B6000
heap
page read and write
5250000
trusted library allocation
page execute and read and write
5DD5000
heap
page read and write
4AA26EB000
stack
page read and write
19528C62000
heap
page read and write
19524C80000
trusted library section
page read and write
1952BA0C000
heap
page read and write
2D64000
unkown
page read and write
5DC9000
heap
page read and write
245A6000
heap
page read and write
19526859000
heap
page read and write
6150000
trusted library allocation
page read and write
7FFD9B6A4000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
75D1000
heap
page read and write
5DBA000
heap
page read and write
73FD000
stack
page read and write
2D64000
unkown
page read and write
5165000
trusted library allocation
page read and write
1950C58F000
trusted library allocation
page read and write
75B000
unkown
page read and write
3022000
heap
page read and write
6BAB0000
unkown
page readonly
239A000
stack
page read and write
2F32000
trusted library allocation
page read and write
5DE8000
heap
page read and write
F24000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
2B82000
heap
page read and write
2A8E0000
heap
page read and write
2E6B000
trusted library allocation
page read and write
418E000
heap
page read and write
DFE000
heap
page read and write
2E81000
trusted library allocation
page read and write
24ED000
direct allocation
page read and write
5E13000
heap
page read and write
5DE8000
heap
page read and write
401000
unkown
page execute read
2A80000
unkown
page read and write
19528D3E000
heap
page read and write
5E0F000
heap
page read and write
6E1000
unkown
page execute read
7B20000
heap
page read and write
5C60000
direct allocation
page read and write
70DE000
stack
page read and write
30E8000
heap
page read and write
195291E0000
trusted library section
page readonly
2F00000
heap
page read and write
24FC000
direct allocation
page read and write
2F40000
heap
page read and write
77CD000
stack
page read and write
5DB2000
heap
page read and write
195268DA000
heap
page read and write
19528BA7000
heap
page read and write
3101000
heap
page read and write
4AA23CE000
stack
page read and write
C70000
heap
page read and write
6570000
trusted library allocation
page execute and read and write
2D03000
trusted library allocation
page read and write
35C000
unkown
page read and write
75B000
unkown
page write copy
141000
unkown
page execute read
23E0000
direct allocation
page read and write
61A0000
heap
page read and write
19526941000
heap
page read and write
245BD000
heap
page read and write
B94000
heap
page read and write
2A650000
heap
page read and write
140000
unkown
page readonly
7FFD9B9B0000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
7FFD9B682000
trusted library allocation
page read and write
248F000
direct allocation
page read and write
4AA2DFD000
stack
page read and write
5DEB000
heap
page read and write
A12000
heap
page read and write
4C6E000
stack
page read and write
30FF000
heap
page read and write
6D70000
trusted library allocation
page read and write
502E000
trusted library allocation
page read and write
2D64000
unkown
page read and write
55DD000
stack
page read and write
4AA2FFB000
stack
page read and write
5E18000
heap
page read and write
6D80000
trusted library allocation
page execute and read and write
580E000
unkown
page read and write
61BE000
stack
page read and write
F4A000
trusted library allocation
page execute and read and write
245E1000
heap
page read and write
30960000
trusted library allocation
page read and write
42B9000
heap
page read and write
4A80000
unkown
page read and write
2A924000
heap
page read and write
2AF0000
trusted library allocation
page read and write
1951BD04000
trusted library allocation
page read and write
245DA000
heap
page read and write
61EB7000
direct allocation
page readonly
B94000
heap
page read and write
4AA2BFA000
stack
page read and write
19524DE0000
trusted library section
page read and write
1284000
heap
page read and write
501B000
trusted library allocation
page read and write
19528C94000
heap
page read and write
2FE0000
heap
page read and write
60A2000
trusted library allocation
page read and write
19528F5D000
heap
page read and write
245D2000
heap
page read and write
2FAC000
trusted library allocation
page read and write
3917000
heap
page read and write
1E4BD000
stack
page read and write
224000
unkown
page read and write
6C250000
unkown
page readonly
19528BEC000
heap
page read and write
35A000
unkown
page read and write
2C21000
heap
page read and write
5E1B000
heap
page read and write
447000
unkown
page execute and read and write
350000
unkown
page read and write
245AC000
heap
page read and write
1950722B000
unkown
page readonly
A16000
heap
page read and write
245B8000
heap
page read and write
30FD000
heap
page read and write
195247FA000
heap
page read and write
4B10000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
9B7000
heap
page read and write
5DB7000
heap
page read and write
2D64000
unkown
page read and write
3171000
heap
page read and write
5DCB000
heap
page read and write
3278000
heap
page read and write
5025000
trusted library allocation
page read and write
63DC000
stack
page read and write
2F27000
trusted library allocation
page read and write
16EE000
stack
page read and write
19524633000
heap
page read and write
5D61000
heap
page read and write
6BC4F000
unkown
page readonly
4C4D000
direct allocation
page read and write
7FFD9B69B000
trusted library allocation
page read and write
B94000
heap
page read and write
7FFD9B740000
trusted library allocation
page read and write
1290000
heap
page read and write
6140000
trusted library allocation
page execute and read and write
2A92A000
heap
page read and write
5E0F000
heap
page read and write
4AA3D7D000
stack
page read and write
69DF000
stack
page read and write
5E10000
heap
page read and write
6110000
trusted library allocation
page execute and read and write
2560000
heap
page read and write
2D64000
unkown
page read and write
245B6000
heap
page read and write
5DB9000
heap
page read and write
2E79000
trusted library allocation
page read and write
2B62000
heap
page read and write
13A9000
heap
page read and write
245B0000
heap
page read and write
5E1B000
heap
page read and write
5059000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
7FFD9B6C2000
trusted library allocation
page read and write
71EB000
heap
page read and write
1950A3B5000
heap
page read and write
245A8000
heap
page read and write
6B1C000
stack
page read and write
4195000
heap
page execute and read and write
4021000
trusted library allocation
page read and write
2EC000
unkown
page readonly
220000
heap
page read and write
19529292000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
76F000
unkown
page read and write
6C251000
unkown
page execute read
288E000
stack
page read and write
1950A360000
heap
page read and write
3FBE000
trusted library allocation
page read and write
5DC6000
heap
page read and write
57D5000
unkown
page read and write
5DCE000
heap
page read and write
75E000
unkown
page write copy
1951BCA1000
trusted library allocation
page read and write
2D29000
heap
page read and write
19528D90000
heap
page read and write
6E0000
unkown
page readonly
24D8000
direct allocation
page read and write
5DEE000
heap
page read and write
5E0F000
heap
page read and write
2CB7000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
4ED1000
unkown
page read and write
49CE000
stack
page read and write
245C0000
heap
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
5D68000
heap
page read and write
30E0000
heap
page read and write
195246A4000
heap
page read and write
2D40000
unkown
page read and write
11F0000
heap
page read and write
1952686D000
heap
page read and write
4040000
heap
page read and write
34AE000
stack
page read and write
D91000
heap
page read and write
56D1000
unkown
page read and write
19525110000
trusted library allocation
page read and write
5DA7000
heap
page read and write
6D60000
trusted library allocation
page read and write
30F2000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page execute and read and write
1E1BF000
stack
page read and write
56E0000
unkown
page read and write
140000
unkown
page readonly
7FF4A1622000
trusted library allocation
page readonly
11E0000
heap
page read and write
160E000
stack
page read and write
501E000
trusted library allocation
page read and write
7D9000
stack
page read and write
302F000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
6B40000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
5D7E000
stack
page read and write
6FB0000
heap
page read and write
5DE9000
heap
page read and write
2593000
heap
page read and write
19528E81000
heap
page read and write
5E11000
heap
page read and write
2C9C000
trusted library allocation
page read and write
29AC000
stack
page read and write
30EA000
heap
page read and write
9C5000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
30E9000
heap
page read and write
10BA000
heap
page read and write
30F8000
heap
page read and write
4180000
heap
page read and write
5D55000
heap
page read and write
675E000
stack
page read and write
245A7000
heap
page read and write
B8E000
stack
page read and write
1E0000
unkown
page readonly
C9D000
stack
page read and write
5DC3000
heap
page read and write
5491000
trusted library allocation
page read and write
24A5000
direct allocation
page read and write
195067F0000
unkown
page readonly
1284000
heap
page read and write
72BE000
stack
page read and write
195268A0000
heap
page read and write
1952697C000
heap
page read and write
970000
heap
page read and write
245D2000
heap
page read and write
10FC000
heap
page read and write
7FFD9B5B6000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
5DB2000
heap
page read and write
2A50000
heap
page read and write
19528EB6000
heap
page read and write
191000
stack
page read and write
B94000
heap
page read and write
245B8000
heap
page read and write
7FF4A1628000
trusted library allocation
page readonly
1950C014000
trusted library allocation
page read and write
19526853000
heap
page read and write
AFB000
stack
page read and write
155E000
stack
page read and write
5E2E000
stack
page read and write
77B000
unkown
page write copy
3036000
trusted library allocation
page read and write
45BE000
trusted library allocation
page read and write
195245D0000
heap
page read and write
2FA4000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
813000
unkown
page readonly
30FF000
heap
page read and write
195067F0000
unkown
page readonly
6BA11000
unkown
page execute read
7FFD9B900000
trusted library allocation
page execute and read and write
5DA7000
heap
page read and write
19528D4D000
heap
page read and write
5D31000
heap
page read and write
6075000
trusted library allocation
page read and write
3430000
heap
page read and write
2D64000
unkown
page read and write
5460000
trusted library allocation
page read and write
19528BE9000
heap
page read and write
4AA35FA000
stack
page read and write
74FD000
stack
page read and write
2566000
heap
page read and write
F5B000
trusted library allocation
page execute and read and write
2FFB000
trusted library allocation
page read and write
2A6FE000
heap
page read and write
2D8E000
trusted library allocation
page read and write
245C9000
heap
page read and write
19523CA0000
trusted library allocation
page read and write
3144B000
stack
page read and write
7FFD9B4E3000
trusted library allocation
page read and write
245CD000
heap
page read and write
549000
unkown
page execute and read and write
2A630000
heap
page read and write
5DEE000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
2A76E000
stack
page read and write
245CD000
heap
page read and write
2D50000
direct allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
245C0000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
1952687C000
heap
page read and write
1950BC90000
heap
page execute and read and write
5DBD000
heap
page read and write
19528C67000
heap
page read and write
F40000
trusted library allocation
page read and write
11A0000
heap
page read and write
5DCB000
heap
page read and write
6BA10000
unkown
page readonly
B94000
heap
page read and write
753C000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
293E000
unkown
page read and write
2F7D000
trusted library allocation
page read and write
766000
unkown
page read and write
2D5A000
trusted library allocation
page read and write
419000
unkown
page write copy
515B000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
D9B000
heap
page read and write
5ECE000
stack
page read and write
6079000
trusted library allocation
page read and write
6B54000
heap
page read and write
5DC9000
heap
page read and write
7A10000
trusted library allocation
page execute and read and write
715C000
stack
page read and write
F5E000
stack
page read and write
3021000
trusted library allocation
page read and write
15AF000
stack
page read and write
1E531000
heap
page read and write
5E1B000
heap
page read and write
6C367000
unkown
page readonly
656E000
stack
page read and write
2A84000
unkown
page read and write
19524580000
trusted library section
page read and write
4220000
heap
page read and write
646E000
stack
page read and write
245C9000
heap
page read and write
454D000
trusted library allocation
page read and write
511E000
stack
page read and write
5DD6000
heap
page read and write
141000
unkown
page execute read
7FFD9B8F0000
trusted library allocation
page read and write
5DCD000
heap
page read and write
245D2000
heap
page read and write
421E000
stack
page read and write
585E000
stack
page read and write
5DB9000
heap
page read and write
433B000
heap
page read and write
245CE000
heap
page read and write
30FC000
heap
page read and write
544C000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
5DD0000
heap
page read and write
3280000
heap
page read and write
30F7000
heap
page read and write
19528C28000
heap
page read and write
FF190000
trusted library allocation
page execute and read and write
6AD2000
heap
page read and write
A38000
heap
page read and write
2C20000
heap
page read and write
502A000
trusted library allocation
page read and write
5DB7000
heap
page read and write
30FF000
heap
page read and write
41C000
unkown
page execute read
2AFB000
trusted library allocation
page read and write
2465A000
heap
page read and write
3066000
trusted library allocation
page read and write
E29000
heap
page read and write
548E000
trusted library allocation
page read and write
5DE0000
heap
page read and write
CF0000
trusted library allocation
page read and write
35C000
unkown
page read and write
1950A1AE000
heap
page read and write
29C0000
unkown
page readonly
545B000
trusted library allocation
page read and write
4D6F000
stack
page read and write
19528EE9000
heap
page read and write
1210000
heap
page read and write
2F55000
heap
page read and write
30FB000
heap
page read and write
D46000
heap
page read and write
2FB0000
heap
page read and write
51CD000
stack
page read and write
11C0000
heap
page read and write
359000
unkown
page write copy
5DC6000
heap
page read and write
4644000
heap
page read and write
1952466C000
heap
page read and write
41F000
unkown
page write copy
195269BE000
heap
page read and write
5E0F000
heap
page read and write
245CD000
heap
page read and write
B94000
heap
page read and write
4F68000
heap
page read and write
56F0000
unkown
page read and write
28FF000
unkown
page read and write
1950BCA1000
trusted library allocation
page read and write
7FFD9B4F4000
trusted library allocation
page read and write
245DC000
heap
page read and write
2F73000
trusted library allocation
page read and write
307E000
unkown
page read and write
10F0000
heap
page read and write
5E1B000
heap
page read and write
FA0000
unkown
page readonly
245DC000
heap
page read and write
7FF4A1626000
trusted library allocation
page readonly
7FFD9B847000
trusted library allocation
page read and write
2D64000
unkown
page read and write
56D1000
unkown
page read and write
5E19000
heap
page read and write
7009000
stack
page read and write
1E631000
heap
page read and write
763B000
stack
page read and write
5DE8000
heap
page read and write
4AA34F6000
stack
page read and write
2D64000
unkown
page read and write
6120000
trusted library allocation
page execute and read and write
245B8000
heap
page read and write
245BD000
heap
page read and write
2496000
direct allocation
page read and write
19528C37000
heap
page read and write
2DAF000
stack
page read and write
19526892000
heap
page read and write
4C1F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
1950A1D4000
heap
page read and write
2B10000
heap
page read and write
256C000
heap
page read and write
61EB4000
direct allocation
page read and write
3170000
heap
page read and write
15C0000
trusted library allocation
page read and write
93E000
stack
page read and write
5DEE000
heap
page read and write
19526840000
heap
page read and write
2416000
direct allocation
page read and write
245DA000
heap
page read and write
200000
heap
page read and write
6D30000
trusted library section
page read and write
4AA2EFE000
stack
page read and write
2D64000
unkown
page read and write
19528C8F000
heap
page read and write
609F000
trusted library allocation
page read and write
5D3E000
stack
page read and write
F42000
trusted library allocation
page read and write
6B24000
heap
page read and write
2645000
heap
page read and write
4AA427E000
stack
page read and write
2D64000
unkown
page read and write
5DEB000
heap
page read and write
9C2000
heap
page read and write
249E000
direct allocation
page read and write
7FFD9B4FB000
trusted library allocation
page execute and read and write
1284000
heap
page read and write
2B14000
heap
page read and write
1464000
trusted library allocation
page read and write
19528E45000
heap
page read and write
19528C8D000
heap
page read and write
DA8000
heap
page read and write
11E0000
heap
page read and write
6BA8D000
unkown
page readonly
7FF4A1627000
trusted library allocation
page execute read
10F3000
heap
page read and write
D30000
heap
page read and write
CB0000
heap
page read and write
4023000
unkown
page readonly
296E000
stack
page read and write
245A6000
heap
page read and write
2CAE000
stack
page read and write
7FF4A1630000
trusted library allocation
page execute and read and write
2FD0000
heap
page read and write
3150000
heap
page read and write
5DCD000
heap
page read and write
7FF4A1621000
trusted library allocation
page execute read
3C36000
trusted library allocation
page read and write
783000
unkown
page readonly
2D08000
trusted library allocation
page read and write
A29000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
CA0000
heap
page read and write
6BAB1000
unkown
page execute read
2F40000
heap
page read and write
30FF000
heap
page read and write
2D64000
unkown
page read and write
1950A170000
heap
page read and write
2F60000
heap
page read and write
140000
unkown
page readonly
6A1C000
stack
page read and write
325F000
unkown
page read and write
16F0000
heap
page execute and read and write
D18000
heap
page read and write
210000
unkown
page read and write
5DCB000
heap
page read and write
5E10000
heap
page read and write
245BD000
heap
page read and write
1952BA56000
heap
page read and write
5320000
direct allocation
page read and write
6088000
trusted library allocation
page read and write
5D68000
heap
page read and write
5460000
trusted library allocation
page read and write
48D3000
unkown
page read and write
8C0000
heap
page read and write
D60000
heap
page read and write
705D000
stack
page read and write
3171000
heap
page read and write
74C000
unkown
page readonly
7FF4A162E000
trusted library allocation
page readonly
19528C88000
heap
page read and write
2A926000
heap
page read and write
5D5C000
heap
page read and write
54C0000
trusted library allocation
page read and write
19526880000
heap
page read and write
1F0000
unkown
page readonly
2D64000
unkown
page read and write
9C3000
heap
page read and write
54C8000
trusted library allocation
page read and write
245DA000
heap
page read and write
2D64000
unkown
page read and write
1284000
heap
page read and write
41CE000
heap
page read and write
4AA4078000
stack
page read and write
19528F27000
heap
page read and write
624000
unkown
page execute and read and write
5DCD000
heap
page read and write
363000
unkown
page readonly
2F63000
heap
page read and write
609A000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
19524631000
heap
page read and write
590E000
unkown
page read and write
5DCB000
heap
page read and write
11D0000
heap
page read and write
7B40000
heap
page read and write
195250E0000
trusted library allocation
page read and write
50A0000
heap
page read and write
9BD000
heap
page read and write
65EE000
stack
page read and write
5E18000
heap
page read and write
E6B000
stack
page read and write
2E60000
trusted library allocation
page read and write
195253E0000
trusted library section
page read and write
19524027000
heap
page read and write
2D64000
unkown
page read and write
245A3000
heap
page read and write
359000
unkown
page write copy
6BC8F000
unkown
page write copy
4AA3B7D000
stack
page read and write
4090000
heap
page read and write
599E000
stack
page read and write
5DD5000
heap
page read and write
5DE8000
heap
page read and write
2DEF000
trusted library allocation
page read and write
2F44000
heap
page read and write
245BD000
heap
page read and write
19524710000
trusted library section
page read and write
1284000
heap
page read and write
30D0000
heap
page read and write
10FA000
stack
page read and write
2EC000
unkown
page readonly
1284000
heap
page read and write
2F48000
heap
page read and write
23F0000
direct allocation
page read and write
2D64000
unkown
page read and write
2D99000
trusted library allocation
page read and write
7FFD9B730000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
5068000
trusted library allocation
page read and write
195268FC000
heap
page read and write
2D64000
unkown
page read and write
5DF0000
heap
page read and write
56D1000
unkown
page read and write
2B11000
trusted library allocation
page read and write
5DE9000
heap
page read and write
243D000
direct allocation
page read and write
87E000
unkown
page readonly
2D64000
unkown
page read and write
3095000
trusted library allocation
page read and write
5DAD000
heap
page read and write
195246D6000
heap
page read and write
2D64000
unkown
page read and write
1950BBD0000
heap
page read and write
2DBA000
trusted library allocation
page read and write
23ED000
direct allocation
page read and write
54BE000
direct allocation
page read and write
76D000
unkown
page read and write
6E0000
unkown
page readonly
3005000
trusted library allocation
page read and write
8B0000
heap
page read and write
F50000
trusted library allocation
page read and write
19524C00000
trusted library section
page read and write
2D64000
unkown
page read and write
61ED3000
direct allocation
page read and write
D79000
heap
page read and write
284F000
stack
page read and write
5D5E000
heap
page read and write
19528E3D000
heap
page read and write
10FB000
stack
page read and write
A1C000
heap
page read and write
5D10000
heap
page read and write
5DBF000
heap
page read and write
3100000
heap
page read and write
5DB2000
heap
page read and write
5D44000
heap
page read and write
F46000
trusted library allocation
page execute and read and write
300B000
trusted library allocation
page read and write
1100000
heap
page read and write
5F2E000
stack
page read and write
9F6000
heap
page read and write
5060000
trusted library allocation
page read and write
195247C0000
heap
page execute and read and write
19D000
stack
page read and write
3060000
heap
page read and write
C50000
heap
page read and write
5AEE000
stack
page read and write
2D64000
unkown
page read and write
30EF000
heap
page read and write
10A4000
heap
page read and write
2D64000
unkown
page read and write
2D64000
unkown
page read and write
43FD000
unkown
page read and write
4AA377F000
stack
page read and write
29F0000
heap
page read and write
245D9000
heap
page read and write
6AF0000
heap
page read and write
1950C002000
trusted library allocation
page read and write
1950A350000
heap
page read and write
2EDC000
trusted library allocation
page read and write
9B000
stack
page read and write
5DBB000
heap
page read and write
1490000
trusted library allocation
page read and write
4AA397B000
stack
page read and write
5EE0000
heap
page read and write
56E3000
unkown
page read and write
2CF3000
trusted library allocation
page read and write
2E79000
heap
page read and write
602C000
stack
page read and write
D7D000
heap
page read and write
5174000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
B94000
heap
page read and write
5031000
trusted library allocation
page read and write
120D000
stack
page read and write
2C40000
trusted library allocation
page read and write
2D64000
unkown
page read and write
5DCD000
heap
page read and write
4AA2AFE000
stack
page read and write
2F71000
trusted library allocation
page read and write
400000
unkown
page readonly
978000
heap
page read and write
6D50000
trusted library allocation
page execute and read and write
5E10000
heap
page read and write
D9F000
heap
page read and write
245C0000
heap
page read and write
7FFD9B798000
trusted library allocation
page read and write
9C3000
heap
page read and write
5DC9000
heap
page read and write
2D42000
trusted library allocation
page read and write
140000
unkown
page readonly
245C9000
heap
page read and write
245BD000
heap
page read and write
19526876000
heap
page read and write
A0E000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
195246AC000
heap
page read and write
689F000
stack
page read and write
2D3F000
trusted library allocation
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
11D5000
heap
page read and write
27A0000
direct allocation
page execute and read and write
245CD000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
1952463C000
heap
page read and write
245AC000
heap
page read and write
1D0000
unkown
page readonly
5DF2000
heap
page read and write
400000
unkown
page readonly
2AE0000
trusted library allocation
page execute and read and write
5E11000
heap
page read and write
5093000
trusted library allocation
page read and write
345E000
heap
page read and write
19528B60000
heap
page read and write
6B49000
heap
page read and write
363000
unkown
page readonly
7FFD9B752000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
24648000
heap
page read and write
5036000
trusted library allocation
page read and write
2D64000
unkown
page read and write
363000
unkown
page readonly
2D34000
trusted library allocation
page read and write
19525140000
trusted library allocation
page read and write
363000
unkown
page readonly
6AD0000
heap
page read and write
9F8000
heap
page read and write
5DD5000
heap
page read and write
30E7000
heap
page read and write
2F96000
trusted library allocation
page read and write
1E530000
heap
page read and write
245B8000
heap
page read and write
5090000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
5DBF000
heap
page read and write
5096000
trusted library allocation
page read and write
5E16000
heap
page read and write
5DB2000
heap
page read and write
2D64000
unkown
page read and write
52A0000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
D75000
heap
page read and write
1950A355000
heap
page read and write
56D1000
unkown
page read and write
2B00000
heap
page read and write
245B9000
heap
page read and write
6BC90000
unkown
page read and write
6CBA1000
unkown
page execute read
5DB8000
heap
page read and write
245D2000
heap
page read and write
6B4E000
heap
page read and write
7FFD9B6E6000
trusted library allocation
page read and write
5DD5000
heap
page read and write
30E5000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
245B3000
heap
page read and write
31A4E000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
57D2000
unkown
page read and write
195245D3000
heap
page read and write
3022000
heap
page read and write
2E08000
trusted library allocation
page read and write
632E000
stack
page read and write
2FE0000
heap
page read and write
5D5A000
heap
page read and write
14A0000
heap
page read and write
A3A000
heap
page read and write
56DF000
stack
page read and write
2D65000
unkown
page read and write
F68000
stack
page read and write
1950BBE0000
trusted library allocation
page read and write
97000
stack
page read and write
19528C77000
heap
page read and write
2F4C000
heap
page read and write
6CD04000
unkown
page read and write
129E000
heap
page read and write
19C000
stack
page read and write
408E000
stack
page read and write
1320000
heap
page read and write
2A70D000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
3163C000
stack
page read and write
245D8000
heap
page read and write
3BED000
heap
page read and write
2C10000
trusted library allocation
page read and write
1950902B000
unkown
page readonly
2FAE000
stack
page read and write
7FFD9B4DD000
trusted library allocation
page execute and read and write
2D64000
unkown
page read and write
5A4F000
stack
page read and write
1950BED9000
trusted library allocation
page read and write
6C0B000
stack
page read and write
24B4000
direct allocation
page read and write
195268BB000
heap
page read and write
73BD000
stack
page read and write
F2D000
trusted library allocation
page execute and read and write
3000000
trusted library allocation
page read and write
1950C3F1000
trusted library allocation
page read and write
4C49000
direct allocation
page read and write
2D64000
unkown
page read and write
412000
unkown
page readonly
56D1000
unkown
page read and write
4ED1000
unkown
page read and write
19524700000
trusted library section
page read and write
5A9E000
stack
page read and write
5DBB000
heap
page read and write
19523CD0000
trusted library allocation
page read and write
4549000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
193000
stack
page read and write
636000
unkown
page execute and read and write
40BE000
stack
page read and write
7FFD9B75C000
trusted library allocation
page read and write
2EC000
unkown
page readonly
224000
unkown
page read and write
2F83000
trusted library allocation
page read and write
A1F000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
3445000
heap
page read and write
224000
unkown
page read and write
19528D01000
heap
page read and write
42DA000
unkown
page read and write
5DB3000
heap
page read and write
23F6000
direct allocation
page read and write
2425000
direct allocation
page read and write
19526865000
heap
page read and write
195247D0000
heap
page read and write
B38000
stack
page read and write
1088000
heap
page read and write
6BC8E000
unkown
page read and write
30F5000
heap
page read and write
24C2000
direct allocation
page read and write
5170000
trusted library allocation
page read and write
19526989000
heap
page read and write
3016000
trusted library allocation
page read and write
354C000
stack
page read and write
6590000
trusted library allocation
page read and write
6E1000
unkown
page execute read
19528C30000
heap
page read and write
1950BBE3000
trusted library allocation
page read and write
30FF000
heap
page read and write
41E7000
heap
page read and write
2518000
direct allocation
page read and write
19528BE4000
heap
page read and write
51AD000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
5DC3000
heap
page read and write
2479000
direct allocation
page read and write
5E0F000
heap
page read and write
5E0F000
heap
page read and write
2BCA000
trusted library allocation
page read and write
195245B0000
trusted library section
page read and write
1952684F000
heap
page read and write
571E000
stack
page read and write
1700000
heap
page read and write
F20000
trusted library allocation
page read and write
30F2000
heap
page read and write
3E20000
trusted library allocation
page read and write
142E000
heap
page read and write
2472000
direct allocation
page read and write
4AA373E000
stack
page read and write
6131000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
224000
unkown
page read and write
642E000
stack
page read and write
3F49000
trusted library allocation
page read and write
5D65000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page read and write
400000
unkown
page readonly
1952465C000
heap
page read and write
3027000
heap
page read and write
19524638000
heap
page read and write
19525150000
trusted library allocation
page read and write
30D7000
heap
page read and write
19528C4C000
heap
page read and write
2D0E000
trusted library allocation
page read and write
790D000
stack
page read and write
6210000
trusted library allocation
page read and write
5DF0000
heap
page read and write
2DF2000
trusted library allocation
page read and write
A02000
heap
page read and write
7FFD9B69E000
trusted library allocation
page read and write
250A000
direct allocation
page read and write
2A70000
unkown
page read and write
24C9000
direct allocation
page read and write
3ACA000
heap
page read and write
B40000
heap
page read and write
245B3000
heap
page read and write
24D0000
direct allocation
page read and write
7FFD9B590000
trusted library allocation
page execute and read and write
19528D8B000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
419000
unkown
page write copy
5DDB000
heap
page read and write
245B8000
heap
page read and write
6C3B4000
unkown
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FF4A1613000
trusted library allocation
page execute read
6FA0000
heap
page read and write
2ECE000
trusted library allocation
page read and write
2EB8000
trusted library allocation
page read and write
2F95000
heap
page read and write
A17000
heap
page read and write
41FC000
heap
page read and write
E2D000
heap
page read and write
5DBF000
heap
page read and write
40C0000
heap
page read and write
61FD000
stack
page read and write
1284000
heap
page read and write
364D000
stack
page read and write
2EF0000
heap
page read and write
5CEF000
stack
page read and write
2F80000
trusted library allocation
page read and write
2B20000
heap
page read and write
1952BA00000
heap
page read and write
4250000
heap
page read and write
4120000
heap
page read and write
7640000
heap
page read and write
1E630000
trusted library allocation
page read and write
D89000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
3F33000
heap
page read and write
7A20000
trusted library allocation
page read and write
4ED0000
unkown
page read and write
1368000
heap
page read and write
5481000
trusted library allocation
page read and write
1951BCBC000
trusted library allocation
page read and write
778000
unkown
page read and write
38FE000
heap
page read and write
30EF000
heap
page read and write
29D0000
unkown
page readonly
2B4C000
stack
page read and write
75F2000
heap
page read and write
5449000
direct allocation
page read and write
139B000
heap
page read and write
F3D000
trusted library allocation
page execute and read and write
5DB4000
heap
page read and write
425E000
heap
page read and write
4C88000
unkown
page read and write
30FF000
heap
page read and write
6D0D000
stack
page read and write
9E6000
heap
page read and write
1950A3C0000
heap
page read and write
5DCD000
heap
page read and write
5E0F000
heap
page read and write
2C4D000
stack
page read and write
B90000
heap
page read and write
4CAD000
stack
page read and write
7FFD9B700000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
1951C06D000
trusted library allocation
page read and write
78CE000
stack
page read and write
4021000
unkown
page read and write
2D64000
unkown
page read and write
245DC000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
444F000
stack
page read and write
5DBA000
heap
page read and write
5E0F000
heap
page read and write
5DB9000
heap
page read and write
2D64000
unkown
page read and write
56D1000
unkown
page read and write
7FFD9B4D4000
trusted library allocation
page read and write
230000
direct allocation
page read and write
2CC2000
trusted library allocation
page read and write
5DD8000
heap
page read and write
2F0F000
trusted library allocation
page read and write
19528C99000
heap
page read and write
1950A195000
heap
page read and write
4AA3876000
stack
page read and write
7FFD9B9E9000
trusted library allocation
page read and write
197000
stack
page read and write
195067F2000
unkown
page readonly
7FFD9B770000
trusted library allocation
page execute and read and write
5DD2000
heap
page read and write
2E58000
trusted library allocation
page read and write
5DB8000
heap
page read and write
42A5000
heap
page read and write
2630000
heap
page read and write
412000
unkown
page readonly
2F1C000
trusted library allocation
page read and write
224000
unkown
page read and write
DBC000
stack
page read and write
950000
heap
page read and write
9B000
stack
page read and write
5DD1000
heap
page read and write
19524698000
heap
page read and write
5DD5000
heap
page read and write
54B9000
trusted library allocation
page read and write
2D64000
unkown
page read and write
4095000
heap
page read and write
2D64000
unkown
page read and write
5DC6000
heap
page read and write
2A6B9000
heap
page read and write
1450000
trusted library allocation
page read and write
56D1000
unkown
page read and write
2A6B1000
heap
page read and write
2D4F000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
5DBA000
heap
page read and write
5DD6000
heap
page read and write
2D8B000
trusted library allocation
page read and write
1360000
heap
page read and write
245C9000
heap
page read and write
2D64000
unkown
page read and write
5BF0000
direct allocation
page execute and read and write
444F000
stack
page read and write
5DC5000
heap
page read and write
60B0000
trusted library allocation
page execute and read and write
61ED4000
direct allocation
page readonly
47D0000
unkown
page read and write
5DB2000
heap
page read and write
1950A179000
heap
page read and write
19529274000
trusted library allocation
page read and write
19528B50000
trusted library allocation
page read and write
2F00000
heap
page read and write
F57000
trusted library allocation
page execute and read and write
6C3B7000
unkown
page readonly
7010000
heap
page read and write
5DED000
heap
page read and write
298C000
stack
page read and write
581E000
stack
page read and write
19528BF3000
heap
page read and write
4070000
heap
page read and write
1952468F000
heap
page read and write
19526856000
heap
page read and write
7FFD9B744000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
A21000
heap
page read and write
19524570000
trusted library allocation
page read and write
5DEA000
heap
page read and write
2CE8000
trusted library allocation
page read and write
240F000
direct allocation
page read and write
2CAA000
trusted library allocation
page read and write
A34000
heap
page read and write
3105000
heap
page read and write
195268D3000
heap
page read and write
195269DE000
heap
page read and write
19525400000
trusted library section
page read and write
7FF4A1625000
trusted library allocation
page execute read
2E48000
trusted library allocation
page read and write
7FFD9B6F7000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
CB5000
heap
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
2503000
direct allocation
page read and write
5DAE000
stack
page read and write
6BAA2000
unkown
page readonly
29E0000
unkown
page readonly
7FF4A1610000
trusted library allocation
page readonly
4046000
unkown
page readonly
41F000
unkown
page write copy
2A6FB000
heap
page read and write
5D55000
heap
page read and write
B94000
heap
page read and write
4044000
unkown
page read and write
5DD5000
heap
page read and write
314BA000
heap
page read and write
106C000
stack
page read and write
761000
unkown
page read and write
3020000
heap
page read and write
1284000
heap
page read and write
5E13000
heap
page read and write
61ECC000
direct allocation
page read and write
5150000
trusted library allocation
page read and write
245A7000
heap
page read and write
35A000
unkown
page read and write
13A0000
heap
page read and write
19B000
stack
page read and write
5E50000
heap
page read and write
19524655000
heap
page read and write
195246D8000
heap
page read and write
2DF0000
heap
page read and write
5E0F000
heap
page read and write
1E3BD000
stack
page read and write
71DF000
stack
page read and write
5DB4000
heap
page read and write
CBE000
stack
page read and write
3010000
heap
page read and write
5DD1000
heap
page read and write
6CBA0000
unkown
page readonly
19525100000
trusted library allocation
page read and write
F23000
trusted library allocation
page execute and read and write
7FF4A1624000
trusted library allocation
page readonly
2BE5000
trusted library allocation
page read and write
142B000
heap
page read and write
2CFA000
stack
page read and write
5D20000
heap
page read and write
1470000
trusted library allocation
page read and write
B94000
heap
page read and write
1950BBC0000
trusted library allocation
page read and write
D10000
heap
page read and write
5DB9000
heap
page read and write
5D6A000
heap
page read and write
244B000
direct allocation
page read and write
5E14000
heap
page read and write
2D64000
unkown
page read and write
7FF4A162B000
trusted library allocation
page execute read
2EC000
unkown
page readonly
534E000
stack
page read and write
19526861000
heap
page read and write
1E2BF000
stack
page read and write
5E0F000
heap
page read and write
5D64000
heap
page read and write
19528C4F000
heap
page read and write
19528C3B000
heap
page read and write
1284000
heap
page read and write
2488000
direct allocation
page read and write
6CCF9000
unkown
page write copy
1950A1AB000
heap
page read and write
5DBE000
stack
page read and write
195269D5000
heap
page read and write
19528C58000
heap
page read and write
425A000
heap
page read and write
5DCB000
heap
page read and write
75E000
unkown
page readonly
A2D000
heap
page read and write
4AA31F1000
stack
page read and write
7FFD9B4ED000
trusted library allocation
page execute and read and write
3280000
unkown
page read and write
2D64000
unkown
page read and write
5E2E000
stack
page read and write
401000
unkown
page execute read
24F4000
direct allocation
page read and write
2481000
direct allocation
page read and write
5DC4000
heap
page read and write
3F4D000
trusted library allocation
page read and write
503D000
trusted library allocation
page read and write
2ABE000
stack
page read and write
5E7E000
stack
page read and write
1120000
heap
page read and write
19528C2D000
heap
page read and write
2D64000
unkown
page read and write
56D1000
unkown
page read and write
4023000
unkown
page readonly
5476000
trusted library allocation
page read and write
5DD0000
heap
page read and write
19528E4C000
heap
page read and write
19507C2B000
unkown
page readonly
5D4D000
heap
page read and write
5DC9000
heap
page read and write
54B0000
trusted library allocation
page read and write
F52000
trusted library allocation
page read and write
29B0000
heap
page execute and read and write
7FFD9B58C000
trusted library allocation
page execute and read and write
2A87F000
stack
page read and write
2D64000
unkown
page read and write
56D1000
unkown
page read and write
19524808000
heap
page read and write
141000
unkown
page execute read
2D64000
unkown
page read and write
5DE8000
heap
page read and write
2464B000
heap
page read and write
245C9000
heap
page read and write
245DC000
heap
page read and write
30EE000
heap
page read and write
4046000
unkown
page readonly
5D9C000
heap
page read and write
245A0000
heap
page read and write
56D1000
unkown
page read and write
49AA000
trusted library allocation
page read and write
1284000
heap
page read and write
7206000
heap
page read and write
4420000
trusted library allocation
page read and write
195250F0000
trusted library allocation
page read and write
A0B000
heap
page read and write
224000
unkown
page read and write
3024000
trusted library allocation
page read and write
255E000
stack
page read and write
1950C0F5000
trusted library allocation
page read and write
141000
unkown
page execute read
245BB000
heap
page read and write
There are 1511 hidden memdumps, click here to show them.