IOC Report
VucRf0jboS.exe

loading gif

Files

File Path
Type
Category
Malicious
VucRf0jboS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FBAKEHIEBK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nkho
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ssfwvk
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5qk.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5qk.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5qk.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5qk.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5qk.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKEGHIJJEHJDGCBFHCGIJEBAAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\BGCBGCAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGIEGHJE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EBKEHJJDAAAAKECBGHDAAAFCGC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGCFIDAFBFBAKFHJEGIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HTAGVDFUIE.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IIEHCFIDHIDGIDHJEHID
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEHIDHDAKJDHJKEBFIEHCAAEHD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_VucRf0jboS.exe_e3b9fe92d8dc9b63e4a22d7f28811b1d0fca491_4784956c_5e6cbc41-8248-488b-b2e5-c32ac93c52c3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5qk.0.exe_d28fc939c8c997f1a81a69322f9c419efdcd2ec_56ba69cb_0f5fb6c2-8ef4-4c98-a11e-bcca98cc3e58\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER584E.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 23:32:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B2D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BCB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB552.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 23:32:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB776.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB7D5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQRKHNBNYN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SQRKHNBNYN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZBEDCJPBEY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
modified
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\122fddqk.55u
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\200f0c31
data
dropped
C:\Users\user\AppData\Local\Temp\31defa75
data
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\mfftjmsft
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Fri Apr 26 22:31:28 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\tmpFF68.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\u5qk.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5qk.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u5qk.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 54 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VucRf0jboS.exe
"C:\Users\user\Desktop\VucRf0jboS.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5qk.0.exe
"C:\Users\user\AppData\Local\Temp\u5qk.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5qk.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5qk.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u5qk.3.exe
"C:\Users\user\AppData\Local\Temp\u5qk.3.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\u5qk.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5qk.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\FBAKEHIEBK.exe"
malicious
C:\Users\user\AppData\Local\Temp\FBAKEHIEBK.exe
"C:\Users\user\AppData\Local\Temp\FBAKEHIEBK.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 1168
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7516 -s 2108
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://www.vmware.com/0
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dll5
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://dc.services.visualstudio.com
unknown
https://snapshot.monitor.azure.com/X
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://rt.services.visualstudio.com/Ptr
unknown
https://www.iolo.com/company/legal/privacy/
unknown
https://dc.services.visualstudio.com/X
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://rt.services.visualstudio.com/p
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://profiler.monitor.azure.com/Ptr
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://pastebin.com/raw/z9pYkqPQPO
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://snapshot.monitor.azure.com/p
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.info-zip.org/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllg
unknown
https://scripts.sil.org/OFLThis
unknown
https://scripts.sil.org/OFLins
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
http://westus2-2.in.applicationinsights.azure.com
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
https://github.com/itfoundry/Poppins)5
unknown
http://ocsp.sectigo.com0
unknown
http://185.172.128.228/ping.php?substr=two
185.172.128.228
http://185.172.128.76/15f649199f40275b/nss3.dll2
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllS
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php9bc63c5c878de6304643d64e61fb8releaseccbd010d5db7d1a32561c9
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
http://185.172.128.76Z
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
iolo0.b-cdn.net
185.93.1.247
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
TypesSupported
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
ProgramId
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
FileId
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
LowerCaseLongPath
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
LongPathHash
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
Name
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
OriginalFileName
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
Publisher
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
Version
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
BinFileVersion
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
BinaryType
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
ProductName
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
ProductVersion
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
LinkDate
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
BinProductVersion
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
AppxPackageFullName
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
AppxPackageRelativeId
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
Size
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
Language
\REGISTRY\A\{443ede88-b678-492b-4a61-81527409b0f0}\Root\InventoryApplicationFile\vucrf0jbos.exe|c4c41a632b8d1324
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
ProgramId
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
FileId
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
LowerCaseLongPath
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
LongPathHash
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
Name
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
OriginalFileName
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
Publisher
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
Version
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
BinFileVersion
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
BinaryType
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
ProductName
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
ProductVersion
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
LinkDate
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
BinProductVersion
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
AppxPackageFullName
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
AppxPackageRelativeId
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
Size
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
Language
\REGISTRY\A\{1f2c9ea0-c9ee-4f5d-ada8-d108e1ec8860}\Root\InventoryApplicationFile\u5qk.0.exe|5b22f5c5b9840a47
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000F04494BCF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 64 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
902000
unkown
page readonly
malicious
20EEB370000
trusted library section
page read and write
malicious
20EEB550000
trusted library section
page read and write
malicious
5C70000
direct allocation
page execute and read and write
malicious
20EE543B000
unkown
page readonly
malicious
406A000
heap
page read and write
malicious
5CA0000
direct allocation
page read and write
malicious
20EE863B000
unkown
page readonly
malicious
5210000
direct allocation
page read and write
malicious
54C0000
direct allocation
page read and write
malicious
20E900C3000
trusted library allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
39CF000
heap
page read and write
malicious
4A36000
trusted library allocation
page read and write
malicious
4C35000
trusted library allocation
page read and write
malicious
3E2F000
heap
page read and write
malicious
7FFD9B950000
trusted library allocation
page read and write
A7D000
heap
page read and write
EBF000
stack
page read and write
2784000
trusted library allocation
page read and write
5E3F000
heap
page read and write
31F80000
heap
page read and write
20EEB36A000
heap
page read and write
11D4000
heap
page read and write
9C5000
heap
page read and write
581000
unkown
page execute read
1170000
heap
page read and write
20EEAA60000
trusted library section
page read and write
41CE000
stack
page read and write
85A000
stack
page read and write
5E94000
heap
page read and write
2F44000
heap
page read and write
62E0000
heap
page read and write
28D8000
direct allocation
page read and write
29C1000
trusted library allocation
page read and write
4A38000
trusted library allocation
page read and write
635E000
heap
page read and write
5EEF000
stack
page read and write
BAB000
trusted library allocation
page execute and read and write
20EEB322000
heap
page read and write
2CB1000
heap
page read and write
2B60000
heap
page read and write
C10000
heap
page read and write
24713000
heap
page read and write
20EE8DB0000
heap
page read and write
30D2000
heap
page read and write
6BAF0000
unkown
page readonly
2796000
heap
page read and write
4A08000
trusted library allocation
page read and write
4927000
unkown
page read and write
20EEF6F5000
heap
page read and write
5E5C000
heap
page read and write
20EEFAA1000
heap
page read and write
6C301000
unkown
page execute read
20EEBD30000
trusted library allocation
page read and write
20E80511000
trusted library allocation
page read and write
20E80001000
trusted library allocation
page read and write
66CD000
stack
page read and write
20E80391000
trusted library allocation
page read and write
7FFD9B660000
trusted library allocation
page read and write
C94000
heap
page read and write
276F000
trusted library allocation
page read and write
2744000
unkown
page read and write
20EE9175000
heap
page read and write
20EEB342000
heap
page read and write
35AF000
stack
page read and write
C00000
heap
page read and write
3130000
heap
page read and write
5DEE000
stack
page read and write
75E000
unkown
page read and write
4CCE000
stack
page read and write
20EEB461000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
19B000
stack
page read and write
9C664FE000
stack
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
2744000
unkown
page read and write
4043000
unkown
page readonly
43E9000
trusted library allocation
page read and write
401000
unkown
page execute read
20EEF7DB000
heap
page read and write
65E000
stack
page read and write
27AD000
trusted library allocation
page read and write
9C666FF000
stack
page read and write
53DE000
stack
page read and write
9C6787D000
stack
page read and write
3085000
unkown
page read and write
27E4000
unkown
page read and write
5E5C000
heap
page read and write
BD3000
heap
page read and write
27E4000
unkown
page read and write
6BAF1000
unkown
page execute read
32FF000
stack
page read and write
11D4000
heap
page read and write
26E6000
trusted library allocation
page read and write
2471B000
heap
page read and write
28CE000
stack
page read and write
2508000
trusted library allocation
page read and write
9C661FE000
stack
page read and write
6720000
trusted library allocation
page read and write
5E94000
heap
page read and write
20EEF829000
heap
page read and write
2FB1000
heap
page read and write
5E94000
heap
page read and write
7FF3FF341000
trusted library allocation
page execute read
2876000
trusted library allocation
page read and write
20EE9010000
trusted library allocation
page read and write
20EE5400000
unkown
page readonly
4140000
direct allocation
page execute and read and write
421E000
heap
page read and write
5DED000
heap
page read and write
20EEF9FD000
heap
page read and write
30DF000
heap
page read and write
4A66000
trusted library allocation
page read and write
3E60000
trusted library allocation
page read and write
137F000
heap
page read and write
2978000
trusted library allocation
page read and write
11D4000
heap
page read and write
23F0000
heap
page read and write
5F90000
heap
page read and write
447000
unkown
page execute and read and write
BEC000
heap
page read and write
2471C000
heap
page read and write
7FFD9B620000
trusted library allocation
page read and write
30B7000
heap
page read and write
2A790000
heap
page read and write
7C2000
trusted library allocation
page read and write
7D5000
trusted library allocation
page execute and read and write
20EEAA40000
trusted library section
page read and write
246FB000
heap
page read and write
5D40000
direct allocation
page read and write
5E4C000
heap
page read and write
5B7E000
stack
page read and write
246F7000
heap
page read and write
2AF8000
heap
page read and write
11D4000
heap
page read and write
2744000
unkown
page read and write
7FF3FF359000
trusted library allocation
page execute read
246FB000
heap
page read and write
75CD000
heap
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
4C89000
direct allocation
page read and write
DA0000
unkown
page read and write
2839000
direct allocation
page read and write
5016000
unkown
page read and write
2744000
unkown
page read and write
58F0000
trusted library allocation
page read and write
70DE000
stack
page read and write
13D0000
heap
page read and write
4A63000
trusted library allocation
page read and write
20E80404000
trusted library allocation
page read and write
7FFD9B700000
trusted library allocation
page read and write
4A12000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
246FC000
heap
page read and write
27B4000
direct allocation
page read and write
2755000
trusted library allocation
page read and write
11D4000
heap
page read and write
246F3000
heap
page read and write
5FE000
unkown
page readonly
9C6767B000
stack
page read and write
6C300000
unkown
page readonly
7FF3FF35A000
trusted library allocation
page readonly
20E80437000
trusted library allocation
page read and write
2CB1000
heap
page read and write
20EEAA50000
trusted library section
page read and write
4C0D000
stack
page read and write
DD0000
trusted library allocation
page read and write
5E94000
heap
page read and write
AC0000
heap
page read and write
5E55000
heap
page read and write
20EEF750000
trusted library allocation
page read and write
28A6000
direct allocation
page read and write
2744000
unkown
page read and write
20EEF7E6000
heap
page read and write
20EE8E86000
heap
page read and write
20E803E5000
trusted library allocation
page read and write
2AF4000
heap
page read and write
BCD000
heap
page read and write
2760000
heap
page read and write
20EEF5CF000
heap
page read and write
28DA000
trusted library allocation
page read and write
6C5000
heap
page read and write
6BAE2000
unkown
page readonly
400000
unkown
page readonly
2A924000
heap
page read and write
20EEB31A000
heap
page read and write
7D7000
trusted library allocation
page execute and read and write
7FFD9B740000
trusted library allocation
page read and write
C90000
heap
page read and write
19D000
stack
page read and write
49A0000
trusted library allocation
page execute and read and write
DB3000
unkown
page readonly
20EEFAA7000
heap
page read and write
20EEB483000
heap
page read and write
5E95000
heap
page read and write
B91000
unkown
page execute read
15C3000
heap
page read and write
49F4000
trusted library allocation
page read and write
D3C000
unkown
page readonly
1175000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page execute and read and write
5A5C000
stack
page read and write
20EEF791000
heap
page read and write
41F5000
heap
page read and write
B7B000
stack
page read and write
20EE8FF0000
trusted library allocation
page read and write
2744000
unkown
page read and write
7F0000
heap
page read and write
20EEF8D2000
heap
page read and write
4ED0000
trusted library allocation
page read and write
30DF000
heap
page read and write
5E5C000
heap
page read and write
2A3D000
stack
page read and write
5FB000
unkown
page read and write
2814000
direct allocation
page read and write
9C670FD000
stack
page read and write
5E3C000
heap
page read and write
20EE9150000
heap
page execute and read and write
4E8D000
direct allocation
page read and write
20EEF772000
heap
page read and write
284F000
direct allocation
page read and write
C2A000
heap
page read and write
DAC000
unkown
page read and write
5E5C000
heap
page read and write
2585000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
23FC000
stack
page read and write
900000
unkown
page readonly
DB0000
trusted library allocation
page execute and read and write
20EEB347000
heap
page read and write
2744000
unkown
page read and write
DAA000
unkown
page read and write
1E671000
heap
page read and write
24780000
heap
page read and write
27B0000
direct allocation
page read and write
B91000
unkown
page execute read
A80000
heap
page read and write
20EE9170000
heap
page read and write
24716000
heap
page read and write
20EEBDC0000
heap
page execute and read and write
20EE90C0000
heap
page read and write
20EEB34A000
heap
page read and write
5E94000
heap
page read and write
5E46000
heap
page read and write
246F6000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
5E56000
heap
page read and write
2744000
unkown
page read and write
20EEB344000
heap
page read and write
20EEFEA2000
trusted library allocation
page read and write
2A9F000
unkown
page read and write
20EEF619000
heap
page read and write
275B000
trusted library allocation
page read and write
7FF3FF340000
trusted library allocation
page readonly
7FFD9B9A0000
trusted library allocation
page execute and read and write
27ED000
direct allocation
page read and write
20EEB7A0000
trusted library section
page read and write
314DB000
stack
page read and write
DAC000
unkown
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
6B0000
heap
page read and write
C27000
heap
page read and write
BE6000
heap
page read and write
350D000
trusted library allocation
page read and write
20EEB850000
trusted library section
page read and write
20EEFA9C000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
246E4000
heap
page read and write
5C0000
heap
page read and write
B10000
heap
page read and write
5E44000
heap
page read and write
30D5000
heap
page read and write
4F20000
unkown
page read and write
5DE1000
heap
page read and write
3131000
heap
page read and write
5111000
unkown
page read and write
20E80428000
trusted library allocation
page read and write
20EEB3E0000
trusted library section
page read and write
20EEF90F000
heap
page read and write
92F000
unkown
page read and write
EEF000
stack
page read and write
20EEFADE000
heap
page read and write
20EEFABC000
heap
page read and write
20EEF5B4000
heap
page read and write
5BBE000
stack
page read and write
260E000
trusted library allocation
page read and write
5E47000
heap
page read and write
246FA000
heap
page read and write
71E7000
heap
page read and write
27FD000
direct allocation
page read and write
4C8D000
direct allocation
page read and write
3F6F000
heap
page read and write
5E55000
heap
page read and write
246F3000
heap
page read and write
11D4000
heap
page read and write
27E4000
unkown
page read and write
FF810000
trusted library allocation
page execute and read and write
5E55000
heap
page read and write
5E99000
heap
page read and write
636000
unkown
page execute and read and write
2A924000
heap
page read and write
246F8000
heap
page read and write
9B000
stack
page read and write
49E6000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
496F000
unkown
page read and write
2BD2000
heap
page read and write
30D2000
heap
page read and write
2230000
trusted library allocation
page read and write
860000
heap
page read and write
5DF0000
trusted library allocation
page execute and read and write
30DF000
heap
page read and write
7FFD9B670000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
2744000
unkown
page read and write
20EE8E5F000
heap
page read and write
DA9000
unkown
page write copy
4553000
unkown
page read and write
15CA000
heap
page read and write
5EC000
unkown
page readonly
5E6F000
heap
page read and write
210000
unkown
page readonly
824000
heap
page read and write
30D7000
heap
page read and write
5E94000
heap
page read and write
DA0000
unkown
page read and write
7FFD9B7C8000
trusted library allocation
page read and write
2920000
heap
page execute and read and write
6710000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
20EEB340000
heap
page read and write
20EEC0C0000
trusted library section
page read and write
2744000
unkown
page read and write
4E89000
direct allocation
page read and write
B70000
heap
page read and write
246F6000
heap
page read and write
3C28000
heap
page read and write
20E803E0000
trusted library allocation
page read and write
24700000
heap
page read and write
30D7000
heap
page read and write
20EEF654000
heap
page read and write
5E40000
heap
page read and write
11D4000
heap
page read and write
5DEB000
heap
page read and write
30DB000
heap
page read and write
C1B000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
9C673FB000
stack
page read and write
2470E000
heap
page read and write
30E0000
heap
page read and write
590F000
trusted library allocation
page read and write
B74000
heap
page read and write
3070000
heap
page read and write
61EB7000
direct allocation
page readonly
7FFD9B5F2000
trusted library allocation
page read and write
49BB000
trusted library allocation
page read and write
20EE90C5000
heap
page read and write
2C54000
unkown
page read and write
2C54000
unkown
page read and write
6B5E000
stack
page read and write
20EEB338000
heap
page read and write
20EE9020000
trusted library allocation
page read and write
15AF000
stack
page read and write
7FFD9B708000
trusted library allocation
page read and write
2A7A5000
heap
page read and write
6BADE000
unkown
page read and write
20EEB311000
heap
page read and write
66D0000
trusted library section
page read and write
27E4000
unkown
page read and write
40C5000
heap
page read and write
2F48000
heap
page read and write
5015000
unkown
page read and write
12B0000
heap
page read and write
49B0000
heap
page read and write
20EEF782000
heap
page read and write
264F000
trusted library allocation
page read and write
468E000
heap
page read and write
648E000
stack
page read and write
64E0000
heap
page read and write
2470E000
heap
page read and write
1E39E000
stack
page read and write
5E71000
heap
page read and write
15C0000
heap
page read and write
20EEF91E000
heap
page read and write
C18000
heap
page read and write
27CF000
direct allocation
page read and write
269B000
trusted library allocation
page read and write
5E94000
heap
page read and write
BC4000
heap
page read and write
4054000
heap
page execute and read and write
7FFD9B5E2000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
5E5E000
heap
page read and write
6C9F7000
unkown
page readonly
BE7000
heap
page read and write
9C67A7D000
stack
page read and write
5E3C000
heap
page read and write
B91000
unkown
page execute read
5D3F000
stack
page read and write
5EC000
unkown
page readonly
4B0C000
stack
page read and write
288E000
trusted library allocation
page read and write
109B000
trusted library allocation
page read and write
5E94000
heap
page read and write
250E000
trusted library allocation
page read and write
28F0000
heap
page read and write
52FE000
stack
page read and write
6CA39000
unkown
page write copy
129E000
stack
page read and write
246F8000
heap
page read and write
D3C000
unkown
page readonly
2744000
unkown
page read and write
49C0000
trusted library allocation
page read and write
8B0000
heap
page read and write
2998000
trusted library allocation
page read and write
11D4000
heap
page read and write
26D0000
unkown
page read and write
52DE000
stack
page read and write
DBE000
stack
page read and write
5E70000
heap
page read and write
400000
unkown
page readonly
20EEBE20000
trusted library allocation
page read and write
4EFE000
direct allocation
page read and write
2874000
trusted library allocation
page read and write
137A000
heap
page read and write
24719000
heap
page read and write
5E56000
heap
page read and write
2763000
trusted library allocation
page read and write
3F8D000
trusted library allocation
page read and write
7FFD9B64D000
trusted library allocation
page read and write
5E5E000
heap
page read and write
6A1C000
stack
page read and write
61E00000
direct allocation
page execute and read and write
A0E000
stack
page read and write
9C6757D000
stack
page read and write
2744000
unkown
page read and write
30CF000
heap
page read and write
5DF6000
heap
page read and write
87E000
unkown
page readonly
5E3F000
heap
page read and write
7FFD9B680000
trusted library allocation
page read and write
20EEFAB5000
heap
page read and write
2730000
unkown
page readonly
20E90061000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
2470E000
heap
page read and write
7202000
heap
page read and write
290E000
stack
page read and write
4135000
heap
page read and write
1E671000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
30950000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
7FF3FF355000
trusted library allocation
page execute read
1090000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
20EEB35F000
heap
page read and write
4CFE000
direct allocation
page read and write
261C000
trusted library allocation
page read and write
DB3000
unkown
page readonly
27E4000
unkown
page read and write
44CF000
stack
page read and write
2835000
trusted library allocation
page read and write
C28000
heap
page read and write
50BE000
unkown
page read and write
827000
heap
page read and write
20EEB3A0000
trusted library section
page read and write
7FFD9B970000
trusted library allocation
page read and write
B74000
heap
page read and write
4F8000
stack
page read and write
24711000
heap
page read and write
23A0000
heap
page read and write
9C672F6000
stack
page read and write
27BC000
trusted library allocation
page read and write
20EEF95C000
heap
page read and write
5E44000
heap
page read and write
246FC000
heap
page read and write
7D2000
trusted library allocation
page read and write
C43000
heap
page read and write
5F2E000
stack
page read and write
BBD000
heap
page read and write
2AB3000
heap
page read and write
41E5000
heap
page execute and read and write
1E35E000
stack
page read and write
20EEF5AC000
heap
page read and write
2780000
direct allocation
page execute and read and write
6880000
trusted library allocation
page execute and read and write
12ED000
heap
page read and write
30E5000
heap
page read and write
1E49D000
stack
page read and write
2744000
unkown
page read and write
418E000
stack
page read and write
10CF000
stack
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
870000
heap
page read and write
26F5000
trusted library allocation
page read and write
2744000
unkown
page read and write
2889000
direct allocation
page read and write
581000
unkown
page execute read
30DC000
heap
page read and write
4ABE000
stack
page read and write
4670000
unkown
page read and write
3363000
heap
page read and write
9C67F7F000
stack
page read and write
9C667FE000
stack
page read and write
4B9D000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
24700000
heap
page read and write
B90000
unkown
page readonly
4B1B000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
5E94000
heap
page read and write
2744000
unkown
page read and write
193000
stack
page read and write
29F3000
heap
page read and write
2C30000
unkown
page read and write
5DE0000
heap
page read and write
DA0000
unkown
page write copy
3515000
trusted library allocation
page read and write
246F0000
heap
page read and write
266F000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
345F000
stack
page read and write
2744000
unkown
page read and write
96E000
unkown
page read and write
58F2000
trusted library allocation
page read and write
5E51000
heap
page read and write
4B60000
direct allocation
page read and write
30CE000
heap
page read and write
56D0000
heap
page read and write
2720000
direct allocation
page read and write
4A40000
trusted library allocation
page read and write
28A0000
heap
page read and write
5E5C000
heap
page read and write
27AD000
direct allocation
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page execute and read and write
2883000
trusted library allocation
page read and write
9C0000
heap
page read and write
2744000
unkown
page read and write
591A000
trusted library allocation
page read and write
20EE8DD0000
heap
page read and write
57AC000
stack
page read and write
7D0000
trusted library allocation
page read and write
30E9000
heap
page read and write
20EEFAE6000
heap
page read and write
2790000
heap
page read and write
5E4B000
heap
page read and write
4A60000
trusted library allocation
page read and write
30C5000
heap
page read and write
2822000
trusted library allocation
page read and write
20EE5E3B000
unkown
page readonly
C17000
heap
page read and write
B8E000
stack
page read and write
11D4000
heap
page read and write
4040000
heap
page read and write
6362000
heap
page read and write
7FF3FF35F000
trusted library allocation
page execute read
2744000
unkown
page read and write
9F0000
trusted library allocation
page read and write
624000
unkown
page execute and read and write
2744000
unkown
page read and write
4BA0000
trusted library allocation
page execute and read and write
5E5E000
heap
page read and write
595E000
stack
page read and write
9B0000
heap
page read and write
7FFD9B45D000
trusted library allocation
page execute and read and write
9C66CFB000
stack
page read and write
4313000
unkown
page read and write
5E44000
heap
page read and write
75E000
unkown
page write copy
41C000
unkown
page execute read
5E6F000
heap
page read and write
2856000
direct allocation
page read and write
6B1C000
stack
page read and write
854000
heap
page read and write
4E7E000
stack
page read and write
C0E000
stack
page read and write
13CE000
stack
page read and write
7FF3FF35B000
trusted library allocation
page execute read
2744000
unkown
page read and write
9C671F7000
stack
page read and write
5E94000
heap
page read and write
26A5000
trusted library allocation
page read and write
2BB2000
heap
page read and write
9C661AB000
stack
page read and write
5DEF000
heap
page read and write
7AD000
trusted library allocation
page execute and read and write
65EE000
stack
page read and write
22D0000
heap
page execute and read and write
30CF000
heap
page read and write
2EA0000
heap
page read and write
5E94000
heap
page read and write
DAA000
unkown
page read and write
20E903CC000
trusted library allocation
page read and write
20EE9154000
heap
page execute and read and write
20EEF7D5000
heap
page read and write
2BC2000
heap
page read and write
27E4000
unkown
page read and write
57EE000
stack
page read and write
2411000
trusted library allocation
page read and write
499C000
stack
page read and write
658E000
stack
page read and write
20EEB2FA000
heap
page read and write
7FFD9B4FC000
trusted library allocation
page execute and read and write
6C464000
unkown
page read and write
4779000
unkown
page read and write
5E6F000
heap
page read and write
6730000
heap
page read and write
B74000
heap
page read and write
27A0000
direct allocation
page read and write
DB3000
unkown
page readonly
20EEF7EE000
heap
page read and write
6350000
heap
page read and write
9C6743E000
stack
page read and write
2F40000
heap
page read and write
580000
unkown
page readonly
1E25E000
stack
page read and write
20EEFAEC000
heap
page read and write
6C417000
unkown
page readonly
4A30000
trusted library allocation
page read and write
7FFD9B956000
trusted library allocation
page read and write
20EEF7F2000
heap
page read and write
A7C000
stack
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
7FFD9B460000
trusted library allocation
page read and write
7FF3FF353000
trusted library allocation
page execute read
68DE000
stack
page read and write
5E4B000
heap
page read and write
20E90064000
trusted library allocation
page read and write
2470E000
heap
page read and write
BD3000
heap
page read and write
6C45D000
unkown
page read and write
4092000
heap
page read and write
5E6F000
heap
page read and write
7FF3FF360000
trusted library allocation
page execute and read and write
27E4000
unkown
page read and write
20EEB316000
heap
page read and write
266A000
trusted library allocation
page read and write
15B0000
heap
page read and write
5E54000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
335E000
stack
page read and write
246F8000
heap
page read and write
4FEB000
trusted library allocation
page read and write
20EEAA30000
trusted library section
page read and write
15D0000
heap
page read and write
5FE000
unkown
page readonly
4F11000
unkown
page read and write
B90000
unkown
page readonly
24719000
heap
page read and write
9C66BFE000
stack
page read and write
77B000
unkown
page write copy
C03000
heap
page read and write
5D3E000
stack
page read and write
4D60000
direct allocation
page read and write
5A60000
trusted library allocation
page read and write
2AC5000
unkown
page read and write
2898000
direct allocation
page read and write
5E59000
heap
page read and write
41A000
unkown
page write copy
20EE5400000
unkown
page readonly
71DF000
stack
page read and write
27D6000
direct allocation
page read and write
2944000
trusted library allocation
page read and write
417000
unkown
page execute read
4A15000
trusted library allocation
page read and write
4F11000
unkown
page read and write
2744000
unkown
page read and write
990000
heap
page read and write
76D000
unkown
page read and write
20EEFAEE000
heap
page read and write
2721000
trusted library allocation
page read and write
2A91C000
heap
page read and write
287B000
direct allocation
page read and write
6C5F000
stack
page read and write
7FFD9B6CC000
trusted library allocation
page read and write
B74000
heap
page read and write
379A000
heap
page read and write
5DEB000
heap
page read and write
27AE000
unkown
page read and write
20EEB9D0000
trusted library section
page read and write
669E000
stack
page read and write
97000
stack
page read and write
B74000
heap
page read and write
6374000
heap
page read and write
5CEE000
stack
page read and write
2736000
trusted library allocation
page read and write
41D0000
heap
page read and write
9C67E78000
stack
page read and write
27BF000
trusted library allocation
page read and write
6BA50000
unkown
page readonly
4BB0000
trusted library allocation
page read and write
20EEF5E5000
heap
page read and write
2470B000
heap
page read and write
30CE000
heap
page read and write
7FFD9B526000
trusted library allocation
page execute and read and write
2F40000
heap
page read and write
B0E000
stack
page read and write
6C8E1000
unkown
page execute read
24713000
heap
page read and write
2AEF000
unkown
page read and write
DB3000
unkown
page readonly
B0F000
stack
page read and write
9C66AFD000
stack
page read and write
12EB000
heap
page read and write
9B000
stack
page read and write
6BCCE000
unkown
page read and write
413000
unkown
page readonly
5E56000
heap
page read and write
5E4E000
heap
page read and write
5E94000
heap
page read and write
15CE000
heap
page read and write
5E94000
heap
page read and write
9C668FA000
stack
page read and write
56AE000
stack
page read and write
6700000
trusted library allocation
page execute and read and write
5DF1000
heap
page read and write
5E95000
heap
page read and write
20EEFDF0000
trusted library section
page readonly
51FD000
stack
page read and write
3120000
heap
page read and write
20EEF96B000
heap
page read and write
24792000
heap
page read and write
7B0000
trusted library allocation
page read and write
2471B000
heap
page read and write
4070000
heap
page read and write
C3A000
heap
page read and write
7FF3FF357000
trusted library allocation
page execute read
2744000
unkown
page read and write
591F000
trusted library allocation
page read and write
2848000
direct allocation
page read and write
30D4000
heap
page read and write
2744000
unkown
page read and write
49EF000
trusted library allocation
page read and write
23EE000
unkown
page read and write
5E5C000
heap
page read and write
6C0000
heap
page read and write
284F000
unkown
page read and write
5DE1000
heap
page read and write
401F000
unkown
page readonly
61EB4000
direct allocation
page read and write
2F92000
heap
page read and write
5E55000
heap
page read and write
BFD000
heap
page read and write
2841000
direct allocation
page read and write
6CA47000
unkown
page readonly
27E5000
direct allocation
page read and write
2471B000
heap
page read and write
246E7000
heap
page read and write
7CA000
trusted library allocation
page execute and read and write
2601000
trusted library allocation
page read and write
76F000
unkown
page read and write
5E70000
heap
page read and write
2471B000
heap
page read and write
271E000
unkown
page read and write
81A000
heap
page read and write
2991000
trusted library allocation
page read and write
B74000
heap
page read and write
334A000
heap
page read and write
25A5000
trusted library allocation
page read and write
5E94000
heap
page read and write
5E3D000
heap
page read and write
4E3E000
stack
page read and write
40A4000
heap
page read and write
55B000
stack
page read and write
2A7F3000
heap
page read and write
1099000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
2744000
unkown
page read and write
4060000
heap
page read and write
4A29000
trusted library allocation
page read and write
246E7000
heap
page read and write
27F8000
direct allocation
page read and write
7FF3FF356000
trusted library allocation
page readonly
2913000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
24700000
heap
page read and write
2744000
unkown
page read and write
5E94000
heap
page read and write
2810000
trusted library allocation
page read and write
20EE8CB0000
unkown
page readonly
C49000
heap
page read and write
30E1000
heap
page read and write
133A000
stack
page read and write
5DD0000
heap
page read and write
2744000
unkown
page read and write
450E000
stack
page read and write
61ED4000
direct allocation
page readonly
1080000
trusted library allocation
page read and write
30CA000
heap
page read and write
5E3F000
heap
page read and write
7FF3FF342000
trusted library allocation
page readonly
4B25000
trusted library allocation
page read and write
20EEF776000
heap
page read and write
7FFD9B614000
trusted library allocation
page read and write
75EE000
heap
page read and write
2832000
direct allocation
page read and write
761000
unkown
page read and write
4119000
heap
page read and write
5E40000
heap
page read and write
20EE8E5D000
heap
page read and write
A54000
trusted library allocation
page read and write
BDA000
heap
page read and write
2950000
heap
page read and write
20EEB270000
heap
page read and write
5DD0000
heap
page read and write
B80000
heap
page read and write
2FA2000
heap
page read and write
5AD0000
trusted library allocation
page execute and read and write
20EEF802000
heap
page read and write
6358000
heap
page read and write
2FAF000
stack
page read and write
BCE000
heap
page read and write
1605000
heap
page read and write
7FFD9B656000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
7FF3FF35E000
trusted library allocation
page readonly
6BCCF000
unkown
page write copy
4110000
heap
page read and write
2719000
trusted library allocation
page read and write
246F7000
heap
page read and write
1380000
heap
page read and write
4F11000
unkown
page read and write
352D000
trusted library allocation
page read and write
5E3F000
heap
page read and write
4F7E000
stack
page read and write
5E55000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
95B000
stack
page read and write
246E6000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
29AE000
stack
page read and write
2936000
trusted library allocation
page read and write
281C000
trusted library allocation
page read and write
2A750000
heap
page read and write
3FFE000
trusted library allocation
page read and write
20EEB450000
heap
page read and write
49B0000
trusted library allocation
page read and write
3131000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
20E8041D000
trusted library allocation
page read and write
5E36000
heap
page read and write
A53000
trusted library allocation
page execute and read and write
27E0000
heap
page read and write
76A000
unkown
page read and write
2A91C000
heap
page read and write
7FFD9B610000
trusted library allocation
page read and write
37B3000
heap
page read and write
4B10000
trusted library allocation
page read and write
3050000
heap
page read and write
30B0000
heap
page read and write
5AF1000
trusted library allocation
page read and write
6C467000
unkown
page readonly
11D0000
heap
page read and write
2890000
direct allocation
page read and write
3B05000
heap
page read and write
4041000
unkown
page read and write
12B8000
heap
page read and write
7C6000
trusted library allocation
page execute and read and write
2E3E000
stack
page read and write
7FFD9B44D000
trusted library allocation
page execute and read and write
284B000
trusted library allocation
page read and write
123C000
stack
page read and write
5E3D000
heap
page read and write
24700000
heap
page read and write
5E95000
heap
page read and write
DE0000
heap
page read and write
24711000
heap
page read and write
7FFD9B640000
trusted library allocation
page read and write
253F000
trusted library allocation
page read and write
290B000
trusted library allocation
page read and write
20EEBE10000
trusted library allocation
page read and write
2740000
unkown
page readonly
4F10000
unkown
page read and write
4BEC000
trusted library allocation
page read and write
286C000
direct allocation
page read and write
10A8000
trusted library allocation
page read and write
20EE8E88000
heap
page read and write
5DFD000
heap
page read and write
49F8000
trusted library allocation
page read and write
20EEBD90000
trusted library allocation
page read and write
246F3000
heap
page read and write
B90000
unkown
page readonly
51BE000
unkown
page read and write
27F4000
direct allocation
page read and write
4FE0000
trusted library allocation
page read and write
282C000
heap
page read and write
A64000
trusted library allocation
page read and write
20E80381000
trusted library allocation
page read and write
C10000
heap
page read and write
274A000
trusted library allocation
page read and write
31FE000
stack
page read and write
20EEBDE0000
trusted library allocation
page read and write
2471B000
heap
page read and write
247E8000
heap
page read and write
7FFD9B706000
trusted library allocation
page read and write
2621000
trusted library allocation
page read and write
2744000
unkown
page read and write
24782000
heap
page read and write
4A20000
trusted library allocation
page read and write
5E4D000
heap
page read and write
2C2F000
unkown
page read and write
404E000
heap
page read and write
3DD9000
heap
page read and write
2744000
unkown
page read and write
5E3C000
heap
page read and write
4890000
heap
page read and write
7FFD9B444000
trusted library allocation
page read and write
20EEF6E7000
heap
page read and write
20E90001000
trusted library allocation
page read and write
4A0D000
trusted library allocation
page read and write
5111000
unkown
page read and write
6CA3D000
unkown
page read and write
580000
unkown
page readonly
489C000
unkown
page read and write
4BB4000
trusted library allocation
page read and write
5E04000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
1E5FE000
stack
page read and write
2C50000
unkown
page read and write
488D000
heap
page read and write
34AE000
stack
page read and write
2899000
trusted library allocation
page read and write
246F6000
heap
page read and write
28E4000
trusted library allocation
page read and write
2471B000
heap
page read and write
2A798000
heap
page read and write
2E4C000
heap
page read and write
7FFD9B464000
trusted library allocation
page read and write
27CF000
stack
page read and write
5D0000
heap
page read and write
58F9000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
49E4000
trusted library allocation
page read and write
7FF3FF352000
trusted library allocation
page readonly
246EB000
heap
page read and write
27E7000
trusted library allocation
page read and write
5E5D000
heap
page read and write
296D000
trusted library allocation
page read and write
20EEF82B000
heap
page read and write
B74000
heap
page read and write
1370000
heap
page read and write
2744000
unkown
page read and write
A40000
trusted library allocation
page read and write
20EEF5B0000
heap
page read and write
5E41000
heap
page read and write
23E0000
heap
page read and write
5000000
trusted library allocation
page read and write
7FFD9B46B000
trusted library allocation
page execute and read and write
270C000
trusted library allocation
page read and write
2874000
direct allocation
page read and write
1050000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
5E55000
heap
page read and write
20EE683B000
unkown
page readonly
20EEB470000
heap
page read and write
5E42000
heap
page read and write
20EEF6EB000
heap
page read and write
7FF3FF354000
trusted library allocation
page readonly
20EEFAB0000
heap
page read and write
2744000
unkown
page read and write
281C000
direct allocation
page read and write
293D000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
20EEAAF0000
trusted library allocation
page read and write
28B5000
heap
page read and write
41F7000
heap
page read and write
3837000
heap
page read and write
2740000
heap
page read and write
5E36000
heap
page read and write
5E51000
heap
page read and write
2E9E000
stack
page read and write
49EC000
trusted library allocation
page read and write
A70000
heap
page read and write
5E58000
heap
page read and write
20E807EF000
trusted library allocation
page read and write
7A4000
trusted library allocation
page read and write
4210000
unkown
page read and write
20E9007E000
trusted library allocation
page read and write
5FB000
unkown
page write copy
2960000
trusted library allocation
page read and write
1DC000
stack
page read and write
69CD000
stack
page read and write
20E80394000
trusted library allocation
page read and write
28E7000
trusted library allocation
page read and write
1E770000
trusted library allocation
page read and write
20EEF5A5000
heap
page read and write
5A70000
trusted library allocation
page execute and read and write
5E4C000
heap
page read and write
20EEF595000
heap
page read and write
5E3C000
heap
page read and write
A79000
heap
page read and write
1DB000
stack
page read and write
C20000
heap
page read and write
BEA000
heap
page read and write
51DE000
stack
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
9C6747E000
stack
page read and write
20EEB356000
heap
page read and write
6BACD000
unkown
page readonly
49FE000
trusted library allocation
page read and write
24719000
heap
page read and write
20EEB2D3000
heap
page read and write
539E000
stack
page read and write
29F0000
heap
page read and write
5300000
unkown
page read and write
5E3F000
heap
page read and write
68CE000
stack
page read and write
5DB6000
heap
page read and write
2843000
trusted library allocation
page read and write
B5E000
stack
page read and write
20EEAA80000
heap
page read and write
4B30000
heap
page execute and read and write
9B8000
heap
page read and write
2594000
trusted library allocation
page read and write
26A8000
trusted library allocation
page read and write
1E20F000
stack
page read and write
2A7AC000
heap
page read and write
1170000
heap
page read and write
2744000
unkown
page read and write
27B9000
trusted library allocation
page read and write
69DF000
stack
page read and write
4F11000
unkown
page read and write
2D90000
heap
page read and write
2470B000
heap
page read and write
5E55000
heap
page read and write
783000
unkown
page readonly
28CA000
direct allocation
page read and write
30DD000
heap
page read and write
20EE8D80000
heap
page read and write
B74000
heap
page read and write
5E4A000
heap
page read and write
BC0000
heap
page read and write
2EB6000
heap
page read and write
30D2000
heap
page read and write
28F2000
trusted library allocation
page read and write
778000
unkown
page read and write
7FFD9B796000
trusted library allocation
page read and write
30C0000
heap
page read and write
20EEF83B000
heap
page read and write
3518000
trusted library allocation
page read and write
2659000
trusted library allocation
page read and write
2758000
trusted library allocation
page read and write
20EE5402000
unkown
page readonly
6CA44000
unkown
page read and write
7FFD9B6E0000
trusted library allocation
page execute and read and write
5E94000
heap
page read and write
3F89000
trusted library allocation
page read and write
5E42000
heap
page read and write
7FFD9B453000
trusted library allocation
page read and write
2470E000
heap
page read and write
3131000
heap
page read and write
7FFD9B667000
trusted library allocation
page read and write
D3C000
unkown
page readonly
257A000
trusted library allocation
page read and write
6C8E0000
unkown
page readonly
20EEFE84000
trusted library allocation
page read and write
41A000
unkown
page write copy
7F8000
heap
page read and write
197000
stack
page read and write
20EE9080000
trusted library allocation
page read and write
30DF000
heap
page read and write
5E94000
heap
page read and write
679F000
stack
page read and write
459B000
unkown
page read and write
61ED0000
direct allocation
page read and write
27B0000
unkown
page read and write
5E62000
heap
page read and write
2744000
unkown
page read and write
C12000
heap
page read and write
20EEA92E000
heap
page read and write
20EEB275000
heap
page read and write
246E6000
heap
page read and write
610000
heap
page read and write
7FFD9B632000
trusted library allocation
page read and write
2471B000
heap
page read and write
7FFD9B450000
trusted library allocation
page read and write
7FFD9B4F6000
trusted library allocation
page read and write
5E95000
heap
page read and write
774000
unkown
page read and write
C09000
heap
page read and write
C0C000
heap
page read and write
27C0000
direct allocation
page read and write
BF9000
heap
page read and write
813000
unkown
page readonly
2990000
heap
page read and write
28AC000
heap
page read and write
BEF000
heap
page read and write
9C66EF1000
stack
page read and write
289F000
direct allocation
page read and write
20EEBE00000
trusted library section
page read and write
7FFD9B817000
trusted library allocation
page read and write
2965000
trusted library allocation
page read and write
24700000
heap
page read and write
281F000
trusted library allocation
page read and write
20EEB440000
heap
page read and write
DC0000
trusted library allocation
page read and write
30C7000
heap
page read and write
5E4B000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
28BC000
direct allocation
page read and write
58EC000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
43ED000
trusted library allocation
page read and write
5E62000
heap
page read and write
14AE000
stack
page read and write
280B000
direct allocation
page read and write
401D000
unkown
page read and write
20EEF6EE000
heap
page read and write
9C66DFB000
stack
page read and write
5E94000
heap
page read and write
400000
unkown
page readonly
44CD000
unkown
page read and write
67A0000
heap
page read and write
5E51000
heap
page read and write
7FFD9B60E000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
2470E000
heap
page read and write
246E6000
heap
page read and write
277C000
trusted library allocation
page read and write
BE1000
heap
page read and write
5F30000
heap
page read and write
49ED000
trusted library allocation
page read and write
27C7000
trusted library allocation
page read and write
11D4000
heap
page read and write
3411000
trusted library allocation
page read and write
8F8000
stack
page read and write
5E3D000
heap
page read and write
449F000
stack
page read and write
2744000
unkown
page read and write
B74000
heap
page read and write
7FFD9B500000
trusted library allocation
page execute and read and write
2940000
heap
page read and write
5E94000
heap
page read and write
4A06000
trusted library allocation
page read and write
5E4B000
heap
page read and write
2A770000
heap
page read and write
20EE7C3B000
unkown
page readonly
660000
heap
page read and write
5E54000
heap
page read and write
20EEF557000
heap
page read and write
26E8000
trusted library allocation
page read and write
39C5000
trusted library allocation
page read and write
5E02000
heap
page read and write
20EEF550000
heap
page read and write
26B6000
trusted library allocation
page read and write
27E4000
unkown
page read and write
2744000
unkown
page read and write
47B1000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
20EE8E20000
heap
page read and write
116E000
stack
page read and write
1E4FE000
stack
page read and write
5B30000
trusted library allocation
page execute and read and write
A0E000
stack
page read and write
42C0000
trusted library allocation
page read and write
26FA000
stack
page read and write
28D8000
trusted library allocation
page read and write
1E00F000
stack
page read and write
400000
unkown
page execute and read and write
2770000
heap
page read and write
2910000
trusted library allocation
page read and write
246E6000
heap
page read and write
27DE000
direct allocation
page read and write
246EE000
heap
page read and write
20E80239000
trusted library allocation
page read and write
30D8000
heap
page read and write
6740000
heap
page read and write
39C1000
trusted library allocation
page read and write
4FD0000
heap
page read and write
5E6F000
heap
page read and write
30CD000
heap
page read and write
30A0000
heap
page read and write
2951000
trusted library allocation
page read and write
20EEF770000
heap
page read and write
4FF0000
trusted library allocation
page read and write
20EE8D90000
heap
page read and write
5E94000
heap
page read and write
3979000
heap
page read and write
27B6000
direct allocation
page read and write
A3E000
stack
page read and write
246F7000
heap
page read and write
20EE9050000
heap
page execute and read and write
410E000
stack
page read and write
61E01000
direct allocation
page execute read
5908000
trusted library allocation
page read and write
1E779000
heap
page read and write
10A0000
trusted library allocation
page read and write
5E5C000
heap
page read and write
A76000
heap
page read and write
27E0000
trusted library allocation
page read and write
5E3C000
heap
page read and write
2744000
unkown
page read and write
246F7000
heap
page read and write
7FF3FF358000
trusted library allocation
page readonly
411E000
heap
page read and write
766000
unkown
page read and write
5E9C000
heap
page read and write
20EEBDA0000
trusted library allocation
page read and write
404A000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
27CC000
direct allocation
page read and write
2804000
direct allocation
page read and write
26C1000
trusted library allocation
page read and write
868000
heap
page read and write
2675000
trusted library allocation
page read and write
29B0000
heap
page read and write
239A000
stack
page read and write
246FD000
heap
page read and write
20EEBD40000
trusted library allocation
page read and write
5E94000
heap
page read and write
246E9000
heap
page read and write
401F000
unkown
page readonly
1E670000
heap
page read and write
20EEBDB0000
trusted library allocation
page read and write
2A83A000
heap
page read and write
2BB0000
heap
page read and write
413000
unkown
page readonly
4436000
unkown
page read and write
7FFD9B6C5000
trusted library allocation
page read and write
3156A000
heap
page read and write
2CA0000
heap
page read and write
7A0000
trusted library allocation
page read and write
30C5000
heap
page read and write
549000
unkown
page execute and read and write
5E55000
heap
page read and write
7FFD9B600000
trusted library allocation
page read and write
5DE8000
heap
page read and write
20EEF81A000
heap
page read and write
28A7000
trusted library allocation
page read and write
20EEF973000
heap
page read and write
3522000
trusted library allocation
page read and write
28AD000
direct allocation
page read and write
42AD000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
5E5D000
heap
page read and write
24780000
heap
page read and write
2700000
trusted library allocation
page read and write
20EEAAB0000
heap
page read and write
5A62000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
2A92A000
heap
page read and write
20EEF952000
heap
page read and write
40A8000
heap
page read and write
445E000
trusted library allocation
page read and write
11D4000
heap
page read and write
20EEF570000
heap
page read and write
5BE0000
trusted library allocation
page execute and read and write
24700000
heap
page read and write
10B0000
heap
page read and write
5E46000
heap
page read and write
7FFD9B650000
trusted library allocation
page read and write
5DBE000
stack
page read and write
20EEF9B0000
heap
page read and write
20EEF6A9000
heap
page read and write
65CB000
stack
page read and write
20EEF554000
heap
page read and write
2744000
unkown
page read and write
DCB000
trusted library allocation
page read and write
C24000
heap
page read and write
549F000
stack
page read and write
20EEB2F2000
heap
page read and write
6BCD0000
unkown
page read and write
C3D000
heap
page read and write
7C0000
trusted library allocation
page read and write
7FFD9B440000
trusted library allocation
page read and write
2A79F000
heap
page read and write
C45000
heap
page read and write
5E4B000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
2CB1000
heap
page read and write
20EEF72A000
heap
page read and write
5D40000
heap
page read and write
7FFD9B443000
trusted library allocation
page execute and read and write
C32000
heap
page read and write
15C0000
heap
page read and write
2CB0000
heap
page read and write
2744000
unkown
page read and write
5AA0000
trusted library allocation
page read and write
279C000
heap
page read and write
4043000
unkown
page readonly
20EEAA70000
trusted library section
page read and write
27E4000
unkown
page read and write
2AC0000
unkown
page read and write
7FFD9B718000
trusted library allocation
page read and write
27D2000
trusted library allocation
page read and write
20EEC0A0000
trusted library section
page read and write
26BB000
trusted library allocation
page read and write
26F8000
trusted library allocation
page read and write
5DC1000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
A10000
heap
page read and write
20EE9160000
heap
page read and write
2627000
trusted library allocation
page read and write
5D7E000
stack
page read and write
5DC0000
heap
page read and write
20E9001C000
trusted library allocation
page read and write
2886000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
20EEB2EB000
heap
page read and write
41DE000
heap
page read and write
C3F000
heap
page read and write
1E10F000
stack
page read and write
246F7000
heap
page read and write
27C3000
direct allocation
page read and write
20EEB280000
heap
page read and write
285E000
direct allocation
page read and write
B91000
unkown
page execute read
30DF000
heap
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
5CC0000
heap
page read and write
5E3C000
heap
page read and write
5E5E000
heap
page read and write
C33000
heap
page read and write
30A40000
heap
page read and write
7FF3FF351000
trusted library allocation
page execute read
2744000
unkown
page read and write
5E70000
heap
page read and write
20EEF87C000
heap
page read and write
64BC000
stack
page read and write
7BD000
trusted library allocation
page execute and read and write
7DB000
trusted library allocation
page execute and read and write
265C000
trusted library allocation
page read and write
28FD000
trusted library allocation
page read and write
C22000
heap
page read and write
5010000
trusted library allocation
page execute and read and write
1E660000
heap
page read and write
6C60000
heap
page read and write
31FB9000
heap
page read and write
8E4000
heap
page read and write
9C6797E000
stack
page read and write
246FD000
heap
page read and write
D3C000
unkown
page readonly
20EE9023000
trusted library allocation
page read and write
293C000
stack
page read and write
9C6777B000
stack
page read and write
2812000
trusted library allocation
page read and write
5E4C000
heap
page read and write
2F90000
heap
page read and write
20EEF9D3000
heap
page read and write
2865000
direct allocation
page read and write
2F3F000
stack
page read and write
30C8000
heap
page read and write
6397000
heap
page read and write
9C66FF4000
stack
page read and write
49E0000
trusted library allocation
page read and write
31560000
heap
page read and write
2744000
unkown
page read and write
20EEF58E000
heap
page read and write
2744000
unkown
page read and write
9EB000
heap
page read and write
6C459000
unkown
page write copy
40BE000
stack
page read and write
2DB1000
heap
page read and write
B90000
unkown
page readonly
20EEFAA4000
heap
page read and write
5110000
unkown
page read and write
50DE000
stack
page read and write
1600000
heap
page read and write
6BA51000
unkown
page execute read
B88000
heap
page read and write
7FFD9B730000
trusted library allocation
page read and write
28B4000
direct allocation
page read and write
2AB0000
heap
page read and write
2400000
heap
page read and write
2AF0000
heap
page read and write
7FFD9B7BF000
trusted library allocation
page read and write
A7A000
stack
page read and write
28D1000
direct allocation
page read and write
28C3000
direct allocation
page read and write
9C665FE000
stack
page read and write
230000
unkown
page readonly
293C000
trusted library allocation
page read and write
7FFD9B7B7000
trusted library allocation
page read and write
4140000
heap
page read and write
20EE9090000
trusted library section
page read and write
191000
stack
page read and write
B74000
heap
page read and write
220000
unkown
page readonly
3098C000
stack
page read and write
4130000
heap
page read and write
5915000
trusted library allocation
page read and write
260B000
trusted library allocation
page read and write
41F0000
heap
page read and write
2744000
unkown
page read and write
20EE723B000
unkown
page readonly
246E0000
heap
page read and write
2471A000
heap
page read and write
3161C000
stack
page read and write
41F7000
heap
page read and write
DA0000
unkown
page write copy
30DD000
heap
page read and write
2744000
unkown
page read and write
20EE9163000
heap
page read and write
3237000
heap
page read and write
282A000
trusted library allocation
page read and write
2744000
unkown
page read and write
20EEF662000
heap
page read and write
5B10000
trusted library allocation
page read and write
3151C000
stack
page read and write
2820000
heap
page read and write
31A7C000
heap
page read and write
C3B000
heap
page read and write
7FFD9B49C000
trusted library allocation
page execute and read and write
23DE000
stack
page read and write
5E51000
heap
page read and write
2882000
direct allocation
page read and write
20EEF64A000
heap
page read and write
85A000
heap
page read and write
DA9000
unkown
page write copy
67B8000
heap
page read and write
5E3D000
heap
page read and write
15AE000
stack
page read and write
26F2000
trusted library allocation
page read and write
2C40000
unkown
page read and write
31FE1000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
1F0000
heap
page read and write
CA5000
heap
page read and write
B60000
heap
page read and write
7FFD9B60B000
trusted library allocation
page read and write
20EEF760000
trusted library allocation
page read and write
7FF3FF343000
trusted library allocation
page execute read
5DB0000
heap
page read and write
4A01000
trusted library allocation
page read and write
401000
unkown
page execute read
FCF000
stack
page read and write
6BC8F000
unkown
page readonly
294E000
trusted library allocation
page read and write
43CF000
stack
page read and write
401000
unkown
page execute read
2B2E000
unkown
page read and write
2744000
unkown
page read and write
259F000
trusted library allocation
page read and write
20E8043B000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
3C8F000
heap
page read and write
7FFD9B75B000
trusted library allocation
page read and write
7A3000
trusted library allocation
page execute and read and write
5E60000
heap
page read and write
20EEB48D000
heap
page read and write
2750000
unkown
page readonly
20EEB490000
heap
page read and write
C18000
heap
page read and write
30C9000
heap
page read and write
5E62000
heap
page read and write
C2E000
heap
page read and write
28EA000
trusted library allocation
page read and write
5E3F000
heap
page read and write
2A793000
heap
page read and write
20EEF7D1000
heap
page read and write
2744000
unkown
page read and write
20E80445000
trusted library allocation
page read and write
20EE8E47000
heap
page read and write
5E02000
heap
page read and write
41DA000
heap
page read and write
C35000
heap
page read and write
20EEFAD2000
heap
page read and write
7FFD9B560000
trusted library allocation
page execute and read and write
27AB000
direct allocation
page read and write
6BCD5000
unkown
page readonly
There are 1457 hidden memdumps, click here to show them.