IOC Report
JHqNlw9U8c.exe

loading gif

Files

File Path
Type
Category
Malicious
JHqNlw9U8c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\moxpbix
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\pfbgvokqcvhbw
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5w4.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5w4.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5w4.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5w4.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5w4.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKJDAEGCAFIIDGDGCGIJDAEHCB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBKKKEHDHCBFIEBFBGIDGHJJJD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FENIVHOIKN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FENIVHOIKN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HIDAFHDHCBGDGCBGCGII
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIDBFCBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JKECGDBFCBKFIDHIDHDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKKEBGCGHIDHCBFHIDGHCBKEHC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\KKFHJDAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_JHqNlw9U8c.exe_ab753f96b82e74d7ba4da3cd349bafc65218159_24b67d21_5d46cc26-b5fa-41b8-a3a1-f49a873a268e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5w4.0.exe_f9ccffcd5d7564625ecdd2ababf8d7cc3b3c_4586126e_17a0f7ba-7303-4dbc-8740-9e1ea2c9f86e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4AC.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 09:20:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3A1.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 09:19:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA528.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA558.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NYMMPCEIMA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\wma2me3p.ig2
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ae5a11d3
data
dropped
C:\Users\user\AppData\Local\Temp\bd194e98
data
dropped
C:\Users\user\AppData\Local\Temp\hqxckafrghj
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Fri Apr 26 08:19:46 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u5w4.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5w4.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u5w4.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 59 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JHqNlw9U8c.exe
"C:\Users\user\Desktop\JHqNlw9U8c.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5w4.0.exe
"C:\Users\user\AppData\Local\Temp\u5w4.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5w4.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5w4.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u5w4.3.exe
"C:\Users\user\AppData\Local\Temp\u5w4.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5w4.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5w4.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe"
malicious
C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe
"C:\Users\user\AppData\Local\Temp\GIEHIDHJDB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7636 -s 1192
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7736 -s 2216
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=one&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/freebl3.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://pastebin.comd
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
http://185.172.128.76/15f649199f40275b/nss3.dll~
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://185.172.128.203/tiktok.exe7
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php$
unknown
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://pastebin.com
unknown
https://pastebin.com
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
https://www.iolo.com/company/legal/eula/
unknown
http://185.172.128.228/ping.php?substr=one
185.172.128.228
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpc
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
http://185.172.128.76/15f649199f40275b/softokn3.dllO%Eu
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
https://pastebin.com/raw/z9pYkqPQd
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php22b3eb0bbcd7286fe3f6c61a23394release
unknown
https://github.com/microsoft/ApplicationInsights-dotnet/issues/2560
unknown
http://www.vmware.com/0/
unknown
https://pastebin.com/raw/z9pYkqPQ
104.20.4.235
http://james.newtonking.com/projects/json
unknown
https://profiler.monitor.azure.com/l
unknown
https://github.com/Microsoft/ApplicationInsights-dotnetw
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://dc.services.visualstudio.com/api/profiles/
unknown
https://github.com/Microsoft/ApplicationInsights-dotnet
unknown
http://svc.iolo.com/__svc/sbv/Uninstall.ashx
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
iolo0.b-cdn.net
195.181.163.196
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
pastebin.com
104.20.4.235
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
104.20.4.235
pastebin.com
United States
172.67.19.24
unknown
United States
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Governor
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Governor
TypesSupported
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
ProgramId
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
FileId
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
LowerCaseLongPath
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
LongPathHash
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
Name
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
OriginalFileName
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
Publisher
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
Version
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
BinFileVersion
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
BinaryType
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
ProductName
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
ProductVersion
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
LinkDate
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
BinProductVersion
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
AppxPackageFullName
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
AppxPackageRelativeId
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
Size
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
Language
\REGISTRY\A\{79bea720-bda2-6bca-af2b-7d8e86ab0c2b}\Root\InventoryApplicationFile\jhqnlw9u8c.exe|39e31c31d4a2e649
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
ProgramId
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
FileId
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
LowerCaseLongPath
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
LongPathHash
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
Name
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
OriginalFileName
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
Publisher
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
Version
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
BinFileVersion
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
BinaryType
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
ProductName
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
ProductVersion
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
LinkDate
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
BinProductVersion
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
AppxPackageFullName
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
AppxPackageRelativeId
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
Size
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
Language
\REGISTRY\A\{d360ce4b-6576-4544-a9bb-5d43012a7dc4}\Root\InventoryApplicationFile\u5w4.0.exe|e311fc29be7c1afa
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800ED3DBF37A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 75 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
42C6000
heap
page read and write
malicious
1EEAE49B000
unkown
page readonly
malicious
61E0000
direct allocation
page read and write
malicious
1EEAB29B000
unkown
page readonly
malicious
1EEC91C0000
trusted library section
page read and write
malicious
5771000
trusted library allocation
page read and write
malicious
1EEC9410000
trusted library section
page read and write
malicious
5CD0000
direct allocation
page read and write
malicious
922000
unkown
page readonly
malicious
414A000
heap
page read and write
malicious
3B21000
heap
page read and write
malicious
5CC0000
direct allocation
page read and write
malicious
5687000
trusted library allocation
page read and write
malicious
5C90000
direct allocation
page execute and read and write
malicious
D54000
heap
page read and write
D44000
heap
page read and write
C71000
unkown
page execute read
76D000
unkown
page read and write
2A740000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
88A000
stack
page read and write
2470E000
heap
page read and write
B24000
heap
page read and write
1570000
heap
page read and write
3374000
unkown
page read and write
1EEB0C23000
trusted library allocation
page read and write
2584000
direct allocation
page read and write
7FF4A8003000
trusted library allocation
page execute read
35AC000
stack
page read and write
5E66000
heap
page read and write
CBE000
stack
page read and write
D64000
heap
page read and write
5E18000
heap
page read and write
246FB000
heap
page read and write
5E22000
heap
page read and write
5E73000
heap
page read and write
246D0000
heap
page read and write
197000
stack
page read and write
3730000
heap
page read and write
246EC000
heap
page read and write
412A000
heap
page read and write
40DD000
trusted library allocation
page read and write
246F0000
heap
page read and write
246DE000
heap
page read and write
150E000
stack
page read and write
B3C000
heap
page read and write
5E2F000
heap
page read and write
3374000
unkown
page read and write
67AE000
stack
page read and write
32A0000
heap
page read and write
41FB000
heap
page read and write
5E41000
heap
page read and write
24700000
heap
page read and write
2470E000
heap
page read and write
11C0000
heap
page read and write
2470B000
heap
page read and write
30DF000
heap
page read and write
332F000
stack
page read and write
3210000
heap
page read and write
C60000
trusted library allocation
page execute and read and write
1EEB0F0A000
trusted library allocation
page read and write
5E19000
heap
page read and write
4046000
unkown
page readonly
7FF4A8018000
trusted library allocation
page readonly
30D0000
heap
page read and write
2740000
trusted library allocation
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
1EEC9126000
heap
page read and write
D40000
heap
page read and write
30EF000
heap
page read and write
7FFD9BA66000
trusted library allocation
page read and write
1EECD52A000
heap
page read and write
1EECD8B0000
heap
page read and write
3374000
unkown
page read and write
B3A000
heap
page read and write
4C00000
trusted library allocation
page execute and read and write
1120000
heap
page read and write
30EF000
heap
page read and write
2FF8000
unkown
page read and write
5D20000
direct allocation
page read and write
1EECD420000
heap
page read and write
41B0000
heap
page read and write
6CEDD000
unkown
page read and write
B44000
heap
page read and write
595E000
direct allocation
page read and write
A72217B000
stack
page read and write
24772000
heap
page read and write
5E67000
heap
page read and write
419000
unkown
page write copy
2B91000
trusted library allocation
page read and write
5D89000
heap
page read and write
7FF4A801F000
trusted library allocation
page execute read
87E000
unkown
page readonly
2998000
trusted library allocation
page read and write
5E36000
heap
page read and write
2D44000
heap
page read and write
5E41000
heap
page read and write
7FF4A8002000
trusted library allocation
page readonly
1E671000
heap
page read and write
E1E000
heap
page read and write
3374000
unkown
page read and write
5E36000
heap
page read and write
2470C000
heap
page read and write
2990000
trusted library allocation
page read and write
A720FCB000
stack
page read and write
5DA0000
heap
page read and write
4889000
trusted library allocation
page read and write
246E8000
heap
page read and write
7FFD9B59C000
trusted library allocation
page execute and read and write
2690000
trusted library allocation
page read and write
1EEB09E0000
heap
page execute and read and write
5B9F000
stack
page read and write
1E49D000
stack
page read and write
246E9000
heap
page read and write
A7225BD000
stack
page read and write
C00000
trusted library allocation
page read and write
1240000
heap
page read and write
6A00000
heap
page read and write
5E35000
heap
page read and write
7FF4A801E000
trusted library allocation
page readonly
3374000
unkown
page read and write
1EEC927B000
heap
page read and write
61E01000
direct allocation
page execute read
3374000
unkown
page read and write
1E5EE000
stack
page read and write
1EEAEE83000
trusted library allocation
page read and write
33F0000
heap
page read and write
246E0000
heap
page read and write
246F5000
heap
page read and write
3160A000
heap
page read and write
246E2000
heap
page read and write
5E36000
heap
page read and write
1EECD927000
heap
page read and write
5E36000
heap
page read and write
246D7000
heap
page read and write
333E000
unkown
page read and write
24700000
heap
page read and write
3FB0000
trusted library allocation
page read and write
1EEAED00000
heap
page read and write
B6D000
heap
page read and write
3163C000
stack
page read and write
1F0000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
1EECD4FF000
heap
page read and write
D39000
trusted library allocation
page read and write
D44000
heap
page read and write
3607000
trusted library allocation
page read and write
1EECD571000
heap
page read and write
B2C000
heap
page read and write
41A9000
heap
page read and write
2B60000
heap
page read and write
8FA000
trusted library allocation
page execute and read and write
D44000
heap
page read and write
24775000
heap
page read and write
C0B000
trusted library allocation
page read and write
24BD000
direct allocation
page read and write
3805000
unkown
page read and write
75E000
unkown
page write copy
54E8000
heap
page read and write
325E000
unkown
page read and write
246F0000
heap
page read and write
2480000
direct allocation
page read and write
11D0000
heap
page read and write
B37000
heap
page read and write
2FC0000
heap
page read and write
C03000
trusted library allocation
page execute and read and write
61EB7000
direct allocation
page readonly
AA0000
heap
page read and write
246E4000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
70C6000
heap
page read and write
32FA000
stack
page read and write
3374000
unkown
page read and write
2ACE000
stack
page read and write
1EECD8C6000
heap
page read and write
5E0E000
heap
page read and write
3374000
unkown
page read and write
30F5000
heap
page read and write
1EECD983000
heap
page read and write
7FF4A8020000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
419000
unkown
page write copy
5DB8000
heap
page read and write
3245000
heap
page read and write
2A83A000
heap
page read and write
400000
unkown
page readonly
26DC000
trusted library allocation
page read and write
D54000
heap
page read and write
8C0000
trusted library allocation
page read and write
3374000
unkown
page read and write
315EB000
stack
page read and write
5CE0000
heap
page read and write
271F000
trusted library allocation
page read and write
401000
unkown
page execute read
4B0F000
stack
page read and write
6C867000
unkown
page readonly
30E4000
heap
page read and write
1EEC9360000
trusted library section
page read and write
1EEC9770000
trusted library section
page read and write
61BF000
stack
page read and write
1EEB0990000
trusted library section
page read and write
6CEE7000
unkown
page readonly
30E2000
heap
page read and write
5EDE000
unkown
page read and write
246F0000
heap
page read and write
D54000
heap
page read and write
488D000
trusted library allocation
page read and write
1EEB0970000
trusted library section
page read and write
3200000
unkown
page readonly
5E2F000
heap
page read and write
246E3000
heap
page read and write
407A000
heap
page read and write
C59000
unkown
page write copy
32A4000
unkown
page read and write
1EEC9163000
heap
page read and write
52DF000
heap
page read and write
610000
heap
page read and write
3EE1000
heap
page read and write
30DE000
heap
page read and write
3374000
unkown
page read and write
3380000
heap
page read and write
3D82000
heap
page read and write
10E0000
heap
page read and write
3906000
heap
page read and write
24700000
heap
page read and write
2601000
trusted library allocation
page read and write
8D4000
trusted library allocation
page read and write
BFE000
stack
page read and write
3374000
unkown
page read and write
5E1F000
heap
page read and write
1575000
heap
page read and write
5E1B000
heap
page read and write
30D5000
heap
page read and write
920000
unkown
page readonly
7FFD9B850000
trusted library allocation
page read and write
5E13000
heap
page read and write
3374000
unkown
page read and write
D5C000
stack
page read and write
246F0000
heap
page read and write
7FFD9B8C7000
trusted library allocation
page read and write
6C7D1000
unkown
page execute read
813000
unkown
page readonly
1EECD8B5000
heap
page read and write
5E66000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
246ED000
heap
page read and write
5D70000
heap
page read and write
5B81000
unkown
page read and write
1EEC9136000
heap
page read and write
4A56000
trusted library allocation
page read and write
B21000
heap
page read and write
24700000
heap
page read and write
B5F000
heap
page read and write
2470E000
heap
page read and write
1EECD9CE000
heap
page read and write
5E30000
heap
page read and write
3374000
unkown
page read and write
1EEC9184000
heap
page read and write
5E36000
heap
page read and write
5E0E000
heap
page read and write
B6B000
heap
page read and write
C5A000
unkown
page read and write
1EEAEBE0000
heap
page read and write
CEE000
stack
page read and write
1EEC9156000
heap
page read and write
5E66000
heap
page read and write
1EEC9F50000
trusted library section
page read and write
5E0C000
heap
page read and write
960000
heap
page read and write
140E000
stack
page read and write
24C1000
trusted library allocation
page read and write
7FFD9B54D000
trusted library allocation
page execute and read and write
1EEC9C90000
trusted library section
page read and write
B39000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1EEC90E4000
heap
page read and write
42CE000
stack
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
1EEAEF80000
heap
page read and write
4134000
heap
page execute and read and write
97000
stack
page read and write
4F0E000
stack
page read and write
32A4000
unkown
page read and write
CCF000
stack
page read and write
A7219FE000
stack
page read and write
5ED0000
heap
page read and write
5E36000
heap
page read and write
A41000
unkown
page execute read
60BE000
stack
page read and write
D54000
heap
page read and write
2A760000
heap
page read and write
CDC000
unkown
page readonly
30D7000
heap
page read and write
3374000
unkown
page read and write
1EEB0940000
trusted library section
page read and write
51EE000
stack
page read and write
CEB000
unkown
page write copy
9B000
stack
page read and write
2560000
direct allocation
page read and write
5DAE000
heap
page read and write
5E25000
heap
page read and write
5DC4000
heap
page read and write
B57000
heap
page read and write
72E000
stack
page read and write
3374000
unkown
page read and write
246D7000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
5F1E000
stack
page read and write
30DD000
heap
page read and write
B65000
heap
page read and write
24E4000
direct allocation
page read and write
3374000
unkown
page read and write
2FF0000
unkown
page readonly
5D81000
heap
page read and write
2484000
direct allocation
page read and write
A2C000
heap
page read and write
BEC000
unkown
page readonly
1EEC929E000
heap
page read and write
38D0000
heap
page read and write
DA4000
heap
page read and write
3374000
unkown
page read and write
1EEC912E000
heap
page read and write
B24000
heap
page read and write
41F000
unkown
page write copy
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B8D8000
trusted library allocation
page read and write
1EEC9660000
trusted library section
page read and write
5E12000
heap
page read and write
4170000
heap
page read and write
907000
trusted library allocation
page execute and read and write
965000
heap
page read and write
412E000
heap
page read and write
C10000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
319F000
heap
page read and write
29A0000
heap
page read and write
129D000
heap
page read and write
9F0000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
A7226BE000
stack
page read and write
30D8000
heap
page read and write
1EEAC69B000
unkown
page readonly
6C750000
unkown
page readonly
C50000
unkown
page write copy
3374000
unkown
page read and write
7FFD9B70B000
trusted library allocation
page read and write
1EECD953000
heap
page read and write
11F5000
heap
page read and write
6BB7D000
unkown
page readonly
D7C000
heap
page read and write
B51000
heap
page read and write
1E0AF000
stack
page read and write
C50000
unkown
page read and write
1EECD8C1000
heap
page read and write
2FE0000
direct allocation
page read and write
2B63000
heap
page read and write
5E35000
heap
page read and write
249F000
direct allocation
page read and write
412000
unkown
page readonly
6020000
unkown
page read and write
3207A000
heap
page read and write
5E13000
heap
page read and write
2FE0000
unkown
page readonly
61ED0000
direct allocation
page read and write
4CCE000
stack
page read and write
1299000
heap
page read and write
40DE000
stack
page read and write
A7215FE000
stack
page read and write
D44000
heap
page read and write
A722AB8000
stack
page read and write
40F0000
heap
page read and write
69EC000
stack
page read and write
1EEC0AD0000
trusted library allocation
page read and write
5E36000
heap
page read and write
DDE000
stack
page read and write
1EECDA38000
heap
page read and write
1EEC93F0000
trusted library allocation
page read and write
1EEB0D4B000
trusted library allocation
page read and write
2576000
direct allocation
page read and write
2AAE000
stack
page read and write
4A54000
trusted library allocation
page read and write
2AA52000
heap
page read and write
4C30000
heap
page read and write
1EEB0980000
trusted library section
page read and write
2D5D000
stack
page read and write
6C8B4000
unkown
page read and write
5CDE000
stack
page read and write
24700000
heap
page read and write
269A000
trusted library allocation
page read and write
3374000
unkown
page read and write
1EEC9123000
heap
page read and write
506F000
stack
page read and write
1EECDD34000
trusted library allocation
page read and write
2662000
trusted library allocation
page read and write
7FFD9B626000
trusted library allocation
page execute and read and write
1EECD4CD000
heap
page read and write
7FFD9B660000
trusted library allocation
page execute and read and write
1EEC915B000
heap
page read and write
C63000
unkown
page readonly
783000
unkown
page readonly
549000
unkown
page execute and read and write
1EEC89F0000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
1EEB09B0000
trusted library section
page read and write
2593000
direct allocation
page read and write
D00000
trusted library allocation
page read and write
3715000
unkown
page read and write
26C4000
trusted library allocation
page read and write
5E45000
heap
page read and write
2B80000
heap
page execute and read and write
774000
unkown
page read and write
24DB000
direct allocation
page read and write
6C9AE000
unkown
page read and write
24D5000
trusted library allocation
page read and write
1EEC93E0000
trusted library allocation
page read and write
59C9000
direct allocation
page read and write
1EECD96A000
heap
page read and write
605E000
stack
page read and write
2470E000
heap
page read and write
6C8AD000
unkown
page read and write
5E12000
heap
page read and write
1E20F000
stack
page read and write
246E9000
heap
page read and write
5E30000
heap
page read and write
BBE000
stack
page read and write
1EEC9870000
trusted library section
page read and write
2DA0000
heap
page read and write
24701000
heap
page read and write
902000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
30B40000
heap
page read and write
7FFD9B828000
trusted library allocation
page read and write
24785000
heap
page read and write
3601000
trusted library allocation
page read and write
7FFD9B553000
trusted library allocation
page read and write
B6F000
heap
page read and write
CF0000
heap
page read and write
30F9000
heap
page read and write
3374000
unkown
page read and write
2720000
heap
page read and write
1EEC918A000
heap
page read and write
1EEAEB10000
unkown
page readonly
369E000
unkown
page read and write
4070000
heap
page read and write
7FFD9B8A6000
trusted library allocation
page read and write
70AB000
heap
page read and write
53C5000
heap
page read and write
32A4000
unkown
page read and write
5DBC000
heap
page read and write
2657000
trusted library allocation
page read and write
3E22000
heap
page read and write
5DC4000
heap
page read and write
3EE0000
heap
page read and write
7FF4A8012000
trusted library allocation
page readonly
D44000
heap
page read and write
1EEC9C60000
heap
page execute and read and write
111F000
stack
page read and write
1EECDD52000
trusted library allocation
page read and write
246EC000
heap
page read and write
5A3E000
direct allocation
page read and write
5E1C000
heap
page read and write
3374000
unkown
page read and write
5E08000
heap
page read and write
2509000
direct allocation
page read and write
2568000
direct allocation
page read and write
C63000
unkown
page readonly
1EECD5F2000
heap
page read and write
1EEC9C50000
trusted library allocation
page read and write
246F0000
heap
page read and write
30DF000
heap
page read and write
D50000
heap
page read and write
5D5B000
unkown
page read and write
3800000
unkown
page read and write
2C6E000
stack
page read and write
1EEC9400000
heap
page read and write
CEE000
unkown
page readonly
57C0000
direct allocation
page read and write
2FAA000
stack
page read and write
51EE000
stack
page read and write
B34000
heap
page read and write
1EEAEEB0000
heap
page read and write
8F8000
stack
page read and write
2470C000
heap
page read and write
3460000
heap
page read and write
2486000
direct allocation
page read and write
B62000
heap
page read and write
6BB01000
unkown
page execute read
C20000
trusted library allocation
page read and write
6CED9000
unkown
page write copy
B3E000
stack
page read and write
2470E000
heap
page read and write
41B5000
heap
page read and write
7FFD9B74D000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
4360000
unkown
page read and write
2723000
heap
page read and write
1EEC9254000
heap
page execute and read and write
2511000
direct allocation
page read and write
7FF4A8015000
trusted library allocation
page execute read
1DB000
stack
page read and write
246E9000
heap
page read and write
5B81000
unkown
page read and write
61ECD000
direct allocation
page readonly
D3B000
trusted library allocation
page read and write
30A0000
heap
page read and write
30E8000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
246F0000
heap
page read and write
6A15000
heap
page read and write
3374000
unkown
page read and write
C59000
unkown
page write copy
5E1C000
heap
page read and write
B1B000
heap
page read and write
5D60000
heap
page read and write
32A4000
unkown
page read and write
C10000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
30ABC000
stack
page read and write
5E2C000
heap
page read and write
1EEAEE50000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
5E12000
heap
page read and write
A41000
unkown
page execute read
3E22000
heap
page read and write
6E70000
heap
page read and write
1EECD466000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
2552000
direct allocation
page read and write
761000
unkown
page read and write
CFE000
stack
page read and write
5E2F000
heap
page read and write
41E4000
heap
page read and write
401000
unkown
page execute read
C50000
unkown
page write copy
1EEC9C30000
trusted library allocation
page read and write
2A834000
heap
page read and write
7FF4A801C000
trusted library allocation
page readonly
636000
unkown
page execute and read and write
A20000
heap
page read and write
5E66000
heap
page read and write
329E000
unkown
page read and write
46EF000
stack
page read and write
4404000
heap
page read and write
5E22000
heap
page read and write
5E9E000
stack
page read and write
2D48000
heap
page read and write
5E0C000
heap
page read and write
5E13000
heap
page read and write
D44000
heap
page read and write
BB6000
heap
page read and write
2DB0000
heap
page read and write
325E000
heap
page read and write
5E66000
heap
page read and write
5E23000
heap
page read and write
A41000
unkown
page execute read
AB0000
direct allocation
page execute and read and write
7FF4A8014000
trusted library allocation
page readonly
5E48000
heap
page read and write
A40000
unkown
page readonly
1EECDA75000
heap
page read and write
112A000
heap
page read and write
66FE000
stack
page read and write
B83000
heap
page read and write
61E00000
direct allocation
page execute and read and write
30ED000
heap
page read and write
1DFAF000
stack
page read and write
5E66000
heap
page read and write
30E7000
heap
page read and write
77B000
unkown
page write copy
C3B000
trusted library allocation
page execute and read and write
5E2F000
heap
page read and write
5E43000
heap
page read and write
418B000
heap
page read and write
9E2000
heap
page read and write
D54000
heap
page read and write
B80000
heap
page read and write
2535000
direct allocation
page read and write
3E20000
heap
page read and write
24700000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
A721AFB000
stack
page read and write
2A780000
heap
page read and write
1EEC918C000
heap
page read and write
247D000
direct allocation
page read and write
30D9000
heap
page read and write
4120000
heap
page read and write
5E67000
heap
page read and write
1EEAB260000
unkown
page readonly
4A60000
trusted library allocation
page read and write
1E25E000
stack
page read and write
246DB000
heap
page read and write
246F0000
heap
page read and write
5E43000
heap
page read and write
246EB000
heap
page read and write
2ED5000
unkown
page read and write
59CD000
direct allocation
page read and write
252E000
direct allocation
page read and write
980000
heap
page read and write
413D000
heap
page read and write
58E9000
direct allocation
page read and write
257D000
direct allocation
page read and write
730000
heap
page read and write
940000
heap
page read and write
BEC000
unkown
page readonly
B11000
heap
page read and write
5E2F000
heap
page read and write
B31000
heap
page read and write
3374000
unkown
page read and write
1EECD925000
heap
page read and write
563E000
trusted library allocation
page read and write
246FB000
heap
page read and write
B91000
heap
page read and write
5E28000
heap
page read and write
2470E000
heap
page read and write
75E000
unkown
page read and write
5E73000
heap
page read and write
3390000
unkown
page read and write
46FE000
stack
page read and write
1EEAED30000
heap
page read and write
19D000
stack
page read and write
5E5E000
stack
page read and write
322E000
stack
page read and write
5E41000
heap
page read and write
5B80000
unkown
page read and write
5E0C000
heap
page read and write
E1B000
heap
page read and write
3833000
heap
page read and write
B8F000
heap
page read and write
7FFD9B6F2000
trusted library allocation
page read and write
246F4000
heap
page read and write
2D00000
heap
page read and write
1EECDAEE000
heap
page read and write
3700000
unkown
page read and write
2646000
heap
page read and write
5E22000
heap
page read and write
1EEC9C40000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
1EEAED6F000
heap
page read and write
251F000
direct allocation
page read and write
4044000
unkown
page read and write
1E4EE000
stack
page read and write
A40000
unkown
page readonly
C70000
unkown
page readonly
5D1F000
stack
page read and write
A7E000
stack
page read and write
6470000
heap
page read and write
7FFD9B55D000
trusted library allocation
page execute and read and write
65FC000
stack
page read and write
3374000
unkown
page read and write
5E66000
heap
page read and write
246F4000
heap
page read and write
52EF000
stack
page read and write
A40000
unkown
page readonly
3374000
unkown
page read and write
2640000
heap
page read and write
1EECD95F000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
5E36000
heap
page read and write
3374000
unkown
page read and write
3ACB000
heap
page read and write
7FF4A8016000
trusted library allocation
page readonly
5E22000
heap
page read and write
6CD81000
unkown
page execute read
7FFD9B543000
trusted library allocation
page execute and read and write
5E33000
heap
page read and write
3731000
heap
page read and write
6E60000
heap
page read and write
5E32000
heap
page read and write
C70000
unkown
page readonly
258C000
direct allocation
page read and write
2502000
direct allocation
page read and write
4023000
unkown
page readonly
1E660000
heap
page read and write
30EB000
heap
page read and write
1EEC9272000
heap
page read and write
1EEC90B0000
heap
page read and write
32A4000
unkown
page read and write
1EEC9CC0000
trusted library allocation
page read and write
5C8C000
unkown
page read and write
1E10E000
stack
page read and write
4040000
heap
page read and write
10FB000
stack
page read and write
5D9D000
heap
page read and write
25A8000
direct allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1EECDA84000
heap
page read and write
4A0E000
stack
page read and write
A721CF1000
stack
page read and write
A72173F000
stack
page read and write
A721DF4000
stack
page read and write
7FFD9B740000
trusted library allocation
page read and write
246E8000
heap
page read and write
246E6000
heap
page read and write
C48000
trusted library allocation
page read and write
5E66000
heap
page read and write
447000
unkown
page execute and read and write
24A6000
trusted library allocation
page read and write
DC0000
heap
page read and write
B15000
heap
page read and write
30A80000
trusted library allocation
page read and write
950000
trusted library allocation
page execute and read and write
30EF000
heap
page read and write
5E68000
heap
page read and write
C14000
trusted library allocation
page read and write
3374000
unkown
page read and write
3374000
unkown
page read and write
5E41000
heap
page read and write
C50000
heap
page read and write
7FF4A8001000
trusted library allocation
page execute read
5E22000
heap
page read and write
2A812000
heap
page read and write
7FF4A8011000
trusted library allocation
page execute read
36EF000
unkown
page read and write
265F000
trusted library allocation
page read and write
1EECD5AE000
heap
page read and write
D54000
heap
page read and write
24700000
heap
page read and write
2AB6000
trusted library allocation
page read and write
2DB3000
heap
page read and write
A7216FA000
stack
page read and write
7FFD9B5F6000
trusted library allocation
page read and write
8B0000
heap
page read and write
1EEC0A2C000
trusted library allocation
page read and write
C50000
unkown
page read and write
1EEC9CD0000
trusted library allocation
page read and write
5E73000
heap
page read and write
589E000
stack
page read and write
30E7000
heap
page read and write
5C50000
unkown
page read and write
2526000
direct allocation
page read and write
2470000
direct allocation
page read and write
A7221BF000
stack
page read and write
6C9B5000
unkown
page readonly
C63000
unkown
page readonly
DE0000
heap
page read and write
1EECD92D000
heap
page read and write
90B000
trusted library allocation
page execute and read and write
417000
unkown
page execute read
7FFD9B6E2000
trusted library allocation
page read and write
7FFD9B560000
trusted library allocation
page read and write
599E000
stack
page read and write
7FFD9B720000
trusted library allocation
page read and write
DB0000
heap
page read and write
1EEC9199000
heap
page read and write
BEC000
unkown
page readonly
1EEB09C0000
heap
page read and write
DC0000
heap
page read and write
3374000
unkown
page read and write
7FFD9B550000
trusted library allocation
page read and write
1E39E000
stack
page read and write
3E27000
heap
page read and write
8FE000
stack
page read and write
40BE000
heap
page read and write
5402000
heap
page read and write
B22000
heap
page read and write
25FC000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
40F7000
heap
page read and write
4178000
heap
page read and write
1EECD9B7000
heap
page read and write
5E2F000
heap
page read and write
1EEAB262000
unkown
page readonly
1EEC9250000
heap
page execute and read and write
46F8000
unkown
page read and write
1EECDBC0000
heap
page read and write
D44000
heap
page read and write
4A5A000
trusted library allocation
page read and write
2AA54000
heap
page read and write
1EEC9CA0000
trusted library section
page read and write
11F0000
heap
page read and write
5EB000
stack
page read and write
D50000
heap
page read and write
5D3E000
stack
page read and write
5E24000
heap
page read and write
2A809000
heap
page read and write
B88000
heap
page read and write
C04000
trusted library allocation
page read and write
BC0000
heap
page read and write
259A000
direct allocation
page read and write
1EEC9BC0000
trusted library allocation
page read and write
1EEAEF73000
heap
page read and write
1EECD48E000
heap
page read and write
1EECD612000
heap
page read and write
3EE1000
heap
page read and write
1EEAED56000
heap
page read and write
1EECD92B000
heap
page read and write
1EEC0AD3000
trusted library allocation
page read and write
1EECD5BD000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
6C7D0000
unkown
page readonly
1EECD46F000
heap
page read and write
193000
stack
page read and write
6C9AF000
unkown
page write copy
1EECD431000
heap
page read and write
4527000
heap
page read and write
B15000
heap
page read and write
5E13000
heap
page read and write
43CF000
stack
page read and write
1EEB073E000
heap
page read and write
1EEAECC0000
heap
page read and write
30EC000
heap
page read and write
36F0000
unkown
page read and write
30F2000
heap
page read and write
B5C000
heap
page read and write
1EECDBEE000
heap
page read and write
B11000
heap
page read and write
24A4000
trusted library allocation
page read and write
24CD000
direct allocation
page read and write
1EEC9150000
heap
page read and write
6BB00000
unkown
page readonly
5E73000
heap
page read and write
407E000
heap
page read and write
246E8000
heap
page read and write
3FE5000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
32A4000
unkown
page read and write
19B000
stack
page read and write
1EEC928F000
heap
page read and write
3173C000
stack
page read and write
246E3000
heap
page read and write
1EEC97D0000
trusted library section
page readonly
7FFD9B5F0000
trusted library allocation
page read and write
1EEC9C20000
trusted library allocation
page read and write
5E67000
heap
page read and write
1E35D000
stack
page read and write
50AE000
stack
page read and write
A3E000
stack
page read and write
1EEC91AA000
heap
page read and write
4190000
heap
page read and write
5E36000
heap
page read and write
4151000
heap
page read and write
1EEAEF70000
heap
page read and write
68EC000
stack
page read and write
2470E000
heap
page read and write
7FF4A801D000
trusted library allocation
page execute read
1EEC9BD0000
trusted library allocation
page read and write
40EC000
heap
page read and write
1EEB0840000
heap
page read and write
2AF0000
heap
page read and write
1EEC09F1000
trusted library allocation
page read and write
5C1E000
stack
page read and write
7FF4A8017000
trusted library allocation
page execute read
5E29000
heap
page read and write
1EECD456000
heap
page read and write
254B000
direct allocation
page read and write
2AA5A000
heap
page read and write
420A000
heap
page read and write
A722036000
stack
page read and write
30C0000
heap
page read and write
6BB8E000
unkown
page read and write
1EECD50D000
heap
page read and write
1E770000
heap
page read and write
D0B000
trusted library allocation
page read and write
30DE000
heap
page read and write
7FFD9B564000
trusted library allocation
page read and write
1EEAED6C000
heap
page read and write
2544000
direct allocation
page read and write
5CEB000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
5E36000
heap
page read and write
37DF000
unkown
page read and write
4591000
unkown
page read and write
542E000
stack
page read and write
412000
unkown
page readonly
1EECD9E1000
heap
page read and write
5E2F000
heap
page read and write
960000
heap
page execute and read and write
4ADD000
stack
page read and write
246E6000
heap
page read and write
5DB2000
heap
page read and write
7FFD9B56B000
trusted library allocation
page execute and read and write
48FE000
trusted library allocation
page read and write
A40000
unkown
page readonly
5E66000
heap
page read and write
4F8000
stack
page read and write
D58000
heap
page read and write
3731000
heap
page read and write
5E08000
heap
page read and write
5E22000
heap
page read and write
2B3E000
stack
page read and write
D1A000
stack
page read and write
7FF4A8013000
trusted library allocation
page execute read
270E000
stack
page read and write
5E66000
heap
page read and write
5ECF000
stack
page read and write
5E36000
heap
page read and write
5E1A000
heap
page read and write
30EF000
heap
page read and write
9B9000
heap
page read and write
11D0000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
3374000
unkown
page read and write
7A6000
heap
page read and write
58A0000
direct allocation
page read and write
265A000
trusted library allocation
page read and write
246ED000
heap
page read and write
B4F000
heap
page read and write
1EEAEF50000
trusted library allocation
page read and write
246D6000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
A72207F000
stack
page read and write
24701000
heap
page read and write
1EEABC9B000
unkown
page readonly
5E14000
heap
page read and write
C39000
trusted library allocation
page read and write
101E000
stack
page read and write
2ACE000
trusted library allocation
page read and write
2F5F000
stack
page read and write
7FFD9B7A5000
trusted library allocation
page read and write
26C0000
heap
page read and write
30E5000
heap
page read and write
A722BBE000
stack
page read and write
5E08000
heap
page read and write
1EECD8D5000
heap
page read and write
2A99F000
stack
page read and write
2A81F000
heap
page read and write
615E000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
36AD000
stack
page read and write
5E1E000
heap
page read and write
5D8F000
heap
page read and write
1EEB09A0000
trusted library section
page read and write
1EECD943000
heap
page read and write
61EB4000
direct allocation
page read and write
249C000
direct allocation
page read and write
400000
unkown
page readonly
1560000
heap
page read and write
1EECD8B2000
heap
page read and write
C5C000
unkown
page read and write
246F0000
heap
page read and write
24700000
heap
page read and write
4A65000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
4D40000
heap
page execute and read and write
1EECD906000
heap
page read and write
3374000
unkown
page read and write
A721EF9000
stack
page read and write
246E5000
heap
page read and write
D9A000
heap
page read and write
7FF4A8019000
trusted library allocation
page execute read
5E0C000
heap
page read and write
8D3000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
1E670000
heap
page read and write
5E19000
heap
page read and write
5E1C000
heap
page read and write
5E66000
heap
page read and write
2EAC000
stack
page read and write
1EECD970000
heap
page read and write
D54000
heap
page read and write
1EECD9E9000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
5C51000
unkown
page read and write
5E36000
heap
page read and write
5C51000
unkown
page read and write
A7227BD000
stack
page read and write
5DC4000
heap
page read and write
3820000
heap
page read and write
1EECD44D000
heap
page read and write
414E000
trusted library allocation
page read and write
1EECD9F0000
heap
page read and write
5E1E000
heap
page read and write
41C000
unkown
page execute read
1E671000
heap
page read and write
3374000
unkown
page read and write
3C5F000
heap
page read and write
5E36000
heap
page read and write
5F9E000
stack
page read and write
CDC000
unkown
page readonly
271B000
trusted library allocation
page read and write
311A000
unkown
page read and write
6BB92000
unkown
page readonly
24C4000
direct allocation
page read and write
5E68000
heap
page read and write
1EEAEEB5000
heap
page read and write
D48000
heap
page read and write
C71000
unkown
page execute read
2A7E2000
heap
page read and write
37D0000
heap
page read and write
5D76000
heap
page read and write
2A80F000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
BB0000
heap
page read and write
5E0C000
heap
page read and write
1EEB0DAC000
trusted library allocation
page read and write
5E12000
heap
page read and write
5E24000
heap
page read and write
D44000
heap
page read and write
5DA7000
heap
page read and write
B26000
heap
page read and write
246E8000
heap
page read and write
5E66000
heap
page read and write
3087000
unkown
page read and write
1EECF930000
trusted library allocation
page read and write
247D7000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
5E66000
heap
page read and write
41E9000
heap
page read and write
253C000
direct allocation
page read and write
7FFD9B7C4000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
1EECD473000
heap
page read and write
6C8B7000
unkown
page readonly
5E41000
heap
page read and write
61ECC000
direct allocation
page read and write
AD8000
heap
page read and write
988000
heap
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
2470E000
heap
page read and write
C40000
trusted library allocation
page read and write
709F000
stack
page read and write
1EECDB74000
heap
page read and write
30DA000
heap
page read and write
5E19000
heap
page read and write
30D0000
heap
page read and write
40F5000
heap
page read and write
30E2000
heap
page read and write
C5C000
unkown
page read and write
2518000
direct allocation
page read and write
1EECD95A000
heap
page read and write
5E66000
heap
page read and write
5DBE000
stack
page read and write
7FFD9B818000
trusted library allocation
page read and write
4A6C000
trusted library allocation
page read and write
B94000
heap
page read and write
3374000
unkown
page read and write
7FFD9B764000
trusted library allocation
page read and write
5D80000
heap
page read and write
5E11000
heap
page read and write
24B5000
direct allocation
page read and write
7FFD9B7D7000
trusted library allocation
page read and write
5E41000
heap
page read and write
5E28000
heap
page read and write
76F000
unkown
page read and write
5BDE000
stack
page read and write
1EEB0D47000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
5DC5000
heap
page read and write
2470E000
heap
page read and write
7FFD9B732000
trusted library allocation
page read and write
1E770000
trusted library allocation
page read and write
2F90000
unkown
page readonly
246E9000
heap
page read and write
246F0000
heap
page read and write
7FFD9B600000
trusted library allocation
page execute and read and write
D44000
heap
page read and write
A41000
unkown
page execute read
3B95000
trusted library allocation
page read and write
D40000
heap
page read and write
32A4000
unkown
page read and write
401000
unkown
page execute read
C30000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
4085000
heap
page execute and read and write
1EEC0A0C000
trusted library allocation
page read and write
30EF000
heap
page read and write
191000
stack
page read and write
365D000
unkown
page read and write
3374000
unkown
page read and write
1EECD961000
heap
page read and write
3374000
unkown
page read and write
6C96F000
unkown
page readonly
6C9B0000
unkown
page read and write
A7218FD000
stack
page read and write
1EEC9260000
heap
page read and write
5E1F000
heap
page read and write
2FD0000
unkown
page read and write
C63000
unkown
page readonly
3374000
unkown
page read and write
4046000
unkown
page readonly
24AC000
trusted library allocation
page read and write
24AE000
direct allocation
page read and write
2A816000
heap
page read and write
5E36000
heap
page read and write
5C8F000
unkown
page read and write
A721BFB000
stack
page read and write
112E000
heap
page read and write
1EEB0D58000
trusted library allocation
page read and write
51AE000
stack
page read and write
61F0000
heap
page read and write
778000
unkown
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
30D5000
heap
page read and write
3374000
unkown
page read and write
446E000
unkown
page read and write
103E000
stack
page read and write
5E36000
heap
page read and write
2681000
trusted library allocation
page read and write
7A0000
heap
page read and write
7FFD9B8CF000
trusted library allocation
page read and write
30D2000
heap
page read and write
C3B000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
1EEC90D9000
heap
page read and write
2AF0000
trusted library allocation
page read and write
32A4000
unkown
page read and write
D8B000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
5B70000
direct allocation
page execute and read and write
7FFD9B714000
trusted library allocation
page read and write
1EECD486000
heap
page read and write
43EF000
stack
page read and write
5E22000
heap
page read and write
1EEAECE0000
heap
page read and write
5E29000
heap
page read and write
46B0000
unkown
page read and write
6CD80000
unkown
page readonly
5DC0000
heap
page read and write
900000
heap
page read and write
5E6D000
heap
page read and write
5E2C000
heap
page read and write
3374000
unkown
page read and write
5E19000
heap
page read and write
2EC4000
heap
page read and write
4270000
heap
page read and write
6F9E000
stack
page read and write
2F5C000
stack
page read and write
8F7000
trusted library allocation
page execute and read and write
35EF000
unkown
page read and write
970000
heap
page read and write
3374000
unkown
page read and write
76A000
unkown
page read and write
11D8000
heap
page read and write
4760000
trusted library allocation
page read and write
30C7000
heap
page read and write
1EEC91A3000
heap
page read and write
1EEC9181000
heap
page read and write
6CEE4000
unkown
page read and write
2FB0000
unkown
page readonly
32A4000
unkown
page read and write
246D6000
heap
page read and write
3370000
heap
page read and write
1EECDAB9000
heap
page read and write
246E3000
heap
page read and write
5E12000
heap
page read and write
400000
unkown
page readonly
B61000
heap
page read and write
6C8A9000
unkown
page write copy
4ECE000
stack
page read and write
320A2000
heap
page read and write
AD0000
heap
page read and write
1EEC919F000
heap
page read and write
BEC000
unkown
page readonly
269E000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1EEC9710000
trusted library section
page read and write
3230000
heap
page read and write
CEE000
unkown
page readonly
3162000
unkown
page read and write
247B000
direct allocation
page read and write
4A70000
trusted library allocation
page read and write
246E9000
heap
page read and write
26AE000
stack
page read and write
1EEB0D2C000
trusted library allocation
page read and write
2EC8000
heap
page read and write
31600000
heap
page read and write
9B000
stack
page read and write
2AD1000
trusted library allocation
page read and write
1EEAEF85000
heap
page read and write
408E000
stack
page read and write
5E0F000
heap
page read and write
1EEAD09B000
unkown
page readonly
246D5000
heap
page read and write
5E36000
heap
page read and write
9FE000
heap
page read and write
246D7000
heap
page read and write
25FE000
stack
page read and write
B7D000
stack
page read and write
25A1000
direct allocation
page read and write
1EEAEE80000
trusted library allocation
page read and write
98B000
stack
page read and write
D30000
trusted library allocation
page read and write
2ABC000
trusted library allocation
page read and write
282F000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
2AA4C000
heap
page read and write
5DAC000
heap
page read and write
5DC1000
heap
page read and write
461E000
unkown
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
5E70000
heap
page read and write
766000
unkown
page read and write
5E36000
heap
page read and write
624000
unkown
page execute and read and write
30F0000
heap
page read and write
33D0000
direct allocation
page read and write
1EEAED95000
heap
page read and write
3374000
unkown
page read and write
1EECDA7D000
heap
page read and write
1EEC9187000
heap
page read and write
68AF000
stack
page read and write
2AA5A000
heap
page read and write
5D56000
unkown
page read and write
7FFD9B756000
trusted library allocation
page read and write
5E1A000
heap
page read and write
2B50000
heap
page read and write
400000
unkown
page execute and read and write
30F1000
heap
page read and write
1EEAEE70000
trusted library allocation
page read and write
7FFD9B86C000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
3374000
unkown
page read and write
34B8000
heap
page read and write
41EE000
heap
page read and write
7FFD9B544000
trusted library allocation
page read and write
120C000
heap
page read and write
256F000
direct allocation
page read and write
2493000
direct allocation
page read and write
2D30000
heap
page read and write
5D7E000
stack
page read and write
32020000
heap
page read and write
3B91000
trusted library allocation
page read and write
5E41000
heap
page read and write
D6C000
heap
page read and write
7FFD9B540000
trusted library allocation
page read and write
2470B000
heap
page read and write
D54000
heap
page read and write
B18000
heap
page read and write
B7B000
heap
page read and write
3374000
unkown
page read and write
1EECD947000
heap
page read and write
B0E000
heap
page read and write
3989000
heap
page read and write
3EE1000
heap
page read and write
1EEC0AEC000
trusted library allocation
page read and write
CEB000
unkown
page read and write
5E36000
heap
page read and write
5E08000
heap
page read and write
24D4000
direct allocation
page read and write
3374000
unkown
page read and write
246F3000
heap
page read and write
1EEC8A20000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
41F000
unkown
page write copy
5E1E000
stack
page read and write
2AE5000
trusted library allocation
page read and write
2A89E000
stack
page read and write
246F0000
heap
page read and write
4021000
unkown
page read and write
9E8000
heap
page read and write
F3F000
stack
page read and write
C5A000
unkown
page read and write
13CE000
stack
page read and write
5DDD000
unkown
page read and write
24E0000
trusted library allocation
page read and write
10FA000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
5E1C000
heap
page read and write
373E000
heap
page read and write
A7224BD000
stack
page read and write
24772000
heap
page read and write
1EECD90E000
heap
page read and write
24C8000
direct allocation
page read and write
5CC0000
heap
page read and write
D54000
heap
page read and write
33FC000
heap
page read and write
30E2000
heap
page read and write
1EEC92AB000
heap
page read and write
5A9E000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1EEB09F1000
trusted library allocation
page read and write
C70000
heap
page read and write
3731000
heap
page read and write
B65000
heap
page read and write
4060000
heap
page read and write
B4D000
heap
page read and write
246D6000
heap
page read and write
5E1C000
heap
page read and write
38ED000
heap
page read and write
D20000
trusted library allocation
page read and write
6C751000
unkown
page execute read
1EEAB260000
unkown
page readonly
1EEADA9B000
unkown
page readonly
3374000
unkown
page read and write
7FFD9B5FC000
trusted library allocation
page execute and read and write
3710000
unkown
page read and write
601F000
stack
page read and write
8DD000
trusted library allocation
page execute and read and write
24BE000
trusted library allocation
page read and write
5E10000
heap
page read and write
40F7000
heap
page read and write
267A000
trusted library allocation
page read and write
7FFD9B7DE000
trusted library allocation
page read and write
7FFD9B70E000
trusted library allocation
page read and write
24EC000
direct allocation
page read and write
D54000
heap
page read and write
1EEB0D39000
trusted library allocation
page read and write
5E29000
heap
page read and write
65BE000
stack
page read and write
5E69000
heap
page read and write
3374000
unkown
page read and write
2E5F000
stack
page read and write
532E000
stack
page read and write
24F0000
heap
page read and write
298E000
stack
page read and write
58ED000
direct allocation
page read and write
5E12000
heap
page read and write
5E0E000
heap
page read and write
3374000
unkown
page read and write
31B19000
heap
page read and write
30E2000
heap
page read and write
1EECD937000
heap
page read and write
1EEC9106000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FF4A8000000
trusted library allocation
page readonly
346B000
heap
page read and write
5E36000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
D44000
heap
page read and write
4D0D000
stack
page read and write
26A2000
trusted library allocation
page read and write
1EECDBF0000
heap
page read and write
B17000
heap
page read and write
7FFD9B7D3000
trusted library allocation
page read and write
5E36000
heap
page read and write
2FA0000
unkown
page readonly
3374000
unkown
page read and write
246F0000
heap
page read and write
61ED3000
direct allocation
page read and write
4B10000
unkown
page read and write
5DCB000
heap
page read and write
1EECDA7A000
heap
page read and write
41F5000
heap
page read and write
2EC0000
heap
page read and write
64BE000
stack
page read and write
6CE97000
unkown
page readonly
2D40000
heap
page read and write
2470B000
heap
page read and write
30ED000
heap
page read and write
2559000
direct allocation
page read and write
4023000
unkown
page readonly
36D0000
heap
page read and write
C50000
trusted library allocation
page read and write
77F000
stack
page read and write
930000
heap
page read and write
24A6000
direct allocation
page read and write
5E71000
heap
page read and write
There are 1331 hidden memdumps, click here to show them.