IOC Report
kO1P1YnLst.exe

loading gif

Files

File Path
Type
Category
Malicious
kO1P1YnLst.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IIDHJDGCGD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\khjsru
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\pasb
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5c4.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5c4.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5c4.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5c4.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5c4.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBAKEBGIIDAFIDHIIECFCFIEGH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EHDHDHIECGCAEBFIIDHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FCGIJDBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HIIEGHJJDGHCAKEBGIJKJEBAFC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HTAGVDFUIE.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IEHDBGDHDAECBGDHJKFIDGCBFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\KFBFCAFCBKFIEBFHIDBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJKKKJJJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_kO1P1YnLst.exe_4c824633669c49f0654a94edfc957b484331f1f_ed3814b0_b31a73a3-b069-4bc0-b171-85340e582538\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5c4.0.exe_6f888996e3cfc8e41cbd69f2aada922252844ac4_8bd4d979_f4cad45f-74cf-4b34-a79a-4811a67b30a4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA53C.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 22:47:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA608.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA647.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB761.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 22:46:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC34.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC64.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQRKHNBNYN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQRKHNBNYN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZBEDCJPBEY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
modified
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\l1vhufo0.vnq
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\63c3f20b
data
dropped
C:\Users\user\AppData\Local\Temp\7364db56
data
dropped
C:\Users\user\AppData\Local\Temp\agdgegmy
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Fri Apr 26 21:46:09 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE9B0.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmpFC21.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
modified
C:\Users\user\AppData\Local\Temp\u5c4.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5c4.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u5c4.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kO1P1YnLst.exe
"C:\Users\user\Desktop\kO1P1YnLst.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5c4.0.exe
"C:\Users\user\AppData\Local\Temp\u5c4.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5c4.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5c4.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u5c4.3.exe
"C:\Users\user\AppData\Local\Temp\u5c4.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5c4.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5c4.2\run.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\IIDHJDGCGD.exe"
malicious
C:\Users\user\AppData\Local\Temp\IIDHJDGCGD.exe
"C:\Users\user\AppData\Local\Temp\IIDHJDGCGD.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6916 -s 944
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 2256
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.215.85.66:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
91.215.85.66
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllL
unknown
https://pastebin.com/raw/z9pYkqPQPOdq8
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllZ
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpeb42eb8dbe78cdaae1ee01f89185a
unknown
https://duckduckgo.com/?q=
unknown
http://microsoft.co
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
https://support.iolo.com/support/solutions/articles/44
unknown
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://scripts.sil.4
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://185.172.128.228/ping.php?substr=eight
185.172.128.228
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
https://westus2-2.in.applicationinsights.azure.com0p5
unknown
http://185.172.128.203/tiktok.exek
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpW
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
http://91.215.85.66:9000
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
iolo0.b-cdn.net
169.150.236.100
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Governor
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Governor
TypesSupported
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
ProgramId
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
FileId
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
LowerCaseLongPath
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
LongPathHash
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
Name
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
OriginalFileName
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
Publisher
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
Version
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
BinFileVersion
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
BinaryType
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
ProductName
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
ProductVersion
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
LinkDate
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
BinProductVersion
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
AppxPackageFullName
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
AppxPackageRelativeId
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
Size
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
Language
\REGISTRY\A\{5ea62f91-4409-d7b5-7d3a-12b45d45086f}\Root\InventoryApplicationFile\ko1p1ynlst.exe|b4e24fd6af5d1950
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
ProgramId
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
FileId
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
LowerCaseLongPath
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
LongPathHash
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
Name
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
OriginalFileName
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
Publisher
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
Version
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
BinFileVersion
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
BinaryType
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
ProductName
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
ProductVersion
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
LinkDate
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
BinProductVersion
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
AppxPackageFullName
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
AppxPackageRelativeId
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
Size
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
Language
\REGISTRY\A\{f1aae023-511e-62ab-322b-619b9cd0a4cb}\Root\InventoryApplicationFile\u5c4.0.exe|7d9603fe8c2540bd
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000F043B6419
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 85 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
567B000
trusted library allocation
page read and write
malicious
37AE000
heap
page read and write
malicious
240F7AE0000
trusted library section
page read and write
malicious
4506000
heap
page read and write
malicious
4300000
direct allocation
page read and write
malicious
240F198B000
unkown
page readonly
malicious
400000
unkown
page execute and read and write
malicious
240F4B8B000
unkown
page readonly
malicious
57AF000
trusted library allocation
page read and write
malicious
436A000
heap
page read and write
malicious
42D0000
direct allocation
page execute and read and write
malicious
240F79A0000
trusted library section
page read and write
malicious
5DD0000
direct allocation
page read and write
malicious
6090000
direct allocation
page read and write
malicious
822000
unkown
page readonly
malicious
3A32000
heap
page read and write
6C60000
heap
page read and write
1E0DF000
stack
page read and write
19B000
stack
page read and write
240FDC00000
trusted library allocation
page read and write
6CC31000
unkown
page execute read
58DD000
direct allocation
page read and write
792D000
stack
page read and write
7FFD9B730000
trusted library allocation
page read and write
26A8000
heap
page read and write
4DAD000
stack
page read and write
3FC7000
trusted library allocation
page read and write
1304000
heap
page read and write
5D9E000
stack
page read and write
783000
unkown
page readonly
5E73000
heap
page read and write
240F828E000
heap
page read and write
2A7E2000
heap
page read and write
6230000
trusted library allocation
page execute and read and write
6C3E000
stack
page read and write
61ECC000
direct allocation
page read and write
EB3000
trusted library allocation
page execute and read and write
76D000
unkown
page read and write
240F5365000
heap
page read and write
2590000
direct allocation
page read and write
7D4000
heap
page read and write
7FFD9B602000
trusted library allocation
page read and write
B04000
trusted library allocation
page read and write
4171000
heap
page read and write
3284000
unkown
page read and write
F9BB2FE000
stack
page read and write
5D3E000
stack
page read and write
2F5D000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
240803A4000
trusted library allocation
page read and write
1304000
heap
page read and write
6310000
trusted library allocation
page execute and read and write
3F2D000
trusted library allocation
page read and write
78C0000
heap
page read and write
D90000
unkown
page readonly
42F6000
heap
page read and write
FFB40000
trusted library allocation
page execute and read and write
3C40000
trusted library allocation
page read and write
3060000
heap
page read and write
4158000
trusted library allocation
page read and write
D70000
heap
page read and write
240FBBC3000
heap
page read and write
245C0000
heap
page read and write
245B8000
heap
page read and write
7D4000
heap
page read and write
2811000
trusted library allocation
page read and write
B9E000
heap
page read and write
240F7070000
trusted library section
page read and write
29D0000
heap
page read and write
A4C000
heap
page read and write
49AE000
stack
page read and write
50F0000
trusted library allocation
page read and write
30F4000
heap
page read and write
2645000
direct allocation
page read and write
FAC000
unkown
page read and write
7FFD9B510000
trusted library allocation
page execute and read and write
240FBD34000
heap
page read and write
945000
heap
page read and write
401F000
unkown
page readonly
240F86E0000
trusted library section
page readonly
245D8000
heap
page read and write
6CEE7000
unkown
page readonly
245BD000
heap
page read and write
240FBCC0000
heap
page read and write
3A22000
heap
page read and write
27FB000
trusted library allocation
page read and write
53FB000
heap
page read and write
7FFD9B7C7000
trusted library allocation
page read and write
A10000
heap
page read and write
240F7855000
heap
page read and write
2A7DC000
heap
page read and write
FAC000
unkown
page read and write
5EC0000
heap
page read and write
240F1950000
unkown
page readonly
240F5200000
unkown
page readonly
240FDC10000
trusted library allocation
page read and write
3284000
unkown
page read and write
3284000
unkown
page read and write
2E2F000
trusted library allocation
page read and write
3380000
direct allocation
page read and write
AB9000
heap
page read and write
4D38000
trusted library allocation
page read and write
1304000
heap
page read and write
5E9B000
heap
page read and write
31440000
heap
page read and write
30D7000
heap
page read and write
69DC000
stack
page read and write
240F8275000
heap
page read and write
58D9000
direct allocation
page read and write
240F7808000
heap
page read and write
5B61000
unkown
page read and write
4D04000
trusted library allocation
page read and write
1E21F000
stack
page read and write
14C0000
heap
page read and write
2F77000
trusted library allocation
page read and write
3284000
unkown
page read and write
3840000
unkown
page read and write
31A0000
heap
page read and write
820000
unkown
page readonly
FE6000
trusted library allocation
page execute and read and write
341A000
heap
page read and write
F9BBFBE000
stack
page read and write
240F5424000
heap
page read and write
6CC7000
heap
page read and write
2E48000
trusted library allocation
page read and write
1008000
heap
page read and write
6470000
trusted library allocation
page read and write
245A5000
heap
page read and write
4B1B000
unkown
page read and write
ED6000
heap
page read and write
240900D8000
trusted library allocation
page read and write
240FBD49000
heap
page read and write
7FFD9B500000
trusted library allocation
page read and write
F00000
trusted library allocation
page execute and read and write
32C3000
heap
page read and write
7FFD9B76B000
trusted library allocation
page read and write
240F53A5000
heap
page read and write
938000
heap
page read and write
675F000
stack
page read and write
240FBB56000
heap
page read and write
3284000
unkown
page read and write
41AE000
stack
page read and write
245CE000
heap
page read and write
240F86F0000
heap
page execute and read and write
2E53000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
35BF000
unkown
page read and write
5E73000
heap
page read and write
3260000
direct allocation
page read and write
61E00000
direct allocation
page execute and read and write
5E5E000
heap
page read and write
3109000
heap
page read and write
2E25000
trusted library allocation
page read and write
2912000
heap
page read and write
4F6E000
stack
page read and write
4048000
unkown
page readonly
3F23000
trusted library allocation
page read and write
636000
unkown
page execute and read and write
9FC000
heap
page read and write
240F824C000
heap
page read and write
2662000
direct allocation
page read and write
240FBC61000
heap
page read and write
193000
stack
page read and write
245B0000
heap
page read and write
1280000
heap
page read and write
5DFC000
heap
page read and write
240F7841000
heap
page read and write
5E06000
heap
page read and write
3284000
unkown
page read and write
7FFD9B47B000
trusted library allocation
page execute and read and write
240FBCFA000
heap
page read and write
EBB000
unkown
page write copy
27AF000
stack
page read and write
5DE9000
heap
page read and write
240F785B000
heap
page read and write
3173C000
stack
page read and write
434A000
heap
page read and write
400000
unkown
page execute and read and write
7AE000
stack
page read and write
3F32000
trusted library allocation
page read and write
1038000
heap
page read and write
4BCD000
stack
page read and write
7FFD9B750000
trusted library allocation
page read and write
2C30000
trusted library allocation
page execute and read and write
3284000
unkown
page read and write
3268000
heap
page read and write
5E4E000
heap
page read and write
33D4000
heap
page read and write
748D000
stack
page read and write
1500000
heap
page read and write
594E000
direct allocation
page read and write
245CD000
heap
page read and write
1DFDF000
stack
page read and write
240FDB60000
trusted library allocation
page read and write
7FFD9B6D5000
trusted library allocation
page read and write
5DE3000
heap
page read and write
240F5580000
trusted library allocation
page read and write
6BD0E000
unkown
page read and write
7FFD9B650000
trusted library allocation
page read and write
30E5000
heap
page read and write
240FDBE0000
trusted library allocation
page read and write
7FFD9B46D000
trusted library allocation
page execute and read and write
7FFD9B6DC000
trusted library allocation
page read and write
240F7CA0000
trusted library section
page read and write
7E6E000
stack
page read and write
EC0000
trusted library allocation
page read and write
3284000
unkown
page read and write
7FFD9B453000
trusted library allocation
page execute and read and write
93E000
stack
page read and write
5E54000
heap
page read and write
7FF463120000
trusted library allocation
page execute and read and write
7FFD9B93A000
trusted library allocation
page read and write
26A3000
direct allocation
page read and write
4032000
trusted library allocation
page read and write
191000
stack
page read and write
3284000
unkown
page read and write
240FBB78000
heap
page read and write
3160000
unkown
page readonly
420000
unkown
page write copy
679E000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B4AC000
trusted library allocation
page execute and read and write
240F8365000
heap
page read and write
5E45000
heap
page read and write
BB5000
heap
page read and write
2A7EE000
heap
page read and write
7FFD9B666000
trusted library allocation
page read and write
240F7811000
heap
page read and write
424A000
heap
page read and write
B4B000
heap
page read and write
240F783E000
heap
page read and write
5C80000
heap
page read and write
417000
unkown
page execute read
421E000
unkown
page read and write
FD0000
heap
page read and write
532E000
stack
page read and write
34BE000
stack
page read and write
5E5F000
heap
page read and write
5DF4000
heap
page read and write
30FB000
heap
page read and write
1304000
heap
page read and write
401000
unkown
page execute read
33B4000
unkown
page read and write
5DF8000
heap
page read and write
245D8000
heap
page read and write
7FF463111000
trusted library allocation
page execute read
240FBB83000
heap
page read and write
1187000
heap
page read and write
5E63000
heap
page read and write
3195000
trusted library allocation
page read and write
245B8000
heap
page read and write
40B1000
trusted library allocation
page read and write
5E99000
heap
page read and write
4167000
trusted library allocation
page read and write
5E64000
heap
page read and write
61ED4000
direct allocation
page readonly
240FBAB9000
heap
page read and write
5DF8000
heap
page read and write
7FF46311F000
trusted library allocation
page execute read
240F784E000
heap
page read and write
240F7980000
trusted library section
page read and write
5E98000
heap
page read and write
245A6000
heap
page read and write
CF8000
stack
page read and write
30F7000
heap
page read and write
263E000
direct allocation
page read and write
EBE000
unkown
page readonly
27D0000
heap
page read and write
240FBD6C000
heap
page read and write
7FFD9B610000
trusted library allocation
page read and write
D70000
heap
page read and write
2A610000
heap
page read and write
3284000
unkown
page read and write
5FDB000
trusted library allocation
page read and write
428E000
heap
page read and write
61ED0000
direct allocation
page read and write
245BD000
heap
page read and write
1150000
trusted library allocation
page read and write
240FBB85000
heap
page read and write
58E0000
direct allocation
page read and write
2922000
heap
page read and write
7499000
heap
page read and write
5E4E000
heap
page read and write
7FFD9B7A6000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
400F000
trusted library allocation
page read and write
4045000
unkown
page read and write
240F6F70000
heap
page read and write
E41000
unkown
page execute read
2F73000
trusted library allocation
page read and write
1E531000
heap
page read and write
3B20000
heap
page read and write
5E98000
heap
page read and write
41C0000
trusted library allocation
page read and write
240803BC000
trusted library allocation
page read and write
7FF463119000
trusted library allocation
page execute read
240F55E0000
heap
page read and write
2ED3000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
A00000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
5E58000
heap
page read and write
26B8000
direct allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
2A6F8000
heap
page read and write
4CF6000
trusted library allocation
page read and write
4769000
trusted library allocation
page read and write
371F000
unkown
page read and write
FA0000
unkown
page read and write
970000
heap
page read and write
2630000
heap
page read and write
5D50000
heap
page read and write
4070000
heap
page read and write
5766000
trusted library allocation
page read and write
1180000
heap
page read and write
74EE000
stack
page read and write
5E74000
heap
page read and write
5E06000
heap
page read and write
5A7E000
direct allocation
page read and write
1304000
heap
page read and write
240F78A5000
heap
page read and write
A62000
heap
page read and write
148E000
stack
page read and write
552C000
heap
page read and write
273C000
heap
page read and write
400000
unkown
page readonly
24642000
heap
page read and write
245A0000
heap
page read and write
306D000
trusted library allocation
page read and write
7FFD9B620000
trusted library allocation
page read and write
38E4000
heap
page read and write
2CEE000
stack
page read and write
600A000
trusted library allocation
page read and write
7FF463113000
trusted library allocation
page execute read
75E000
unkown
page write copy
4EB000
stack
page read and write
5C6E000
unkown
page read and write
4BEE000
unkown
page read and write
138A000
stack
page read and write
30FD000
heap
page read and write
5632000
trusted library allocation
page read and write
26AA000
direct allocation
page read and write
3F82000
trusted library allocation
page read and write
2669000
direct allocation
page read and write
245B6000
heap
page read and write
240F788A000
heap
page read and write
63FC000
stack
page read and write
240F70D0000
trusted library allocation
page read and write
AA7000
heap
page read and write
604E000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B65D000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
3100000
heap
page read and write
5E45000
heap
page read and write
7FF463115000
trusted library allocation
page execute read
33B4000
unkown
page read and write
33B0000
heap
page read and write
5E48000
heap
page read and write
6F9E000
stack
page read and write
30FD000
trusted library allocation
page read and write
4320000
heap
page read and write
5E8000
stack
page read and write
245DC000
heap
page read and write
AC4000
heap
page read and write
5260000
trusted library allocation
page read and write
413E000
trusted library allocation
page read and write
950000
heap
page read and write
414D000
trusted library allocation
page read and write
5740000
trusted library allocation
page execute and read and write
ABF000
heap
page read and write
245DC000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
401000
unkown
page execute read
511E000
trusted library allocation
page read and write
68DC000
stack
page read and write
A8A000
heap
page read and write
B28000
heap
page read and write
25C5000
direct allocation
page read and write
240F8338000
heap
page read and write
240FBC68000
heap
page read and write
700A000
stack
page read and write
2A7D4000
heap
page read and write
2E9B000
trusted library allocation
page read and write
245A7000
heap
page read and write
240F6F64000
heap
page execute and read and write
2D23000
trusted library allocation
page read and write
5BE0000
direct allocation
page execute and read and write
30810000
trusted library allocation
page read and write
245A6000
heap
page read and write
30FF000
heap
page read and write
FEA000
trusted library allocation
page execute and read and write
43A7000
unkown
page read and write
3715000
unkown
page read and write
5E98000
heap
page read and write
240FDBD0000
trusted library allocation
page read and write
240FE690000
trusted library section
page read and write
3B70000
heap
page read and write
14B4000
heap
page read and write
6CF0000
heap
page read and write
2409007C000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
41C0000
heap
page read and write
5DBF000
stack
page read and write
25D8000
direct allocation
page read and write
240FBC23000
heap
page read and write
1E530000
heap
page read and write
25AC000
direct allocation
page read and write
4340000
heap
page read and write
6E3D000
stack
page read and write
ECD000
trusted library allocation
page execute and read and write
7FFD9B463000
trusted library allocation
page read and write
5DF2000
heap
page read and write
240FBD06000
heap
page read and write
245AD000
heap
page read and write
FA9000
unkown
page write copy
6005000
trusted library allocation
page read and write
724C000
stack
page read and write
132E000
heap
page read and write
6150000
trusted library allocation
page read and write
30D0000
heap
page read and write
3811000
trusted library allocation
page read and write
3280000
heap
page read and write
3DD6000
trusted library allocation
page read and write
330E000
unkown
page read and write
30E1000
trusted library allocation
page read and write
3DDE000
trusted library allocation
page read and write
30FF000
heap
page read and write
97000
stack
page read and write
7FFD9B7CF000
trusted library allocation
page read and write
7FFD9B7D8000
trusted library allocation
page read and write
6FB0000
heap
page read and write
A49000
heap
page read and write
7FF463112000
trusted library allocation
page readonly
140E000
stack
page read and write
30FF000
heap
page read and write
4D01000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
1304000
heap
page read and write
2800000
heap
page execute and read and write
5E00000
heap
page read and write
2C6D000
stack
page read and write
267F000
direct allocation
page read and write
5E45000
heap
page read and write
25AF000
direct allocation
page read and write
920000
heap
page read and write
9BE000
stack
page read and write
40BF000
trusted library allocation
page read and write
5EE0000
unkown
page read and write
714D000
stack
page read and write
3170000
heap
page read and write
268D000
direct allocation
page read and write
240FBF32000
trusted library allocation
page read and write
5DC0000
heap
page read and write
331F000
stack
page read and write
6E60000
heap
page read and write
41A000
unkown
page write copy
62AE000
stack
page read and write
106B000
heap
page read and write
245A8000
heap
page read and write
3284000
unkown
page read and write
240F7990000
heap
page read and write
245AC000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
240F5575000
heap
page read and write
3EFF000
trusted library allocation
page read and write
240FBD00000
heap
page read and write
7610000
trusted library allocation
page read and write
5E64000
heap
page read and write
3EF5000
trusted library allocation
page read and write
7FFD9B630000
trusted library allocation
page read and write
14E0000
heap
page read and write
476D000
trusted library allocation
page read and write
3284000
unkown
page read and write
7FFD9B740000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
28D0000
heap
page read and write
74BA000
heap
page read and write
240F537E000
heap
page read and write
11D8000
trusted library allocation
page read and write
240F2D8B000
unkown
page readonly
240F8333000
heap
page read and write
3284000
unkown
page read and write
2931000
heap
page read and write
FAA000
unkown
page read and write
240F783B000
heap
page read and write
3D69000
trusted library allocation
page read and write
41F4000
trusted library allocation
page read and write
40A6000
trusted library allocation
page read and write
5E54000
heap
page read and write
245A6000
heap
page read and write
30FF000
heap
page read and write
30FC000
heap
page read and write
512D000
trusted library allocation
page read and write
240F5349000
heap
page read and write
5C50000
direct allocation
page read and write
5DEE000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
33CB000
heap
page read and write
5DEA000
heap
page read and write
5C9E000
unkown
page read and write
6221000
trusted library allocation
page read and write
240F77DB000
heap
page read and write
240F7090000
heap
page execute and read and write
2DBE000
trusted library allocation
page read and write
5E42000
heap
page read and write
6CED9000
unkown
page write copy
245B3000
heap
page read and write
30FB000
trusted library allocation
page read and write
313B0000
heap
page read and write
940000
heap
page read and write
5B72000
unkown
page read and write
400000
unkown
page readonly
1320000
heap
page read and write
AD3000
heap
page read and write
3F3F000
trusted library allocation
page read and write
5FBC000
stack
page read and write
240F7872000
heap
page read and write
F9BB3FB000
stack
page read and write
26B0000
heap
page read and write
6210000
heap
page read and write
7FFD9B900000
trusted library allocation
page execute and read and write
6BB31000
unkown
page execute read
7FFD9B850000
trusted library allocation
page read and write
105F000
heap
page read and write
65AE000
stack
page read and write
3D75000
trusted library allocation
page read and write
240F77FE000
heap
page read and write
29D1000
heap
page read and write
A8C000
heap
page read and write
B20000
heap
page read and write
41C7000
heap
page read and write
245D2000
heap
page read and write
4354000
heap
page execute and read and write
709F000
stack
page read and write
33B4000
unkown
page read and write
2FD8000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
5EDE000
stack
page read and write
5E59000
heap
page read and write
75E000
unkown
page read and write
3500000
unkown
page read and write
3285000
unkown
page read and write
70CE000
heap
page read and write
240F7960000
trusted library section
page read and write
34CE000
unkown
page read and write
3F18000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
5E45000
heap
page read and write
F9BAEFE000
stack
page read and write
5E98000
heap
page read and write
A6B000
heap
page read and write
40CE000
stack
page read and write
7FF463103000
trusted library allocation
page execute read
9B000
stack
page read and write
240F7D50000
trusted library section
page read and write
A98000
heap
page read and write
245BD000
heap
page read and write
245DC000
heap
page read and write
401D000
unkown
page read and write
3284000
unkown
page read and write
F9E000
stack
page read and write
519B000
trusted library allocation
page read and write
240F6D9A000
heap
page read and write
246A4000
heap
page read and write
3284000
unkown
page read and write
2ECA000
trusted library allocation
page read and write
26B1000
direct allocation
page read and write
240FBB9E000
heap
page read and write
41B6000
trusted library allocation
page read and write
5E5C000
heap
page read and write
2A650000
heap
page read and write
30F2000
heap
page read and write
1300000
heap
page read and write
2DF6000
trusted library allocation
page read and write
240F6EA0000
trusted library section
page read and write
A62000
heap
page read and write
5E50000
heap
page read and write
240F7760000
heap
page read and write
44B000
unkown
page execute and read and write
3284000
unkown
page read and write
5E4C000
heap
page read and write
7FFD9B460000
trusted library allocation
page read and write
1E11E000
stack
page read and write
409C000
trusted library allocation
page read and write
1E520000
heap
page read and write
8B0000
heap
page read and write
42BC000
heap
page read and write
52D0000
trusted library allocation
page execute and read and write
27BE000
stack
page read and write
70B3000
heap
page read and write
240F55D0000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
5E06000
heap
page read and write
600F000
trusted library allocation
page read and write
3284000
unkown
page read and write
5E68000
heap
page read and write
3135B000
stack
page read and write
522E000
stack
page read and write
A5D000
heap
page read and write
240F8240000
heap
page read and write
F9BBB3B000
stack
page read and write
A8F000
heap
page read and write
240FBCA4000
heap
page read and write
2DB3000
trusted library allocation
page read and write
2E6A000
trusted library allocation
page read and write
5E62000
heap
page read and write
6C6C000
heap
page read and write
6C7A1000
unkown
page execute read
36E0000
heap
page read and write
9C0000
heap
page read and write
6EA0000
trusted library allocation
page read and write
3B81000
heap
page read and write
5E4E000
heap
page read and write
7FF463117000
trusted library allocation
page execute read
7FFD9B670000
trusted library allocation
page read and write
3A07000
heap
page read and write
61D0000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
5E63000
heap
page read and write
240F83D1000
heap
page read and write
24080452000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page execute and read and write
240F5300000
heap
page read and write
2678000
direct allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
7D0000
heap
page read and write
7D4000
heap
page read and write
240F5320000
heap
page read and write
245D9000
heap
page read and write
240FBA90000
heap
page read and write
3040000
heap
page read and write
2621000
direct allocation
page read and write
4439000
heap
page read and write
645D000
stack
page read and write
ED0000
heap
page read and write
3A41000
heap
page read and write
F9BB9F6000
stack
page read and write
6CE97000
unkown
page readonly
57CE000
stack
page read and write
30D6000
trusted library allocation
page read and write
240F537B000
heap
page read and write
1E35E000
stack
page read and write
4D8D000
stack
page read and write
AB5000
heap
page read and write
549000
unkown
page execute and read and write
27D0000
trusted library allocation
page read and write
3284000
unkown
page read and write
3D6D000
trusted library allocation
page read and write
7D4000
heap
page read and write
25D4000
direct allocation
page read and write
240F77D7000
heap
page read and write
87E000
unkown
page readonly
3284000
unkown
page read and write
5E99000
heap
page read and write
ACA000
heap
page read and write
930000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
4D25000
trusted library allocation
page read and write
8FE000
stack
page read and write
2730000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
F9BBB7E000
stack
page read and write
3284000
unkown
page read and write
245A3000
heap
page read and write
50EE000
stack
page read and write
7FF46311D000
trusted library allocation
page execute read
3284000
unkown
page read and write
6300000
trusted library allocation
page read and write
7FFD9B45D000
trusted library allocation
page execute and read and write
3284000
unkown
page read and write
316A000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
7D4000
heap
page read and write
2612000
direct allocation
page read and write
EAC000
unkown
page readonly
313A000
stack
page read and write
245C0000
heap
page read and write
404D000
trusted library allocation
page read and write
A7B000
heap
page read and write
5CDF000
stack
page read and write
78AF000
stack
page read and write
1508000
heap
page read and write
27D3000
heap
page read and write
3284000
unkown
page read and write
6CD3000
heap
page read and write
7FFD9B570000
trusted library allocation
page execute and read and write
6CD81000
unkown
page execute read
53EE000
stack
page read and write
2F5B000
trusted library allocation
page read and write
4080000
heap
page read and write
7FFD9B728000
trusted library allocation
page read and write
5FFF000
trusted library allocation
page read and write
5409000
heap
page read and write
7D4000
heap
page read and write
990000
heap
page read and write
403E000
trusted library allocation
page read and write
6CCC2000
unkown
page readonly
ADB000
heap
page read and write
320A000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
25DD000
direct allocation
page read and write
AB6000
heap
page read and write
5E99000
heap
page read and write
A69000
heap
page read and write
F9BA7CF000
stack
page read and write
33B4000
unkown
page read and write
7FFD9B450000
trusted library allocation
page read and write
6FAE000
stack
page read and write
240F7080000
trusted library section
page read and write
4D0E000
trusted library allocation
page read and write
F9BB4FB000
stack
page read and write
A5D000
heap
page read and write
32FA000
stack
page read and write
6CEE4000
unkown
page read and write
3250000
unkown
page read and write
F9BB8F9000
stack
page read and write
FE0000
trusted library allocation
page read and write
1304000
heap
page read and write
52D8000
heap
page read and write
5100000
trusted library allocation
page read and write
7FFD9B61E000
trusted library allocation
page read and write
3A20000
heap
page read and write
61A0000
trusted library allocation
page execute and read and write
51B3000
heap
page read and write
240F378B000
unkown
page readonly
1E531000
heap
page read and write
41A0000
unkown
page read and write
3284000
unkown
page read and write
41CC000
trusted library allocation
page read and write
5A09000
direct allocation
page read and write
5E47000
heap
page read and write
11CE000
stack
page read and write
308B0000
heap
page read and write
240FBB4E000
heap
page read and write
3089C000
stack
page read and write
5E68000
heap
page read and write
240F784A000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
766000
unkown
page read and write
49F8000
unkown
page read and write
245B8000
heap
page read and write
CBB000
stack
page read and write
240FDBC0000
trusted library allocation
page read and write
FAA000
unkown
page read and write
2F30000
heap
page read and write
245D2000
heap
page read and write
2EFE000
trusted library allocation
page read and write
96B000
heap
page read and write
240FDE90000
trusted library allocation
page read and write
30F2000
heap
page read and write
F3C000
unkown
page readonly
240FDBF0000
trusted library allocation
page read and write
51B0000
heap
page read and write
33C0000
heap
page read and write
401000
unkown
page execute read
9F9000
heap
page read and write
3310000
unkown
page readonly
5E9E000
heap
page read and write
6BD15000
unkown
page readonly
5FC4000
trusted library allocation
page read and write
AB0000
heap
page read and write
4D30000
trusted library allocation
page read and write
6200000
trusted library allocation
page execute and read and write
240F7804000
heap
page read and write
26AD000
stack
page read and write
3F3A000
trusted library allocation
page read and write
25FC000
direct allocation
page read and write
A3B000
heap
page read and write
F9BC2BD000
stack
page read and write
245B9000
heap
page read and write
15CF000
heap
page read and write
245CD000
heap
page read and write
1304000
heap
page read and write
5C76000
heap
page read and write
5B60000
unkown
page read and write
5E4E000
heap
page read and write
240FBB48000
heap
page read and write
5DE1000
heap
page read and write
411A000
unkown
page read and write
240FBCCF000
heap
page read and write
305C000
trusted library allocation
page read and write
D91000
unkown
page execute read
5DDD000
stack
page read and write
AD1000
heap
page read and write
30E0000
heap
page read and write
5E08000
heap
page read and write
1990000
heap
page read and write
245B8000
heap
page read and write
132A000
heap
page read and write
5C90000
unkown
page read and write
240FBBB4000
heap
page read and write
3844000
unkown
page read and write
33A0000
heap
page read and write
7FFD9B600000
trusted library allocation
page read and write
40E0000
heap
page read and write
5E45000
heap
page read and write
641E000
stack
page read and write
F9BC0BA000
stack
page read and write
5E06000
heap
page read and write
FE2000
trusted library allocation
page read and write
B5A000
heap
page read and write
5E42000
heap
page read and write
6CEDD000
unkown
page read and write
4070000
heap
page read and write
D91000
unkown
page execute read
245DC000
heap
page read and write
F5C000
stack
page read and write
3230000
heap
page read and write
E40000
unkown
page readonly
24090001000
trusted library allocation
page read and write
D90000
unkown
page readonly
5E08000
heap
page read and write
240FBD09000
heap
page read and write
40E6000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
30E9000
heap
page read and write
240FBB92000
heap
page read and write
4161000
trusted library allocation
page read and write
77B000
unkown
page write copy
240F6EE0000
heap
page read and write
25E4000
direct allocation
page read and write
245DA000
heap
page read and write
7FFD9B536000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
4071000
heap
page read and write
5150000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
AFE000
stack
page read and write
64EC000
stack
page read and write
4D11000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
5E53000
heap
page read and write
5FE0000
trusted library allocation
page read and write
7620000
trusted library allocation
page execute and read and write
3FC0000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
240FBF14000
trusted library allocation
page read and write
240FBD0E000
heap
page read and write
25F4000
direct allocation
page read and write
2C50000
trusted library allocation
page read and write
5E53000
heap
page read and write
381F000
unkown
page read and write
3284000
unkown
page read and write
240F6F73000
heap
page read and write
107D000
heap
page read and write
25A3000
direct allocation
page read and write
7FFD9B474000
trusted library allocation
page read and write
6C904000
unkown
page read and write
322A000
trusted library allocation
page read and write
19D000
stack
page read and write
240F5560000
trusted library allocation
page read and write
A6F000
heap
page read and write
2628000
direct allocation
page read and write
1035000
heap
page read and write
5E98000
heap
page read and write
240F829D000
heap
page read and write
30A0000
heap
page read and write
F9BC5B8000
stack
page read and write
16FE000
stack
page read and write
245D9000
heap
page read and write
AA4000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
5E5F000
heap
page read and write
774000
unkown
page read and write
30EF000
heap
page read and write
5E98000
heap
page read and write
BAF000
heap
page read and write
240FBD15000
heap
page read and write
30EA000
heap
page read and write
240F1952000
unkown
page readonly
29D1000
heap
page read and write
5DF8000
heap
page read and write
5DD0000
heap
page read and write
AA2000
heap
page read and write
2F67000
trusted library allocation
page read and write
424E000
heap
page read and write
2A6F8000
heap
page read and write
5E45000
heap
page read and write
27F9000
trusted library allocation
page read and write
FDE000
stack
page read and write
2F2C000
trusted library allocation
page read and write
258D000
direct allocation
page read and write
240FBD37000
heap
page read and write
2FF0000
unkown
page readonly
30E5000
heap
page read and write
240FBD47000
heap
page read and write
5E59000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
240FDB70000
trusted library allocation
page read and write
4BA6000
unkown
page read and write
240F6F60000
heap
page execute and read and write
5E43000
heap
page read and write
3084C000
stack
page read and write
D91000
unkown
page execute read
3110000
unkown
page read and write
245CD000
heap
page read and write
6500000
trusted library allocation
page read and write
245D2000
heap
page read and write
245CD000
heap
page read and write
31FF000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
AD7000
heap
page read and write
245B3000
heap
page read and write
27CB000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
43C6000
heap
page read and write
33B4000
unkown
page read and write
7FFD9B454000
trusted library allocation
page read and write
6C907000
unkown
page readonly
7FFD9B700000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
1270000
heap
page execute and read and write
7FFD9B506000
trusted library allocation
page read and write
7D4000
heap
page read and write
35BF000
stack
page read and write
F9BC1BD000
stack
page read and write
F9BAAEB000
stack
page read and write
4E60000
heap
page read and write
314A4000
heap
page read and write
2F6B000
trusted library allocation
page read and write
6C92000
heap
page read and write
510E000
trusted library allocation
page read and write
D1F000
stack
page read and write
3176000
trusted library allocation
page read and write
240F82BA000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
5FF8000
trusted library allocation
page read and write
5E08000
heap
page read and write
5E98000
heap
page read and write
270C000
stack
page read and write
24080393000
trusted library allocation
page read and write
420F000
heap
page read and write
240F418B000
unkown
page readonly
F9BB5F1000
stack
page read and write
6BB30000
unkown
page readonly
240FBB4C000
heap
page read and write
41EE000
trusted library allocation
page read and write
245B8000
heap
page read and write
24080397000
trusted library allocation
page read and write
3284000
unkown
page read and write
5C68000
unkown
page read and write
F9BBA3F000
stack
page read and write
5DDE000
stack
page read and write
2F00000
heap
page read and write
3140000
unkown
page readonly
5E73000
heap
page read and write
415E000
stack
page read and write
265B000
direct allocation
page read and write
40D4000
trusted library allocation
page read and write
413000
unkown
page readonly
5DF8000
heap
page read and write
4311000
heap
page read and write
7D4000
heap
page read and write
2409007F000
trusted library allocation
page read and write
6BD0F000
unkown
page write copy
3320000
heap
page read and write
3284000
unkown
page read and write
245A7000
heap
page read and write
26A4000
heap
page read and write
761000
unkown
page read and write
3284000
unkown
page read and write
245DA000
heap
page read and write
2FBC000
stack
page read and write
4024000
trusted library allocation
page read and write
2AD5000
heap
page read and write
2DF0000
heap
page read and write
F6C000
stack
page read and write
1E4BD000
stack
page read and write
5DE1000
heap
page read and write
6E88000
heap
page read and write
24080386000
trusted library allocation
page read and write
24080001000
trusted library allocation
page read and write
AAF000
heap
page read and write
27F0000
trusted library allocation
page read and write
240F541B000
heap
page read and write
6FC0000
trusted library allocation
page execute and read and write
6400000
heap
page read and write
3150000
unkown
page readonly
10F4000
heap
page read and write
264C000
direct allocation
page read and write
5E63000
heap
page read and write
A53000
heap
page read and write
9C3000
heap
page read and write
240F7970000
trusted library section
page read and write
240FBB7D000
heap
page read and write
5E58000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
5DFE000
heap
page read and write
313BA000
heap
page read and write
240F52D0000
heap
page read and write
A18000
heap
page read and write
240F77E2000
heap
page read and write
7970000
heap
page read and write
3844000
unkown
page read and write
7FF463118000
trusted library allocation
page readonly
4059000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
240FE6E0000
trusted library section
page read and write
EB4000
trusted library allocation
page read and write
4133000
trusted library allocation
page read and write
3284000
unkown
page read and write
56FE000
stack
page read and write
30EE000
heap
page read and write
A16000
heap
page read and write
6FB000
stack
page read and write
33B4000
unkown
page read and write
25B6000
direct allocation
page read and write
3284000
unkown
page read and write
51EE000
stack
page read and write
A83000
heap
page read and write
240F55E5000
heap
page read and write
5E4B000
heap
page read and write
64A0000
trusted library allocation
page execute and read and write
4019000
trusted library allocation
page read and write
416E000
trusted library allocation
page read and write
240FBCFD000
heap
page read and write
5186000
trusted library allocation
page read and write
D60000
heap
page read and write
240F785E000
heap
page read and write
61EB7000
direct allocation
page readonly
5E52000
heap
page read and write
7FF46311E000
trusted library allocation
page readonly
3F8C000
trusted library allocation
page read and write
738E000
stack
page read and write
262F000
direct allocation
page read and write
240F7AB0000
heap
page read and write
5FE9000
trusted library allocation
page read and write
245B7000
heap
page read and write
5D5B000
heap
page read and write
2736000
heap
page read and write
DDF000
stack
page read and write
3370000
unkown
page read and write
7FFD9B810000
trusted library allocation
page read and write
A9E000
heap
page read and write
41C5000
heap
page read and write
2C60000
heap
page read and write
2C4B000
trusted library allocation
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
41C7000
heap
page read and write
1E630000
trusted library allocation
page read and write
345F000
stack
page read and write
EBB000
trusted library allocation
page execute and read and write
41E5000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
D20000
heap
page read and write
245A6000
heap
page read and write
240FBCD1000
heap
page read and write
5E5B000
heap
page read and write
30F7000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
FB3000
unkown
page readonly
197000
stack
page read and write
5FFA000
trusted library allocation
page read and write
F10000
heap
page read and write
240F238B000
unkown
page readonly
A5E000
stack
page read and write
4100000
heap
page read and write
EBD000
trusted library allocation
page execute and read and write
3FA000
stack
page read and write
5E45000
heap
page read and write
336E000
unkown
page read and write
5F6E000
stack
page read and write
352B000
heap
page read and write
15CC000
heap
page read and write
3FBA000
trusted library allocation
page read and write
FB3000
unkown
page readonly
5EBC000
stack
page read and write
3520000
heap
page read and write
2596000
direct allocation
page read and write
76A000
unkown
page read and write
90B000
stack
page read and write
240FBA98000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
5DF5000
heap
page read and write
5E45000
heap
page read and write
245D2000
heap
page read and write
240F7860000
heap
page read and write
269C000
direct allocation
page read and write
5DC1000
heap
page read and write
240FBA9D000
heap
page read and write
1000000
heap
page read and write
5690000
heap
page read and write
9F0000
direct allocation
page execute and read and write
5FE2000
trusted library allocation
page read and write
5E73000
heap
page read and write
5E98000
heap
page read and write
240F832F000
heap
page read and write
5183000
trusted library allocation
page read and write
5DC5000
heap
page read and write
30EE000
heap
page read and write
41C000
unkown
page execute read
7600000
trusted library allocation
page read and write
510B000
trusted library allocation
page read and write
5DF0000
heap
page read and write
2F7C000
trusted library allocation
page read and write
6260000
trusted library allocation
page execute and read and write
F9BAFFA000
stack
page read and write
6A17000
heap
page read and write
3284000
unkown
page read and write
3284000
unkown
page read and write
F9BC6BF000
stack
page read and write
3C71000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
D90000
unkown
page readonly
245DA000
heap
page read and write
5158000
trusted library allocation
page read and write
5DF8000
heap
page read and write
4ACC000
stack
page read and write
4047000
trusted library allocation
page read and write
240F52E0000
heap
page read and write
6C8F9000
unkown
page write copy
FF7000
trusted library allocation
page execute and read and write
75F0000
heap
page read and write
240FBC6F000
heap
page read and write
2910000
heap
page read and write
61B0000
trusted library allocation
page read and write
A60000
heap
page read and write
D6E000
stack
page read and write
7C6D000
stack
page read and write
6E7E000
stack
page read and write
24080377000
trusted library allocation
page read and write
3284000
unkown
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
33B4000
unkown
page read and write
6E7E000
heap
page read and write
F1E000
stack
page read and write
5DE5000
heap
page read and write
4054000
trusted library allocation
page read and write
7FFD9B5F2000
trusted library allocation
page read and write
A3C000
heap
page read and write
2DC5000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
5E58000
heap
page read and write
4E90000
trusted library allocation
page read and write
FA9000
unkown
page write copy
4255000
heap
page execute and read and write
240F7893000
heap
page read and write
240F8341000
heap
page read and write
240F77EB000
heap
page read and write
5E40000
heap
page read and write
113E000
stack
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
5E4E000
heap
page read and write
5E9D000
heap
page read and write
303C000
stack
page read and write
30E7000
heap
page read and write
6CCAD000
unkown
page readonly
FE0000
heap
page read and write
6190000
trusted library allocation
page read and write
6C40000
heap
page read and write
6C8B7000
unkown
page readonly
400000
unkown
page readonly
7FFD9B880000
trusted library allocation
page execute and read and write
2A6B1000
heap
page read and write
5DFE000
heap
page read and write
25EB000
direct allocation
page read and write
240F5583000
trusted library allocation
page read and write
689F000
stack
page read and write
40CB000
trusted library allocation
page read and write
262F000
stack
page read and write
31946000
heap
page read and write
240F1950000
unkown
page readonly
F3C000
unkown
page readonly
240FBCCC000
heap
page read and write
25CD000
direct allocation
page read and write
1E636000
heap
page read and write
7D4000
heap
page read and write
6CD80000
unkown
page readonly
5DE2000
heap
page read and write
30FD000
heap
page read and write
2C22000
heap
page read and write
7D4000
heap
page read and write
2F6D000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
2636000
direct allocation
page read and write
240F8359000
heap
page read and write
5E4F000
heap
page read and write
F9BBEBE000
stack
page read and write
240F7F30000
trusted library section
page read and write
3FF7000
unkown
page read and write
4048000
unkown
page readonly
614C000
stack
page read and write
1E25E000
stack
page read and write
7FF463114000
trusted library allocation
page readonly
5C91000
unkown
page read and write
7FF463102000
trusted library allocation
page readonly
5FE5000
trusted library allocation
page read and write
50AE000
stack
page read and write
240F5540000
trusted library allocation
page read and write
240F8322000
heap
page read and write
BBA000
stack
page read and write
2DEF000
stack
page read and write
7FFD9B710000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
EBE000
unkown
page readonly
5FC0000
trusted library allocation
page read and write
7FFD9B642000
trusted library allocation
page read and write
FA0000
unkown
page read and write
12FA000
stack
page read and write
7FF463100000
trusted library allocation
page readonly
240F82F1000
heap
page read and write
7FFD9B716000
trusted library allocation
page read and write
B8A000
heap
page read and write
7FFD9B50C000
trusted library allocation
page execute and read and write
3284000
unkown
page read and write
1304000
heap
page read and write
EA0000
trusted library allocation
page read and write
41DA000
trusted library allocation
page read and write
44B0000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
75ED000
stack
page read and write
796E000
stack
page read and write
F9BB6F4000
stack
page read and write
1E3BE000
stack
page read and write
2D5E000
trusted library allocation
page read and write
14D0000
heap
page read and write
448000
unkown
page execute and read and write
2EF9000
trusted library allocation
page read and write
240F8295000
heap
page read and write
6BCCF000
unkown
page readonly
258B000
direct allocation
page read and write
245BD000
heap
page read and write
5E06000
heap
page read and write
360A000
unkown
page read and write
6C7A0000
unkown
page readonly
5E4D000
heap
page read and write
30EF000
heap
page read and write
240FE6A0000
trusted library section
page read and write
2654000
direct allocation
page read and write
F9BB7FB000
stack
page read and write
5DC9000
heap
page read and write
FA0000
unkown
page write copy
5E62000
heap
page read and write
421E000
stack
page read and write
760000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
7FFD9B718000
trusted library allocation
page read and write
3101000
heap
page read and write
30F8000
heap
page read and write
3284000
unkown
page read and write
10B1000
heap
page read and write
A57000
heap
page read and write
5B61000
unkown
page read and write
1995000
heap
page read and write
9C0000
heap
page read and write
A90000
trusted library allocation
page read and write
43A7000
heap
page read and write
5E59000
heap
page read and write
90E000
stack
page read and write
3F0A000
trusted library allocation
page read and write
30F2000
heap
page read and write
7FF46311C000
trusted library allocation
page readonly
3F97000
trusted library allocation
page read and write
2C2F000
stack
page read and write
401F000
unkown
page readonly
5265000
trusted library allocation
page read and write
24640000
heap
page read and write
266E000
stack
page read and write
3281000
heap
page read and write
A93000
heap
page read and write
2D90000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
3147C000
heap
page read and write
FB3000
unkown
page readonly
240F7C70000
trusted library section
page read and write
1304000
heap
page read and write
40E1000
trusted library allocation
page read and write
41FB000
trusted library allocation
page read and write
4173000
trusted library allocation
page read and write
4CAC000
stack
page read and write
EE0000
heap
page read and write
335E000
stack
page read and write
3FCC000
trusted library allocation
page read and write
FA0000
unkown
page write copy
3FA5000
trusted library allocation
page read and write
5DE9000
heap
page read and write
240FBB37000
heap
page read and write
A4F000
heap
page read and write
436F000
heap
page read and write
245B4000
heap
page read and write
7FF463101000
trusted library allocation
page execute read
7FFD9B647000
trusted library allocation
page read and write
E40000
unkown
page readonly
7FFD9B9C0000
trusted library allocation
page read and write
5E42000
heap
page read and write
3105000
heap
page read and write
F3C000
unkown
page readonly
4110000
heap
page read and write
FF2000
trusted library allocation
page read and write
7FFD9B61B000
trusted library allocation
page read and write
3284000
unkown
page read and write
511A000
trusted library allocation
page read and write
7FFD9B674000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
3410000
heap
page read and write
5E98000
heap
page read and write
3284000
unkown
page read and write
240FBD54000
heap
page read and write
4071000
heap
page read and write
3815000
trusted library allocation
page read and write
245B6000
heap
page read and write
5E5F000
heap
page read and write
4640000
trusted library allocation
page read and write
3FB0000
trusted library allocation
page read and write
5E68000
heap
page read and write
3830000
unkown
page read and write
2670000
direct allocation
page read and write
240F8440000
trusted library allocation
page read and write
3284000
unkown
page read and write
7250000
heap
page read and write
245C0000
heap
page read and write
240F7DD0000
trusted library section
page read and write
2EC8000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
5C91000
unkown
page read and write
A75000
heap
page read and write
5E4E000
heap
page read and write
7FFD9B624000
trusted library allocation
page read and write
3284000
unkown
page read and write
43EF000
unkown
page read and write
624000
unkown
page execute and read and write
245B8000
heap
page read and write
3710000
unkown
page read and write
6CC30000
unkown
page readonly
6192000
trusted library allocation
page read and write
5121000
trusted library allocation
page read and write
EAC000
unkown
page readonly
6CCBE000
unkown
page read and write
4436000
heap
page read and write
30ED000
heap
page read and write
5180000
trusted library allocation
page read and write
240F77B3000
heap
page read and write
240F8247000
heap
page read and write
240FBBCE000
heap
page read and write
240FBD27000
heap
page read and write
6210000
trusted library allocation
page execute and read and write
606F000
stack
page read and write
245BB000
heap
page read and write
33B4000
unkown
page read and write
D90000
unkown
page readonly
61E01000
direct allocation
page execute read
2A7E6000
heap
page read and write
321E000
stack
page read and write
5E52000
heap
page read and write
51A0000
heap
page execute and read and write
9E0000
heap
page read and write
5E58000
heap
page read and write
9B000
stack
page read and write
2A630000
heap
page read and write
3B9A000
heap
page read and write
5A0D000
direct allocation
page read and write
2686000
direct allocation
page read and write
5E5F000
heap
page read and write
B43000
heap
page read and write
A96000
heap
page read and write
5E98000
heap
page read and write
4201000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
240F5570000
heap
page read and write
4071000
heap
page read and write
5E61000
heap
page read and write
6480000
trusted library section
page read and write
240F825A000
heap
page read and write
240F5429000
heap
page read and write
5149000
trusted library allocation
page read and write
AA3000
trusted library allocation
page execute and read and write
240F8450000
trusted library allocation
page read and write
52CD000
stack
page read and write
62EE000
stack
page read and write
6C8FD000
unkown
page read and write
CDF000
stack
page read and write
5E42000
heap
page read and write
FF0000
trusted library allocation
page read and write
240F827E000
heap
page read and write
3284000
unkown
page read and write
3D6D000
trusted library allocation
page read and write
1065000
heap
page read and write
4129000
trusted library allocation
page read and write
17FE000
stack
page read and write
245CD000
heap
page read and write
3820000
unkown
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
3284000
unkown
page read and write
42CF000
stack
page read and write
580C000
stack
page read and write
2E5A000
trusted library allocation
page read and write
2594000
direct allocation
page read and write
240F77F4000
heap
page read and write
14B8000
heap
page read and write
6B3E000
stack
page read and write
A10000
heap
page read and write
3284000
unkown
page read and write
3101000
trusted library allocation
page read and write
30F5000
heap
page read and write
30E8000
heap
page read and write
F3C000
unkown
page readonly
144E000
stack
page read and write
AA5000
heap
page read and write
2EE1000
trusted library allocation
page read and write
25BE000
direct allocation
page read and write
4FAE000
stack
page read and write
26A0000
heap
page read and write
2409001C000
trusted library allocation
page read and write
5E06000
heap
page read and write
47DE000
trusted library allocation
page read and write
240F5340000
heap
page read and write
FFB000
trusted library allocation
page execute and read and write
240FBC65000
heap
page read and write
32CE000
unkown
page read and write
24090099000
trusted library allocation
page read and write
AB3000
heap
page read and write
1160000
heap
page read and write
BB0000
heap
page read and write
B2F000
stack
page read and write
4105000
heap
page read and write
7B0000
heap
page read and write
434E000
heap
page read and write
5D9E000
unkown
page read and write
5E98000
heap
page read and write
1287000
heap
page read and write
61C0000
trusted library allocation
page read and write
24080247000
trusted library allocation
page read and write
665E000
stack
page read and write
30FF000
heap
page read and write
3284000
unkown
page read and write
3250000
heap
page read and write
5C70000
heap
page read and write
AAA000
heap
page read and write
6BD10000
unkown
page read and write
3300000
unkown
page readonly
240FBDAD000
heap
page read and write
778000
unkown
page read and write
D91000
unkown
page execute read
7D6E000
stack
page read and write
2C40000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
154E000
heap
page read and write
33B4000
unkown
page read and write
3184000
trusted library allocation
page read and write
5E58000
heap
page read and write
4240000
heap
page read and write
7FF463116000
trusted library allocation
page readonly
FF5000
trusted library allocation
page execute and read and write
413000
unkown
page readonly
36BF000
unkown
page read and write
5E73000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
24080796000
trusted library allocation
page read and write
4CFC000
trusted library allocation
page read and write
1DEDF000
stack
page read and write
240F77B0000
heap
page read and write
240FBB4A000
heap
page read and write
240FBAF9000
heap
page read and write
5E73000
heap
page read and write
7109000
stack
page read and write
245B8000
heap
page read and write
153F000
heap
page read and write
5E55000
heap
page read and write
5E73000
heap
page read and write
7FFD9B64A000
trusted library allocation
page read and write
76F000
unkown
page read and write
40DA000
trusted library allocation
page read and write
2580000
direct allocation
page read and write
2619000
direct allocation
page read and write
77AD000
stack
page read and write
6E70000
heap
page read and write
2D1C000
trusted library allocation
page read and write
5E4E000
heap
page read and write
3284000
unkown
page read and write
3009000
trusted library allocation
page read and write
4395000
heap
page read and write
24640000
heap
page read and write
7B6D000
stack
page read and write
F9BB1FD000
stack
page read and write
57B0000
direct allocation
page read and write
304D000
trusted library allocation
page read and write
3758000
heap
page read and write
240F70A0000
trusted library allocation
page read and write
813000
unkown
page readonly
EBB000
unkown
page read and write
245CE000
heap
page read and write
309D000
trusted library allocation
page read and write
5E58000
heap
page read and write
7FFD9B470000
trusted library allocation
page read and write
E41000
unkown
page execute read
30A3000
heap
page read and write
3D96000
trusted library allocation
page read and write
443F000
stack
page read and write
1304000
heap
page read and write
14B0000
heap
page read and write
41A000
unkown
page write copy
5E98000
heap
page read and write
2694000
direct allocation
page read and write
240FBD52000
heap
page read and write
240F7839000
heap
page read and write
FB3000
unkown
page readonly
There are 1494 hidden memdumps, click here to show them.