IOC Report
wxfSIz4PAi.exe

loading gif

Files

File Path
Type
Category
Malicious
wxfSIz4PAi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\EGIJKEHCAK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\jwjqeqx
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5ek.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5ek.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5ek.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5ek.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5ek.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\xtfky
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CGIDAAAKJJDBGCBFCBGI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CGIDAAAKJJDBGCBFCBGIIDHCFB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DGDBKFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DTBZGIOOSO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FHJKKECFIECAKECAFBGCAFHDHJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JEHJKJEB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JEHJKJEBGHJJKEBGIECAAFIJKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\KATAXZVCPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KKFBAAFCGIEGDHIEBFII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5ek.0.exe_c4793a923f4cc69111ceaae60d9b71f164f7b3b_12fb6202_d8346ab6-0040-491c-9bf0-091b4131b0b0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_wxfSIz4PAi.exe_5fbbe57adbe1229748d63767aa0a8f3a9b9562_4968f6c2_682abc5b-c1b4-400f-bf41-7d2b0fc4f781\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5482.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 21:09:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER554E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER556E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0B9.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 21:09:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE212.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE271.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NHPKIZUUSG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NHPKIZUUSG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\QNCYCDFIJJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZBEDCJPBEY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZBEDCJPBEY.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZSSZYEFYMU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
modified
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\qubdaohh.xyw
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\b8e17ab5
data
dropped
C:\Users\user\AppData\Local\Temp\d197510f
data
dropped
C:\Users\user\AppData\Local\Temp\egegedwacimf
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Fri Apr 26 20:09:08 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD3E6.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\u5ek.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5ek.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u5ek.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 54 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wxfSIz4PAi.exe
"C:\Users\user\Desktop\wxfSIz4PAi.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5ek.0.exe
"C:\Users\user\AppData\Local\Temp\u5ek.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5ek.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5ek.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u5ek.3.exe
"C:\Users\user\AppData\Local\Temp\u5ek.3.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\EGIJKEHCAK.exe"
malicious
C:\Users\user\AppData\Local\Temp\EGIJKEHCAK.exe
"C:\Users\user\AppData\Local\Temp\EGIJKEHCAK.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5ek.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5ek.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7004 -s 1564
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 2220
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllA
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.203/tiktok.exe6=
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllE
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllo
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://www.symauth.com/rpa00
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php(;T
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpad32c124f7c2674f26e5e63942ecbrelease05bfdde8fa3fa3eef0df8c
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
http://185.172.128.228/ping.php?substr=two
185.172.128.228
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllY
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpO
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/microsoft/ApplicationInsights-dotnet/issues/2560
unknown
http://www.vmware.com/0/
unknown
https://pastebin.com/raw/z9pYkqPQ
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
iolo0.b-cdn.net
195.181.163.193
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
TypesSupported
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
ProgramId
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
FileId
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
LowerCaseLongPath
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
LongPathHash
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
Name
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
OriginalFileName
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
Publisher
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
Version
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
BinFileVersion
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
BinaryType
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
ProductName
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
ProductVersion
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
LinkDate
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
BinProductVersion
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
AppxPackageFullName
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
AppxPackageRelativeId
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
Size
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
Language
\REGISTRY\A\{40f95574-e8cf-9da8-67c8-12fafdf57aef}\Root\InventoryApplicationFile\wxfsiz4pai.exe|77d856a84575e7d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
ProgramId
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
FileId
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
LowerCaseLongPath
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
LongPathHash
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
Name
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
OriginalFileName
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
Publisher
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
Version
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
BinFileVersion
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
BinaryType
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
ProductName
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
ProductVersion
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
LinkDate
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
BinProductVersion
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
AppxPackageFullName
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
AppxPackageRelativeId
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
Size
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
Language
\REGISTRY\A\{ece34c48-a5f3-0a30-5809-da26cf2fbebb}\Root\InventoryApplicationFile\u5ek.0.exe|89791c26d612c8db
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000F041A6F0D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 71 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2727CB30000
trusted library section
page read and write
malicious
27279CEB000
unkown
page readonly
malicious
40A0000
direct allocation
page execute and read and write
malicious
27276AEB000
unkown
page readonly
malicious
4B12000
trusted library allocation
page read and write
malicious
57C5000
trusted library allocation
page read and write
malicious
5140000
direct allocation
page read and write
malicious
2727CC40000
trusted library section
page read and write
malicious
1402000
unkown
page readonly
malicious
2681000
heap
page read and write
malicious
42EA000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
6250000
direct allocation
page read and write
malicious
5B60000
direct allocation
page read and write
malicious
3DD3000
heap
page read and write
malicious
272100C3000
trusted library allocation
page read and write
malicious
19C0000
heap
page read and write
4201000
trusted library allocation
page read and write
2727CEA0000
trusted library section
page read and write
245D9000
heap
page read and write
27210064000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
B8F000
heap
page read and write
245A6000
heap
page read and write
93E000
stack
page read and write
BC6000
heap
page read and write
612E000
stack
page read and write
2727D48B000
heap
page read and write
261D000
direct allocation
page read and write
5E28000
heap
page read and write
BFC000
heap
page read and write
3060000
heap
page read and write
27200353000
trusted library allocation
page read and write
415E000
heap
page read and write
2727D3EC000
heap
page read and write
A96000
heap
page read and write
5E57000
heap
page read and write
2727EBF7000
heap
page read and write
2374000
unkown
page read and write
5E0D000
heap
page read and write
B13000
heap
page read and write
5D90000
heap
page read and write
3484000
unkown
page read and write
6A50000
trusted library allocation
page read and write
1E630000
trusted library allocation
page read and write
26AB000
direct allocation
page read and write
76F000
unkown
page read and write
2721C623000
heap
page read and write
5E5C000
heap
page read and write
5E57000
heap
page read and write
35A1000
trusted library allocation
page read and write
3110000
heap
page read and write
5E03000
heap
page read and write
2727ECAB000
heap
page read and write
2727F064000
trusted library allocation
page read and write
813000
unkown
page readonly
5E17000
heap
page read and write
1425000
heap
page read and write
3410000
trusted library allocation
page read and write
382F000
unkown
page read and write
26D0000
heap
page read and write
5DFD000
heap
page read and write
5E35000
heap
page read and write
3484000
unkown
page read and write
5E57000
heap
page read and write
24A3000
heap
page read and write
25D0000
direct allocation
page read and write
245D9000
heap
page read and write
1F0000
heap
page read and write
2727C010000
heap
page read and write
7FFD9B640000
trusted library allocation
page execute and read and write
42D4000
heap
page execute and read and write
7FFD9B584000
trusted library allocation
page read and write
2727EC8C000
heap
page read and write
B5B000
heap
page read and write
6A10000
heap
page read and write
B80000
heap
page read and write
193000
stack
page read and write
61E00000
direct allocation
page execute and read and write
5E0E000
heap
page read and write
4AC9000
trusted library allocation
page read and write
30A0000
heap
page read and write
6CCC7000
unkown
page readonly
400000
unkown
page readonly
B70000
heap
page read and write
2727EC5C000
heap
page read and write
2C7D000
stack
page read and write
2FA2000
heap
page read and write
3461000
trusted library allocation
page read and write
774000
heap
page read and write
6A23000
heap
page read and write
3152F000
heap
page read and write
30C1000
heap
page read and write
401000
unkown
page execute read
3439000
trusted library allocation
page read and write
1E531000
heap
page read and write
36BE000
trusted library allocation
page read and write
19B000
stack
page read and write
420000
unkown
page write copy
33D6000
trusted library allocation
page read and write
5E5C000
heap
page read and write
7630000
trusted library section
page read and write
7FFD9B74B000
trusted library allocation
page read and write
9F1BBF1000
stack
page read and write
1E3AE000
stack
page read and write
1772000
heap
page read and write
61EB7000
direct allocation
page readonly
2727C9F1000
heap
page read and write
BF6000
heap
page read and write
34AA000
trusted library allocation
page read and write
9F1CCFE000
stack
page read and write
26DD000
direct allocation
page read and write
245B6000
heap
page read and write
580D000
trusted library allocation
page read and write
69DC000
stack
page read and write
14E2000
heap
page read and write
76A000
unkown
page read and write
5E57000
heap
page read and write
2727EBE2000
heap
page read and write
5E12000
heap
page read and write
40EA000
heap
page read and write
245B8000
heap
page read and write
5815000
trusted library allocation
page read and write
5E22000
heap
page read and write
2727BFB0000
trusted library allocation
page read and write
2727A630000
heap
page read and write
2727D5A0000
trusted library allocation
page read and write
3484000
unkown
page read and write
2374000
unkown
page read and write
1044000
heap
page read and write
16C2000
trusted library allocation
page read and write
5CCE000
stack
page read and write
75E000
unkown
page read and write
5B40000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
3121000
heap
page read and write
9F1B9FB000
stack
page read and write
25FC000
direct allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
5E35000
heap
page read and write
3679000
heap
page read and write
7670000
trusted library allocation
page read and write
BD8000
heap
page read and write
5E35000
heap
page read and write
7FF49E4C2000
trusted library allocation
page readonly
57F4000
trusted library allocation
page read and write
245CD000
heap
page read and write
32A3000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
393000
unkown
page readonly
1428000
heap
page read and write
5E5F000
heap
page read and write
7FFD9B7F4000
trusted library allocation
page read and write
7FFD9B63C000
trusted library allocation
page execute and read and write
4040000
heap
page read and write
7FFD9B730000
trusted library allocation
page read and write
AC0000
direct allocation
page execute and read and write
740000
heap
page read and write
5BF6000
heap
page read and write
59E0000
heap
page read and write
246A0000
heap
page read and write
476F000
heap
page read and write
7600000
trusted library allocation
page read and write
31C000
unkown
page readonly
59B0000
trusted library allocation
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
5CCE000
stack
page read and write
2A916000
heap
page read and write
2727C9AC000
heap
page read and write
245A6000
heap
page read and write
30B5000
heap
page read and write
2606000
direct allocation
page read and write
245DA000
heap
page read and write
5DB2000
heap
page read and write
2727CA7A000
heap
page read and write
BD6000
heap
page read and write
3484000
unkown
page read and write
69E0000
trusted library allocation
page execute and read and write
2727C920000
heap
page execute and read and write
5850000
trusted library allocation
page read and write
2727F082000
trusted library allocation
page read and write
30BB000
heap
page read and write
5E24000
heap
page read and write
432A000
heap
page read and write
5E22000
heap
page read and write
363F000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5E57000
heap
page read and write
3484000
unkown
page read and write
3182C000
stack
page read and write
245DC000
heap
page read and write
4207000
trusted library allocation
page read and write
7FF49E4D5000
trusted library allocation
page execute read
5828000
trusted library allocation
page read and write
245D2000
heap
page read and write
5E5C000
heap
page read and write
5E58000
heap
page read and write
4FF0000
unkown
page read and write
65EC000
stack
page read and write
1950000
heap
page read and write
7FF49E4C3000
trusted library allocation
page execute read
245A6000
heap
page read and write
2FA7000
heap
page read and write
6D2E000
stack
page read and write
3394000
trusted library allocation
page read and write
2727A360000
unkown
page readonly
5DE2000
heap
page read and write
5E09000
heap
page read and write
2A75E000
stack
page read and write
417000
unkown
page execute read
3561000
heap
page read and write
6BBFE000
unkown
page read and write
115D000
heap
page read and write
2721C614000
heap
page read and write
19D000
stack
page read and write
1560000
heap
page read and write
B92000
heap
page read and write
1E22F000
stack
page read and write
135F000
stack
page read and write
75E000
unkown
page write copy
5DA5000
heap
page read and write
5BCE000
stack
page read and write
245B8000
heap
page read and write
43A4000
heap
page read and write
2634000
direct allocation
page read and write
2360000
unkown
page readonly
9F1C6FE000
stack
page read and write
245CD000
heap
page read and write
6820000
trusted library allocation
page read and write
2727EE3F000
heap
page read and write
26EC000
direct allocation
page read and write
5E5E000
heap
page read and write
5E35000
heap
page read and write
33A9000
trusted library allocation
page read and write
245B8000
heap
page read and write
263B000
direct allocation
page read and write
5E25000
heap
page read and write
2727CA08000
heap
page read and write
196E000
stack
page read and write
5E10000
heap
page read and write
389000
unkown
page write copy
7BE000
stack
page read and write
71F2000
heap
page read and write
BA5000
heap
page read and write
2727D544000
heap
page read and write
5E35000
heap
page read and write
5E12000
heap
page read and write
3484000
unkown
page read and write
272788EB000
unkown
page readonly
3484000
unkown
page read and write
48C7000
unkown
page read and write
5E57000
heap
page read and write
BBF000
heap
page read and write
7FFD9B722000
trusted library allocation
page read and write
2727C750000
trusted library section
page read and write
6C8F7000
unkown
page readonly
539D000
stack
page read and write
16F0000
trusted library allocation
page execute and read and write
2721C658000
heap
page read and write
2374000
unkown
page read and write
191000
stack
page read and write
64AE000
stack
page read and write
3060000
heap
page read and write
2BA0000
unkown
page read and write
622F000
stack
page read and write
5E1A000
heap
page read and write
683F000
trusted library allocation
page read and write
34EC000
trusted library allocation
page read and write
2727EC0D000
heap
page read and write
8B0000
heap
page read and write
3557000
trusted library allocation
page read and write
B68000
heap
page read and write
5E21000
heap
page read and write
2390000
unkown
page readonly
5CC000
stack
page read and write
5DA1000
heap
page read and write
774000
heap
page read and write
BE9000
heap
page read and write
400000
unkown
page execute and read and write
171000
unkown
page execute read
3310000
unkown
page readonly
2727CA42000
heap
page read and write
1020000
heap
page read and write
636000
unkown
page execute and read and write
2727C99B000
heap
page read and write
30B2000
heap
page read and write
4383000
heap
page read and write
1E530000
heap
page read and write
30BF000
heap
page read and write
5BF0000
heap
page read and write
2686000
direct allocation
page read and write
1450000
heap
page read and write
2727D3A0000
heap
page read and write
9B000
stack
page read and write
7FFD9B89B000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
B97000
heap
page read and write
32FE000
trusted library allocation
page read and write
413000
unkown
page readonly
7FFD9B666000
trusted library allocation
page execute and read and write
9F1ADAE000
stack
page read and write
6B4B000
heap
page read and write
2727ECAD000
heap
page read and write
3484000
unkown
page read and write
314EA000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
BB9000
heap
page read and write
679E000
stack
page read and write
5856000
trusted library allocation
page read and write
155E000
stack
page read and write
5DFB000
heap
page read and write
141B000
heap
page read and write
5200000
trusted library allocation
page read and write
7FF49E4DC000
trusted library allocation
page readonly
260E000
direct allocation
page read and write
5E35000
heap
page read and write
1E36D000
stack
page read and write
31FE000
stack
page read and write
774000
unkown
page read and write
5E0D000
heap
page read and write
408E000
stack
page read and write
4395000
heap
page read and write
11A8000
stack
page read and write
5E0A000
heap
page read and write
2370000
heap
page read and write
1738000
heap
page read and write
5E0A000
heap
page read and write
368D000
heap
page read and write
245A7000
heap
page read and write
8AA000
heap
page read and write
3486000
trusted library allocation
page read and write
1455000
heap
page read and write
5C7E000
stack
page read and write
170000
unkown
page readonly
2BA4000
unkown
page read and write
3484000
unkown
page read and write
26E4000
direct allocation
page read and write
75FD000
stack
page read and write
7FFD9B858000
trusted library allocation
page read and write
7FF49E4D2000
trusted library allocation
page readonly
3436000
trusted library allocation
page read and write
1D5000
heap
page read and write
70EE000
stack
page read and write
412E000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
5E02000
heap
page read and write
30A5000
heap
page read and write
8AE000
heap
page read and write
25DB000
direct allocation
page read and write
189C000
stack
page read and write
2727C7A0000
heap
page read and write
3484000
unkown
page read and write
3328000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
1700000
heap
page read and write
6C8F4000
unkown
page read and write
5890000
heap
page read and write
4347000
heap
page read and write
6829000
trusted library allocation
page read and write
5416000
heap
page read and write
6BBED000
unkown
page readonly
4168000
unkown
page read and write
5E10000
heap
page read and write
2A6A2000
heap
page read and write
2727EFAE000
heap
page read and write
6B30000
heap
page read and write
1930000
trusted library allocation
page read and write
5E1C000
heap
page read and write
41A000
unkown
page write copy
2727CE70000
trusted library section
page read and write
27210061000
trusted library allocation
page read and write
373F000
heap
page read and write
245AC000
heap
page read and write
3451000
trusted library allocation
page read and write
171000
unkown
page execute read
33E0000
trusted library allocation
page read and write
347E000
stack
page read and write
3120000
heap
page read and write
6E98000
heap
page read and write
3726000
trusted library allocation
page read and write
366D000
heap
page read and write
3330000
heap
page read and write
172B000
trusted library allocation
page read and write
30A8000
heap
page read and write
30B7000
heap
page read and write
3EDA000
unkown
page read and write
5D7E000
stack
page read and write
5E05000
heap
page read and write
5CC0000
unkown
page read and write
2727D535000
heap
page read and write
3227000
heap
page read and write
1E637000
heap
page read and write
272792EB000
unkown
page readonly
264C000
direct allocation
page read and write
2727EEE5000
heap
page read and write
55FD000
stack
page read and write
17BE000
heap
page read and write
25F3000
direct allocation
page read and write
2727ED08000
heap
page read and write
5875000
trusted library allocation
page read and write
87E000
unkown
page readonly
9F1B0EB000
stack
page read and write
33B4000
trusted library allocation
page read and write
30AA000
heap
page read and write
2A908000
heap
page read and write
6090000
unkown
page read and write
232C000
stack
page read and write
30C9000
heap
page read and write
5E35000
heap
page read and write
5E35000
heap
page read and write
25FF000
direct allocation
page read and write
167D000
stack
page read and write
57EC000
trusted library allocation
page read and write
2EE8000
heap
page read and write
245BD000
heap
page read and write
2A880000
heap
page read and write
7FFD9B593000
trusted library allocation
page read and write
B96000
heap
page read and write
5F8E000
stack
page read and write
6CD0D000
unkown
page read and write
152D000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
5E12000
heap
page read and write
BE0000
heap
page read and write
1730000
heap
page read and write
6822000
trusted library allocation
page read and write
2721B020000
trusted library allocation
page read and write
5D81000
heap
page read and write
1693000
trusted library allocation
page execute and read and write
27276AB2000
unkown
page readonly
5E35000
heap
page read and write
2727EBE0000
heap
page read and write
BDA000
heap
page read and write
2727EF28000
heap
page read and write
2727D579000
heap
page read and write
5DE2000
heap
page read and write
5B60000
direct allocation
page execute and read and write
5E27000
heap
page read and write
272103CA000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
25E4000
direct allocation
page read and write
3090000
heap
page read and write
2727A482000
heap
page read and write
2727CA30000
heap
page read and write
2727CF20000
trusted library section
page read and write
30AE000
heap
page read and write
272008DA000
trusted library allocation
page read and write
5E5B000
heap
page read and write
1E520000
heap
page read and write
3400000
trusted library allocation
page read and write
5E17000
heap
page read and write
30C5000
heap
page read and write
3F60000
unkown
page read and write
42CE000
heap
page read and write
1044000
heap
page read and write
720D000
heap
page read and write
245DC000
heap
page read and write
5E27000
heap
page read and write
2727CDC0000
trusted library section
page read and write
2727ECA1000
heap
page read and write
598D000
stack
page read and write
245B3000
heap
page read and write
5830000
trusted library allocation
page read and write
2727EE1A000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
3172C000
stack
page read and write
9F1B7FD000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
3143B000
stack
page read and write
2727D3F5000
heap
page read and write
1940000
trusted library allocation
page read and write
5E57000
heap
page read and write
B6D000
heap
page read and write
B74000
heap
page read and write
BC8000
heap
page read and write
5E5B000
heap
page read and write
2B90000
unkown
page read and write
960000
heap
page read and write
389000
unkown
page write copy
5E57000
heap
page read and write
245B8000
heap
page read and write
2721B060000
trusted library allocation
page read and write
2727EDD4000
heap
page read and write
5E28000
heap
page read and write
3484000
unkown
page read and write
7FFD9B980000
trusted library allocation
page read and write
2615000
direct allocation
page read and write
5801000
trusted library allocation
page read and write
3484000
unkown
page read and write
3484000
unkown
page read and write
7690000
trusted library allocation
page execute and read and write
2727EC4F000
heap
page read and write
71EF000
stack
page read and write
2624000
direct allocation
page read and write
3201000
trusted library allocation
page read and write
31564000
heap
page read and write
16B4000
trusted library allocation
page read and write
245C0000
heap
page read and write
BBC000
heap
page read and write
5E12000
heap
page read and write
5B30000
trusted library allocation
page execute and read and write
5E27000
heap
page read and write
5E23000
heap
page read and write
3484000
unkown
page read and write
5DC4000
heap
page read and write
34DC000
trusted library allocation
page read and write
6C7F1000
unkown
page execute read
5ADE000
stack
page read and write
2727C924000
heap
page execute and read and write
2727C8C0000
trusted library section
page read and write
33E4000
trusted library allocation
page read and write
5E13000
heap
page read and write
5E01000
heap
page read and write
4029000
heap
page read and write
73BE000
stack
page read and write
A90000
heap
page read and write
2727A625000
heap
page read and write
2727EC98000
heap
page read and write
33C0000
heap
page execute and read and write
5E17000
heap
page read and write
A60000
heap
page read and write
2727D53A000
heap
page read and write
7FF49E4D8000
trusted library allocation
page readonly
245C0000
heap
page read and write
2721B030000
trusted library allocation
page read and write
9F1C4FD000
stack
page read and write
737E000
stack
page read and write
2727C8F0000
heap
page read and write
5E01000
heap
page read and write
2727EF32000
heap
page read and write
E2F000
stack
page read and write
3405000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
3A2D000
trusted library allocation
page read and write
30AE000
heap
page read and write
3605000
trusted library allocation
page read and write
5E31000
heap
page read and write
AB0000
heap
page read and write
2EE4000
heap
page read and write
4048000
unkown
page readonly
2727ECD8000
heap
page read and write
3484000
unkown
page read and write
6B20000
trusted library allocation
page execute and read and write
2727D49A000
heap
page read and write
9F1B8FE000
stack
page read and write
5CD0000
heap
page read and write
5E57000
heap
page read and write
2727A4AA000
heap
page read and write
1585000
heap
page read and write
5DCE000
stack
page read and write
2721C61C000
heap
page read and write
7FF49E4D7000
trusted library allocation
page execute read
2FE0000
heap
page read and write
1710000
trusted library allocation
page execute and read and write
26FA000
direct allocation
page read and write
3678000
trusted library allocation
page read and write
2FCC000
stack
page read and write
35CE000
unkown
page read and write
25E0000
direct allocation
page read and write
3484000
unkown
page read and write
EA0000
heap
page read and write
5E59000
heap
page read and write
3405000
trusted library allocation
page read and write
30B2000
heap
page read and write
3484000
unkown
page read and write
B10000
heap
page read and write
5DA4000
unkown
page read and write
5E0D000
heap
page read and write
2727ECB2000
heap
page read and write
9F1C7FD000
stack
page read and write
7FFD9B740000
trusted library allocation
page read and write
7FFD9B802000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
65DE000
stack
page read and write
2374000
unkown
page read and write
58F0000
direct allocation
page read and write
3317000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
6CBB1000
unkown
page execute read
33EE000
trusted library allocation
page read and write
5E0E000
heap
page read and write
5E5C000
heap
page read and write
35D4000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
3C39000
heap
page read and write
25E6000
direct allocation
page read and write
4E90000
trusted library allocation
page read and write
3850000
unkown
page read and write
3484000
unkown
page read and write
2727CA64000
heap
page read and write
33B8000
trusted library allocation
page read and write
7FFD9B8F7000
trusted library allocation
page read and write
5E12000
heap
page read and write
5E57000
heap
page read and write
5DE2000
heap
page read and write
2B80000
unkown
page read and write
B30000
heap
page read and write
3002000
heap
page read and write
1560000
heap
page read and write
41B0000
unkown
page read and write
75D8000
heap
page read and write
1530000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
174E000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
5DAF000
heap
page read and write
25DD000
direct allocation
page read and write
57FE000
trusted library allocation
page read and write
5DAA000
unkown
page read and write
3484000
unkown
page read and write
2727D3E5000
heap
page read and write
1457000
heap
page read and write
27200001000
trusted library allocation
page read and write
36A3000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
5E09000
heap
page read and write
5DFD000
heap
page read and write
5D9E000
heap
page read and write
7FF49E4D3000
trusted library allocation
page execute read
35AD000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
2727C000000
trusted library allocation
page read and write
170000
unkown
page readonly
245CD000
heap
page read and write
2727A430000
heap
page read and write
27200266000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
16C5000
trusted library allocation
page execute and read and write
9F1C5FD000
stack
page read and write
2727BE60000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
5E09000
heap
page read and write
2727C7B0000
heap
page read and write
43A2000
heap
page read and write
5E57000
heap
page read and write
7FFD9B6A0000
trusted library allocation
page execute and read and write
42FD000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page read and write
5E27000
heap
page read and write
5E57000
heap
page read and write
27277EEB000
unkown
page readonly
27200239000
trusted library allocation
page read and write
2D20000
heap
page read and write
2A916000
heap
page read and write
2374000
unkown
page read and write
171000
unkown
page execute read
3446000
trusted library allocation
page read and write
400000
unkown
page readonly
3133C000
stack
page read and write
5E27000
heap
page read and write
400000
unkown
page readonly
6C791000
unkown
page execute read
1580000
heap
page read and write
5860000
trusted library allocation
page read and write
171000
unkown
page execute read
2A655000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
6838000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
2727C9FB000
heap
page read and write
5DFE000
heap
page read and write
245AD000
heap
page read and write
1ACF000
stack
page read and write
18F0000
heap
page read and write
630000
heap
page read and write
40F5000
heap
page execute and read and write
26F3000
direct allocation
page read and write
B83000
heap
page read and write
3484000
unkown
page read and write
3479000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
393000
unkown
page readonly
5DAE000
heap
page read and write
40D0000
heap
page read and write
5E5D000
heap
page read and write
1920000
trusted library allocation
page read and write
16A3000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
59C0000
heap
page execute and read and write
471F000
unkown
page read and write
197000
stack
page read and write
5E35000
heap
page read and write
59BB000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
3483000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
30AD000
heap
page read and write
76D000
unkown
page read and write
5DB0000
heap
page read and write
5E23000
heap
page read and write
31C000
unkown
page readonly
2727C790000
trusted library section
page read and write
3611000
trusted library allocation
page read and write
1700000
heap
page execute and read and write
5E12000
heap
page read and write
3484000
unkown
page read and write
5E17000
heap
page read and write
24A0000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
3614000
trusted library allocation
page read and write
30BF000
heap
page read and write
2FA0000
heap
page read and write
2727C020000
trusted library allocation
page read and write
30AF000
heap
page read and write
1044000
heap
page read and write
5E23000
heap
page read and write
5DAB000
heap
page read and write
2727EF6F000
heap
page read and write
6BAC000
heap
page read and write
16A0000
trusted library allocation
page read and write
341F000
stack
page read and write
314E0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
3855000
unkown
page read and write
27200362000
trusted library allocation
page read and write
1044000
heap
page read and write
2A7F000
unkown
page read and write
5539000
heap
page read and write
1044000
heap
page read and write
2E40000
heap
page read and write
5DE2000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page execute and read and write
192E000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
2880000
heap
page read and write
2EE0000
heap
page read and write
24640000
heap
page read and write
5820000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
6C8A7000
unkown
page readonly
65AE000
stack
page read and write
5E28000
heap
page read and write
6BC02000
unkown
page readonly
4D6D000
direct allocation
page read and write
2662000
direct allocation
page read and write
25F0000
heap
page read and write
2721007E000
trusted library allocation
page read and write
3484000
unkown
page read and write
3683000
trusted library allocation
page read and write
2A91E000
heap
page read and write
7FFD9B5A4000
trusted library allocation
page read and write
26B9000
direct allocation
page read and write
5DFD000
heap
page read and write
35B3000
trusted library allocation
page read and write
5CB0000
unkown
page read and write
169D000
trusted library allocation
page execute and read and write
9F1AD6F000
stack
page read and write
2695000
direct allocation
page read and write
5E35000
heap
page read and write
36CE000
trusted library allocation
page read and write
4326000
heap
page read and write
40EE000
heap
page read and write
3477000
trusted library allocation
page read and write
30A5000
heap
page read and write
369C000
trusted library allocation
page read and write
5E21000
heap
page read and write
761000
unkown
page read and write
1098000
heap
page read and write
5E0D000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
6B79000
heap
page read and write
2727ECCD000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
5DE2000
heap
page read and write
B5C000
heap
page read and write
7FFD9B78D000
trusted library allocation
page read and write
245DC000
heap
page read and write
32DF000
stack
page read and write
5E5C000
heap
page read and write
5E00000
heap
page read and write
28E0000
heap
page read and write
17B3000
heap
page read and write
23F0000
unkown
page read and write
2727D850000
heap
page execute and read and write
1694000
trusted library allocation
page read and write
3484000
unkown
page read and write
1044000
heap
page read and write
3300000
unkown
page readonly
6C9CF000
unkown
page write copy
2727C9CD000
heap
page read and write
4ACC000
stack
page read and write
B7E000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
72E000
unkown
page readonly
4FF1000
unkown
page read and write
5990000
trusted library allocation
page execute and read and write
B98000
heap
page read and write
393000
unkown
page readonly
7FFD9B820000
trusted library allocation
page execute and read and write
5E35000
heap
page read and write
EAE000
heap
page read and write
380000
unkown
page write copy
2C1E000
stack
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
4D69000
direct allocation
page read and write
245B4000
heap
page read and write
30BD000
heap
page read and write
245CD000
heap
page read and write
2E80000
heap
page read and write
BAD000
heap
page read and write
5E5C000
heap
page read and write
2BA4000
unkown
page read and write
38A000
unkown
page read and write
2A620000
heap
page read and write
BD2000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
2727A4AC000
heap
page read and write
2727D5B0000
trusted library allocation
page read and write
5D80000
heap
page read and write
BF0000
heap
page read and write
35C6000
trusted library allocation
page read and write
774000
heap
page read and write
2727C9A1000
heap
page read and write
6B0000
unkown
page readonly
BF1000
heap
page read and write
7FFD9B5DC000
trusted library allocation
page execute and read and write
13F8000
heap
page read and write
2727C9F3000
heap
page read and write
BDC000
heap
page read and write
3484000
unkown
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2727A480000
heap
page read and write
7FFD9B59D000
trusted library allocation
page execute and read and write
684F000
trusted library allocation
page read and write
1510000
heap
page read and write
6825000
trusted library allocation
page read and write
6C8ED000
unkown
page read and write
9F1B5FB000
stack
page read and write
4048000
unkown
page readonly
6C98F000
unkown
page readonly
171000
unkown
page execute read
6E80000
heap
page read and write
5E05000
heap
page read and write
3617000
trusted library allocation
page read and write
5E35000
heap
page read and write
2727A440000
heap
page read and write
1E4AD000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
5E31000
heap
page read and write
5812000
trusted library allocation
page read and write
30B8000
heap
page read and write
2727BE80000
trusted library allocation
page read and write
246E000
stack
page read and write
3460000
unkown
page read and write
3638000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
354F000
trusted library allocation
page read and write
2727EE54000
heap
page read and write
5806000
trusted library allocation
page read and write
34F4000
trusted library allocation
page read and write
5CA1000
unkown
page read and write
684A000
trusted library allocation
page read and write
2727D3F1000
heap
page read and write
30BF000
heap
page read and write
5E12000
heap
page read and write
66EE000
stack
page read and write
357F000
stack
page read and write
4024000
unkown
page readonly
7FFD9B7B0000
trusted library allocation
page read and write
B61000
heap
page read and write
5E12000
heap
page read and write
393000
unkown
page readonly
2A6F1000
heap
page read and write
5E5C000
heap
page read and write
3450000
heap
page read and write
2727C8D0000
trusted library section
page read and write
D2E000
stack
page read and write
3484000
unkown
page read and write
13F0000
heap
page read and write
6A70000
trusted library allocation
page execute and read and write
640000
heap
page read and write
14E0000
heap
page read and write
5E21000
heap
page read and write
2727D3CD000
heap
page read and write
245DC000
heap
page read and write
3630000
heap
page read and write
3FDE000
unkown
page read and write
4892000
heap
page read and write
5E1A000
heap
page read and write
3484000
unkown
page read and write
2A6A6000
heap
page read and write
B78000
heap
page read and write
3390000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
3484000
unkown
page read and write
4465000
trusted library allocation
page read and write
2727EFA8000
heap
page read and write
413000
unkown
page readonly
7E8000
heap
page read and write
9F1C2FB000
stack
page read and write
3484000
unkown
page read and write
2727C050000
trusted library allocation
page read and write
41B2000
heap
page read and write
5E09000
heap
page read and write
179E000
stack
page read and write
3484000
unkown
page read and write
5DFD000
heap
page read and write
6B81000
heap
page read and write
5DAD000
heap
page read and write
5E35000
heap
page read and write
5E23000
heap
page read and write
7FFD9BA96000
trusted library allocation
page read and write
5E35000
heap
page read and write
CBA000
stack
page read and write
71C000
unkown
page readonly
378A000
trusted library allocation
page read and write
5E01000
heap
page read and write
774000
heap
page read and write
31C000
unkown
page readonly
7FFD9B5A0000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
671E000
stack
page read and write
30B7000
heap
page read and write
5E0D000
heap
page read and write
69C0000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
5D3E000
stack
page read and write
33B0000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
6C8E9000
unkown
page write copy
5E57000
heap
page read and write
5E57000
heap
page read and write
2727C9F9000
heap
page read and write
33BA000
trusted library allocation
page read and write
10AB000
stack
page read and write
2727ECEB000
heap
page read and write
3470000
direct allocation
page read and write
608E000
stack
page read and write
2721B2F0000
trusted library allocation
page read and write
1090000
heap
page read and write
38C000
unkown
page read and write
624000
unkown
page execute and read and write
6BB70000
unkown
page readonly
380000
unkown
page read and write
5E5C000
heap
page read and write
2727C8E0000
trusted library section
page read and write
245D2000
heap
page read and write
6CBB0000
unkown
page readonly
2727CA68000
heap
page read and write
7650000
trusted library allocation
page execute and read and write
282E000
unkown
page read and write
7FFD9B754000
trusted library allocation
page read and write
2F60000
heap
page read and write
783000
unkown
page readonly
245B7000
heap
page read and write
1159000
heap
page read and write
3484000
unkown
page read and write
2A640000
heap
page read and write
2727ED22000
heap
page read and write
2727EF23000
heap
page read and write
4305000
trusted library allocation
page read and write
16DB000
trusted library allocation
page execute and read and write
2DF0000
heap
page read and write
361F000
trusted library allocation
page read and write
19AD000
stack
page read and write
41C000
unkown
page execute read
7FFD9BA80000
trusted library allocation
page read and write
3A9E000
trusted library allocation
page read and write
9F1BDFD000
stack
page read and write
24642000
heap
page read and write
5E35000
heap
page read and write
4FF1000
unkown
page read and write
2A910000
heap
page read and write
4080000
heap
page read and write
5E01000
heap
page read and write
2727A650000
heap
page read and write
5E18000
heap
page read and write
4045000
unkown
page read and write
401000
unkown
page execute read
2727ECE4000
heap
page read and write
5E26000
heap
page read and write
3491000
trusted library allocation
page read and write
3320000
unkown
page readonly
5E27000
heap
page read and write
3561000
heap
page read and write
774000
heap
page read and write
245BD000
heap
page read and write
2727C9B4000
heap
page read and write
108E000
stack
page read and write
7FFD9B580000
trusted library allocation
page read and write
11A000
stack
page read and write
7FFD9B583000
trusted library allocation
page execute and read and write
5EEE000
stack
page read and write
5A8E000
direct allocation
page read and write
33FA000
trusted library allocation
page read and write
2727A469000
heap
page read and write
2F90000
heap
page read and write
5E04000
heap
page read and write
7FFD9B957000
trusted library allocation
page read and write
2669000
direct allocation
page read and write
6AFE000
stack
page read and write
368E000
trusted library allocation
page read and write
5E35000
heap
page read and write
72B000
unkown
page read and write
B8B000
heap
page read and write
5B8F000
stack
page read and write
2610000
heap
page read and write
1044000
heap
page read and write
5E57000
heap
page read and write
245C0000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
2490000
heap
page read and write
380000
unkown
page write copy
5E57000
heap
page read and write
774000
heap
page read and write
2727D840000
trusted library section
page readonly
380000
unkown
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
2727D4A2000
heap
page read and write
16E0000
trusted library allocation
page read and write
1DFEF000
stack
page read and write
3778000
trusted library allocation
page read and write
2727D4F8000
heap
page read and write
5E0D000
heap
page read and write
5E4E000
unkown
page read and write
5A19000
direct allocation
page read and write
5DFD000
heap
page read and write
19B0000
trusted library allocation
page read and write
3338000
trusted library allocation
page read and write
3484000
unkown
page read and write
7FF49E4C0000
trusted library allocation
page readonly
7FFD9BAB0000
trusted library allocation
page read and write
FF370000
trusted library allocation
page execute and read and write
5E12000
heap
page read and write
16B2000
trusted library allocation
page read and write
5CA0000
unkown
page read and write
75F9000
heap
page read and write
2628000
direct allocation
page read and write
2727A830000
heap
page read and write
2FE2000
heap
page read and write
EAA000
heap
page read and write
38C000
unkown
page read and write
7FFD9B80C000
trusted library allocation
page read and write
2727CA29000
heap
page read and write
245BB000
heap
page read and write
2374000
unkown
page read and write
1044000
heap
page read and write
74BF000
stack
page read and write
2374000
unkown
page read and write
766000
unkown
page read and write
3900000
trusted library allocation
page read and write
26A4000
direct allocation
page read and write
245BD000
heap
page read and write
6C790000
unkown
page readonly
2727ECC3000
heap
page read and write
42AF000
stack
page read and write
3669000
trusted library allocation
page read and write
2B7C000
stack
page read and write
3484000
unkown
page read and write
2671000
direct allocation
page read and write
3560000
heap
page read and write
7FFD9B58D000
trusted library allocation
page execute and read and write
1044000
heap
page read and write
2727ECB0000
heap
page read and write
40D5000
heap
page read and write
5E05000
heap
page read and write
401000
unkown
page execute read
353E000
trusted library allocation
page read and write
2721BB20000
trusted library section
page read and write
2727EE06000
heap
page read and write
2727EC9C000
heap
page read and write
597E000
stack
page read and write
577C000
trusted library allocation
page read and write
965000
heap
page read and write
3097000
heap
page read and write
33A0000
trusted library allocation
page read and write
245CF000
heap
page read and write
5E35000
heap
page read and write
CD0000
heap
page read and write
17DE000
stack
page read and write
1720000
trusted library allocation
page read and write
3484000
unkown
page read and write
331E000
stack
page read and write
61ECC000
direct allocation
page read and write
5E59000
heap
page read and write
2F00000
heap
page read and write
16CB000
trusted library allocation
page execute and read and write
2727C930000
heap
page read and write
5DFB000
heap
page read and write
3D7D000
heap
page read and write
61E01000
direct allocation
page execute read
7FFD9B910000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
6B0000
unkown
page readonly
245CD000
heap
page read and write
375F000
trusted library allocation
page read and write
7FF49E4DF000
trusted library allocation
page execute read
7FFD9B590000
trusted library allocation
page read and write
2727C7B3000
heap
page read and write
1DEEF000
stack
page read and write
420000
unkown
page write copy
245D2000
heap
page read and write
5DBB000
heap
page read and write
5E0E000
heap
page read and write
16A4000
trusted library allocation
page read and write
74FC000
stack
page read and write
2A600000
heap
page read and write
6380000
heap
page read and write
2618000
heap
page read and write
6B1000
unkown
page execute read
30B2000
heap
page read and write
72B000
unkown
page write copy
26C8000
direct allocation
page read and write
2721B0B0000
trusted library allocation
page read and write
BD5000
heap
page read and write
9F1BCF4000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
2CFF000
stack
page read and write
170000
unkown
page readonly
367B000
trusted library allocation
page read and write
5E23000
heap
page read and write
6220000
heap
page read and write
447000
unkown
page execute and read and write
354C000
trusted library allocation
page read and write
4461000
trusted library allocation
page read and write
9F1C3FB000
stack
page read and write
9B000
stack
page read and write
3758000
heap
page read and write
2727A835000
heap
page read and write
2E00000
heap
page read and write
288C000
heap
page read and write
40DE000
stack
page read and write
5690000
heap
page read and write
262D000
direct allocation
page read and write
27276AB0000
unkown
page readonly
1044000
heap
page read and write
3076000
heap
page read and write
16D0000
trusted library allocation
page read and write
490F000
unkown
page read and write
5E5F000
heap
page read and write
32FA000
stack
page read and write
2CBE000
stack
page read and write
5E57000
heap
page read and write
376A000
trusted library allocation
page read and write
170000
unkown
page readonly
5E18000
heap
page read and write
16B0000
trusted library allocation
page read and write
23A0000
heap
page read and write
6C9D0000
unkown
page read and write
2FE2000
heap
page read and write
BD0000
heap
page read and write
2380000
unkown
page readonly
1D0000
heap
page read and write
439B000
heap
page read and write
5B60000
trusted library allocation
page execute and read and write
3484000
unkown
page read and write
43AF000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
5E57000
heap
page read and write
3F0000
heap
page read and write
2FA0000
heap
page read and write
B81000
heap
page read and write
77B000
unkown
page write copy
7FF49E4D6000
trusted library allocation
page readonly
350D000
trusted library allocation
page read and write
6B1000
unkown
page execute read
B38000
heap
page read and write
34FF000
trusted library allocation
page read and write
41A000
unkown
page write copy
30A7000
heap
page read and write
33F1000
trusted library allocation
page read and write
27276AB0000
unkown
page readonly
6845000
trusted library allocation
page read and write
5DCE000
stack
page read and write
33ED000
trusted library allocation
page read and write
358F000
unkown
page read and write
2E30000
heap
page read and write
73D000
stack
page read and write
2727CA19000
heap
page read and write
245B9000
heap
page read and write
2708000
direct allocation
page read and write
16C7000
trusted library allocation
page execute and read and write
30C0000
heap
page read and write
774000
heap
page read and write
42CA000
heap
page read and write
339E000
trusted library allocation
page read and write
A9C000
heap
page read and write
245A6000
heap
page read and write
27E0000
heap
page read and write
16B0000
trusted library allocation
page read and write
439F000
heap
page read and write
267F000
direct allocation
page read and write
7FF49E4D9000
trusted library allocation
page execute read
5E5D000
heap
page read and write
5A1D000
direct allocation
page read and write
59A4000
trusted library allocation
page read and write
7FFD9B630000
trusted library allocation
page read and write
5E57000
heap
page read and write
1680000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
18EB000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
770000
heap
page read and write
2701000
direct allocation
page read and write
32B9000
trusted library allocation
page read and write
5E0D000
heap
page read and write
2D23000
heap
page read and write
7FFD9B8D6000
trusted library allocation
page read and write
245B8000
heap
page read and write
5E17000
heap
page read and write
2727C780000
trusted library section
page read and write
BE2000
heap
page read and write
1E26E000
stack
page read and write
2FA2000
heap
page read and write
245B8000
heap
page read and write
1754000
heap
page read and write
269C000
direct allocation
page read and write
2727ECD2000
heap
page read and write
5B80000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
5E27000
heap
page read and write
34B2000
trusted library allocation
page read and write
6B7E000
heap
page read and write
7FFD9B74E000
trusted library allocation
page read and write
6C9D5000
unkown
page readonly
7FFD9B848000
trusted library allocation
page read and write
5E57000
heap
page read and write
6CD17000
unkown
page readonly
2727EBE6000
heap
page read and write
2727EF66000
heap
page read and write
1044000
heap
page read and write
72E000
unkown
page readonly
5DC7000
heap
page read and write
2A64F000
heap
page read and write
245DA000
heap
page read and write
57EF000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
7FFD9B636000
trusted library allocation
page read and write
BF5000
heap
page read and write
2A85F000
stack
page read and write
5E01000
heap
page read and write
5CA1000
unkown
page read and write
6CD14000
unkown
page read and write
5BD0000
direct allocation
page read and write
5E35000
heap
page read and write
5EA0000
heap
page read and write
2721B040000
trusted library allocation
page read and write
5CB8000
unkown
page read and write
9F1BEF9000
stack
page read and write
5D7F000
stack
page read and write
16AD000
trusted library allocation
page execute and read and write
3484000
unkown
page read and write
2727EE88000
heap
page read and write
7FFD9B732000
trusted library allocation
page read and write
245B6000
heap
page read and write
245A2000
heap
page read and write
3484000
unkown
page read and write
7FFD9B908000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
40D7000
heap
page read and write
3309000
trusted library allocation
page read and write
4C40000
direct allocation
page read and write
245B8000
heap
page read and write
2727EC78000
heap
page read and write
5E63000
heap
page read and write
9F1CBFE000
stack
page read and write
1949000
trusted library allocation
page read and write
30950000
trusted library allocation
page read and write
5E17000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
AAE000
stack
page read and write
4090000
heap
page read and write
5E35000
heap
page read and write
61EB4000
direct allocation
page read and write
4610000
unkown
page read and write
6D40000
trusted library allocation
page read and write
2727CA23000
heap
page read and write
30BD000
heap
page read and write
81B000
heap
page read and write
37CC000
heap
page read and write
5DEE000
stack
page read and write
7FF49E4DD000
trusted library allocation
page execute read
5E35000
heap
page read and write
69B0000
trusted library allocation
page execute and read and write
9F1ADEF000
stack
page read and write
5DFE000
heap
page read and write
5E21000
heap
page read and write
27210001000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
3484000
unkown
page read and write
245B3000
heap
page read and write
B6A000
heap
page read and write
2721BAF0000
trusted library section
page read and write
5E24000
heap
page read and write
2644000
direct allocation
page read and write
2720036F000
trusted library allocation
page read and write
5E35000
heap
page read and write
5E57000
heap
page read and write
38A000
unkown
page read and write
5E35000
heap
page read and write
3DB7000
unkown
page read and write
57E6000
trusted library allocation
page read and write
245B0000
heap
page read and write
2DBF000
stack
page read and write
245BD000
heap
page read and write
5E35000
heap
page read and write
6ABE000
stack
page read and write
5808000
trusted library allocation
page read and write
362A000
trusted library allocation
page read and write
3450000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
5E35000
heap
page read and write
1E0EF000
stack
page read and write
2374000
unkown
page read and write
5B50000
trusted library allocation
page execute and read and write
5E17000
heap
page read and write
2721B050000
trusted library allocation
page read and write
1799000
heap
page read and write
774000
heap
page read and write
3515000
trusted library allocation
page read and write
262B000
heap
page read and write
1040000
heap
page read and write
10CB000
heap
page read and write
26D6000
direct allocation
page read and write
66DC000
stack
page read and write
5E1B000
heap
page read and write
5DFC000
heap
page read and write
16BA000
trusted library allocation
page execute and read and write
5DCA000
heap
page read and write
2727C9F6000
heap
page read and write
245D2000
heap
page read and write
3323000
trusted library allocation
page read and write
5E5A000
heap
page read and write
3675000
trusted library allocation
page read and write
5C8F000
stack
page read and write
3484000
unkown
page read and write
7E0000
heap
page read and write
2374000
unkown
page read and write
2FE7000
heap
page read and write
9F1C0F6000
stack
page read and write
6FB000
stack
page read and write
B7D000
heap
page read and write
2727D3B1000
heap
page read and write
35DB000
trusted library allocation
page read and write
2B7F000
unkown
page read and write
9F1BAFB000
stack
page read and write
2678000
direct allocation
page read and write
5E31000
heap
page read and write
35B0000
trusted library allocation
page read and write
26C0000
direct allocation
page read and write
26FA000
stack
page read and write
27BD000
heap
page read and write
7FFD9B5AB000
trusted library allocation
page execute and read and write
27200373000
trusted library allocation
page read and write
2721C590000
heap
page read and write
40E0000
heap
page read and write
2721C5D7000
heap
page read and write
2727D410000
heap
page read and write
1030000
heap
page read and write
59A0000
trusted library allocation
page read and write
31C000
unkown
page readonly
2727D497000
heap
page read and write
2A643000
heap
page read and write
7FFD9B805000
trusted library allocation
page read and write
5DB5000
heap
page read and write
3484000
unkown
page read and write
2727D45A000
heap
page read and write
5E35000
heap
page read and write
33DE000
trusted library allocation
page read and write
BA7000
heap
page read and write
2727BE90000
heap
page execute and read and write
5E01000
heap
page read and write
272774EB000
unkown
page readonly
4842000
unkown
page read and write
57E4000
trusted library allocation
page read and write
3CB0000
unkown
page read and write
438D000
trusted library allocation
page read and write
2727EC49000
heap
page read and write
3784000
trusted library allocation
page read and write
2727ED91000
heap
page read and write
176E000
heap
page read and write
3549000
trusted library allocation
page read and write
314F0000
heap
page read and write
681D000
stack
page read and write
5E57000
heap
page read and write
245A8000
heap
page read and write
3F06000
heap
page read and write
5DBF000
heap
page read and write
6BB71000
unkown
page execute read
319FF000
heap
page read and write
5E31000
heap
page read and write
1900000
heap
page read and write
245BD000
heap
page read and write
2727D590000
heap
page read and write
363A000
heap
page read and write
9F1C1FA000
stack
page read and write
2727EE61000
heap
page read and write
245A0000
heap
page read and write
1400000
unkown
page readonly
2727C9D1000
heap
page read and write
6E70000
heap
page read and write
438E000
heap
page read and write
342A000
trusted library allocation
page read and write
6CD09000
unkown
page write copy
1566000
heap
page read and write
245D8000
heap
page read and write
2721001C000
trusted library allocation
page read and write
3370000
heap
page read and write
5D80000
heap
page read and write
5DA9000
heap
page read and write
61ECD000
direct allocation
page readonly
24640000
heap
page read and write
2727EE57000
heap
page read and write
2727CA0E000
heap
page read and write
308F000
heap
page read and write
778000
unkown
page read and write
30AF000
heap
page read and write
5870000
trusted library allocation
page read and write
2727A449000
heap
page read and write
1E531000
heap
page read and write
5853000
trusted library allocation
page read and write
BAE000
stack
page read and write
4024000
unkown
page readonly
71C000
unkown
page readonly
5E61000
heap
page read and write
5E57000
heap
page read and write
245DA000
heap
page read and write
171000
unkown
page execute read
336E000
stack
page read and write
9F1B4FE000
stack
page read and write
2727D3D6000
heap
page read and write
5E32000
heap
page read and write
2727BFB3000
trusted library allocation
page read and write
AFA000
stack
page read and write
5E59000
heap
page read and write
940000
heap
page read and write
2727D080000
trusted library section
page read and write
26B2000
direct allocation
page read and write
57F8000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
2721B000000
trusted library allocation
page read and write
2727A620000
heap
page read and write
344E000
unkown
page read and write
268E000
direct allocation
page read and write
5E23000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FF49E4DE000
trusted library allocation
page readonly
2727ECC0000
heap
page read and write
2A648000
heap
page read and write
97000
stack
page read and write
245D8000
heap
page read and write
5CA1000
unkown
page read and write
1E12E000
stack
page read and write
3484000
unkown
page read and write
2721B010000
trusted library allocation
page read and write
4022000
unkown
page read and write
4BCD000
stack
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
5E35000
heap
page read and write
DBB000
stack
page read and write
5E57000
heap
page read and write
2720038C000
trusted library allocation
page read and write
42C0000
heap
page read and write
27200454000
trusted library allocation
page read and write
7FF49E4D4000
trusted library allocation
page readonly
B9C000
heap
page read and write
12F8000
stack
page read and write
245A7000
heap
page read and write
3484000
unkown
page read and write
3480000
heap
page read and write
35BB000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
31DE000
stack
page read and write
7FFD9B8FF000
trusted library allocation
page read and write
30A9000
heap
page read and write
1690000
trusted library allocation
page read and write
3121000
heap
page read and write
14EB000
heap
page read and write
40D7000
heap
page read and write
57DE000
stack
page read and write
30B4000
heap
page read and write
9F1CAF8000
stack
page read and write
3484000
unkown
page read and write
3484000
unkown
page read and write
342C000
trusted library allocation
page read and write
549000
unkown
page execute and read and write
59BE000
stack
page read and write
7FF49E4D1000
trusted library allocation
page execute read
27D0000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
6C7F0000
unkown
page readonly
27200382000
trusted library allocation
page read and write
5E32000
heap
page read and write
5E32000
heap
page read and write
5E57000
heap
page read and write
5F4E000
unkown
page read and write
6C9CE000
unkown
page read and write
774000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
245CF000
heap
page read and write
5E32000
heap
page read and write
5DFB000
heap
page read and write
26CF000
direct allocation
page read and write
3A29000
trusted library allocation
page read and write
144E000
stack
page read and write
7FF49E4C1000
trusted library allocation
page execute read
5E35000
heap
page read and write
2721BB00000
trusted library section
page read and write
5E59000
heap
page read and write
5E35000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
30BC000
heap
page read and write
FDB000
stack
page read and write
1750000
heap
page read and write
2614000
heap
page read and write
2727CA1F000
heap
page read and write
BCA000
heap
page read and write
68DC000
stack
page read and write
5BD0000
heap
page read and write
7FF49E4E0000
trusted library allocation
page execute and read and write
9F1BFF7000
stack
page read and write
23EE000
unkown
page read and write
2727A670000
heap
page read and write
2727EC95000
heap
page read and write
2727EBE9000
heap
page read and write
33A1000
trusted library allocation
page read and write
43FE000
trusted library allocation
page read and write
245BD000
heap
page read and write
5E35000
heap
page read and write
2A65C000
heap
page read and write
774000
heap
page read and write
BB5000
heap
page read and write
8FE000
stack
page read and write
5E1E000
heap
page read and write
3570000
trusted library allocation
page read and write
3484000
unkown
page read and write
4DDE000
direct allocation
page read and write
3484000
unkown
page read and write
16B6000
trusted library allocation
page execute and read and write
689F000
stack
page read and write
5E09000
heap
page read and write
5E09000
heap
page read and write
4388000
heap
page read and write
2727BEA0000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
6D30000
trusted library allocation
page execute and read and write
146D000
heap
page read and write
There are 1529 hidden memdumps, click here to show them.