IOC Report
SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exe

loading gif

Files

File Path
Type
Category
Malicious
SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Settings.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsz3421.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\falden\myotonias\nonvoting\Kontrakttillgs\Perruque.ing
data
dropped
C:\Users\user\falden\myotonias\nonvoting\Kontrakttillgs\Shrapnelen.Mye
data
dropped
C:\Users\user\falden\myotonias\nonvoting\Kontrakttillgs\Slettelandene.chr
data
dropped
C:\Users\user\falden\myotonias\nonvoting\Kontrakttillgs\Stures.ped
data
dropped
C:\Users\user\falden\myotonias\nonvoting\Kontrakttillgs\anchorets.ndr
data
dropped
C:\Users\user\falden\myotonias\nonvoting\Kontrakttillgs\degelatinize.juv
DIY-Thermocam raw data (Lepton 2.x), scale 56-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 140075391325219348865385704194048.000000
dropped
C:\Users\user\hanknsordet.ini
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exe
"C:\Users\user\Desktop\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exe"
malicious
C:\Users\user\Desktop\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exe
"C:\Users\user\Desktop\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.google.com/chrome/next-steps.html?brand=CHWL&statcb=0&installdataindex=empty&defaultbrow
unknown
https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.autoitscript.com/site/autoit/downloads/https://www.autoitscript.com/site/autoit/download
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://eicar.org/
unknown
https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
unknown
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
https://www.google.com/https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-n
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:936905%0D%0ADate%20and%20Time:%2007/10/2024%20/%2004:56:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20936905%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://www.google.com
unknown
https://sdlc-esd.oracle.com/ESD6/JSCDL/jdk/8u301-b09/d3c52aa6bfa54d3ca74e617f18309292/JavaSetup8u301
unknown
https://www.eicar.org/download-anti-malware-testfile/:
unknown
http://checkip.dyndns.org/
132.226.247.73
https://packetstormsecurity.com/https://packetstormsecurity.com/files/download/22459/BIOS320.EXEhttp
unknown
https://chrome.google.com/webstore?hl=enlBZr
unknown
https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B9AB9339B
unknown
https://drive.google.com/
unknown
https://cdn.stubdownloader.services.mozilla.com/builds/firefox-latest-ssl/en-GB/win64/b5110ff5d41570
unknown
https://secure.eicar.org/eicar.com;
unknown
https://api.telegram
unknown
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245029_d3c52aa6bfa54d3ca74e617f18309292K
unknown
https://secure.eicar.org/eicar.com.txtD
unknown
https://stubdownloader.services.mozilla.com/?attribution_code=c291cmNlPXd3dy5nb29nbGUuY29tJm1lZGl1bT
unknown
https://reallyfreegeoip.org/xml/191.96.150.187
172.67.177.134
https://apis.google.com
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/191.96.150.187$
unknown
http://beta.visualstudio.net/net/sdk/feedback.asp
unknown
https://drive.google.com/?
unknown
https://www.office.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://secure.eicar.org/eicar.com
unknown
https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.exe
unknown
https://packetstormsecurity.com/files/download/22459/BIOS320.EXE
unknown
https://drive.usercontent.google.com/X
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://secure.eicar.org/eicar.com.txt/
unknown
https://www.google.com/search?q=eicar
unknown
https://secure.eicar.org/eicar.com/
unknown
http://aborters.duckdns.org:8081
unknown
https://www.autoitscript.com/site/autoit/downloads/
unknown
https://www.eicar.org/download-anti-malware-testfile/Download
unknown
https://www.eicar.org/download-anti-malware-testfile/
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:936905%0D%0ADate%20a
unknown
https://packetstormsecurity.com/
unknown
http://anotherarmy.dns.army:8081
unknown
https://www.eicar.org/
unknown
http://www.quovadis.bm0
unknown
https://www.autoitscript.com/files/autoit3/autoit-v3-setup.exeQ
unknown
https://packetstormsecurity.com/files/22459/BIOS320.EXE.html
unknown
http://api.telegram.org
unknown
https://www.eicar.org/https://eicar.org/https://www.eicar.org/download-anti-malware-testfile/https:/
unknown
https://www.google.com/
unknown
https://secure.eicar.org/eicar.com.txt
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
172.67.177.134
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.80.46
drive.usercontent.google.com
142.250.65.225
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
172.67.177.134
reallyfreegeoip.org
United States
malicious
142.250.80.46
drive.google.com
United States
142.250.65.225
drive.usercontent.google.com
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\rapporteringen\unripe\gnomezombie
tordenstemmers
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\Sombreroers38\hieroglypher\hematologist
Ginward187
HKEY_CURRENT_USER\rackway\Uninstall\Overskriftslinierne
cyanbenzyl
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_CURRENT_USER\SOFTWARE\Locales Approx
C Langs
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i_RASMANCS
FileDirectory
There are 233 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
361E1000
trusted library allocation
page read and write
malicious
597D000
direct allocation
page execute and read and write
malicious
507000
heap
page read and write
malicious
515000
heap
page read and write
malicious
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
51B000
heap
page read and write
33A0000
direct allocation
page read and write
384A0000
trusted library allocation
page read and write
374D1000
trusted library allocation
page read and write
503000
heap
page read and write
364C3000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
38CC0000
trusted library allocation
page read and write
29CF000
stack
page read and write
191000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
70B11000
unkown
page read and write
38CA0000
trusted library allocation
page execute and read and write
3757B000
trusted library allocation
page read and write
38CC0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
515000
heap
page read and write
247C000
stack
page read and write
35AFE000
stack
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
37545000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
503000
heap
page read and write
384A0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
5A15000
heap
page read and write
385C0000
trusted library allocation
page read and write
35EC0000
direct allocation
page read and write
36279000
trusted library allocation
page read and write
401000
unkown
page execute read
385C0000
trusted library allocation
page read and write
4F2000
heap
page read and write
407000
unkown
page readonly
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
70C9E000
unkown
page write copy
384B0000
heap
page read and write
38C70000
trusted library allocation
page read and write
515000
heap
page read and write
37276000
trusted library allocation
page read and write
374A7000
trusted library allocation
page read and write
3330000
direct allocation
page read and write
36291000
trusted library allocation
page read and write
3380000
direct allocation
page read and write
38C70000
trusted library allocation
page read and write
53AD000
remote allocation
page execute and read and write
38C70000
trusted library allocation
page read and write
59AE000
heap
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
70B10000
unkown
page readonly
191000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
37593000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
70B2A000
unkown
page read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
37260000
trusted library allocation
page read and write
36240000
trusted library allocation
page read and write
37206000
trusted library allocation
page read and write
503000
heap
page read and write
70B68000
unkown
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
37364000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38CD0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
361D0000
heap
page execute and read and write
503000
heap
page read and write
710C1000
unkown
page execute read
36289000
trusted library allocation
page read and write
38CC0000
trusted library allocation
page read and write
37507000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
35EB0000
direct allocation
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
385E0000
trusted library allocation
page read and write
372C2000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
10001000
unkown
page execute read
3C3D000
stack
page read and write
384A0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
5938000
heap
page read and write
190000
trusted library allocation
page read and write
38C80000
trusted library allocation
page read and write
5C7E000
stack
page read and write
38CC0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
5A08000
heap
page read and write
362ED000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
5A67000
heap
page read and write
7740000
direct allocation
page read and write
28CF000
stack
page read and write
4F2000
heap
page read and write
191000
trusted library allocation
page read and write
37246000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
362E3000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
70C71000
unkown
page write copy
16D0000
remote allocation
page execute and read and write
719BA000
unkown
page read and write
98000
stack
page read and write
35ED0000
trusted library allocation
page read and write
38490000
trusted library allocation
page read and write
515000
heap
page read and write
190000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
3724A000
trusted library allocation
page read and write
35C10000
heap
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
59AE000
heap
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
2385000
heap
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
718F4000
unkown
page readonly
70BDF000
unkown
page write copy
191000
trusted library allocation
page read and write
30000
heap
page read and write
36295000
trusted library allocation
page read and write
70BC9000
unkown
page write copy
37437000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
70B19000
unkown
page write copy
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
384C0000
heap
page read and write
71991000
unkown
page write copy
7750000
direct allocation
page read and write
38C70000
trusted library allocation
page read and write
38C80000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
372A8000
trusted library allocation
page read and write
59F9000
heap
page read and write
401000
unkown
page execute read
190000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
3340000
direct allocation
page read and write
817D000
direct allocation
page execute and read and write
38C70000
trusted library allocation
page read and write
515000
heap
page read and write
371EF000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
70BD0000
unkown
page write copy
362DF000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
70B70000
unkown
page read and write
90000
trusted library allocation
page read and write
3631A000
trusted library allocation
page read and write
3759A000
trusted library allocation
page read and write
70CBB000
unkown
page execute read
36281000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38CB0000
trusted library allocation
page execute and read and write
362E1000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
515000
heap
page read and write
373E1000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
38CC0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
409000
unkown
page write copy
384A0000
trusted library allocation
page read and write
5E0000
heap
page read and write
38C70000
trusted library allocation
page read and write
71B10000
unkown
page readonly
3612F000
stack
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
71981000
unkown
page read and write
38C70000
trusted library allocation
page read and write
37537000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
37370000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
36252000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
70C58000
unkown
page write copy
38C40000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
70B5A000
unkown
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
38C50000
trusted library allocation
page read and write
401000
unkown
page execute read
38CC0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
59AB000
heap
page read and write
38C70000
trusted library allocation
page read and write
120000
heap
page read and write
385C0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
29D0000
heap
page read and write
70BF3000
unkown
page write copy
190000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
51E000
heap
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
37377000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
70BD6000
unkown
page write copy
71982000
unkown
page write copy
503000
heap
page read and write
3320000
direct allocation
page read and write
717DB000
unkown
page execute read
36489000
trusted library allocation
page read and write
400000
unkown
page readonly
363FF000
trusted library allocation
page read and write
29D2000
heap
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
435000
unkown
page read and write
3627D000
trusted library allocation
page read and write
36312000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
71980000
unkown
page readonly
374BF000
trusted library allocation
page read and write
384AA000
trusted library allocation
page read and write
38C2F000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
199000
trusted library allocation
page read and write
373CF000
trusted library allocation
page read and write
407000
unkown
page readonly
4FE000
heap
page read and write
384A0000
trusted library allocation
page read and write
3624A000
trusted library allocation
page read and write
3628D000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
7700000
direct allocation
page read and write
191000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
507000
heap
page read and write
362AA000
trusted library allocation
page read and write
507000
heap
page read and write
191000
trusted library allocation
page read and write
3360000
direct allocation
page read and write
372D8000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
35ED6000
trusted library allocation
page read and write
384C1000
heap
page read and write
38CC0000
trusted library allocation
page read and write
59B8000
heap
page read and write
371FD000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
372A2000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
70BF2000
unkown
page read and write
385C0000
trusted library allocation
page read and write
438000
unkown
page readonly
10012000
trusted library allocation
page read and write
385E0000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
38C70000
trusted library allocation
page read and write
36372000
trusted library allocation
page read and write
38C80000
trusted library allocation
page execute and read and write
507000
heap
page read and write
191000
trusted library allocation
page read and write
29DB000
heap
page read and write
385C0000
trusted library allocation
page read and write
373EF000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
38C80000
trusted library allocation
page read and write
23C0000
heap
page read and write
35EE0000
heap
page read and write
515000
heap
page read and write
385C0000
trusted library allocation
page read and write
900000
heap
page read and write
5A60000
heap
page read and write
35AB0000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
400000
unkown
page readonly
3300000
direct allocation
page read and write
30000
heap
page read and write
191000
trusted library allocation
page read and write
36406000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
37587000
trusted library allocation
page read and write
507000
heap
page read and write
3310000
direct allocation
page read and write
38C70000
trusted library allocation
page read and write
59AB000
heap
page read and write
C2000
trusted library allocation
page read and write
38CC0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
4F7D000
direct allocation
page execute and read and write
38C20000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
38C10000
trusted library allocation
page read and write
4C0000
heap
page read and write
503000
heap
page read and write
191000
trusted library allocation
page read and write
363A7000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
5E6000
heap
page read and write
38CC0000
trusted library allocation
page read and write
4FE000
heap
page read and write
191000
trusted library allocation
page read and write
400000
unkown
page readonly
10000000
unkown
page readonly
2380000
heap
page read and write
3743E000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
110000
trusted library allocation
page execute and read and write
3877D000
stack
page read and write
38480000
trusted library allocation
page read and write
53A000
heap
page read and write
190000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
5B7C000
stack
page read and write
191000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
4FE000
heap
page read and write
38C70000
trusted library allocation
page read and write
374A9000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
59A2000
heap
page read and write
36386000
trusted library allocation
page read and write
36138000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
373C9000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
36275000
trusted library allocation
page read and write
59F6000
heap
page read and write
B2000
trusted library allocation
page read and write
3751F000
trusted library allocation
page read and write
372C0000
trusted library allocation
page read and write
3647B000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
70B2B000
unkown
page write copy
38C80000
trusted library allocation
page read and write
36474000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
37501000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
29D8000
heap
page read and write
3623B000
trusted library allocation
page read and write
2400000
heap
page read and write
384C1000
heap
page read and write
385E0000
trusted library allocation
page execute and read and write
38C30000
trusted library allocation
page read and write
507000
heap
page read and write
19C000
trusted library allocation
page read and write
37521000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
35AD000
remote allocation
page execute and read and write
233E000
stack
page read and write
38CC0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
7730000
direct allocation
page read and write
38C80000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
407000
unkown
page readonly
777D000
direct allocation
page execute and read and write
373B7000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
59A9000
heap
page read and write
38C70000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
37209000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
407000
unkown
page readonly
373B3000
trusted library allocation
page read and write
70B60000
unkown
page write copy
5A50000
direct allocation
page read and write
191000
trusted library allocation
page read and write
4FE000
heap
page read and write
38C30000
trusted library allocation
page read and write
7720000
direct allocation
page read and write
10E000
stack
page read and write
36325000
trusted library allocation
page read and write
385F0000
heap
page execute and read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
71990000
unkown
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
2484000
heap
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
507000
heap
page read and write
191000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
3830C000
heap
page read and write
191000
trusted library allocation
page read and write
3637A000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
76F0000
direct allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
3640B000
trusted library allocation
page read and write
438000
unkown
page readonly
29D8000
heap
page read and write
37358000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
35E5E000
stack
page read and write
38C70000
trusted library allocation
page read and write
371F7000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
5A67000
heap
page read and write
70BC1000
unkown
page write copy
70B14000
unkown
page write copy
38C70000
trusted library allocation
page read and write
29D1000
heap
page read and write
38C70000
trusted library allocation
page read and write
38CC0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
3738E000
trusted library allocation
page read and write
38C20000
trusted library allocation
page read and write
421000
unkown
page read and write
70B72000
unkown
page write copy
38C70000
trusted library allocation
page read and write
29D6000
heap
page read and write
409000
unkown
page write copy
385C0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
4F2000
heap
page read and write
385D0000
trusted library allocation
page execute and read and write
16E000
stack
page read and write
51B000
heap
page read and write
19F000
trusted library allocation
page read and write
49AD000
remote allocation
page execute and read and write
36318000
trusted library allocation
page read and write
77F0000
heap
page read and write
2361000
unkown
page readonly
38C40000
trusted library allocation
page read and write
36316000
trusted library allocation
page read and write
70C76000
unkown
page write copy
35E20000
remote allocation
page read and write
21AD000
remote allocation
page execute and read and write
382DE000
stack
page read and write
4FE000
heap
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38C60000
trusted library allocation
page read and write
35F2A000
stack
page read and write
4FE000
heap
page read and write
190000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
364C1000
trusted library allocation
page read and write
38CD0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
36027000
stack
page read and write
3624E000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
6D7D000
direct allocation
page execute and read and write
2480000
heap
page read and write
364B5000
trusted library allocation
page read and write
36482000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
373B1000
trusted library allocation
page read and write
4F2000
heap
page read and write
190000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
36320000
trusted library allocation
page read and write
8B7D000
direct allocation
page execute and read and write
191000
trusted library allocation
page read and write
38A3F000
stack
page read and write
10003000
unkown
page readonly
38C70000
trusted library allocation
page read and write
637D000
direct allocation
page execute and read and write
374D5000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
409000
unkown
page read and write
3741F000
trusted library allocation
page read and write
70BE7000
unkown
page write copy
70C57000
unkown
page read and write
373E9000
trusted library allocation
page read and write
35E20000
remote allocation
page read and write
35ED0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
3FAD000
remote allocation
page execute and read and write
191000
trusted library allocation
page read and write
4FE000
heap
page read and write
401000
unkown
page execute read
37203000
trusted library allocation
page read and write
424000
unkown
page read and write
70BEE000
unkown
page write copy
36285000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
4F2000
heap
page read and write
38CC0000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
3754B000
trusted library allocation
page read and write
38312000
heap
page read and write
10005000
unkown
page readonly
38C60000
trusted library allocation
page execute and read and write
362D9000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
409000
unkown
page write copy
5A40000
direct allocation
page read and write
362F4000
trusted library allocation
page read and write
515000
heap
page read and write
2BAD000
remote allocation
page execute and read and write
190000
trusted library allocation
page read and write
719BB000
unkown
page execute read
190000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
191000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
4F2000
heap
page read and write
38C70000
trusted library allocation
page read and write
438000
unkown
page readonly
385C0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
5996000
heap
page read and write
70CBA000
unkown
page read and write
5A0B000
heap
page read and write
5A18000
heap
page read and write
385E0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
371E1000
trusted library allocation
page read and write
38CE0000
trusted library allocation
page read and write
38CD0000
trusted library allocation
page execute and read and write
385C0000
trusted library allocation
page read and write
4C8000
heap
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
438000
unkown
page readonly
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
3350000
direct allocation
page read and write
38C70000
trusted library allocation
page read and write
37248000
trusted library allocation
page read and write
3390000
direct allocation
page read and write
191000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
59A9000
heap
page read and write
5930000
heap
page read and write
19A000
stack
page read and write
70BE3000
unkown
page write copy
51E000
heap
page read and write
35E20000
remote allocation
page read and write
38C70000
trusted library allocation
page read and write
400000
unkown
page readonly
38C70000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C90000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
38C80000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
2350000
unkown
page readonly
38C70000
trusted library allocation
page read and write
70B15000
unkown
page read and write
190000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
3370000
direct allocation
page read and write
3754D000
trusted library allocation
page read and write
5A66000
heap
page read and write
4FE000
heap
page read and write
3622E000
trusted library allocation
page read and write
59AE000
heap
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
76E0000
direct allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
3887F000
stack
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
373E7000
trusted library allocation
page read and write
225E000
stack
page read and write
191000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
429000
unkown
page read and write
38C70000
trusted library allocation
page read and write
5DC0000
heap
page read and write
38CD0000
trusted library allocation
page read and write
37272000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
5976000
heap
page read and write
507000
heap
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
70B6F000
unkown
page write copy
35ED0000
trusted library allocation
page read and write
7710000
heap
page read and write
385C0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
2280000
heap
page read and write
38C70000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
363FA000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
3742B000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
59AE000
heap
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
17AD000
remote allocation
page execute and read and write
384A0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
70BB0000
unkown
page write copy
38480000
trusted library allocation
page read and write
29D0000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
385C0000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
35E9F000
stack
page read and write
384A0000
trusted library allocation
page read and write
389FD000
stack
page read and write
2290000
heap
page read and write
38C70000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
385C0000
trusted library allocation
page read and write
503000
heap
page read and write
36401000
trusted library allocation
page read and write
35ED0000
trusted library allocation
page read and write
38C70000
trusted library allocation
page read and write
35BFF000
stack
page read and write
191000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
384A0000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
4F2000
heap
page read and write
384A0000
trusted library allocation
page read and write
38C10000
trusted library allocation
page read and write
382E0000
heap
page read and write
38C70000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
70BDB000
unkown
page write copy
190000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
5A30000
direct allocation
page read and write
191000
trusted library allocation
page read and write
191000
trusted library allocation
page read and write
503000
heap
page read and write
385C0000
trusted library allocation
page read and write
38CE0000
trusted library allocation
page read and write
There are 737 hidden memdumps, click here to show them.