IOC Report
FixTsDfhiC.exe

loading gif

Files

File Path
Type
Category
Malicious
FixTsDfhiC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\en-US\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\7-Zip\Lang\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{D5D19E2F-7189-42FE-8103-92CD1FA457C2}v14.36.32532\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\ApplicationFrameHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\52cheatand52rat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheatV2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Nu8jJRNGRr.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\windows defender.bat
ASCII text
dropped
malicious
C:\Users\user\Videos\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\AppReadiness\dwm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\INF\.NET Data Provider for Oracle\SgrmBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Performance\WinSAT\DataStore\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Setup\State\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\blockweb\J6PsSzBYKK7mXTJyYh2Tgne.vbe
data
dropped
malicious
C:\blockweb\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\blockweb\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\blockweb\portrefNet.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\blockweb\ukzoUeHPfeDwGdTDRNL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\en-US\4811fe426320bd
ASCII text, with very long lines (412), with no line terminators
dropped
C:\Program Files\7-Zip\Lang\4811fe426320bd
ASCII text, with very long lines (440), with no line terminators
dropped
C:\Program Files\Windows Portable Devices\4811fe426320bd
ASCII text, with no line terminators
dropped
C:\ProgramData\Package Cache\{D5D19E2F-7189-42FE-8103-92CD1FA457C2}v14.36.32532\4811fe426320bd
ASCII text, with no line terminators
dropped
C:\Recovery\4811fe426320bd
ASCII text, with very long lines (657), with no line terminators
dropped
C:\Users\Default\6dd19aba3e2428
ASCII text, with very long lines (570), with no line terminators
dropped
C:\Users\user\4811fe426320bd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\52cheatand52rat.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\portrefNet.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\aliRzOxVmS
ASCII text, with no line terminators
dropped
C:\Users\user\Videos\4811fe426320bd
ASCII text, with very long lines (571), with no line terminators
dropped
C:\Windows\AppReadiness\6cb0b6c459d5d3
ASCII text, with no line terminators
dropped
C:\Windows\INF\.NET Data Provider for Oracle\91e168f4ec1147
ASCII text, with no line terminators
dropped
C:\Windows\Performance\WinSAT\DataStore\4811fe426320bd
ASCII text, with very long lines (844), with no line terminators
dropped
C:\Windows\Setup\State\4811fe426320bd
ASCII text, with very long lines (933), with no line terminators
dropped
C:\blockweb\24dbde2999530e
ASCII text, with very long lines (828), with no line terminators
dropped
C:\blockweb\4811fe426320bd
ASCII text, with very long lines (893), with no line terminators
dropped
C:\blockweb\9e8d7a4ca61bd9
ASCII text, with no line terminators
dropped
C:\blockweb\TOdra8QNG4wQEWkSimCHh9eVG.bat
ASCII text, with no line terminators
dropped
C:\blockweb\file.vbs
ASCII text, with no line terminators
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FixTsDfhiC.exe
"C:\Users\user\Desktop\FixTsDfhiC.exe"
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheatV2.exe
"C:\Users\user\AppData\Local\Temp\Lunch LaCheatV2.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\windows defender.bat" "
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
malicious
C:\Users\user\AppData\Local\Temp\Lunch LaCheat.exe
"C:\Users\user\AppData\Local\Temp\Lunch LaCheat.exe"
malicious
C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
"C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
malicious
C:\Users\user\AppData\Local\Temp\52cheatand52rat.exe
"C:\Users\user\AppData\Local\Temp\52cheatand52rat.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\blockweb\J6PsSzBYKK7mXTJyYh2Tgne.vbe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\blockweb\file.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\blockweb\TOdra8QNG4wQEWkSimCHh9eVG.bat" "
malicious
C:\blockweb\portrefNet.exe
"C:\blockweb\portrefNet.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 34 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cp91897.tw1.ru/@=MzY2MWOkV2N
malicious
https://github.com/Blank-c/Umbral-Stealer
unknown
https://discord.com/api/v10/users/
unknown
http://crl.microsoft
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/json/?fields=225545
unknown
http://ip-api.com/line/?fields=hostingI7AB5C494-39F5-4941-9163-47F54D6D5016I032E02B4-0499-05C3-0806-
unknown
https://discordapp.com/api/v9/users/
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiVirus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine
MpEnablePus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting
DisableEnhancedNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
DisableBlockAtFirstSeen
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
SpynetReporting
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
SubmitSamplesConsent
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dwm
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dwm
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ApplicationFrameHost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ApplicationFrameHost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SgrmBroker
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ukzoUeHPfeDwGdTDRNL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderApiLogger
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderAuditLogger
Start
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\52cheatand52rat_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\06e2b670deeeb0369e0a6228b922328bd20fd44e
d0712a2905e1838191a878887475e857bd799d9b
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
There are 64 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B56000
heap
page read and write
malicious
4F70000
heap
page read and write
malicious
2561000
trusted library allocation
page read and write
malicious
2774000
trusted library allocation
page read and write
malicious
1256F000
trusted library allocation
page read and write
malicious
239BB8D2000
unkown
page readonly
malicious
1B1E000
heap
page read and write
malicious
2D30000
heap
page read and write
2CEE000
stack
page read and write
3841000
heap
page read and write
1879000
unkown
page execute read
19A9870A000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
33AF000
heap
page read and write
19A9A3CD000
heap
page read and write
3581000
heap
page read and write
B0E000
heap
page read and write
1B97B000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2B9D000
stack
page read and write
3841000
heap
page read and write
3350000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
2AF2000
stack
page read and write
35BF000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
27FA000
trusted library allocation
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2E80000
heap
page read and write
19A984BB000
heap
page read and write
1C74000
heap
page read and write
738C0FD000
stack
page read and write
404000
unkown
page read and write
3581000
heap
page read and write
B03000
heap
page read and write
3581000
heap
page read and write
1190000
heap
page read and write
3581000
heap
page read and write
4E97000
heap
page read and write
3841000
heap
page read and write
2C1D000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2AC0000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2BE0000
heap
page read and write
3581000
heap
page read and write
2D38000
heap
page read and write
3581000
heap
page read and write
BF2FDFE000
stack
page read and write
1C74000
heap
page read and write
33BC000
heap
page read and write
1B630000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
33B8000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
1C75000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
7FFD9B9CC000
trusted library allocation
page read and write
19A98488000
heap
page read and write
3841000
heap
page read and write
28BD000
stack
page read and write
310D000
stack
page read and write
3080000
heap
page read and write
2F00000
heap
page read and write
19A4000
heap
page read and write
2730000
heap
page read and write
3581000
heap
page read and write
6D00000
trusted library allocation
page read and write
29E0000
heap
page read and write
19A98450000
heap
page read and write
704F000
stack
page read and write
3841000
heap
page read and write
2C4C000
heap
page read and write
4BCE000
stack
page read and write
3841000
heap
page read and write
738C077000
stack
page read and write
19A98491000
heap
page read and write
B04000
heap
page read and write
2AE9000
stack
page read and write
7FFD9BBC1000
trusted library allocation
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
4A2F000
stack
page read and write
2CBE000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2C19000
heap
page read and write
3841000
heap
page read and write
623000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
582E000
stack
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
1676000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
1BC05000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
592F000
stack
page read and write
2B4D000
stack
page read and write
3581000
heap
page read and write
29CE000
trusted library allocation
page read and write
3581000
heap
page read and write
400000
unkown
page readonly
3841000
heap
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
1C74000
heap
page read and write
19A98700000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
2CA2000
heap
page read and write
1C74000
heap
page read and write
19A984C6000
heap
page read and write
AC8000
heap
page read and write
3581000
heap
page read and write
194E000
stack
page read and write
3581000
heap
page read and write
2B7E000
stack
page read and write
2FBD000
stack
page read and write
2A50000
heap
page read and write
271F000
stack
page read and write
29A7000
trusted library allocation
page read and write
33B8000
heap
page read and write
41E0000
heap
page read and write
2E6F000
stack
page read and write
29A0000
heap
page read and write
19A9A3C1000
heap
page read and write
3581000
heap
page read and write
332F000
stack
page read and write
2D30000
heap
page read and write
1C74000
heap
page read and write
27E6000
trusted library allocation
page read and write
2CAA000
heap
page read and write
33BC000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
19A98430000
heap
page read and write
2CBE000
heap
page read and write
3841000
heap
page read and write
1B6BE000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
6E0000
heap
page read and write
292F000
stack
page read and write
239BBC60000
heap
page read and write
2CA2000
heap
page read and write
3581000
heap
page read and write
1B936000
heap
page read and write
43BE000
stack
page read and write
2C18000
heap
page read and write
B36000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
13FF000
heap
page read and write
19A98C1A000
heap
page read and write
2E80000
heap
page read and write
3841000
heap
page read and write
19A98A6F000
heap
page read and write
2760000
heap
page read and write
63E000
stack
page read and write
2C4E000
stack
page read and write
339B000
heap
page read and write
3841000
heap
page read and write
239D5E40000
heap
page read and write
2F60000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2768000
heap
page read and write
3581000
heap
page read and write
730000
unkown
page readonly
600000
heap
page read and write
1C74000
heap
page read and write
B12000
heap
page read and write
1B91E000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
3841000
heap
page read and write
3581000
heap
page read and write
296A000
trusted library allocation
page read and write
2E50000
heap
page read and write
33B9000
heap
page read and write
24B0000
trusted library section
page read and write
2808000
heap
page read and write
3841000
heap
page read and write
2BE8000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
19A4000
heap
page read and write
2D7D000
stack
page read and write
1BBDA000
heap
page read and write
231F000
stack
page read and write
7FFD9B99C000
trusted library allocation
page read and write
2480000
trusted library section
page read and write
19A984C9000
heap
page read and write
27ED000
stack
page read and write
1BBC2000
heap
page read and write
2990000
heap
page read and write
2E4F000
stack
page read and write
4F74000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
19A98C10000
heap
page read and write
1B865000
heap
page read and write
1AAED000
stack
page read and write
3841000
heap
page read and write
6F4E000
stack
page read and write
19A984AE000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2D8D000
stack
page read and write
558F000
stack
page read and write
2A40000
heap
page read and write
4CE1000
heap
page read and write
3187000
heap
page read and write
2CAA000
heap
page read and write
B2C000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
1F0000
heap
page read and write
2D58000
heap
page read and write
3841000
heap
page read and write
2BCE000
stack
page read and write
B06000
heap
page read and write
5BEC000
stack
page read and write
2ECE000
stack
page read and write
3F0000
heap
page read and write
501E000
stack
page read and write
1C74000
heap
page read and write
8FB000
stack
page read and write
3841000
heap
page read and write
D50000
heap
page read and write
19A98462000
heap
page read and write
1B69F000
heap
page read and write
2C1A000
heap
page read and write
3581000
heap
page read and write
960000
heap
page read and write
B2B000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
1B705000
heap
page read and write
1C74000
heap
page read and write
B1B000
heap
page read and write
3581000
heap
page read and write
2A58000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
7FFD9BB25000
trusted library allocation
page read and write
3581000
heap
page read and write
1B710000
heap
page read and write
31EF000
stack
page read and write
3581000
heap
page read and write
2D10000
heap
page read and write
3581000
heap
page read and write
396E000
heap
page read and write
B20000
heap
page read and write
3730000
heap
page read and write
3581000
heap
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
44BE000
stack
page read and write
1240000
heap
page read and write
19A98A64000
heap
page read and write
2A90000
heap
page read and write
B05000
heap
page read and write
2CA2000
heap
page read and write
3581000
heap
page read and write
2C90000
heap
page read and write
19A984AB000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
1B98F000
heap
page read and write
1C74000
heap
page read and write
2B50000
heap
page read and write
3581000
heap
page read and write
239BBBB0000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
2040000
trusted library allocation
page read and write
4F9D000
stack
page read and write
2A3D000
stack
page read and write
3581000
heap
page read and write
8EE000
stack
page read and write
239BD56E000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
19A984B6000
heap
page read and write
A6E000
stack
page read and write
2E7E000
stack
page read and write
279D000
stack
page read and write
3581000
heap
page read and write
276000
unkown
page readonly
2A8D000
stack
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
19A9A3CE000
heap
page read and write
3841000
heap
page read and write
19A98491000
heap
page read and write
3338000
heap
page read and write
3581000
heap
page read and write
2BB0000
heap
page read and write
7FFD9BA66000
trusted library allocation
page read and write
596E000
stack
page read and write
116D000
unkown
page execute read
19A9A3CE000
heap
page read and write
548E000
stack
page read and write
3841000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
3581000
heap
page read and write
19A98493000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
714C000
stack
page read and write
19A98A5C000
heap
page read and write
2D1F000
stack
page read and write
2C40000
heap
page read and write
2CBE000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2CAA000
heap
page read and write
19A984C1000
heap
page read and write
3581000
heap
page read and write
2CBE000
heap
page read and write
3841000
heap
page read and write
19A98459000
heap
page read and write
3840000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
1AF30000
trusted library section
page read and write
3841000
heap
page read and write
3310000
heap
page read and write
2AD7000
stack
page read and write
19A984B5000
heap
page read and write
18BA000
unkown
page execute read
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2FA0000
heap
page read and write
1B52E000
stack
page read and write
3841000
heap
page read and write
19A98C1E000
heap
page read and write
4871000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
53BE000
stack
page read and write
32EE000
stack
page read and write
305F000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2C49000
heap
page read and write
2ED0000
heap
page read and write
3310000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
D20000
heap
page read and write
B0F000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
643000
heap
page read and write
3581000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
515E000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
36DF000
stack
page read and write
6550000
trusted library allocation
page read and write
3581000
heap
page read and write
4B9E000
stack
page read and write
32C0000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
BF2FFFE000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
BF2F9E3000
stack
page read and write
1C74000
heap
page read and write
738C1FF000
stack
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2AFA000
stack
page read and write
2F00000
heap
page read and write
3841000
heap
page read and write
BF300FC000
stack
page read and write
627000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
29DF000
stack
page read and write
400000
unkown
page readonly
2350000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
408000
unkown
page execute read
19A4000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2656000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
B4C000
heap
page read and write
19A98C17000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2A7F000
stack
page read and write
3581000
heap
page read and write
239BD56C000
trusted library allocation
page read and write
3581000
heap
page read and write
276D000
stack
page read and write
301E000
stack
page read and write
19A98A81000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1B423000
stack
page read and write
3F0000
heap
page read and write
1C74000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
1B6CE000
heap
page read and write
3841000
heap
page read and write
2340000
trusted library section
page read and write
3841000
heap
page read and write
26FB000
trusted library allocation
page read and write
65E000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
19A98491000
heap
page read and write
3841000
heap
page read and write
1C40000
heap
page read and write
46AE000
stack
page read and write
B16000
heap
page read and write
CBF000
stack
page read and write
3581000
heap
page read and write
2AE0000
heap
page read and write
19A98400000
trusted library allocation
page read and write
7D0000
heap
page read and write
19A983C0000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
19A984C0000
heap
page read and write
2C9F000
heap
page read and write
239BD548000
trusted library allocation
page read and write
3841000
heap
page read and write
2C47000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
1B6B1000
heap
page read and write
3581000
heap
page read and write
B2C000
heap
page read and write
13DE000
heap
page read and write
2F2F000
stack
page read and write
2C1E000
heap
page read and write
B09000
heap
page read and write
3841000
heap
page read and write
19B000
stack
page read and write
3581000
heap
page read and write
19A982E0000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
B2C000
heap
page read and write
3841000
heap
page read and write
B2E000
heap
page read and write
2FF0000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
32FF000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
3841000
heap
page read and write
B24000
heap
page read and write
BF302FE000
stack
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
318E000
heap
page read and write
2E2E000
stack
page read and write
BF30D76000
stack
page read and write
19A984C8000
heap
page read and write
2ACD000
stack
page read and write
3581000
heap
page read and write
13D9000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
B0E000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2A3D000
stack
page read and write
1C74000
heap
page read and write
3B6000
stack
page read and write
19A98C17000
heap
page read and write
2D9F000
stack
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
269E000
trusted library allocation
page read and write
3391000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
3397000
heap
page read and write
1B902000
heap
page read and write
1B830000
heap
page read and write
19A98A84000
heap
page read and write
3841000
heap
page read and write
27DA000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3966000
heap
page read and write
2DE0000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2F8A000
trusted library allocation
page read and write
4C9F000
stack
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
660000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2C9F000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2D5E000
stack
page read and write
AB0000
heap
page execute and read and write
3841000
heap
page read and write
2C20000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
54BF000
stack
page read and write
1B8F3000
heap
page read and write
2C0E000
heap
page read and write
3581000
heap
page read and write
19A98492000
heap
page read and write
3841000
heap
page read and write
19A98A7D000
heap
page read and write
1C74000
heap
page read and write
1950000
heap
page read and write
B25000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
239BD5D0000
trusted library allocation
page read and write
1B020000
heap
page read and write
1B667000
heap
page read and write
3581000
heap
page read and write
1B689000
heap
page read and write
27E0000
trusted library allocation
page read and write
3841000
heap
page read and write
9B000
stack
page read and write
509E000
stack
page read and write
3581000
heap
page read and write
19A984C1000
heap
page read and write
B13000
heap
page read and write
433000
unkown
page execute read
19A98705000
heap
page read and write
1C74000
heap
page read and write
56CD000
stack
page read and write
3841000
heap
page read and write
40000
unkown
page readonly
3841000
heap
page read and write
3841000
heap
page read and write
400000
unkown
page readonly
511F000
stack
page read and write
1B6EC000
heap
page read and write
3581000
heap
page read and write
67E000
stack
page read and write
19A4000
heap
page read and write
1B67000
unkown
page readonly
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
1F0E000
stack
page read and write
3841000
heap
page read and write
1BBA5000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
3D0000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2C48000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2DDD000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
1B8AF000
heap
page read and write
3581000
heap
page read and write
19A9A3C2000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
40000
unkown
page readonly
3581000
heap
page read and write
3580000
heap
page read and write
3841000
heap
page read and write
19A98C1A000
heap
page read and write
3581000
heap
page read and write
2D50000
heap
page read and write
19A98A7B000
heap
page read and write
3841000
heap
page read and write
3397000
heap
page read and write
19A4000
heap
page read and write
1B84D000
heap
page read and write
4D80000
heap
page read and write
2CA2000
heap
page read and write
19A98C1B000
heap
page read and write
239BBC30000
trusted library allocation
page read and write
1B22E000
stack
page read and write
BF3033E000
stack
page read and write
3841000
heap
page read and write
50DE000
stack
page read and write
2A7D000
stack
page read and write
4CEE000
stack
page read and write
1C74000
heap
page read and write
1C74000
heap
page read and write
1B92B000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
27AC000
trusted library allocation
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
B52000
heap
page read and write
67D000
stack
page read and write
4B0000
heap
page read and write
3581000
heap
page read and write
B29000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
2CDE000
stack
page read and write
3841000
heap
page read and write
1900000
heap
page read and write
3841000
heap
page read and write
19A98A81000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
3841000
heap
page read and write
2AB0000
heap
page read and write
567E000
stack
page read and write
19A4000
heap
page read and write
9B000
stack
page read and write
239BBD15000
heap
page read and write
2DB8000
heap
page read and write
2FDF000
stack
page read and write
2A80000
heap
page read and write
3581000
heap
page read and write
66F000
heap
page read and write
3581000
heap
page read and write
116D000
unkown
page execute read
4C80000
heap
page read and write
1BBF1000
heap
page read and write
19A984BB000
heap
page read and write
3841000
heap
page read and write
1B6DE000
heap
page read and write
292D000
stack
page read and write
C3A000
stack
page read and write
31B0000
heap
page read and write
8F0000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
239BBD10000
heap
page read and write
3841000
heap
page read and write
303D000
stack
page read and write
19A4000
heap
page read and write
310E000
stack
page read and write
3841000
heap
page read and write
2AC6000
stack
page read and write
264A000
trusted library allocation
page read and write
2720000
heap
page read and write
3841000
heap
page read and write
239D5E8B000
heap
page read and write
2C3E000
stack
page read and write
3581000
heap
page read and write
4E97000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1B67000
unkown
page readonly
1B853000
heap
page read and write
3841000
heap
page read and write
27A8000
trusted library allocation
page read and write
2CAA000
heap
page read and write
B06000
heap
page read and write
3841000
heap
page read and write
2CA0000
heap
page read and write
3581000
heap
page read and write
28FD000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
44FE000
stack
page read and write
3581000
heap
page read and write
1C41C000
stack
page read and write
2DD8000
heap
page read and write
715000
heap
page read and write
B1F000
heap
page read and write
3581000
heap
page read and write
2C19000
heap
page read and write
3581000
heap
page read and write
2CBE000
heap
page read and write
B2C000
heap
page read and write
1BC38000
heap
page read and write
2E8F000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
3841000
heap
page read and write
1B70C000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2460000
trusted library section
page read and write
3581000
heap
page read and write
518E000
stack
page read and write
12F6F000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
4CE9000
heap
page read and write
3841000
heap
page read and write
2ACD000
stack
page read and write
527E000
stack
page read and write
19A4000
heap
page read and write
1B909000
heap
page read and write
239D5E6D000
heap
page read and write
19A98A89000
heap
page read and write
2C0E000
heap
page read and write
3370000
heap
page read and write
2C74000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
2E70000
heap
page read and write
3581000
heap
page read and write
200F000
stack
page read and write
3841000
heap
page read and write
19A984CE000
heap
page read and write
27EA000
trusted library allocation
page read and write
347E000
stack
page read and write
3841000
heap
page read and write
1990000
heap
page read and write
1B97000
heap
page read and write
19A98A83000
heap
page read and write
2D5E000
stack
page read and write
1BBFA000
heap
page read and write
2B30000
heap
page read and write
3581000
heap
page read and write
27DD000
stack
page read and write
3841000
heap
page read and write
19A98A78000
heap
page read and write
2FA8000
heap
page read and write
19A98400000
trusted library allocation
page read and write
5A6F000
stack
page read and write
3581000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
400000
unkown
page readonly
3841000
heap
page read and write
3841000
heap
page read and write
239BBC90000
trusted library allocation
page read and write
401000
unkown
page execute read
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
146E000
heap
page read and write
2CDF000
stack
page read and write
3164000
heap
page read and write
4A6C000
stack
page read and write
3581000
heap
page read and write
339A000
heap
page read and write
3841000
heap
page read and write
121E000
stack
page read and write
3940000
trusted library allocation
page read and write
239BD59E000
trusted library allocation
page read and write
2A8E000
stack
page read and write
1C74000
heap
page read and write
BF30A7D000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
284E000
stack
page read and write
28AF000
stack
page read and write
19A98C14000
heap
page read and write
D30000
heap
page read and write
3841000
heap
page read and write
529C000
stack
page read and write
3841000
heap
page read and write
1DDA000
heap
page read and write
B1E000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1B895000
heap
page read and write
3581000
heap
page read and write
738C27E000
stack
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
3430000
heap
page read and write
3378000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
33AF000
heap
page read and write
3581000
heap
page read and write
1DD0000
heap
page read and write
1C9E000
stack
page read and write
19A98487000
heap
page read and write
1DDE000
heap
page read and write
2ECE000
stack
page read and write
2DE0000
heap
page read and write
3190000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
EBA000
unkown
page execute read
1B6E4000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
27E0000
heap
page read and write
2E80000
heap
page read and write
1C74000
heap
page read and write
2C36000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
239BD578000
trusted library allocation
page read and write
2A90000
heap
page read and write
3581000
heap
page read and write
2CAA000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
341F000
stack
page read and write
731000
unkown
page execute read
3841000
heap
page read and write
3581000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
239BD58C000
trusted library allocation
page read and write
52D0000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
2C50000
heap
page read and write
3841000
heap
page read and write
61F000
stack
page read and write
43D000
stack
page read and write
3581000
heap
page read and write
B0E000
heap
page read and write
47D000
stack
page read and write
3220000
heap
page read and write
239BB9E1000
heap
page read and write
30E0000
heap
page read and write
5430000
heap
page read and write
2A80000
heap
page read and write
BF30E7E000
stack
page read and write
19A4000
heap
page read and write
31C0000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
5CE000
stack
page read and write
AE1000
heap
page read and write
2C6E000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2CA0000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1431000
heap
page read and write
3581000
heap
page read and write
2CAA000
heap
page read and write
7FFD9BC19000
trusted library allocation
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
76E000
unkown
page write copy
3841000
heap
page read and write
2A3D000
stack
page read and write
239BD560000
trusted library allocation
page read and write
19A4000
heap
page read and write
1BB79000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
19A98A58000
heap
page read and write
910000
heap
page read and write
3581000
heap
page read and write
B38000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
3581000
heap
page read and write
BF3063D000
stack
page read and write
3581000
heap
page read and write
4D86000
heap
page read and write
3581000
heap
page read and write
2CA2000
heap
page read and write
19A98A5E000
heap
page read and write
B52000
heap
page read and write
3581000
heap
page read and write
3AEE000
heap
page read and write
A55000
heap
page read and write
1B83A000
heap
page read and write
239BD580000
trusted library allocation
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
19A9870D000
heap
page read and write
2CA0000
heap
page read and write
1BB87000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
5350000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2BDD000
stack
page read and write
2035000
heap
page read and write
3581000
heap
page read and write
AF1000
heap
page read and write
1C74000
heap
page read and write
B65000
heap
page read and write
B52000
heap
page read and write
3160000
heap
page read and write
357F000
stack
page read and write
13AE000
stack
page read and write
19A4000
heap
page read and write
4E00000
heap
page read and write
3841000
heap
page read and write
A50000
heap
page read and write
19A4000
heap
page read and write
19A984A3000
heap
page read and write
2E40000
heap
page read and write
19A98467000
heap
page read and write
239BBB90000
heap
page read and write
792000
unkown
page readonly
3581000
heap
page read and write
239BB9AC000
heap
page read and write
2CBE000
heap
page read and write
1B6F1000
heap
page read and write
51CD000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
563E000
stack
page read and write
3841000
heap
page read and write
2CA2000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
26DD000
trusted library allocation
page read and write
19A98A6F000
heap
page read and write
239BB8D0000
unkown
page readonly
1AA0000
heap
page read and write
1DBF000
stack
page read and write
279D000
trusted library allocation
page read and write
3581000
heap
page read and write
4062000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
964000
heap
page read and write
3841000
heap
page read and write
B25000
heap
page read and write
2DDE000
stack
page read and write
404000
unkown
page read and write
3581000
heap
page read and write
298E000
stack
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
27B2000
trusted library allocation
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
34B0000
heap
page read and write
33DE000
stack
page read and write
1AD0000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
27D8000
trusted library allocation
page read and write
318A000
heap
page read and write
3841000
heap
page read and write
27E2000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2B30000
heap
page read and write
3581000
heap
page read and write
19A98A64000
heap
page read and write
3841000
heap
page read and write
2A50000
heap
page read and write
29A0000
heap
page read and write
763000
unkown
page readonly
2E2C000
heap
page read and write
2C1D000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
36B0000
trusted library allocation
page read and write
1B87F000
heap
page read and write
3581000
heap
page read and write
D59000
heap
page read and write
2DD0000
heap
page read and write
239BB9C9000
heap
page read and write
3841000
heap
page read and write
2F04000
heap
page read and write
1C74000
heap
page read and write
B17000
heap
page read and write
27E0000
heap
page read and write
3581000
heap
page read and write
B0F000
heap
page read and write
9B000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
239BBC00000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
401000
unkown
page execute read
E33000
unkown
page execute read
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
1B324000
stack
page read and write
3841000
heap
page read and write
1B88A000
heap
page read and write
3581000
heap
page read and write
239BB990000
heap
page read and write
B2A000
heap
page read and write
369E000
stack
page read and write
19A984C1000
heap
page read and write
3581000
heap
page read and write
2DD0000
heap
page read and write
34E0000
heap
page read and write
1833000
unkown
page execute read
3581000
heap
page read and write
3581000
heap
page read and write
B2C000
heap
page read and write
2C0F000
stack
page read and write
76E000
unkown
page read and write
3841000
heap
page read and write
3060000
heap
page read and write
1B984000
heap
page read and write
29EF000
stack
page read and write
3841000
heap
page read and write
292D000
stack
page read and write
3581000
heap
page read and write
AC0000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
1BB9C000
heap
page read and write
3581000
heap
page read and write
24A0000
trusted library section
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
2D0E000
stack
page read and write
2CA8000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
1256D000
trusted library allocation
page read and write
AE0000
heap
page read and write
2A30000
heap
page read and write
3581000
heap
page read and write
19A984BB000
heap
page read and write
1B967000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
239BB8D0000
unkown
page readonly
1AAE000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
239BB90C000
unkown
page readonly
2ED0000
heap
page read and write
1BC0F000
heap
page read and write
2AB0000
heap
page read and write
B1E000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2800000
heap
page read and write
15CF000
stack
page read and write
2CAF000
stack
page read and write
2BC0000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2C28000
heap
page read and write
339F000
stack
page read and write
3330000
heap
page read and write
3841000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
2CA2000
heap
page read and write
1B719000
heap
page read and write
19A9848A000
heap
page read and write
3841000
heap
page read and write
239BD53E000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
19A4000
heap
page read and write
BF2FEFE000
stack
page read and write
2E40000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
2C6D000
stack
page read and write
309F000
stack
page read and write
2CA2000
heap
page read and write
19A4000
heap
page read and write
2DB0000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
353F000
stack
page read and write
1B68D000
heap
page read and write
239BBC10000
trusted library allocation
page read and write
1BBBE000
heap
page read and write
3070000
heap
page read and write
2FAB000
heap
page read and write
B65000
heap
page read and write
2E30000
heap
page read and write
19A4000
heap
page read and write
27DE000
trusted library allocation
page read and write
28DD000
stack
page read and write
2FEE000
stack
page read and write
239BD5CA000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
AE0000
heap
page read and write
2C3E000
stack
page read and write
3841000
heap
page read and write
2860000
heap
page read and write
63D000
stack
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
577F000
stack
page read and write
3320000
heap
page read and write
1B840000
heap
page read and write
2FC0000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2C70000
heap
page read and write
BF301FE000
stack
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
3841000
heap
page read and write
3581000
heap
page read and write
738C17E000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
19A4000
heap
page read and write
2990000
heap
page read and write
3581000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
3581000
heap
page read and write
2CBE000
heap
page read and write
41D0000
heap
page read and write
3841000
heap
page read and write
2F90000
heap
page read and write
3841000
heap
page read and write
AF0000
heap
page read and write
3581000
heap
page read and write
730000
unkown
page readonly
B2F000
heap
page read and write
774000
unkown
page read and write
2CBE000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1B6C6000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2AC8000
heap
page read and write
3841000
heap
page read and write
4E2F000
stack
page read and write
19A98A89000
heap
page read and write
19A98A81000
heap
page read and write
3841000
heap
page read and write
32B0000
heap
page read and write
400000
unkown
page readonly
2CAA000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2C4E000
stack
page read and write
239BD5B6000
trusted library allocation
page read and write
35D0000
heap
page read and write
2F0F000
stack
page read and write
B4C000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2A3E000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2D6F000
stack
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
3581000
heap
page read and write
2E70000
heap
page read and write
3581000
heap
page read and write
314F000
stack
page read and write
5CEC000
stack
page read and write
47AF000
stack
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
239BB9A0000
heap
page read and write
19A4000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
27EC000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1BC32000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
3841000
heap
page read and write
239BB9DF000
heap
page read and write
7FFD9BB23000
trusted library allocation
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
AFF000
heap
page read and write
1B868000
heap
page read and write
289D000
stack
page read and write
12561000
trusted library allocation
page read and write
2AD0000
stack
page read and write
2CAD000
stack
page read and write
19A98A61000
heap
page read and write
B13000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
19A984BC000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
EBA000
unkown
page execute read
19A4000
heap
page read and write
1995000
heap
page read and write
2AE3000
stack
page read and write
2BBF000
stack
page read and write
239D5E7A000
heap
page read and write
2C16000
heap
page read and write
3581000
heap
page read and write
3030000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
2CAD000
stack
page read and write
3581000
heap
page read and write
2BFF000
stack
page read and write
763000
unkown
page readonly
3841000
heap
page read and write
19B000
stack
page read and write
239BD586000
trusted library allocation
page read and write
3841000
heap
page read and write
19A98A5C000
heap
page read and write
2C0A000
heap
page read and write
3841000
heap
page read and write
66D000
heap
page read and write
3581000
heap
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
2F71000
trusted library allocation
page read and write
3581000
heap
page read and write
42000
unkown
page readonly
19A984B1000
heap
page read and write
645000
heap
page read and write
2CA8000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2886000
trusted library allocation
page read and write
6C40000
heap
page read and write
239BB9BE000
heap
page read and write
3841000
heap
page read and write
19A9A3C6000
heap
page read and write
239BD5A0000
trusted library allocation
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3090000
heap
page read and write
67E000
stack
page read and write
19A984B7000
heap
page read and write
3397000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
47EE000
stack
page read and write
2940000
heap
page read and write
29DE000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
19A9A3D4000
heap
page read and write
3581000
heap
page read and write
19A98A67000
heap
page read and write
5F0000
heap
page read and write
1BC40000
heap
page read and write
BF30C7D000
stack
page read and write
65D000
stack
page read and write
2C8F000
stack
page read and write
31AE000
stack
page read and write
2ABC000
stack
page read and write
3248000
heap
page read and write
3581000
heap
page read and write
1A80000
heap
page read and write
3841000
heap
page read and write
1BBC7000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
19A4000
heap
page read and write
51E0000
heap
page read and write
3581000
heap
page read and write
19A98C12000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
19A984A8000
heap
page read and write
3841000
heap
page read and write
19A98486000
heap
page read and write
19A984AA000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
401000
unkown
page execute read
27AA000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
19A98A79000
heap
page read and write
3270000
heap
page read and write
239D5E30000
heap
page execute and read and write
1C74000
heap
page read and write
356E000
stack
page read and write
BF3073E000
stack
page read and write
BF3097E000
stack
page read and write
2F7D000
stack
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2B3F000
stack
page read and write
3841000
heap
page read and write
793000
unkown
page readonly
3841000
heap
page read and write
51DE000
stack
page read and write
19A98C15000
heap
page read and write
1B883000
heap
page read and write
6E4E000
stack
page read and write
3581000
heap
page read and write
BF2FCFE000
stack
page read and write
2010000
heap
page read and write
19A984A2000
heap
page read and write
19A98A78000
heap
page read and write
1C74000
heap
page read and write
239BB9A6000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
31C8000
heap
page read and write
3581000
heap
page read and write
239BBCF0000
heap
page execute and read and write
3590000
heap
page read and write
3841000
heap
page read and write
1B728000
heap
page read and write
3581000
heap
page read and write
2D20000
heap
page read and write
2090000
heap
page read and write
3385000
heap
page read and write
3581000
heap
page read and write
12A5000
heap
page read and write
3581000
heap
page read and write
2C9E000
stack
page read and write
B0A000
heap
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
3390000
heap
page read and write
4C20000
heap
page read and write
3841000
heap
page read and write
19A9870E000
heap
page read and write
1C70000
heap
page read and write
19A984C5000
heap
page read and write
BF3053E000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
3841000
heap
page read and write
2EDE000
stack
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
2D40000
heap
page read and write
1A8EE000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
B08000
heap
page read and write
19A9A530000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2D9F000
stack
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
19A5000
heap
page read and write
12A0000
heap
page read and write
2B58000
heap
page read and write
11DE000
stack
page read and write
1B95B000
heap
page read and write
5E0000
heap
page read and write
29AE000
stack
page read and write
3841000
heap
page read and write
28EE000
stack
page read and write
19A98A60000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
7FFD9BC1C000
trusted library allocation
page read and write
3581000
heap
page read and write
1B6A8000
heap
page read and write
3581000
heap
page read and write
62F000
heap
page read and write
3841000
heap
page read and write
2ED000
stack
page read and write
408000
unkown
page readonly
3841000
heap
page read and write
2C58000
heap
page read and write
34E8000
heap
page read and write
19A9A3D4000
heap
page read and write
2CAA000
heap
page read and write
4D80000
heap
page read and write
293E000
stack
page read and write
42D000
unkown
page read and write
239BBB70000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
B52000
heap
page read and write
239BBC05000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
6F0000
heap
page readonly
3581000
heap
page read and write
3841000
heap
page read and write
3180000
heap
page read and write
3841000
heap
page read and write
239BD59A000
trusted library allocation
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
19A9A3C3000
heap
page read and write
2DF0000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
36D8000
heap
page read and write
B00000
heap
page read and write
7FFD9BB73000
trusted library allocation
page read and write
19A4000
heap
page read and write
4BBE000
stack
page read and write
3581000
heap
page read and write
327D000
stack
page read and write
3581000
heap
page read and write
45FF000
stack
page read and write
3841000
heap
page read and write
19A98C1A000
heap
page read and write
3581000
heap
page read and write
2E5F000
stack
page read and write
2C48000
heap
page read and write
2F9E000
stack
page read and write
19A98A57000
heap
page read and write
462E000
stack
page read and write
710000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
48EF000
stack
page read and write
27DD000
stack
page read and write
1C74000
heap
page read and write
239BD564000
trusted library allocation
page read and write
19A0000
heap
page read and write
3841000
heap
page read and write
3070000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
3090000
heap
page read and write
3581000
heap
page read and write
492E000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
B36000
heap
page read and write
3581000
heap
page read and write
674000
heap
page read and write
1670000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
1B9B1000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3DE000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
33BC000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
791000
unkown
page read and write
2A20000
heap
page read and write
2A60000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
E33000
unkown
page execute read
19A98A89000
heap
page read and write
3841000
heap
page read and write
27E4000
trusted library allocation
page read and write
3581000
heap
page read and write
553E000
stack
page read and write
3581000
heap
page read and write
239BD4C1000
trusted library allocation
page read and write
3581000
heap
page read and write
63E000
stack
page read and write
539C000
stack
page read and write
2AFE000
stack
page read and write
3195000
heap
page read and write
3841000
heap
page read and write
239CD4C1000
trusted library allocation
page read and write
54C0000
heap
page read and write
3581000
heap
page read and write
19A98A6F000
heap
page read and write
19A98485000
heap
page read and write
3841000
heap
page read and write
282F000
stack
page read and write
3581000
heap
page read and write
3E0000
heap
page read and write
19A98A78000
heap
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
19A4000
heap
page read and write
4EDE000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
19A984BB000
heap
page read and write
19A98A78000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
27AE000
trusted library allocation
page read and write
1B21000
unkown
page execute read
2C00000
heap
page read and write
3841000
heap
page read and write
B13000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
405000
unkown
page write copy
3841000
heap
page read and write
3581000
heap
page read and write
433000
unkown
page execute read
60C000
heap
page read and write
27FD000
stack
page read and write
1833000
unkown
page execute read
19A4000
heap
page read and write
3581000
heap
page read and write
524B000
stack
page read and write
3850000
heap
page read and write
3581000
heap
page read and write
5AAE000
stack
page read and write
5BAF000
stack
page read and write
3581000
heap
page read and write
2BFE000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
B22000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
525F000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
5207000
heap
page read and write
57B000
stack
page read and write
B65000
heap
page read and write
19A984AF000
heap
page read and write
1C74000
heap
page read and write
4D90000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
239CD4CD000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
19A983E0000
heap
page read and write
B03000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
2A8D000
stack
page read and write
1BB70000
heap
page read and write
19A9A3D6000
heap
page read and write
3581000
heap
page read and write
1B12E000
stack
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
3BFA000
heap
page read and write
4E9B000
heap
page read and write
3581000
heap
page read and write
2E3F000
stack
page read and write
3581000
heap
page read and write
19A984B9000
heap
page read and write
19A98C1E000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
4CCF000
stack
page read and write
3581000
heap
page read and write
1ABD000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
2BFE000
stack
page read and write
1B62E000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
A0E000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
30DF000
stack
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
239CD4C6000
trusted library allocation
page read and write
3841000
heap
page read and write
3160000
heap
page read and write
3581000
heap
page read and write
B04000
heap
page read and write
3581000
heap
page read and write
27B0000
trusted library allocation
page read and write
19A98A6F000
heap
page read and write
2D2F000
stack
page read and write
3841000
heap
page read and write
1C26E000
stack
page read and write
3581000
heap
page read and write
1B8C1000
heap
page read and write
29D0000
heap
page read and write
27B4000
trusted library allocation
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
29F0000
heap
page read and write
3841000
heap
page read and write
4D2E000
stack
page read and write
1CBE000
stack
page read and write
1C74000
heap
page read and write
2C50000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
2030000
heap
page read and write
3581000
heap
page read and write
1AAA000
heap
page read and write
19A98483000
heap
page read and write
19A9A3C4000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
1F0000
heap
page read and write
AE8000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
323D000
stack
page read and write
2D10000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FF446690000
trusted library allocation
page execute and read and write
3841000
heap
page read and write
314E000
stack
page read and write
281F000
trusted library allocation
page read and write
3841000
heap
page read and write
A70000
trusted library allocation
page read and write
2F08000
heap
page read and write
BF30B7B000
stack
page read and write
3581000
heap
page read and write
E08000
unkown
page readonly
7FFD9BA96000
trusted library allocation
page execute and read and write
2850000
heap
page read and write
1B6A1000
heap
page read and write
B0E000
heap
page read and write
3841000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
3841000
heap
page read and write
B4C000
heap
page read and write
69B000
heap
page read and write
19A984CE000
heap
page read and write
3841000
heap
page read and write
676000
stack
page read and write
12568000
trusted library allocation
page read and write
1B8DA000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1B6B7000
heap
page read and write
1B82D000
stack
page read and write
2EBF000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
296D000
stack
page read and write
7FFD9BB7B000
trusted library allocation
page read and write
2C10000
heap
page read and write
272000
unkown
page readonly
3841000
heap
page read and write
239BBA0B000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
1E00000
heap
page read and write
3841000
heap
page read and write
2B0D000
stack
page read and write
2D60000
heap
page read and write
2D7F000
stack
page read and write
3841000
heap
page read and write
28B2000
trusted library allocation
page read and write
3841000
heap
page read and write
2960000
heap
page read and write
2B90000
heap
page read and write
3581000
heap
page read and write
1B6FA000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
33D2000
heap
page read and write
3841000
heap
page read and write
408000
unkown
page execute read
2D3D000
stack
page read and write
3581000
heap
page read and write
2A10000
heap
page read and write
19A9A3CE000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
19A98400000
trusted library allocation
page read and write
3350000
heap
page read and write
305E000
stack
page read and write
2DA0000
heap
page read and write
7FFD9BB53000
trusted library allocation
page read and write
61D000
stack
page read and write
13D0000
heap
page read and write
29A8000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
239BBA11000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2C00000
heap
page read and write
3841000
heap
page read and write
B0B000
heap
page read and write
5D0000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
520E000
stack
page read and write
3841000
heap
page read and write
2DCD000
stack
page read and write
3841000
heap
page read and write
30E8000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2550000
heap
page execute and read and write
27AD000
stack
page read and write
3581000
heap
page read and write
2E40000
heap
page read and write
19A98400000
trusted library allocation
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
2EEE000
stack
page read and write
700000
heap
page read and write
55FE000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
B11000
heap
page read and write
731000
unkown
page execute read
33BD000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
19A98C13000
heap
page read and write
A9D000
stack
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
2FE0000
heap
page read and write
27E8000
trusted library allocation
page read and write
2E20000
heap
page read and write
2C6D000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
2DF0000
heap
page read and write
2E2E000
stack
page read and write
3581000
heap
page read and write
2913000
trusted library allocation
page read and write
BF3043E000
stack
page read and write
3581000
heap
page read and write
2FE8000
heap
page read and write
2CBE000
heap
page read and write
330E000
stack
page read and write
19A4000
heap
page read and write
19A984C1000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
2C19000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
2F30000
heap
page read and write
3841000
heap
page read and write
1B89D000
heap
page read and write
4D80000
trusted library allocation
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
19A984B6000
heap
page read and write
3581000
heap
page read and write
3340000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3078000
heap
page read and write
3841000
heap
page read and write
AE8000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
4E9A000
heap
page read and write
357E000
stack
page read and write
19A9A3D4000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
1C74000
heap
page read and write
3581000
heap
page read and write
2F30000
heap
page read and write
19A9A3C0000
heap
page read and write
29E0000
heap
page read and write
3E0000
heap
page read and write
537F000
stack
page read and write
B25000
heap
page read and write
3BF0000
heap
page read and write
2A90000
heap
page read and write
3841000
heap
page read and write
333E000
stack
page read and write
1C16D000
stack
page read and write
3841000
heap
page read and write
BF30839000
stack
page read and write
19A98467000
heap
page read and write
A90000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
2BB0000
heap
page read and write
29E0000
heap
page read and write
3581000
heap
page read and write
2A68000
heap
page read and write
42D000
unkown
page read and write
1AF2F000
stack
page read and write
329E000
stack
page read and write
56FF000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
36D000
stack
page read and write
B29000
heap
page read and write
3841000
heap
page read and write
2D4F000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
274A000
trusted library allocation
page read and write
3581000
heap
page read and write
27DC000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page execute and read and write
4FDF000
stack
page read and write
55CB000
stack
page read and write
1B97F000
heap
page read and write
3841000
heap
page read and write
2CA7000
heap
page read and write
2F40000
heap
page read and write
32D000
stack
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
19A98A50000
heap
page read and write
3140000
heap
page read and write
4BFE000
stack
page read and write
4DEF000
stack
page read and write
40DF000
heap
page read and write
31AE000
stack
page read and write
D3A000
stack
page read and write
3581000
heap
page read and write
2ED8000
heap
page read and write
3841000
heap
page read and write
390000
heap
page read and write
3581000
heap
page read and write
1BB90000
heap
page read and write
307E000
stack
page read and write
2D0E000
stack
page read and write
3581000
heap
page read and write
239BD535000
trusted library allocation
page read and write
1B696000
heap
page read and write
1DED000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
303F000
stack
page read and write
4B6C000
stack
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
1C74000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
2B40000
heap
page read and write
3946000
heap
page read and write
738C2FF000
stack
page read and write
2CAA000
heap
page read and write
32D000
stack
page read and write
2856000
trusted library allocation
page read and write
28ED000
stack
page read and write
792000
unkown
page write copy
3841000
heap
page read and write
2D20000
heap
page read and write
297F000
stack
page read and write
239BBC0A000
heap
page read and write
3841000
heap
page read and write
B4C000
heap
page read and write
2A60000
heap
page read and write
3581000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
3581000
heap
page read and write
3388000
heap
page read and write
2C40000
heap
page read and write
19A4000
heap
page read and write
3841000
heap
page read and write
3841000
heap
page read and write
3581000
heap
page read and write
245E000
stack
page read and write
3240000
heap
page read and write
2CA0000
heap
page read and write
19A4000
heap
page read and write
3581000
heap
page read and write
2AB0000
heap
page read and write
3581000
heap
page read and write
404000
unkown
page read and write
3841000
heap
page read and write
19B000
stack
page read and write
3581000
heap
page read and write
3581000
heap
page read and write
1A590000
trusted library allocation
page read and write
AE4000
heap
page read and write
B65000
heap
page read and write
There are 1989 hidden memdumps, click here to show them.