IOC Report
TNQTc6Qmkg.exe

loading gif

Files

File Path
Type
Category
Malicious
TNQTc6Qmkg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tiktok[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HDBKJEGIEB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bxhlahunbhc
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\osssciedmed
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3bs.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3bs.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3bs.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3bs.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3bs.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SecureClient\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AEHIECAFCGDBFHIDBKFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BQJUWOYRTO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CGHCGIIDGDAKFIEBKFCF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAKFCGIJKJKFHIDHIIIEBGCBFB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGDBAKKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FCFIJEBF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HCFBFBAEBKJKEBGCAEHCFCBAEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\HTAGVDFUIE.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JEBKKEGDBFIIEBFHIEHCBKJJKJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KATAXZVCPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KZWFNRXYKI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86DC.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 27 00:20:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F88.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8FC7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA541.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Apr 27 00:20:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA775.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7F3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NWCXBPIUYI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\YPSIACHYXW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bd2f8780
data
dropped
C:\Users\user\AppData\Local\Temp\d5c4eeb7
data
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\kccglr
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 24 04:56:20 2024, mtime=Fri Apr 26 23:19:52 2024, atime=Wed Apr 24 04:56:20 2024, length=2469936, window=hide
dropped
C:\Users\user\AppData\Local\Temp\tmpC87D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\u3bs.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u3bs.2\bunch.dat
data
dropped
C:\Users\user\AppData\Local\Temp\u3bs.2\whale.dbf
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\bunch.dat
data
dropped
C:\Users\user\AppData\Roaming\SecureClient\whale.dbf
data
dropped
Chrome Cache Entry: 111
ASCII text, with very long lines (787)
downloaded
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TNQTc6Qmkg.exe
"C:\Users\user\Desktop\TNQTc6Qmkg.exe"
malicious
C:\Users\user\AppData\Local\Temp\u3bs.0.exe
"C:\Users\user\AppData\Local\Temp\u3bs.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u3bs.2\run.exe
"C:\Users\user\AppData\Local\Temp\u3bs.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\u3bs.2\run.exe
"C:\Users\user\AppData\Local\Temp\u3bs.2\run.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\u3bs.3.exe
"C:\Users\user\AppData\Local\Temp\u3bs.3.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\HDBKJEGIEB.exe"
malicious
C:\Users\user\AppData\Local\Temp\HDBKJEGIEB.exe
"C:\Users\user\AppData\Local\Temp\HDBKJEGIEB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://923204732243015979198396844819192998461207207524972816830460816/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1948,i,6675877024813103109,700328751344061810,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1948,i,6675877024813103109,700328751344061810,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 1392
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6808 -s 2360
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/freebl3.dll
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=eight&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/vcruntime140.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.vmware.com/0
unknown
http://ocsp.sectigo.com0
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
20.9.155.145
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.indyproject.org/
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://google.com
unknown
http://185.172.128.203/tiktok.exe
185.172.128.203
http://185.172.128.203/tiktok.exe00
unknown
http://185.172.128.228/ping.php?substr=eight
185.172.128.228
http://185.172.128.76/15f649199f40275b/sqlite3.dll#
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://185.172.128.76/15f649199f40275b/msvcp140.dllQ
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgSaEMC5GMCJsbEGIjDQUM1XksqiVK7TvDJ-VWO8_5g4InGTtoS9EM--2kh8-SXh1FoYbI9aSPEi5GAatgQyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.32.100
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
https://pastebin.com/raw/z9pYkqPQPOdq8
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.32.100
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sqlite.org/copyright.html.
unknown
http://note.padd.cn.com/1/Package.zip
176.97.76.106
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllc
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllr
unknown
http://ocsp.thawte.com0
unknown
http://www.vmware.com/0/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpb530a5706ea79088c3d36b56fcb77release4d62687a42cd9519ca69bf
unknown
https://www.google.com/async/newtab_promos
142.251.32.100
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpt
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.
unknown
https://www.ecosia.org/newtab/
unknown
http://www.symauth.com/cps0(
unknown
https://pastebin.com/raw/z9pYkqPQ
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
http://185.172.128.76/15f649199f40275b/vcruntime140.dll)
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.32.100
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.32.100
http://www.symauth.com/rpa00
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exebbC
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
169.150.236.99
http://www.info-zip.org/
unknown
http://185.172.128.203/tiktok.exet-Disposition:
unknown
http://185.172.128.203/tiktok.exe&
unknown
http://download.iolo.net
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
http://185.172.128.76/15f649199f40275b/vcruntime140.dll:
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllb
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
download.iolo.net
unknown
malicious
www.google.com
142.251.32.100
iolo0.b-cdn.net
169.150.236.99
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
192.168.2.4
unknown
unknown
malicious
91.215.85.66
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
185.172.128.203
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation
239.255.255.250
unknown
Reserved
142.251.32.100
www.google.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
ProgramId
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
FileId
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
LowerCaseLongPath
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
LongPathHash
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
Name
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
OriginalFileName
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
Publisher
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
Version
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
BinFileVersion
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
BinaryType
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
ProductName
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
ProductVersion
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
LinkDate
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
BinProductVersion
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
AppxPackageFullName
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
AppxPackageRelativeId
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
Size
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
Language
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\tnqtc6qmkg.exe|fb525984a830e3d4
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
ProgramId
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
FileId
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
LowerCaseLongPath
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
LongPathHash
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
Name
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
OriginalFileName
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
Publisher
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
Version
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
BinFileVersion
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
BinaryType
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
ProductName
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
ProductVersion
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
LinkDate
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
BinProductVersion
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
AppxPackageFullName
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
AppxPackageRelativeId
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
Size
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
Language
\REGISTRY\A\{abba5c1c-8dc8-3496-9368-195c8da1d77f}\Root\InventoryApplicationFile\u3bs.0.exe|283b3b135507ae2a
Usn
There are 50 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5D80000
direct allocation
page read and write
malicious
42A0000
direct allocation
page execute and read and write
malicious
432A000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
3BCF000
heap
page read and write
malicious
3E57000
heap
page read and write
malicious
60B0000
direct allocation
page read and write
malicious
5671000
trusted library allocation
page read and write
malicious
576A000
trusted library allocation
page read and write
malicious
42D0000
direct allocation
page read and write
malicious
2764000
direct allocation
page read and write
580B000
trusted library allocation
page read and write
26C4000
direct allocation
page read and write
5FB8000
heap
page read and write
3234000
unkown
page read and write
9F0000
heap
page read and write
1E671000
heap
page read and write
31C81000
heap
page read and write
5EF0000
heap
page read and write
3100000
heap
page read and write
3804000
unkown
page read and write
6D00000
trusted library allocation
page execute and read and write
5F5D000
heap
page read and write
5CF0000
direct allocation
page execute and read and write
E98000
heap
page read and write
5EF1000
heap
page read and write
30AA0000
trusted library allocation
page read and write
5C4E000
stack
page read and write
2A0F000
trusted library allocation
page read and write
2724000
direct allocation
page read and write
340E000
unkown
page read and write
3147C000
stack
page read and write
5F79000
heap
page read and write
5C6F000
trusted library allocation
page read and write
40BD000
trusted library allocation
page read and write
2640000
heap
page read and write
66D3000
heap
page read and write
5EF6000
heap
page read and write
36D0000
heap
page read and write
D8E000
stack
page read and write
31C6D000
heap
page read and write
530B000
stack
page read and write
5F6E000
heap
page read and write
31B63000
heap
page read and write
61ED3000
direct allocation
page read and write
5DEE000
stack
page read and write
B1E000
unkown
page readonly
3A13000
trusted library allocation
page read and write
5FAE000
heap
page read and write
401000
unkown
page execute read
28E8000
heap
page read and write
31CA9000
heap
page read and write
3234000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
5CA000
stack
page read and write
1E4FE000
stack
page read and write
246E7000
heap
page read and write
5C49000
trusted library allocation
page read and write
399F000
trusted library allocation
page read and write
2659000
direct allocation
page read and write
A20000
heap
page read and write
5FAE000
heap
page read and write
5F07000
heap
page read and write
2CFE000
trusted library allocation
page read and write
19AF000
stack
page read and write
3917000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
394B000
trusted library allocation
page read and write
780000
unkown
page readonly
5879000
trusted library allocation
page read and write
30F4000
heap
page read and write
2A7D3000
heap
page read and write
2A33000
trusted library allocation
page read and write
4FBE000
stack
page read and write
6970000
heap
page read and write
3494000
unkown
page read and write
B0A000
heap
page read and write
1E0CF000
stack
page read and write
425E000
heap
page read and write
59B8000
stack
page read and write
5FAE000
heap
page read and write
9F0000
heap
page read and write
359D000
heap
page read and write
5EF0000
heap
page read and write
5FAE000
heap
page read and write
601F000
stack
page read and write
246EC000
heap
page read and write
24702000
heap
page read and write
6B0FE000
unkown
page read and write
A40000
trusted library allocation
page read and write
954000
heap
page read and write
5F6B000
heap
page read and write
BC3000
heap
page read and write
19B000
stack
page read and write
5EF1000
heap
page read and write
5888000
trusted library allocation
page read and write
31480000
heap
page read and write
13FF000
unkown
page readonly
80000
unkown
page readonly
30FF000
heap
page read and write
650E000
stack
page read and write
624000
unkown
page execute and read and write
5EEE000
heap
page read and write
A44000
heap
page read and write
26EE000
stack
page read and write
30FC000
heap
page read and write
400000
unkown
page readonly
2788000
direct allocation
page read and write
246E6000
heap
page read and write
2940000
heap
page read and write
26E9000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
3A80000
trusted library allocation
page read and write
6C651000
unkown
page execute read
5EDD000
heap
page read and write
584E000
trusted library allocation
page read and write
2FE0000
unkown
page read and write
3234000
unkown
page read and write
5F62000
heap
page read and write
13F9000
unkown
page readonly
5CA0000
trusted library allocation
page execute and read and write
5FAE000
heap
page read and write
3B40000
trusted library allocation
page read and write
6C8B7000
unkown
page readonly
4367000
heap
page read and write
7C0000
unkown
page readonly
B4C000
heap
page read and write
5FAF000
heap
page read and write
91D000
heap
page read and write
B46000
heap
page read and write
41C000
unkown
page execute read
778000
unkown
page read and write
5F87000
heap
page read and write
246EB000
heap
page read and write
2FB0000
unkown
page readonly
5C0E000
stack
page read and write
4DBE000
stack
page read and write
313A000
stack
page read and write
3234000
unkown
page read and write
2A95F000
stack
page read and write
246FE000
heap
page read and write
3234000
unkown
page read and write
197000
stack
page read and write
B8B000
heap
page read and write
5F66000
heap
page read and write
331F000
stack
page read and write
CDF000
stack
page read and write
6AE11000
unkown
page execute read
5F70000
heap
page read and write
13FB000
unkown
page readonly
5B51000
unkown
page read and write
1E25E000
stack
page read and write
400000
unkown
page execute and read and write
760000
unkown
page read and write
6C650000
unkown
page readonly
43A5000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
935000
heap
page read and write
6B102000
unkown
page readonly
7E3000
unkown
page readonly
1338000
stack
page read and write
418D000
trusted library allocation
page read and write
30E7000
heap
page read and write
5F87000
heap
page read and write
400000
unkown
page readonly
41FE000
trusted library allocation
page read and write
608F000
stack
page read and write
3A52000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
275D000
direct allocation
page read and write
59C9000
direct allocation
page read and write
3935000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
B18000
heap
page read and write
4C32000
trusted library allocation
page read and write
31C68000
heap
page read and write
37E0000
unkown
page read and write
3722000
heap
page read and write
246E6000
heap
page read and write
39D0000
trusted library allocation
page read and write
246F0000
heap
page read and write
39E8000
trusted library allocation
page read and write
30FD000
heap
page read and write
246E7000
heap
page read and write
B30000
heap
page read and write
C4E000
stack
page read and write
3959000
trusted library allocation
page read and write
5EDD000
heap
page read and write
1DF8F000
stack
page read and write
B40000
heap
page read and write
3235000
unkown
page read and write
1E3AE000
stack
page read and write
5836000
trusted library allocation
page read and write
5F54000
heap
page read and write
31BB4000
heap
page read and write
1427000
unkown
page readonly
5CC1000
heap
page read and write
5CC9000
heap
page read and write
4383000
heap
page read and write
246D8000
heap
page read and write
5F73000
heap
page read and write
1F5000
heap
page read and write
5D30000
trusted library allocation
page execute and read and write
5CCF000
heap
page read and write
81000
unkown
page execute read
4060000
trusted library allocation
page read and write
38DE000
trusted library allocation
page read and write
1513000
trusted library allocation
page execute and read and write
2AD4000
trusted library allocation
page read and write
5ED7000
heap
page read and write
44F3000
unkown
page read and write
3234000
unkown
page read and write
2EED000
stack
page read and write
30EF000
heap
page read and write
246F0000
heap
page read and write
123B000
stack
page read and write
25DB000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5F76000
heap
page read and write
5F78000
heap
page read and write
2EA0000
unkown
page read and write
25BC000
stack
page read and write
5DAE000
unkown
page read and write
3CC0000
heap
page read and write
2470B000
heap
page read and write
5F7E000
heap
page read and write
3234000
unkown
page read and write
3494000
unkown
page read and write
5FAE000
heap
page read and write
5DAE000
stack
page read and write
28D0000
heap
page read and write
5EF6000
heap
page read and write
4C80000
trusted library allocation
page read and write
58CD000
direct allocation
page read and write
30D0000
heap
page read and write
2470C000
heap
page read and write
5EEE000
heap
page read and write
5D21000
trusted library allocation
page read and write
2A760000
heap
page read and write
39B8000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
5ED7000
heap
page read and write
31C45000
heap
page read and write
5F8F000
heap
page read and write
6AF27000
unkown
page readonly
5C3C000
stack
page read and write
3109000
heap
page read and write
3A22000
trusted library allocation
page read and write
246E8000
heap
page read and write
3940000
trusted library allocation
page read and write
31BF0000
heap
page read and write
3101000
heap
page read and write
3160000
unkown
page readonly
3494000
unkown
page read and write
7CC000
unkown
page readonly
C3E000
heap
page read and write
2965000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
1672000
heap
page read and write
5B3E000
stack
page read and write
3B4D000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
266E000
direct allocation
page read and write
4470000
unkown
page read and write
5980000
heap
page read and write
3234000
unkown
page read and write
290000
unkown
page read and write
246FE000
heap
page read and write
246FE000
heap
page read and write
29DB000
trusted library allocation
page read and write
4F7E000
stack
page read and write
5F61000
heap
page read and write
1E770000
trusted library allocation
page read and write
3923000
trusted library allocation
page read and write
5F8E000
heap
page read and write
A33000
heap
page read and write
81000
unkown
page execute read
5F5C000
heap
page read and write
15BE000
stack
page read and write
5EEE000
stack
page read and write
31C27000
heap
page read and write
161A000
heap
page read and write
38D4000
trusted library allocation
page read and write
8C0000
heap
page read and write
26F8000
direct allocation
page read and write
3170000
unkown
page readonly
3494000
unkown
page read and write
5CD0000
trusted library allocation
page read and write
2A4F000
stack
page read and write
5FAE000
heap
page read and write
5F6B000
heap
page read and write
3970000
trusted library allocation
page read and write
3711000
unkown
page read and write
39CB000
trusted library allocation
page read and write
2943000
heap
page read and write
31C59000
heap
page read and write
4041000
unkown
page read and write
A70000
trusted library allocation
page read and write
2A83A000
heap
page read and write
6AC000
stack
page read and write
321E000
unkown
page read and write
71FF000
stack
page read and write
D4E000
stack
page read and write
76C000
unkown
page read and write
6720000
heap
page read and write
5EDD000
heap
page read and write
37B7000
trusted library allocation
page read and write
5FAE000
heap
page read and write
2666000
direct allocation
page read and write
28E0000
direct allocation
page execute and read and write
6AF69000
unkown
page write copy
3742000
heap
page read and write
263E000
stack
page read and write
AA1000
unkown
page execute read
5EDD000
heap
page read and write
3230000
heap
page read and write
5ED7000
heap
page read and write
B0C000
unkown
page readonly
5FAE000
heap
page read and write
DDF000
stack
page read and write
5D00000
trusted library allocation
page execute and read and write
15E0000
trusted library allocation
page execute and read and write
954000
heap
page read and write
246F0000
heap
page read and write
5FAE000
heap
page read and write
B1E000
unkown
page readonly
246F0000
heap
page read and write
5F81000
heap
page read and write
31C2C000
heap
page read and write
3804000
unkown
page read and write
5851000
trusted library allocation
page read and write
2A7E2000
heap
page read and write
5F5F000
heap
page read and write
5C42000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
2470B000
heap
page read and write
41F0000
heap
page read and write
B5E000
heap
page read and write
5EEE000
heap
page read and write
A44000
heap
page read and write
6C830000
unkown
page read and write
2B4B000
heap
page read and write
31C86000
heap
page read and write
31C13000
heap
page read and write
5F6E000
heap
page read and write
66F2000
heap
page read and write
31C90000
heap
page read and write
31DE000
unkown
page read and write
3234000
unkown
page read and write
9AE000
stack
page read and write
3A6B000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
A8E000
stack
page read and write
2BFC000
trusted library allocation
page read and write
37DF000
unkown
page read and write
30E5000
heap
page read and write
6950000
trusted library allocation
page execute and read and write
30F2000
heap
page read and write
4314000
heap
page execute and read and write
3570000
heap
page read and write
5F7E000
heap
page read and write
38EC000
trusted library allocation
page read and write
390A000
trusted library allocation
page read and write
5F6E000
heap
page read and write
1403000
unkown
page readonly
5C51000
unkown
page read and write
5F79000
heap
page read and write
C30000
heap
page read and write
155B000
trusted library allocation
page execute and read and write
3490000
heap
page read and write
7F4000
unkown
page readonly
3234000
unkown
page read and write
14C0000
heap
page read and write
1530000
trusted library allocation
page read and write
2F40000
heap
page read and write
67B0000
heap
page read and write
7D2000
unkown
page readonly
3234000
unkown
page read and write
ACE000
stack
page read and write
1432000
unkown
page readonly
5BEE000
stack
page read and write
5F69000
heap
page read and write
5EF6000
heap
page read and write
2668000
direct allocation
page read and write
A44000
heap
page read and write
290000
unkown
page read and write
3B9A000
trusted library allocation
page read and write
3B5A000
trusted library allocation
page read and write
3234000
unkown
page read and write
4C06000
trusted library allocation
page read and write
5F63000
heap
page read and write
13AF000
unkown
page readonly
2B30000
trusted library allocation
page read and write
246D2000
heap
page read and write
31C1D000
heap
page read and write
267C000
direct allocation
page read and write
3234000
unkown
page read and write
5F5E000
heap
page read and write
5F6B000
heap
page read and write
3410000
heap
page read and write
246FF000
heap
page read and write
2CF3000
trusted library allocation
page read and write
291B000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
5ED7000
heap
page read and write
246E3000
heap
page read and write
395E000
trusted library allocation
page read and write
2C27000
trusted library allocation
page read and write
AE8000
heap
page read and write
339F000
stack
page read and write
3F90000
trusted library allocation
page read and write
52C7000
heap
page read and write
31BF5000
heap
page read and write
813000
unkown
page readonly
68ED000
stack
page read and write
5EF1000
heap
page read and write
70FE000
stack
page read and write
425A000
heap
page read and write
27B1000
trusted library allocation
page read and write
5F8F000
heap
page read and write
401000
unkown
page execute read
31BAF000
heap
page read and write
3234000
unkown
page read and write
5880000
trusted library allocation
page read and write
6AF74000
unkown
page read and write
5F81000
heap
page read and write
7C4000
unkown
page readonly
B94000
heap
page read and write
31C63000
heap
page read and write
272B000
direct allocation
page read and write
4BF0000
trusted library allocation
page read and write
3140000
heap
page read and write
2748000
direct allocation
page read and write
2DEC000
stack
page read and write
32070000
heap
page read and write
30E0000
heap
page read and write
2A825000
heap
page read and write
990000
heap
page read and write
BA7000
heap
page read and write
2A740000
heap
page read and write
5EF0000
unkown
page read and write
5F64000
heap
page read and write
3234000
unkown
page read and write
6B070000
unkown
page readonly
5F87000
heap
page read and write
5FAE000
heap
page read and write
A62000
trusted library allocation
page read and write
401000
unkown
page execute read
E80000
heap
page read and write
2A28000
trusted library allocation
page read and write
5F72000
heap
page read and write
5F73000
heap
page read and write
30A0000
heap
page read and write
4C83000
trusted library allocation
page read and write
6310000
heap
page read and write
39BF000
trusted library allocation
page read and write
3A71000
heap
page read and write
2B05000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5EF0000
heap
page read and write
33E2000
heap
page read and write
3234000
unkown
page read and write
81000
unkown
page execute read
3234000
unkown
page read and write
6C82E000
unkown
page read and write
31C0E000
heap
page read and write
31C04000
heap
page read and write
C1A000
heap
page read and write
246FE000
heap
page read and write
28C0000
heap
page read and write
30F8000
heap
page read and write
5ED7000
heap
page read and write
7CA000
unkown
page readonly
5D4E000
stack
page read and write
1470000
heap
page read and write
38E1000
trusted library allocation
page read and write
5FAF000
heap
page read and write
801000
unkown
page readonly
5F5C000
heap
page read and write
7D0000
unkown
page readonly
6BEE000
stack
page read and write
2673000
direct allocation
page read and write
321E000
stack
page read and write
E4E000
stack
page read and write
A44000
heap
page read and write
290000
unkown
page write copy
3234000
unkown
page read and write
5F72000
heap
page read and write
5F69000
heap
page read and write
3E30000
heap
page read and write
3910000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
24706000
heap
page read and write
3905000
trusted library allocation
page read and write
413B000
heap
page read and write
30E9000
heap
page read and write
3234000
unkown
page read and write
31C5E000
heap
page read and write
2A83C000
heap
page read and write
38E4000
trusted library allocation
page read and write
299000
unkown
page write copy
269D000
direct allocation
page read and write
3938000
trusted library allocation
page read and write
5F5D000
heap
page read and write
9B000
stack
page read and write
5F8B000
heap
page read and write
5FAE000
heap
page read and write
5F7A000
heap
page read and write
246E8000
heap
page read and write
2D7D000
trusted library allocation
page read and write
4070000
heap
page read and write
33C0000
heap
page read and write
3380000
heap
page read and write
5EC0000
heap
page read and write
40B9000
trusted library allocation
page read and write
5F79000
heap
page read and write
A44000
heap
page read and write
9E5000
heap
page read and write
246EC000
heap
page read and write
48AE000
stack
page read and write
3180000
unkown
page readonly
7AA000
stack
page read and write
5FAE000
heap
page read and write
246D6000
heap
page read and write
5F79000
heap
page read and write
7228000
heap
page read and write
5C50000
unkown
page read and write
30EE000
heap
page read and write
930000
heap
page read and write
6C82F000
unkown
page write copy
24713000
heap
page read and write
A10000
heap
page read and write
3234000
unkown
page read and write
24709000
heap
page read and write
2C21000
trusted library allocation
page read and write
7F6000
unkown
page readonly
5FAE000
heap
page read and write
954000
heap
page read and write
246D6000
heap
page read and write
2470B000
heap
page read and write
2A05000
trusted library allocation
page read and write
5C51000
unkown
page read and write
76F000
unkown
page read and write
266C000
direct allocation
page read and write
C0F000
stack
page read and write
31C77000
heap
page read and write
B1B000
unkown
page write copy
43A1000
trusted library allocation
page read and write
2FC0000
unkown
page readonly
271C000
direct allocation
page read and write
A4D000
trusted library allocation
page execute and read and write
59FE000
stack
page read and write
2790000
heap
page read and write
6C751000
unkown
page execute read
315BC000
stack
page read and write
3A18000
trusted library allocation
page read and write
27A0000
heap
page execute and read and write
5CB0000
trusted library allocation
page read and write
5FB4000
heap
page read and write
431A000
heap
page read and write
5F54000
heap
page read and write
417000
unkown
page execute read
3310000
heap
page read and write
2999000
unkown
page read and write
31CA4000
heap
page read and write
F5C000
heap
page read and write
A77000
trusted library allocation
page execute and read and write
37F0000
unkown
page read and write
31C8B000
heap
page read and write
75F3000
heap
page read and write
32170000
heap
page read and write
53CD000
heap
page read and write
4C86000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
E50000
heap
page read and write
B15000
heap
page read and write
2D72000
trusted library allocation
page read and write
B50000
heap
page read and write
3A06000
trusted library allocation
page read and write
4C2D000
trusted library allocation
page read and write
3704000
unkown
page read and write
396B000
trusted library allocation
page read and write
3704000
unkown
page read and write
5B60000
unkown
page read and write
15C0000
heap
page execute and read and write
267F000
direct allocation
page read and write
3994000
trusted library allocation
page read and write
B25000
heap
page read and write
5F68000
heap
page read and write
95E000
stack
page read and write
246E0000
heap
page read and write
6C750000
unkown
page readonly
5F6E000
heap
page read and write
A40000
heap
page read and write
2664000
heap
page read and write
1F0000
heap
page read and write
549000
unkown
page execute and read and write
2470A000
heap
page read and write
30FB000
heap
page read and write
5F82000
heap
page read and write
2686000
direct allocation
page read and write
5F72000
heap
page read and write
30ED000
heap
page read and write
5C5F000
trusted library allocation
page read and write
6C867000
unkown
page readonly
6920000
trusted library allocation
page read and write
B4A000
heap
page read and write
398C000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
1DE8E000
stack
page read and write
3234000
unkown
page read and write
335E000
stack
page read and write
2470B000
heap
page read and write
A43000
trusted library allocation
page execute and read and write
6AAE000
stack
page read and write
3120000
heap
page read and write
30F2000
heap
page read and write
783000
unkown
page readonly
2D18000
trusted library allocation
page read and write
5EFF000
heap
page read and write
2C8E000
stack
page read and write
A10000
heap
page read and write
5F6E000
heap
page read and write
413000
unkown
page readonly
4D45000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
8D8000
heap
page read and write
3494000
unkown
page read and write
A50000
trusted library allocation
page read and write
A30000
heap
page read and write
2A3000
unkown
page readonly
39DD000
trusted library allocation
page read and write
30D7000
heap
page read and write
246D6000
heap
page read and write
5EFD000
heap
page read and write
296C000
trusted library allocation
page read and write
5FAE000
heap
page read and write
4D3B000
trusted library allocation
page read and write
31C95000
heap
page read and write
954000
heap
page read and write
5240000
trusted library allocation
page execute and read and write
26F1000
direct allocation
page read and write
26AD000
direct allocation
page read and write
5F69000
heap
page read and write
30FF000
heap
page read and write
2CE9000
trusted library allocation
page read and write
1423000
unkown
page readonly
5CED000
stack
page read and write
3D0D000
heap
page read and write
672F000
stack
page read and write
320A000
heap
page read and write
246D6000
heap
page read and write
1E4AD000
stack
page read and write
22C000
unkown
page readonly
3494000
unkown
page read and write
5EEE000
heap
page read and write
453B000
unkown
page read and write
391C000
trusted library allocation
page read and write
430E000
heap
page read and write
39AD000
trusted library allocation
page read and write
66C2000
heap
page read and write
5F87000
heap
page read and write
429E000
heap
page read and write
3234000
unkown
page read and write
5F8B000
heap
page read and write
1E10E000
stack
page read and write
27E3000
unkown
page read and write
A44000
heap
page read and write
A90000
heap
page read and write
4157000
heap
page read and write
2CC2000
trusted library allocation
page read and write
2695000
direct allocation
page read and write
5C6A000
trusted library allocation
page read and write
5F8B000
heap
page read and write
2470B000
heap
page read and write
5F68000
heap
page read and write
1628000
heap
page read and write
5EDD000
heap
page read and write
6AE10000
unkown
page readonly
F59000
heap
page read and write
1514000
trusted library allocation
page read and write
35BF000
stack
page read and write
4189000
trusted library allocation
page read and write
3234000
unkown
page read and write
5EEE000
heap
page read and write
1613000
heap
page read and write
5EDD000
heap
page read and write
AE0000
heap
page read and write
246D7000
heap
page read and write
246E7000
heap
page read and write
5F0B000
heap
page read and write
246E7000
heap
page read and write
5F54000
heap
page read and write
3234000
unkown
page read and write
2470B000
heap
page read and write
5CD2000
heap
page read and write
3A39000
heap
page read and write
2D83000
trusted library allocation
page read and write
5F8E000
heap
page read and write
A44000
heap
page read and write
3234000
unkown
page read and write
5EF6000
heap
page read and write
5FAE000
heap
page read and write
3234000
unkown
page read and write
3732000
heap
page read and write
3494000
unkown
page read and write
2A831000
heap
page read and write
5844000
trusted library allocation
page read and write
1E35E000
stack
page read and write
246E7000
heap
page read and write
2B2A000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
2906000
unkown
page read and write
31C9A000
heap
page read and write
2A3000
unkown
page readonly
8D0000
heap
page read and write
30EA000
heap
page read and write
A44000
heap
page read and write
B0E000
stack
page read and write
401F000
unkown
page readonly
AA1000
unkown
page execute read
3A92000
trusted library allocation
page read and write
39B2000
trusted library allocation
page read and write
26A4000
direct allocation
page read and write
29E1000
unkown
page read and write
5F7A000
heap
page read and write
24779000
heap
page read and write
61E01000
direct allocation
page execute read
5F54000
heap
page read and write
32077000
heap
page read and write
30F5000
heap
page read and write
FEFA0000
trusted library allocation
page execute and read and write
4C21000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
19D000
stack
page read and write
6020000
trusted library allocation
page execute and read and write
3E01000
heap
page read and write
4E63000
heap
page execute and read and write
2740000
direct allocation
page read and write
BD0000
heap
page read and write
38B5000
trusted library allocation
page read and write
6B0ED000
unkown
page readonly
3800000
unkown
page read and write
936000
heap
page read and write
954000
heap
page read and write
5820000
trusted library allocation
page read and write
33C2000
heap
page read and write
5721000
trusted library allocation
page read and write
29A000
unkown
page read and write
24709000
heap
page read and write
5FB0000
heap
page read and write
66AE000
heap
page read and write
3932000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
37E0000
heap
page read and write
31C9F000
heap
page read and write
303C000
stack
page read and write
2660000
heap
page read and write
3A70000
heap
page read and write
A66000
trusted library allocation
page execute and read and write
5FAE000
heap
page read and write
31E0000
heap
page read and write
5EF1000
heap
page read and write
37E1000
heap
page read and write
659E000
stack
page read and write
5FAE000
heap
page read and write
9D0000
heap
page read and write
22C000
unkown
page readonly
5F68000
heap
page read and write
246D0000
heap
page read and write
5F79000
heap
page read and write
1E770000
heap
page read and write
593E000
direct allocation
page read and write
5F56000
heap
page read and write
30FD000
heap
page read and write
3234000
unkown
page read and write
5EF0000
heap
page read and write
2773000
direct allocation
page read and write
5ED7000
heap
page read and write
5F8B000
heap
page read and write
5ED7000
heap
page read and write
5F7E000
heap
page read and write
B1B000
unkown
page read and write
24709000
heap
page read and write
4130000
heap
page read and write
108F000
stack
page read and write
5FAF000
heap
page read and write
5D40000
trusted library allocation
page read and write
946000
heap
page read and write
321B1000
heap
page read and write
6C8A9000
unkown
page write copy
26E2000
direct allocation
page read and write
5FAF000
heap
page read and write
2852000
trusted library allocation
page read and write
57A0000
direct allocation
page read and write
31C22000
heap
page read and write
950000
heap
page read and write
1E671000
heap
page read and write
31C18000
heap
page read and write
3234000
unkown
page read and write
6BAD000
stack
page read and write
9B000
stack
page read and write
76A000
unkown
page read and write
3704000
unkown
page read and write
5F73000
heap
page read and write
5A3E000
direct allocation
page read and write
25E0000
heap
page read and write
36E0000
heap
page read and write
366F000
unkown
page read and write
2C6E000
heap
page read and write
58A0000
direct allocation
page read and write
742000
unkown
page readonly
5ACF000
stack
page read and write
25C0000
trusted library allocation
page execute and read and write
9DE000
stack
page read and write
662E000
stack
page read and write
28F0000
heap
page read and write
360F000
unkown
page read and write
5628000
trusted library allocation
page read and write
5FB3000
heap
page read and write
5EDD000
heap
page read and write
191000
stack
page read and write
341C000
heap
page read and write
3B3B000
trusted library allocation
page read and write
3700000
unkown
page read and write
31C4F000
heap
page read and write
5EDD000
heap
page read and write
75E000
unkown
page write copy
397C000
trusted library allocation
page read and write
31C09000
heap
page read and write
24703000
heap
page read and write
3A01000
trusted library allocation
page read and write
2756000
direct allocation
page read and write
30EE000
heap
page read and write
5AFE000
stack
page read and write
5FAE000
heap
page read and write
954000
heap
page read and write
29C000
unkown
page read and write
38F7000
trusted library allocation
page read and write
699F000
stack
page read and write
4C40000
trusted library allocation
page read and write
3234000
unkown
page read and write
4043000
unkown
page readonly
EFF000
stack
page read and write
1684000
heap
page read and write
B0C000
unkown
page readonly
5F6E000
heap
page read and write
6705000
heap
page read and write
80000
unkown
page readonly
5890000
trusted library allocation
page read and write
2664000
direct allocation
page read and write
246ED000
heap
page read and write
30E8000
heap
page read and write
31C72000
heap
page read and write
9B0000
heap
page read and write
3234000
unkown
page read and write
36D0000
heap
page read and write
41EC000
stack
page read and write
5F88000
heap
page read and write
5FAF000
heap
page read and write
1425000
unkown
page readonly
32FA000
stack
page read and write
246FB000
heap
page read and write
5F4A000
heap
page read and write
59CE000
stack
page read and write
5EF6000
heap
page read and write
7BE000
unkown
page readonly
67EC000
stack
page read and write
3234000
unkown
page read and write
840000
heap
page read and write
766000
unkown
page read and write
5FAE000
heap
page read and write
91A000
stack
page read and write
5CC0000
trusted library allocation
page read and write
954000
heap
page read and write
2706000
direct allocation
page read and write
1E5FD000
stack
page read and write
2A3000
unkown
page readonly
4C35000
trusted library allocation
page read and write
B56000
heap
page read and write
5F87000
heap
page read and write
3325000
heap
page read and write
A90000
trusted library allocation
page read and write
5F7E000
heap
page read and write
5F60000
heap
page read and write
587B000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
920000
heap
page read and write
6CEE000
stack
page read and write
3B7A000
heap
page read and write
246EA000
heap
page read and write
5EEE000
heap
page read and write
30FF000
heap
page read and write
5EDD000
heap
page read and write
2A780000
heap
page read and write
8FB000
stack
page read and write
3928000
trusted library allocation
page read and write
344E000
unkown
page read and write
521B000
trusted library allocation
page read and write
274F000
direct allocation
page read and write
3A5D000
trusted library allocation
page read and write
5B51000
unkown
page read and write
2F6C000
stack
page read and write
2D1E000
trusted library allocation
page read and write
26BB000
direct allocation
page read and write
B40000
heap
page read and write
C1E000
heap
page read and write
39DA000
trusted library allocation
page read and write
2646000
heap
page read and write
1E670000
heap
page read and write
672F000
heap
page read and write
5F74000
heap
page read and write
22C000
unkown
page readonly
28E0000
heap
page read and write
5865000
trusted library allocation
page read and write
5D10000
trusted library allocation
page execute and read and write
5EC6000
heap
page read and write
5F6B000
heap
page read and write
5FB8000
heap
page read and write
5F6E000
heap
page read and write
5F0E000
heap
page read and write
5F79000
heap
page read and write
31C4A000
heap
page read and write
80000
unkown
page readonly
81000
unkown
page execute read
4150000
heap
page read and write
38BC000
trusted library allocation
page read and write
AA0000
unkown
page readonly
1534000
trusted library allocation
page read and write
38AD000
trusted library allocation
page read and write
331B000
heap
page read and write
3234000
unkown
page read and write
61EB7000
direct allocation
page readonly
3986000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
5EF1000
heap
page read and write
2790000
trusted library allocation
page read and write
3157B000
stack
page read and write
22C000
unkown
page readonly
9E0000
heap
page read and write
57E0000
heap
page read and write
738000
stack
page read and write
5F81000
heap
page read and write
3977000
trusted library allocation
page read and write
345F000
stack
page read and write
5F54000
heap
page read and write
5F5F000
heap
page read and write
15F0000
heap
page read and write
4C60000
trusted library allocation
page read and write
6930000
trusted library section
page read and write
7C8000
unkown
page readonly
401F000
unkown
page readonly
37E1000
heap
page read and write
5CDA000
heap
page read and write
6960000
trusted library allocation
page read and write
6F0C000
stack
page read and write
5EF6000
heap
page read and write
38E9000
heap
page read and write
3494000
unkown
page read and write
38CF000
trusted library allocation
page read and write
5B0D000
stack
page read and write
5F80000
heap
page read and write
5EEE000
heap
page read and write
2470B000
heap
page read and write
4D50000
heap
page read and write
31C31000
heap
page read and write
AA0000
unkown
page readonly
43E8000
heap
page read and write
7CE000
unkown
page readonly
4C18000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
5F8B000
heap
page read and write
58C9000
direct allocation
page read and write
430A000
heap
page read and write
31BFA000
heap
page read and write
5841000
trusted library allocation
page read and write
29C000
unkown
page read and write
18A0000
heap
page read and write
15D0000
heap
page read and write
1AAE000
stack
page read and write
5F67000
heap
page read and write
989000
heap
page read and write
447000
unkown
page execute and read and write
429F000
stack
page read and write
4410000
unkown
page read and write
5F81000
heap
page read and write
5F5F000
heap
page read and write
3105000
heap
page read and write
5E4F000
stack
page read and write
A44000
heap
page read and write
2739000
direct allocation
page read and write
2900000
heap
page read and write
5FAE000
heap
page read and write
276C000
direct allocation
page read and write
15F8000
heap
page read and write
6AF6D000
unkown
page read and write
1656000
heap
page read and write
E8F000
stack
page read and write
3234000
unkown
page read and write
5810000
trusted library allocation
page read and write
5F70000
heap
page read and write
13EF000
unkown
page readonly
3B48000
trusted library allocation
page read and write
5F15000
heap
page read and write
3234000
unkown
page read and write
ECB000
heap
page read and write
348E000
unkown
page read and write
4D40000
trusted library allocation
page read and write
246EB000
heap
page read and write
9E0000
heap
page read and write
6C8AD000
unkown
page read and write
26F8000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
A6A000
trusted library allocation
page execute and read and write
77B000
unkown
page write copy
2715000
direct allocation
page read and write
6520000
heap
page read and write
4D30000
trusted library allocation
page read and write
66F8000
heap
page read and write
246E3000
heap
page read and write
636000
unkown
page execute and read and write
5FB3000
heap
page read and write
24711000
heap
page read and write
6C835000
unkown
page readonly
3234000
unkown
page read and write
3A71000
heap
page read and write
2D8E000
stack
page read and write
4265000
heap
page execute and read and write
6B071000
unkown
page execute read
5EF6000
heap
page read and write
1AF0000
heap
page read and write
61E00000
direct allocation
page execute and read and write
31BFF000
heap
page read and write
5F09000
heap
page read and write
5F82000
heap
page read and write
3234000
unkown
page read and write
5C50000
heap
page read and write
5EEE000
heap
page read and write
42AF000
heap
page read and write
97000
stack
page read and write
774000
unkown
page read and write
3234000
unkown
page read and write
270E000
direct allocation
page read and write
434D000
unkown
page read and write
E90000
heap
page read and write
2DDE000
stack
page read and write
ADE000
stack
page read and write
6728000
heap
page read and write
2A822000
heap
page read and write
30F2000
heap
page read and write
33D2000
heap
page read and write
5F8C000
heap
page read and write
290000
unkown
page write copy
13DE000
unkown
page readonly
4250000
heap
page read and write
3720000
heap
page read and write
1550000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
3234000
unkown
page read and write
5F8B000
heap
page read and write
246D7000
heap
page read and write
B58000
heap
page read and write
38C8000
trusted library allocation
page read and write
5F87000
heap
page read and write
4150000
heap
page read and write
3A76000
trusted library allocation
page read and write
1520000
heap
page read and write
6713000
heap
page read and write
39F3000
trusted library allocation
page read and write
960000
heap
page read and write
5F54000
heap
page read and write
A5D000
trusted library allocation
page execute and read and write
91F000
heap
page read and write
265B000
direct allocation
page read and write
3234000
unkown
page read and write
5D60000
trusted library allocation
page execute and read and write
246E6000
heap
page read and write
780000
unkown
page read and write
648C000
stack
page read and write
5ED1000
heap
page read and write
5CE0000
heap
page read and write
4155000
heap
page read and write
3190000
heap
page read and write
962000
heap
page read and write
28E4000
heap
page read and write
5F5D000
heap
page read and write
5F54000
heap
page read and write
13F5000
unkown
page readonly
5F8A000
heap
page read and write
1DFCE000
stack
page read and write
4DC0000
trusted library allocation
page execute and read and write
5C92000
trusted library allocation
page read and write
412E000
trusted library allocation
page read and write
B6E000
stack
page read and write
549E000
stack
page read and write
41A000
unkown
page write copy
6719000
heap
page read and write
2A1A000
trusted library allocation
page read and write
3494000
unkown
page read and write
39E0000
trusted library allocation
page read and write
3234000
unkown
page read and write
246E6000
heap
page read and write
5FAE000
heap
page read and write
5F72000
heap
page read and write
277A000
direct allocation
page read and write
E55000
heap
page read and write
3234000
unkown
page read and write
4C26000
trusted library allocation
page read and write
246F0000
heap
page read and write
5F54000
heap
page read and write
41A000
unkown
page write copy
5B51000
unkown
page read and write
4C58000
trusted library allocation
page read and write
3234000
unkown
page read and write
29A000
unkown
page read and write
5F90000
heap
page read and write
5F87000
heap
page read and write
A44000
trusted library allocation
page read and write
30F7000
heap
page read and write
B20000
heap
page read and write
26CC000
direct allocation
page read and write
6AF77000
unkown
page readonly
5C90000
trusted library allocation
page read and write
A6E000
stack
page read and write
4E60000
heap
page execute and read and write
A7B000
trusted library allocation
page execute and read and write
54F0000
heap
page read and write
954000
heap
page read and write
4043000
unkown
page readonly
26B4000
direct allocation
page read and write
5DEE000
stack
page read and write
A72000
trusted library allocation
page read and write
5EF6000
heap
page read and write
5EF6000
heap
page read and write
59CD000
direct allocation
page read and write
2A81C000
heap
page read and write
5F62000
heap
page read and write
26F0000
trusted library allocation
page read and write
2858000
trusted library allocation
page read and write
1370000
unkown
page readonly
17FE000
stack
page read and write
5E00000
trusted library allocation
page read and write
5EF6000
heap
page read and write
5EEE000
heap
page read and write
2865000
trusted library allocation
page read and write
5F6B000
heap
page read and write
2FD0000
heap
page read and write
5F66000
heap
page read and write
80000
unkown
page readonly
31F1000
heap
page read and write
96C000
heap
page read and write
5B50000
unkown
page read and write
34BE000
stack
page read and write
28D3000
heap
page read and write
31C54000
heap
page read and write
4C0C000
trusted library allocation
page read and write
26A8000
direct allocation
page read and write
13F3000
unkown
page readonly
3584000
heap
page read and write
4C0F000
trusted library allocation
page read and write
5DF0000
heap
page read and write
4157000
heap
page read and write
13F7000
unkown
page readonly
2FA0000
unkown
page readonly
2B1F000
trusted library allocation
page read and write
5F54000
heap
page read and write
314D0000
heap
page read and write
5FAF000
heap
page read and write
2781000
direct allocation
page read and write
6C7EF000
unkown
page readonly
5210000
trusted library allocation
page read and write
5ED0000
heap
page read and write
279F000
stack
page read and write
674C000
heap
page read and write
246ED000
heap
page read and write
246E3000
heap
page read and write
5F81000
heap
page read and write
5E70000
heap
page read and write
2668000
heap
page read and write
3234000
unkown
page read and write
4300000
heap
page read and write
5D60000
direct allocation
page read and write
13FD000
unkown
page readonly
4C28000
trusted library allocation
page read and write
5F63000
heap
page read and write
246EB000
heap
page read and write
24703000
heap
page read and write
61ED4000
direct allocation
page readonly
5800000
trusted library allocation
page read and write
63B000
stack
page read and write
E70000
heap
page read and write
4110000
heap
page read and write
720D000
heap
page read and write
30F7000
heap
page read and write
64CE000
stack
page read and write
3234000
unkown
page read and write
246DD000
heap
page read and write
5F5B000
heap
page read and write
246EB000
heap
page read and write
68F0000
heap
page execute and read and write
193000
stack
page read and write
30E5000
heap
page read and write
8B0000
heap
page read and write
5E10000
trusted library allocation
page execute and read and write
5F6E000
heap
page read and write
2B2C000
trusted library allocation
page read and write
268E000
direct allocation
page read and write
A30000
trusted library allocation
page read and write
75E000
unkown
page read and write
7C2000
unkown
page readonly
66A0000
heap
page read and write
D4F000
stack
page read and write
4EFF000
stack
page read and write
954000
heap
page read and write
3A48000
trusted library allocation
page read and write
2D0C000
trusted library allocation
page read and write
81000
unkown
page execute read
5D60000
heap
page read and write
2650000
direct allocation
page read and write
5EEE000
heap
page read and write
E2E000
stack
page read and write
38C3000
trusted library allocation
page read and write
3640000
direct allocation
page read and write
413000
unkown
page readonly
C3A000
heap
page read and write
6CF0000
trusted library allocation
page read and write
5ED7000
heap
page read and write
400000
unkown
page readonly
314D4000
heap
page read and write
5FB5000
heap
page read and write
5F8E000
stack
page read and write
3220000
unkown
page read and write
CFB000
stack
page read and write
A75000
trusted library allocation
page execute and read and write
3B79000
heap
page read and write
7C6000
unkown
page readonly
6B09000
heap
page read and write
1E20F000
stack
page read and write
2732000
direct allocation
page read and write
5F54000
heap
page read and write
2A3000
unkown
page readonly
61ECD000
direct allocation
page readonly
1526000
heap
page read and write
31C36000
heap
page read and write
1AED000
stack
page read and write
5EF1000
heap
page read and write
53EA000
heap
page read and write
419E000
stack
page read and write
5F69000
heap
page read and write
5FAE000
heap
page read and write
31C7C000
heap
page read and write
5F8B000
heap
page read and write
30EF000
heap
page read and write
39C4000
trusted library allocation
page read and write
5F6E000
heap
page read and write
3234000
unkown
page read and write
5F87000
heap
page read and write
2FF0000
direct allocation
page read and write
A44000
heap
page read and write
2A3A000
trusted library allocation
page read and write
3964000
trusted library allocation
page read and write
3234000
unkown
page read and write
61EB4000
direct allocation
page read and write
66B0000
heap
page read and write
2D59000
trusted library allocation
page read and write
7614000
heap
page read and write
3A8C000
trusted library allocation
page read and write
1401000
unkown
page readonly
922000
heap
page read and write
5F11000
heap
page read and write
5F1F000
stack
page read and write
5F6B000
heap
page read and write
3234000
unkown
page read and write
954000
heap
page read and write
247DF000
heap
page read and write
401D000
unkown
page read and write
246E3000
heap
page read and write
299000
unkown
page write copy
5D4E000
stack
page read and write
3234000
unkown
page read and write
87E000
unkown
page readonly
6C8B4000
unkown
page read and write
5F8B000
heap
page read and write
5F06000
heap
page read and write
13F1000
unkown
page readonly
246F0000
heap
page read and write
9F5000
heap
page read and write
2AA5F000
stack
page read and write
14BE000
stack
page read and write
1E660000
heap
page read and write
81000
unkown
page execute read
5F66000
heap
page read and write
26FF000
direct allocation
page read and write
5FAE000
heap
page read and write
669E000
stack
page read and write
5F8B000
heap
page read and write
4C1E000
trusted library allocation
page read and write
5C2E000
stack
page read and write
4C04000
trusted library allocation
page read and write
6743000
heap
page read and write
4F3E000
stack
page read and write
2B10000
trusted library allocation
page read and write
3A85000
trusted library allocation
page read and write
3175C000
stack
page read and write
5CAD000
unkown
page read and write
67A0000
heap
page read and write
1F0000
heap
page read and write
347B000
heap
page read and write
5F7E000
heap
page read and write
There are 1301 hidden memdumps, click here to show them.