IOC Report
jUlAlD6KHz.exe

loading gif

Files

File Path
Type
Category
Malicious
jUlAlD6KHz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\VKmo9cHGC7A78S8pIPnaIQM.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\ZC9N6dBzS5ZEt9m1PmZDOPh.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\lj9CfpGnnFdMRw3dXDPtKQ6.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\onJm2E6cdj2U7BbKnzc2Vlq.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\q54ck9WjU916t0raHCeE5cn.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Windows\System32\GroupPolicy\GPT.INI
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_bad933f1aa2e3c73144ad98e72f143d4714c1cc_52206fbe_72e21a19-20bb-408a-a8ff-76ab43e08d38\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_bad933f1aa2e3c73144ad98e72f143d4714c1cc_52206fbe_efa4bbb6-396e-4a98-80f5-fae6e996ea76\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_a830bba6823a875cf386378431eaf8cfd5e734b_1e9dd41b_6c24db22-e0be-4ca4-b70f-efe7757bc4c2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_a830bba6823a875cf386378431eaf8cfd5e734b_1e9dd41b_79889955-1a47-4717-8583-b21015b6e2e7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_jUlAlD6KHz.exe_d53664efc34d47f87f9dc37bed84ef4ccfadcbea_9881b80f_c5625a1f-d959-4692-bb37-3baea7294f5d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1600.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER162F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C43.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 20:49:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D2F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D4F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4701.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 20:49:33 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER481C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER483C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C8.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 20:49:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER593.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 20:49:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER640.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER680.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB2.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 20:49:19 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe4u3PTYpFoae8\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe4u3PTYpFoae8\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe4u3PTYpFoae8\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeMmbmgxZ09AYO\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeMmbmgxZ09AYO\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeMmbmgxZ09AYO\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeeh7qkfi3FIF_\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeeh7qkfi3FIF_\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeeh7qkfi3FIF_\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobejf0rU8GsOA8H\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobejf0rU8GsOA8H\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobejf0rU8GsOA8H\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobesP7Gsngn4GEq\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobesP7Gsngn4GEq\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobesP7Gsngn4GEq\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\0I1nOMxQEU3fWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\1m5pOEzQEACaWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\7HhkzNE5WaQhLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\88YVj1dsTfQbHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\FOvFs9CLTiuXWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\Izomk0T_qmYWLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\OeyY47E9KUTgWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\V1j47P52TLmkCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\b0ailY8QibZVHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\c5g7z2jIxWq1Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\fYGMsjKbelOUHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\hgVGsEfQ9x09Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\ihJ_ik9qeGzrCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\oJlLV2RLrNQ3History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi4u3PTYpFoae8\vh1x4eS3r8bXWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\0Z4t08FJyct9History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\0yksjCsmxcB6Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\9HwqlAJLgkt0Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\EH9L22uw0OXNWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\Hsa9dWP5JuyKHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\J10fZ3pDqIs0Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\QR6D2WTBSsMnWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\TgbdyHK8pe1NWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\ULOoq3U7VD2OWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\VxKjJB6X6MXdWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\bHXrMd07cAFvCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\bz6S8lCUNxeHHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\cLqUZahzyafULogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\oxWGFGLEOb7kLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiMmbmgxZ09AYO\upC9DKhfEaqAHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\1sOKapTVAUJzHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\90tY1n5LAioiCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\GOzI6DaHt_e4Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\MusJyEihJF98Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\SazE2VI1JGF9Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\V3w4LVfl7VJSWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\aTcgJcTY1REKWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\bwRYcSfm4lBWCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\c8PPw7DqqM4YWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\ghTh9oDq2WjGLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\lA5cEXm8d3NMHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\nZ6EIIQmvOS8History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\pPuNFXPePxsyLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\tiRa1p3qn1fRLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidieh7qkfi3FIF_\zGsEAkG4xPBPHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\7JkKTTmh_jjVHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\A0SmTJNBjqflCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\IqRoKxcmjNqfHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\JUY8wXDJl57DHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\M4JdHvSCi4zAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\QDUEIK8ip5yOWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\Seou4tH3dF8YCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\UVzneY97LLMqLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\X2n6swCXJ031Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\fpoCRozfv6JGLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\n28bw5yXqz7oHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\pg0_gG3aX3rHWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\qpr6XN5mg9uLWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\sJ8RZK7B7JamLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijf0rU8GsOA8H\zr1v42qVAUMDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\7Xmi9UUhaSI6Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\Aq1fJEYPacGkHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\DfTWXkt7bFHWWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\E75_WsHyrfU7History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\Jb5a_iygLCb1Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\L38Flzesp71fWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\LEsaLohVaJvuWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\NqBpbmu1dmFxHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\Qp9cmaUwQuZsWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\StKoooDFzgBNCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\Z2OEYMzZJJXsWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\dBpQJp7JjV8jHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\myprrumyZ5rYLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\uIronNuyFcXpLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidisP7Gsngn4GEq\yfihlkFrbVaRLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Windows\SysWOW64\GroupPolicy\gpt.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 130 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jUlAlD6KHz.exe
"C:\Users\user\Desktop\jUlAlD6KHz.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7996 -s 1928
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1244
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 1840
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7516 -s 2016
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7480 -s 2044
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.167/cost/lenin.exe
unknown
malicious
http://193.233.132.216:57893/hera/amadka.exeom
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/widget/demo/102.165.48.43b
unknown
https://t.me/RiseProSUPPORTu
unknown
https://t.me/risepro_botM
unknown
https://duckduckgo.com/ac/?q=
unknown
http://193.233.132.167/cost/go.exeLitecoinH8
unknown
https://ipinfo.io/widget/demo/102.165.48.43g
unknown
https://t.k
unknown
https://db-ip.com/
unknown
https://ipinfo.io/C:
unknown
http://193.233.132.167/cost/lenin.exeger
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://t.me/risepro_botW
unknown
http://193.233.132.167/cost/go.exenfinitecoin
unknown
https://db-ip.com/demo/home.php?s=102.165.48.437
unknown
https://t.me/risepro_botSS$
unknown
http://193.233.132.167/mine/amert.exe.ll
unknown
http://193.233.132.167/mine/amert.exe)
unknown
https://db-ip.com:443/demo/home.php?s=102.165.48.43
unknown
http://193.233.132.167/cost/go.exeunt.live.com
unknown
http://193.233.132.167/cost/lenin.exeP
unknown
http://193.233.132.167/cost/go.exe
unknown
http://193.233.132.167/cost/lenin.exeS
unknown
https://t.me/RiseProSUPPORTW
unknown
http://193.233.132.167/cost/lenin.exeorynet
unknown
https://t.me/RiseProSUPPORTM
unknown
https://t.me/RiseProSUPPORTII$=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/risepro_botcu
unknown
https://t.me/RiseProSUPPORTUR
unknown
https://ipinfo.io/widget/demo/102.165.48.43r
unknown
https://t.me/RiseProSUPPORTDEFAULT
unknown
https://ipinfo.io/l
unknown
https://ipinfo.io:443/widget/demo/102.165.48.43
unknown
https://t.me/risepro_botrisepro
unknown
http://193.233.132.167/cost/go.exeamadka.
unknown
http://193.233.132.216:57893/hera/amadka.exeP-B;
unknown
http://193.233.132.216:57893/hera/amadka.exe
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://193.233.132.167/mine/amert.exeUser
unknown
https://db-ip.com/F
unknown
https://t.me/risepro_botSS
unknown
https://db-ip.com/demo/home.php?s=102.165.48.43
104.26.5.15
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://t.me/RiseProSUPPORTQd
unknown
http://193.233.132.167/cost/lenin.exenal
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
http://193.233.132.167/mine/amert.exei
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://193.233.132.167/mine/amert.exem
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
http://193.233.132.167/cost/lenin.exe~
unknown
http://193.233.132.216:57893/hera/amadka.exe43
unknown
https://ipinfo.io/widget/demo/102.165.48.43B
unknown
https://t.me/risepro_botlater
unknown
http://193.233.132.167/mine/amert.exe
unknown
http://193.233.132.167/mine/amert.exet
unknown
http://193.233.132.216:57893/hera/amadka.exeomW
unknown
https://ipinfo.io/
unknown
https://ipinfo.io/widget/demo/102.165.48.43G
unknown
https://db-ip.com/demo/home.php?s=102.165.48.43S
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com:443/demo/home.php?s=102.165.48.43Q
unknown
https://db-ip.com:443/demo/home.php?s=102.165.48.43P
unknown
https://ipinfo.io/widget/demo/102.165.48.43N
unknown
https://t.me/RiseProSUPPORTQQT
unknown
http://193.233.132.216:57893/hera/amadka.exeta
unknown
https://ipinfo.io/widget/demo/102.165.48.43
34.117.186.192
http://www.winimage.com/zLibDll
unknown
http://193.233.132.167/cost/go.exe)
unknown
http://193.233.132.167/mine/amert.exeka.exeomr
unknown
https://support.mozilla.org
unknown
https://ipinfo.io/-
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://t.me/risepro_botu
unknown
http://193.233.132.216:57893/hera/amadka.exe43A
unknown
https://t.me/risepro_botp
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States
172.67.75.166
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Exclusions_Extensions
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableRoutinelyTakingAction
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{0C52D293-93AF-4DB3-8012-32E2FB2DAC51}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRawWriteNotification
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableRoutinelyTakingAction
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Exclusions_Extensions
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{796A6376-0454-455F-AACF-D926BD4DD768}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRawWriteNotification
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableRoutinelyTakingAction
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Exclusions_Extensions
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{642526A1-CA57-422E-8196-D9D6C17E634B}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRawWriteNotification
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
ProgramId
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
FileId
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
LowerCaseLongPath
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
LongPathHash
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
Name
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
OriginalFileName
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
Publisher
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
Version
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
BinFileVersion
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
BinaryType
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
ProductName
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
ProductVersion
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
LinkDate
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
BinProductVersion
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
AppxPackageFullName
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
AppxPackageRelativeId
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
Size
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
Language
\REGISTRY\A\{84f4576a-cb0f-7468-4893-79ef526fea92}\Root\InventoryApplicationFile\julald6khz.exe|b673d07e7765b66c
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{a6cafb5a-db5f-edb4-0125-f2dfa52c4f35}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00C6D8FE690
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 64 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1145000
heap
page read and write
malicious
165E000
heap
page read and write
malicious
1543000
heap
page read and write
malicious
5D3F000
heap
page read and write
malicious
EE5000
heap
page read and write
malicious
6210000
heap
page read and write
malicious
1145000
heap
page read and write
malicious
14ED000
heap
page read and write
malicious
E1D000
heap
page read and write
malicious
148E000
heap
page read and write
malicious
6246000
heap
page read and write
malicious
A8B000
heap
page read and write
malicious
108A000
heap
page read and write
malicious
1424000
heap
page read and write
1424000
heap
page read and write
4E80000
direct allocation
page execute and read and write
638F000
heap
page read and write
6267000
heap
page read and write
D41000
unkown
page execute and write copy
14DB000
heap
page read and write
439F000
stack
page read and write
5DA7000
heap
page read and write
173A000
heap
page read and write
2D8F000
stack
page read and write
5E90000
trusted library allocation
page read and write
4D91000
heap
page read and write
627B000
heap
page read and write
1424000
heap
page read and write
4AEF000
stack
page read and write
5E1D000
heap
page read and write
5D54000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
AA5000
heap
page read and write
984000
heap
page read and write
173B000
heap
page read and write
626E000
heap
page read and write
985000
heap
page read and write
14D5000
heap
page read and write
1070000
heap
page read and write
5DB1000
heap
page read and write
6387000
heap
page read and write
63A4000
heap
page read and write
D41000
unkown
page execute and read and write
4861000
heap
page read and write
5E00000
trusted library allocation
page read and write
1424000
heap
page read and write
5D9D000
heap
page read and write
AAC000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
639E000
heap
page read and write
63AC000
heap
page read and write
5DF1000
heap
page read and write
63AB000
heap
page read and write
2BCE000
stack
page read and write
371E000
stack
page read and write
5D4D000
heap
page read and write
5D6B000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1739000
heap
page read and write
1420000
heap
page read and write
636E000
heap
page read and write
16A1000
heap
page read and write
10FB000
heap
page read and write
2B60000
direct allocation
page read and write
A70000
heap
page read and write
D41000
unkown
page execute and write copy
63A4000
heap
page read and write
5D90000
trusted library allocation
page read and write
63B1000
heap
page read and write
5DBA000
heap
page read and write
5D90000
trusted library allocation
page read and write
5E0D000
heap
page read and write
2C57000
heap
page read and write
1424000
heap
page read and write
5D1D000
heap
page read and write
5DAB000
heap
page read and write
62A6000
heap
page read and write
49B1000
heap
page read and write
D20000
heap
page read and write
39AE000
stack
page read and write
4911000
heap
page read and write
D41000
unkown
page execute and write copy
624F000
heap
page read and write
62B7000
heap
page read and write
5D55000
heap
page read and write
4DA1000
heap
page read and write
148A000
heap
page read and write
53E0000
direct allocation
page execute and read and write
831000
unkown
page execute and read and write
49C0000
heap
page read and write
5D40000
heap
page read and write
5D4E000
heap
page read and write
63BD000
heap
page read and write
5360000
direct allocation
page execute and read and write
5D00000
trusted library allocation
page read and write
1640000
direct allocation
page read and write
629A000
heap
page read and write
5D9E000
heap
page read and write
4E9B000
stack
page read and write
D42000
unkown
page execute and write copy
638E000
heap
page read and write
3D6E000
stack
page read and write
15B7000
heap
page read and write
5D4F000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4EC0000
direct allocation
page execute and read and write
49B1000
heap
page read and write
40EF000
stack
page read and write
F04000
heap
page read and write
5D4E000
heap
page read and write
5D28000
heap
page read and write
6310000
trusted library allocation
page read and write
63A7000
heap
page read and write
6265000
heap
page read and write
2B60000
direct allocation
page read and write
5D10000
trusted library allocation
page read and write
1424000
heap
page read and write
5D3E000
stack
page read and write
5DA7000
heap
page read and write
93B000
stack
page read and write
63A4000
heap
page read and write
5D50000
heap
page read and write
4911000
heap
page read and write
5D8F000
heap
page read and write
5C3F000
stack
page read and write
984000
heap
page read and write
386E000
stack
page read and write
5E90000
trusted library allocation
page read and write
6392000
heap
page read and write
5DDD000
heap
page read and write
638E000
heap
page read and write
3ADE000
stack
page read and write
5D5E000
heap
page read and write
314F000
stack
page read and write
A81000
heap
page read and write
2B60000
direct allocation
page read and write
13DE000
stack
page read and write
5E00000
trusted library allocation
page read and write
63AB000
heap
page read and write
309F000
stack
page read and write
55EE000
stack
page read and write
5DA7000
heap
page read and write
429E000
stack
page read and write
49B0000
heap
page read and write
2AC0000
direct allocation
page read and write
440000
unkown
page read and write
5DB8000
heap
page read and write
5DC8000
heap
page read and write
5DC8000
heap
page read and write
43DE000
stack
page read and write
832000
unkown
page execute and write copy
5390000
direct allocation
page execute and read and write
629E000
heap
page read and write
5DE4000
heap
page read and write
5D6B000
heap
page read and write
63E7000
heap
page read and write
5DFD000
heap
page read and write
3E9E000
stack
page read and write
5D48000
heap
page read and write
B54000
heap
page read and write
5D58000
heap
page read and write
4E60000
direct allocation
page execute and read and write
5DD9000
heap
page read and write
4F40000
direct allocation
page execute and read and write
63A4000
heap
page read and write
2A7E000
stack
page read and write
63AB000
heap
page read and write
436F000
stack
page read and write
5D1E000
heap
page read and write
63AD000
heap
page read and write
FF0000
heap
page read and write
5DA7000
heap
page read and write
1163000
heap
page read and write
5DB1000
heap
page read and write
5440000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
9D3000
heap
page read and write
5490000
direct allocation
page execute and read and write
F44000
heap
page read and write
5230000
trusted library allocation
page read and write
5DD7000
heap
page read and write
5D90000
trusted library allocation
page read and write
5D51000
heap
page read and write
5DFD000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
984000
heap
page read and write
5DDB000
heap
page read and write
5DED000
heap
page read and write
5D4E000
heap
page read and write
984000
heap
page read and write
984000
heap
page read and write
CFB000
stack
page read and write
5D51000
heap
page read and write
5DD1000
heap
page read and write
5DE0000
heap
page read and write
5D2F000
heap
page read and write
984000
heap
page read and write
6272000
heap
page read and write
2AC0000
direct allocation
page read and write
5D67000
heap
page read and write
5450000
direct allocation
page execute and read and write
5DA7000
heap
page read and write
1424000
heap
page read and write
5DB1000
heap
page read and write
5DA7000
heap
page read and write
5DB1000
heap
page read and write
1470000
direct allocation
page read and write
5DB1000
heap
page read and write
41CE000
stack
page read and write
5D2C000
heap
page read and write
63A4000
heap
page read and write
2F5F000
stack
page read and write
5230000
direct allocation
page read and write
5D4B000
heap
page read and write
5DEA000
heap
page read and write
F05000
heap
page read and write
5DB8000
heap
page read and write
AAC000
heap
page read and write
638C000
heap
page read and write
5DB8000
heap
page read and write
637C000
heap
page read and write
5DA7000
heap
page read and write
5D4E000
heap
page read and write
50C0000
direct allocation
page execute and read and write
5DDB000
heap
page read and write
2F9C000
heap
page read and write
2B60000
direct allocation
page read and write
5D6E000
heap
page read and write
5DDE000
heap
page read and write
5D5D000
heap
page read and write
31DF000
stack
page read and write
6210000
trusted library allocation
page read and write
6383000
heap
page read and write
5D59000
heap
page read and write
623A000
heap
page read and write
A8C000
heap
page read and write
63AB000
heap
page read and write
5420000
direct allocation
page execute and read and write
63D9000
heap
page read and write
3D1F000
stack
page read and write
6245000
heap
page read and write
331F000
stack
page read and write
F44000
heap
page read and write
5880000
remote allocation
page read and write
E6E000
unkown
page execute and read and write
5DD9000
heap
page read and write
4F70000
direct allocation
page execute and read and write
2ECF000
stack
page read and write
984000
heap
page read and write
E6E000
unkown
page execute and read and write
625B000
heap
page read and write
321E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
6270000
heap
page read and write
5D46000
heap
page read and write
4F30000
direct allocation
page execute and read and write
62B7000
heap
page read and write
5D76000
heap
page read and write
5BFE000
stack
page read and write
F02000
heap
page read and write
1640000
direct allocation
page read and write
5DC8000
heap
page read and write
AAB000
heap
page read and write
10E3000
heap
page read and write
5390000
direct allocation
page execute and read and write
5DC3000
heap
page read and write
6249000
heap
page read and write
345F000
stack
page read and write
5D77000
heap
page read and write
984000
heap
page read and write
984000
heap
page read and write
F44000
heap
page read and write
5D57000
heap
page read and write
B54000
heap
page read and write
A7E000
unkown
page execute and read and write
F44000
heap
page read and write
B54000
heap
page read and write
AA9000
heap
page read and write
6246000
heap
page read and write
5DC7000
heap
page read and write
5D60000
heap
page read and write
5D72000
heap
page read and write
1424000
heap
page read and write
49B1000
heap
page read and write
1640000
direct allocation
page read and write
6460000
trusted library allocation
page read and write
5D4F000
heap
page read and write
5D48000
heap
page read and write
5D54000
heap
page read and write
54B0000
direct allocation
page execute and read and write
5840000
remote allocation
page read and write
1160000
heap
page read and write
6265000
heap
page read and write
56C6000
heap
page read and write
4E50000
direct allocation
page read and write
5DD7000
heap
page read and write
4DA0000
direct allocation
page read and write
5D4D000
heap
page read and write
5D9D000
heap
page read and write
624D000
heap
page read and write
4C5F000
stack
page read and write
5D67000
heap
page read and write
D33000
unkown
page execute and read and write
5D58000
heap
page read and write
4B1F000
stack
page read and write
3E5F000
stack
page read and write
5390000
direct allocation
page execute and read and write
5E29000
heap
page read and write
4F90000
direct allocation
page execute and read and write
5880000
remote allocation
page read and write
3A0F000
stack
page read and write
5D60000
heap
page read and write
5D52000
heap
page read and write
54B0000
direct allocation
page execute and read and write
623A000
heap
page read and write
6360000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
5D7E000
heap
page read and write
5D2F000
heap
page read and write
2F70000
direct allocation
page read and write
624B000
heap
page read and write
1640000
direct allocation
page read and write
5D9F000
heap
page read and write
1424000
heap
page read and write
1640000
direct allocation
page read and write
4D70000
heap
page read and write
985000
heap
page read and write
5DDA000
heap
page read and write
B54000
heap
page read and write
5D46000
heap
page read and write
45DF000
stack
page read and write
F44000
heap
page read and write
984000
heap
page read and write
5DEA000
heap
page read and write
B54000
heap
page read and write
5D4B000
heap
page read and write
2BFF000
stack
page read and write
4D00000
direct allocation
page read and write
56CF000
heap
page read and write
49B1000
heap
page read and write
5D59000
heap
page read and write
984000
heap
page read and write
5DEB000
heap
page read and write
51F0000
heap
page read and write
63AB000
heap
page read and write
4DA1000
heap
page read and write
5D9E000
heap
page read and write
479E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
35DE000
stack
page read and write
44EE000
stack
page read and write
49B1000
heap
page read and write
5D3D000
heap
page read and write
5DC8000
heap
page read and write
172C000
heap
page read and write
5D50000
heap
page read and write
3E9E000
stack
page read and write
63A7000
heap
page read and write
5DF2000
heap
page read and write
5E00000
trusted library allocation
page read and write
F44000
heap
page read and write
4D90000
direct allocation
page read and write
63A5000
heap
page read and write
5D50000
heap
page read and write
F44000
heap
page read and write
535D000
stack
page read and write
F0B000
heap
page read and write
5390000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
4DA1000
heap
page read and write
5DCA000
heap
page read and write
5D3D000
heap
page read and write
5050000
direct allocation
page execute and read and write
5DEA000
heap
page read and write
3AAF000
stack
page read and write
5D07000
heap
page read and write
1734000
heap
page read and write
4861000
heap
page read and write
626B000
heap
page read and write
5D9D000
heap
page read and write
56EF000
stack
page read and write
5D9D000
heap
page read and write
359F000
stack
page read and write
62A5000
heap
page read and write
4E80000
direct allocation
page execute and read and write
638D000
heap
page read and write
625B000
heap
page read and write
5D50000
heap
page read and write
5DE3000
heap
page read and write
5E90000
trusted library allocation
page read and write
30DF000
stack
page read and write
5D55000
heap
page read and write
10F6000
heap
page read and write
984000
heap
page read and write
5DD7000
heap
page read and write
1576000
heap
page read and write
A6C000
heap
page read and write
5D55000
heap
page read and write
5D66000
heap
page read and write
5DEA000
heap
page read and write
985000
heap
page read and write
AAA000
heap
page read and write
639C000
heap
page read and write
637B000
heap
page read and write
4D91000
heap
page read and write
63AB000
heap
page read and write
D40000
unkown
page read and write
62B7000
heap
page read and write
56E000
unkown
page execute and read and write
5D6A000
heap
page read and write
638D000
heap
page read and write
5D3D000
heap
page read and write
1470000
direct allocation
page read and write
5D90000
trusted library allocation
page read and write
1470000
direct allocation
page read and write
4DA1000
heap
page read and write
5D7C000
heap
page read and write
1735000
heap
page read and write
63A9000
heap
page read and write
B54000
heap
page read and write
4D91000
heap
page read and write
3F9F000
stack
page read and write
4861000
heap
page read and write
63A8000
heap
page read and write
56C0000
trusted library allocation
page read and write
5910000
remote allocation
page read and write
56C0000
trusted library allocation
page read and write
63B6000
heap
page read and write
5000000
direct allocation
page execute and read and write
5D77000
heap
page read and write
F44000
heap
page read and write
5DA8000
heap
page read and write
1424000
heap
page read and write
63C2000
heap
page read and write
5DF7000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
421F000
stack
page read and write
9D6000
unkown
page execute and read and write
451E000
stack
page read and write
984000
heap
page read and write
4E50000
direct allocation
page read and write
5D5B000
heap
page read and write
639B000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
34AE000
stack
page read and write
49A0000
direct allocation
page read and write
440000
unkown
page readonly
3BDF000
stack
page read and write
5380000
direct allocation
page execute and read and write
5D35000
heap
page read and write
AA5000
heap
page read and write
9DB000
stack
page read and write
4861000
heap
page read and write
5460000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
5D1B000
heap
page read and write
371E000
stack
page read and write
F44000
heap
page read and write
332F000
stack
page read and write
A72000
heap
page read and write
173E000
heap
page read and write
63AD000
heap
page read and write
2FDE000
stack
page read and write
6387000
heap
page read and write
984000
heap
page read and write
5DB8000
heap
page read and write
49A0000
direct allocation
page read and write
1739000
heap
page read and write
6210000
trusted library allocation
page read and write
639B000
heap
page read and write
439E000
stack
page read and write
5D55000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
1424000
heap
page read and write
E73000
unkown
page write copy
623B000
heap
page read and write
629A000
heap
page read and write
5DCA000
heap
page read and write
5DC8000
heap
page read and write
5DC8000
heap
page read and write
5D73000
heap
page read and write
4861000
heap
page read and write
5D5D000
heap
page read and write
4E80000
direct allocation
page execute and read and write
984000
heap
page read and write
63BC000
heap
page read and write
5DC7000
heap
page read and write
5DB1000
heap
page read and write
5D10000
trusted library allocation
page read and write
173F000
heap
page read and write
574D000
stack
page read and write
5DBA000
heap
page read and write
5790000
heap
page read and write
623E000
heap
page read and write
6249000
heap
page read and write
624F000
heap
page read and write
5DB1000
heap
page read and write
6399000
heap
page read and write
5D48000
heap
page read and write
4FAF000
heap
page read and write
4D91000
heap
page read and write
951000
unkown
page execute and write copy
1165000
heap
page read and write
4CC0000
heap
page read and write
5D1C000
heap
page read and write
5D35000
heap
page read and write
5E00000
trusted library allocation
page read and write
62B7000
heap
page read and write
5D59000
heap
page read and write
1424000
heap
page read and write
4861000
heap
page read and write
4D91000
heap
page read and write
1080000
heap
page read and write
5D50000
heap
page read and write
6281000
heap
page read and write
3F0F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
AAC000
heap
page read and write
B54000
heap
page read and write
F44000
heap
page read and write
1165000
heap
page read and write
950000
unkown
page read and write
5DC8000
heap
page read and write
49A0000
direct allocation
page read and write
10D2000
heap
page read and write
62B7000
heap
page read and write
5D9D000
heap
page read and write
5DA7000
heap
page read and write
6256000
heap
page read and write
5D3D000
heap
page read and write
5DB1000
heap
page read and write
A8C000
heap
page read and write
53D0000
direct allocation
page execute and read and write
4DB0000
heap
page read and write
610E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
595E000
stack
page read and write
5DD7000
heap
page read and write
5D44000
heap
page read and write
5D8A000
heap
page read and write
359F000
stack
page read and write
5B9F000
stack
page read and write
B54000
heap
page read and write
1577000
heap
page read and write
4CF0000
direct allocation
page read and write
5DB1000
heap
page read and write
5D2F000
heap
page read and write
173B000
heap
page read and write
984000
heap
page read and write
57FE000
stack
page read and write
2E5F000
stack
page read and write
396F000
stack
page read and write
625B000
heap
page read and write
27FF000
unkown
page read and write
BDD000
stack
page read and write
5DB1000
heap
page read and write
5DCA000
heap
page read and write
3D5E000
stack
page read and write
5E90000
trusted library allocation
page read and write
6253000
heap
page read and write
4DA1000
heap
page read and write
AA9000
heap
page read and write
4F20000
direct allocation
page execute and read and write
548E000
stack
page read and write
12EE000
stack
page read and write
5DDB000
heap
page read and write
63AC000
heap
page read and write
5D90000
trusted library allocation
page read and write
2B60000
direct allocation
page read and write
5D1B000
heap
page read and write
381F000
stack
page read and write
638F000
heap
page read and write
5D25000
heap
page read and write
5D50000
heap
page read and write
1424000
heap
page read and write
5DA7000
heap
page read and write
117C000
heap
page read and write
2C00000
heap
page read and write
F05000
heap
page read and write
AAC000
heap
page read and write
500000
heap
page read and write
5FDE000
stack
page read and write
5DA7000
heap
page read and write
5DA7000
heap
page read and write
984000
heap
page read and write
390E000
stack
page read and write
A8C000
heap
page read and write
5D2F000
heap
page read and write
5DCC000
heap
page read and write
5DA7000
heap
page read and write
47CF000
stack
page read and write
6460000
trusted library allocation
page read and write
577000
unkown
page execute and read and write
2D1E000
stack
page read and write
984000
heap
page read and write
57FE000
stack
page read and write
5DD8000
heap
page read and write
625B000
heap
page read and write
5D4E000
heap
page read and write
157D000
heap
page read and write
2F70000
direct allocation
page read and write
1151000
heap
page read and write
5DC8000
heap
page read and write
5DB8000
heap
page read and write
111A000
unkown
page execute and read and write
468F000
stack
page read and write
49B1000
heap
page read and write
EE6000
unkown
page execute and read and write
12E0000
heap
page read and write
5D9D000
heap
page read and write
63A7000
heap
page read and write
49B1000
heap
page read and write
62B7000
heap
page read and write
AA5000
heap
page read and write
F44000
heap
page read and write
6382000
heap
page read and write
5DDA000
heap
page read and write
F40000
heap
page read and write
63BD000
heap
page read and write
5440000
direct allocation
page execute and read and write
3E5F000
stack
page read and write
5460000
direct allocation
page execute and read and write
5D4A000
heap
page read and write
F44000
heap
page read and write
1470000
direct allocation
page read and write
637B000
heap
page read and write
F0B000
heap
page read and write
984000
heap
page read and write
AA5000
heap
page read and write
F44000
heap
page read and write
31DF000
stack
page read and write
5D5E000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
5DA7000
heap
page read and write
1424000
heap
page read and write
4D9F000
stack
page read and write
173F000
heap
page read and write
2F5F000
stack
page read and write
3ADF000
stack
page read and write
1410000
heap
page read and write
5390000
direct allocation
page execute and read and write
5DC8000
heap
page read and write
625B000
heap
page read and write
4F00000
direct allocation
page execute and read and write
54CD000
heap
page read and write
5DD8000
heap
page read and write
2F97000
heap
page read and write
5E00000
trusted library allocation
page read and write
5D50000
heap
page read and write
5D9D000
heap
page read and write
984000
heap
page read and write
5030000
direct allocation
page execute and read and write
589E000
stack
page read and write
5D11000
heap
page read and write
173A000
heap
page read and write
637C000
heap
page read and write
F44000
heap
page read and write
49B1000
heap
page read and write
1424000
heap
page read and write
5DB1000
heap
page read and write
4D91000
heap
page read and write
157A000
heap
page read and write
5D4C000
heap
page read and write
984000
heap
page read and write
5D5F000
heap
page read and write
1543000
heap
page read and write
9FD000
heap
page read and write
5840000
remote allocation
page read and write
639D000
heap
page read and write
5D9D000
heap
page read and write
4910000
heap
page read and write
146E000
stack
page read and write
5DC8000
heap
page read and write
4E90000
trusted library allocation
page read and write
63D1000
heap
page read and write
63B6000
heap
page read and write
49DF000
stack
page read and write
4E20000
heap
page read and write
5DDA000
heap
page read and write
368E000
stack
page read and write
5D10000
trusted library allocation
page read and write
174B000
heap
page read and write
624C000
heap
page read and write
10BC000
heap
page read and write
59BD000
stack
page read and write
5DCF000
heap
page read and write
490F000
stack
page read and write
26C0000
heap
page read and write
411E000
stack
page read and write
5DB8000
heap
page read and write
637B000
heap
page read and write
5DB1000
heap
page read and write
5A9D000
stack
page read and write
1424000
heap
page read and write
4DA1000
heap
page read and write
639C000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5D2F000
heap
page read and write
5D3D000
heap
page read and write
D40000
unkown
page readonly
B54000
heap
page read and write
AAC000
heap
page read and write
4860000
heap
page read and write
5380000
direct allocation
page execute and read and write
4D91000
heap
page read and write
2C0C000
stack
page read and write
5D4D000
heap
page read and write
831000
unkown
page execute and write copy
7DD000
unkown
page execute and read and write
63A4000
heap
page read and write
950000
unkown
page readonly
4D91000
heap
page read and write
5210000
remote allocation
page read and write
53B0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page execute and read and write
F44000
heap
page read and write
5DA7000
heap
page read and write
637B000
heap
page read and write
1578000
heap
page read and write
5E00000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
B0B000
stack
page read and write
580E000
stack
page read and write
435F000
stack
page read and write
5D50000
heap
page read and write
1424000
heap
page read and write
5D56000
heap
page read and write
5D4E000
heap
page read and write
44AF000
stack
page read and write
AAB000
heap
page read and write
5D60000
heap
page read and write
5D50000
heap
page read and write
4D3C000
stack
page read and write
16BE000
heap
page read and write
5DDA000
heap
page read and write
335E000
stack
page read and write
5D41000
heap
page read and write
5D48000
heap
page read and write
5DC8000
heap
page read and write
637C000
heap
page read and write
5DC4000
heap
page read and write
63AB000
heap
page read and write
5230000
trusted library allocation
page read and write
5D9D000
heap
page read and write
5D66000
heap
page read and write
5D40000
heap
page read and write
3C1E000
stack
page read and write
583D000
stack
page read and write
B54000
heap
page read and write
F05000
heap
page read and write
4B2E000
stack
page read and write
5DBA000
heap
page read and write
5DE6000
heap
page read and write
F05000
heap
page read and write
3DCF000
stack
page read and write
624C000
heap
page read and write
5220000
direct allocation
page read and write
2C50000
heap
page read and write
63AA000
heap
page read and write
38CF000
stack
page read and write
454F000
stack
page read and write
2AC0000
direct allocation
page read and write
36DF000
stack
page read and write
6277000
heap
page read and write
1424000
heap
page read and write
5DD9000
heap
page read and write
5DD7000
heap
page read and write
4DA1000
heap
page read and write
53B0000
direct allocation
page execute and read and write
CED000
stack
page read and write
A83000
unkown
page write copy
5D46000
heap
page read and write
4F50000
direct allocation
page execute and read and write
5D50000
heap
page read and write
1424000
heap
page read and write
F44000
heap
page read and write
1738000
heap
page read and write
4911000
heap
page read and write
5D90000
trusted library allocation
page read and write
5DF9000
heap
page read and write
5D46000
heap
page read and write
331F000
stack
page read and write
63AF000
heap
page read and write
F0B000
heap
page read and write
5D1A000
heap
page read and write
B54000
heap
page read and write
14C8000
heap
page read and write
5DDA000
heap
page read and write
173B000
heap
page read and write
4911000
heap
page read and write
4D91000
heap
page read and write
4DA1000
heap
page read and write
5DFD000
heap
page read and write
5DB8000
heap
page read and write
5220000
direct allocation
page read and write
627A000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
531E000
stack
page read and write
6240000
heap
page read and write
984000
heap
page read and write
984000
heap
page read and write
1739000
heap
page read and write
63A4000
heap
page read and write
5D46000
heap
page read and write
5D9A000
heap
page read and write
5E10000
trusted library allocation
page read and write
36EF000
stack
page read and write
F44000
heap
page read and write
6256000
heap
page read and write
5E2D000
stack
page read and write
5D9F000
heap
page read and write
5E29000
heap
page read and write
411E000
stack
page read and write
5DB1000
heap
page read and write
558E000
stack
page read and write
AAC000
heap
page read and write
26BE000
unkown
page read and write
5D9F000
heap
page read and write
2D5F000
stack
page read and write
E91000
heap
page read and write
F06000
heap
page read and write
441000
unkown
page execute and write copy
5DB8000
heap
page read and write
831000
unkown
page execute and read and write
49B1000
heap
page read and write
63A4000
heap
page read and write
63AB000
heap
page read and write
984000
heap
page read and write
1123000
unkown
page execute and read and write
4D91000
heap
page read and write
2F90000
heap
page read and write
5E29000
heap
page read and write
1480000
heap
page read and write
1424000
heap
page read and write
173A000
heap
page read and write
92E000
stack
page read and write
F04000
heap
page read and write
623A000
heap
page read and write
F44000
heap
page read and write
638C000
heap
page read and write
5DD8000
heap
page read and write
6256000
heap
page read and write
63A4000
heap
page read and write
1123000
unkown
page execute and read and write
5DA7000
heap
page read and write
5D84000
heap
page read and write
F44000
heap
page read and write
F04000
heap
page read and write
6245000
heap
page read and write
F7B000
stack
page read and write
1470000
direct allocation
page read and write
485F000
stack
page read and write
AA5000
heap
page read and write
1424000
heap
page read and write
5D59000
heap
page read and write
5D1C000
heap
page read and write
9A0000
heap
page read and write
5DF0000
heap
page read and write
5450000
direct allocation
page execute and read and write
B54000
heap
page read and write
4F10000
direct allocation
page execute and read and write
1424000
heap
page read and write
823000
unkown
page execute and read and write
311B000
stack
page read and write
6310000
trusted library allocation
page read and write
475E000
stack
page read and write
49EE000
stack
page read and write
F05000
heap
page read and write
49B1000
heap
page read and write
1640000
direct allocation
page read and write
4D70000
heap
page read and write
5DB8000
heap
page read and write
5D52000
heap
page read and write
441000
unkown
page execute and read and write
5D9F000
heap
page read and write
4DA1000
heap
page read and write
F44000
heap
page read and write
5D9A000
heap
page read and write
F44000
heap
page read and write
163C000
stack
page read and write
5D56000
heap
page read and write
173B000
heap
page read and write
5D52000
heap
page read and write
5FD0000
trusted library allocation
page read and write
5DB1000
heap
page read and write
5D58000
heap
page read and write
A8C000
heap
page read and write
63AB000
heap
page read and write
165A000
heap
page read and write
63A4000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5D1B000
heap
page read and write
4E80000
direct allocation
page execute and read and write
157C000
heap
page read and write
2AC0000
direct allocation
page read and write
A82000
heap
page read and write
624C000
heap
page read and write
6387000
heap
page read and write
336E000
stack
page read and write
5D6C000
heap
page read and write
45DF000
stack
page read and write
D1E000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
5D35000
heap
page read and write
157C000
heap
page read and write
5410000
direct allocation
page execute and read and write
624B000
heap
page read and write
582F000
stack
page read and write
157C000
heap
page read and write
B54000
heap
page read and write
6252000
heap
page read and write
5D64000
heap
page read and write
985000
heap
page read and write
3C8F000
stack
page read and write
63A9000
heap
page read and write
9D6000
unkown
page execute and read and write
63B3000
heap
page read and write
5DA7000
heap
page read and write
984000
heap
page read and write
5DB8000
heap
page read and write
5DBA000
heap
page read and write
3D5F000
stack
page read and write
623E000
heap
page read and write
E10000
heap
page read and write
4DA0000
heap
page read and write
6271000
heap
page read and write
5D59000
heap
page read and write
58FF000
stack
page read and write
6285000
heap
page read and write
637C000
heap
page read and write
6210000
trusted library allocation
page read and write
461F000
stack
page read and write
D40000
unkown
page read and write
637A000
heap
page read and write
F30000
heap
page read and write
4DA1000
heap
page read and write
489E000
stack
page read and write
A83000
unkown
page read and write
6210000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
637B000
heap
page read and write
5D60000
heap
page read and write
63AE000
heap
page read and write
5D01000
heap
page read and write
6360000
trusted library allocation
page read and write
5D9B000
heap
page read and write
639A000
heap
page read and write
5D5B000
heap
page read and write
5020000
direct allocation
page execute and read and write
16A9000
heap
page read and write
5D60000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5D35000
heap
page read and write
63AB000
heap
page read and write
B54000
heap
page read and write
5DDA000
heap
page read and write
5D52000
heap
page read and write
5D3A000
heap
page read and write
13C0000
heap
page read and write
55BD000
stack
page read and write
5DEA000
heap
page read and write
5DEA000
heap
page read and write
5D50000
heap
page read and write
4DA1000
heap
page read and write
F0B000
heap
page read and write
4FEE000
stack
page read and write
5480000
direct allocation
page execute and read and write
5D1C000
heap
page read and write
5DDC000
heap
page read and write
49A0000
direct allocation
page read and write
5DC4000
heap
page read and write
6226000
heap
page read and write
5E00000
trusted library allocation
page read and write
5DDA000
heap
page read and write
63A4000
heap
page read and write
5910000
remote allocation
page read and write
4DA1000
heap
page read and write
62B7000
heap
page read and write
1734000
heap
page read and write
345F000
stack
page read and write
5DA7000
heap
page read and write
B54000
heap
page read and write
5D5D000
heap
page read and write
984000
heap
page read and write
63BC000
heap
page read and write
B54000
heap
page read and write
2A9F000
unkown
page read and write
5DBA000
heap
page read and write
461E000
stack
page read and write
2B60000
direct allocation
page read and write
5220000
direct allocation
page read and write
5D63000
heap
page read and write
1470000
direct allocation
page read and write
625B000
heap
page read and write
4D91000
heap
page read and write
5B9E000
stack
page read and write
984000
heap
page read and write
5DB1000
heap
page read and write
2A5E000
unkown
page read and write
A95000
heap
page read and write
5D6B000
heap
page read and write
4DA1000
heap
page read and write
5DCF000
heap
page read and write
5E10000
trusted library allocation
page read and write
5D84000
heap
page read and write
1578000
heap
page read and write
984000
heap
page read and write
14CC000
heap
page read and write
5D50000
heap
page read and write
B54000
heap
page read and write
5D42000
heap
page read and write
63A7000
heap
page read and write
49A0000
direct allocation
page read and write
63E2000
heap
page read and write
5F7E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
9CF000
heap
page read and write
4F8D000
direct allocation
page read and write
985000
heap
page read and write
EFB000
stack
page read and write
63C8000
heap
page read and write
5230000
trusted library allocation
page read and write
5DDA000
heap
page read and write
984000
heap
page read and write
F44000
heap
page read and write
4D91000
heap
page read and write
5D7F000
heap
page read and write
6310000
trusted library allocation
page read and write
4D6F000
stack
page read and write
5D60000
heap
page read and write
321F000
stack
page read and write
4D91000
heap
page read and write
5D4C000
heap
page read and write
984000
heap
page read and write
6277000
heap
page read and write
63E2000
heap
page read and write
1132000
unkown
page execute and write copy
5060000
direct allocation
page execute and read and write
5DC3000
heap
page read and write
2F9E000
stack
page read and write
56CE000
stack
page read and write
5D47000
heap
page read and write
364F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
63AB000
heap
page read and write
4E80000
direct allocation
page execute and read and write
142E000
stack
page read and write
63BC000
heap
page read and write
1424000
heap
page read and write
4E2D000
direct allocation
page read and write
49A0000
direct allocation
page read and write
5DBA000
heap
page read and write
50A0000
direct allocation
page execute and read and write
5D73000
heap
page read and write
1480000
heap
page read and write
462E000
stack
page read and write
F44000
heap
page read and write
985000
heap
page read and write
4DA0000
heap
page read and write
546E000
stack
page read and write
6272000
heap
page read and write
985000
heap
page read and write
E55000
heap
page read and write
14C4000
heap
page read and write
5DFE000
heap
page read and write
5D00000
heap
page read and write
4DA1000
heap
page read and write
4D91000
heap
page read and write
5D1B000
heap
page read and write
984000
heap
page read and write
5D41000
heap
page read and write
5D54000
heap
page read and write
2AC0000
direct allocation
page read and write
D40000
unkown
page readonly
6F7000
unkown
page execute and read and write
5D8F000
heap
page read and write
6392000
heap
page read and write
F44000
heap
page read and write
382F000
stack
page read and write
2C8F000
stack
page read and write
5080000
direct allocation
page execute and read and write
63A7000
heap
page read and write
623E000
heap
page read and write
440F000
stack
page read and write
625B000
heap
page read and write
5D54000
heap
page read and write
4D60000
heap
page read and write
6271000
heap
page read and write
2AA0000
heap
page read and write
B80000
heap
page read and write
5DBA000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5DB8000
heap
page read and write
5D8D000
heap
page read and write
2AC0000
direct allocation
page read and write
5DBA000
heap
page read and write
5DA3000
heap
page read and write
4D91000
heap
page read and write
2C3B000
heap
page read and write
53BE000
stack
page read and write
4F20000
direct allocation
page execute and read and write
503F000
heap
page read and write
AAB000
heap
page read and write
F44000
heap
page read and write
638D000
heap
page read and write
5D50000
heap
page read and write
DE0000
heap
page read and write
4911000
heap
page read and write
10C3000
heap
page read and write
984000
heap
page read and write
2B60000
direct allocation
page read and write
62B5000
heap
page read and write
49A0000
direct allocation
page read and write
4F20000
direct allocation
page execute and read and write
5DB8000
heap
page read and write
6460000
trusted library allocation
page read and write
57CF000
stack
page read and write
F04000
heap
page read and write
3E9F000
stack
page read and write
5DE0000
heap
page read and write
349E000
stack
page read and write
FF7000
unkown
page execute and read and write
5DB8000
heap
page read and write
832000
unkown
page execute and write copy
984000
heap
page read and write
4911000
heap
page read and write
6310000
trusted library allocation
page read and write
33CF000
stack
page read and write
2B5B000
stack
page read and write
5DD8000
heap
page read and write
5DDB000
heap
page read and write
53B0000
direct allocation
page execute and read and write
B54000
heap
page read and write
5D4C000
heap
page read and write
1424000
heap
page read and write
984000
heap
page read and write
5D5A000
heap
page read and write
2F0E000
stack
page read and write
55AD000
stack
page read and write
3FDE000
stack
page read and write
E5A000
heap
page read and write
5DDE000
heap
page read and write
10BC000
heap
page read and write
5D76000
heap
page read and write
984000
heap
page read and write
E6D000
heap
page read and write
5D93000
heap
page read and write
638D000
heap
page read and write
2AC0000
direct allocation
page read and write
1424000
heap
page read and write
4D91000
heap
page read and write
A8B000
heap
page read and write
536F000
stack
page read and write
639D000
heap
page read and write
449F000
stack
page read and write
2AC0000
direct allocation
page read and write
639B000
heap
page read and write
63C2000
heap
page read and write
AA9000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5D6A000
heap
page read and write
951000
unkown
page execute and read and write
6272000
heap
page read and write
529F000
stack
page read and write
63A4000
heap
page read and write
172C000
heap
page read and write
5D93000
heap
page read and write
1424000
heap
page read and write
5D4F000
heap
page read and write
471F000
stack
page read and write
5DB1000
heap
page read and write
5DB1000
heap
page read and write
5DA7000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5D9F000
heap
page read and write
5D59000
heap
page read and write
5DD8000
heap
page read and write
53A0000
direct allocation
page execute and read and write
5DB1000
heap
page read and write
5CEF000
stack
page read and write
5D34000
heap
page read and write
4861000
heap
page read and write
5DB1000
heap
page read and write
5D4E000
heap
page read and write
5D90000
heap
page read and write
153A000
heap
page read and write
4D91000
heap
page read and write
2BBE000
stack
page read and write
626B000
heap
page read and write
50F0000
direct allocation
page execute and read and write
385E000
stack
page read and write
5DDA000
heap
page read and write
5D83000
heap
page read and write
6249000
heap
page read and write
5D73000
heap
page read and write
1424000
heap
page read and write
5D65000
heap
page read and write
62B7000
heap
page read and write
4D91000
heap
page read and write
985000
heap
page read and write
63A4000
heap
page read and write
53B0000
direct allocation
page execute and read and write
A57000
heap
page read and write
5DBA000
heap
page read and write
587E000
stack
page read and write
638C000
heap
page read and write
5DC4000
heap
page read and write
2B60000
direct allocation
page read and write
637B000
heap
page read and write
5D74000
heap
page read and write
54DA000
heap
page read and write
626E000
heap
page read and write
E6B000
heap
page read and write
63C3000
heap
page read and write
5390000
direct allocation
page execute and read and write
623B000
heap
page read and write
30DE000
stack
page read and write
6460000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
425F000
stack
page read and write
62B5000
heap
page read and write
623E000
heap
page read and write
5D40000
heap
page read and write
6F7000
unkown
page execute and read and write
984000
heap
page read and write
5D9F000
heap
page read and write
5D5D000
heap
page read and write
984000
heap
page read and write
6251000
heap
page read and write
5D3D000
heap
page read and write
411F000
stack
page read and write
4D91000
heap
page read and write
F04000
heap
page read and write
5D9D000
heap
page read and write
5BBF000
stack
page read and write
5DA7000
heap
page read and write
4911000
heap
page read and write
5DAB000
heap
page read and write
637B000
heap
page read and write
1568000
heap
page read and write
5D9D000
heap
page read and write
5D9F000
heap
page read and write
276D000
stack
page read and write
5DD7000
heap
page read and write
5390000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
54AE000
stack
page read and write
4D91000
heap
page read and write
81A000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
63B3000
heap
page read and write
48DE000
stack
page read and write
5480000
direct allocation
page execute and read and write
4911000
heap
page read and write
627A000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
2CDF000
stack
page read and write
5DA7000
heap
page read and write
C6B000
stack
page read and write
AAE000
heap
page read and write
984000
heap
page read and write
5D97000
heap
page read and write
1694000
heap
page read and write
4B5E000
stack
page read and write
1424000
heap
page read and write
5D2F000
heap
page read and write
5D10000
trusted library allocation
page read and write
5D6F000
heap
page read and write
287F000
stack
page read and write
49B1000
heap
page read and write
9F7000
heap
page read and write
6360000
trusted library allocation
page read and write
4D91000
heap
page read and write
63A7000
heap
page read and write
625B000
heap
page read and write
4D91000
heap
page read and write
349E000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
4911000
heap
page read and write
3F4E000
stack
page read and write
5D73000
heap
page read and write
625B000
heap
page read and write
4F9F000
stack
page read and write
60DF000
stack
page read and write
4E80000
direct allocation
page execute and read and write
46CE000
stack
page read and write
399F000
stack
page read and write
1424000
heap
page read and write
A83000
heap
page read and write
48AE000
stack
page read and write
62B7000
heap
page read and write
984000
heap
page read and write
AA5000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
984000
heap
page read and write
63A5000
heap
page read and write
F44000
heap
page read and write
625B000
heap
page read and write
B54000
heap
page read and write
441000
unkown
page execute and write copy
54A0000
direct allocation
page execute and read and write
9F5000
heap
page read and write
F01000
heap
page read and write
4D91000
heap
page read and write
F0B000
heap
page read and write
5D4E000
heap
page read and write
63A7000
heap
page read and write
E73000
unkown
page read and write
984000
heap
page read and write
58B0000
heap
page read and write
5DB1000
heap
page read and write
5DF5000
heap
page read and write
625B000
heap
page read and write
169A000
heap
page read and write
154B000
heap
page read and write
2AD0000
heap
page read and write
1424000
heap
page read and write
49A0000
direct allocation
page read and write
173B000
heap
page read and write
984000
heap
page read and write
56BD000
stack
page read and write
5D10000
trusted library allocation
page read and write
5D2F000
heap
page read and write
F44000
heap
page read and write
AAE000
heap
page read and write
2B60000
direct allocation
page read and write
4FE0000
direct allocation
page execute and read and write
B54000
heap
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
F44000
heap
page read and write
4861000
heap
page read and write
F44000
heap
page read and write
5DB1000
heap
page read and write
5D66000
heap
page read and write
5DD1000
heap
page read and write
5DBA000
heap
page read and write
5D51000
heap
page read and write
4911000
heap
page read and write
568D000
stack
page read and write
5D46000
heap
page read and write
5DDE000
heap
page read and write
637C000
heap
page read and write
A7F000
heap
page read and write
63C2000
heap
page read and write
174B000
heap
page read and write
5D60000
heap
page read and write
5D59000
heap
page read and write
4D91000
heap
page read and write
53B0000
direct allocation
page execute and read and write
63A4000
heap
page read and write
4870000
heap
page read and write
472F000
stack
page read and write
5DC8000
heap
page read and write
BF0000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
984000
heap
page read and write
5DD3000
heap
page read and write
6360000
trusted library allocation
page read and write
63A7000
heap
page read and write
5E10000
trusted library allocation
page read and write
628A000
heap
page read and write
4861000
heap
page read and write
5400000
direct allocation
page execute and read and write
6267000
heap
page read and write
5D58000
heap
page read and write
37CE000
stack
page read and write
1424000
heap
page read and write
5840000
remote allocation
page read and write
6285000
heap
page read and write
49B1000
heap
page read and write
1738000
heap
page read and write
638C000
heap
page read and write
10CB000
heap
page read and write
5D4E000
heap
page read and write
6368000
heap
page read and write
1424000
heap
page read and write
389E000
stack
page read and write
4911000
heap
page read and write
F0B000
heap
page read and write
4D91000
heap
page read and write
6249000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
5DB8000
heap
page read and write
5DB8000
heap
page read and write
AA5000
heap
page read and write
5D6C000
heap
page read and write
62B7000
heap
page read and write
5DB8000
heap
page read and write
628B000
heap
page read and write
984000
heap
page read and write
63EE000
heap
page read and write
5DBA000
heap
page read and write
401E000
stack
page read and write
CED000
unkown
page execute and read and write
62B7000
heap
page read and write
173B000
heap
page read and write
63A4000
heap
page read and write
5400000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
5D4C000
heap
page read and write
1424000
heap
page read and write
2B60000
direct allocation
page read and write
636F000
heap
page read and write
5370000
direct allocation
page execute and read and write
627B000
heap
page read and write
4D91000
heap
page read and write
4911000
heap
page read and write
5E90000
trusted library allocation
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
9BB000
heap
page read and write
1537000
heap
page read and write
1543000
heap
page read and write
49B1000
heap
page read and write
AA8000
heap
page read and write
B54000
heap
page read and write
F0B000
heap
page read and write
E5C000
heap
page read and write
1424000
heap
page read and write
6399000
heap
page read and write
B54000
heap
page read and write
5360000
remote allocation
page read and write
6230000
heap
page read and write
5D8F000
heap
page read and write
435F000
stack
page read and write
173A000
heap
page read and write
5DCC000
heap
page read and write
5D93000
heap
page read and write
AA5000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5D3D000
heap
page read and write
5D48000
heap
page read and write
174D000
heap
page read and write
B54000
heap
page read and write
49B1000
heap
page read and write
63A7000
heap
page read and write
637B000
heap
page read and write
626E000
heap
page read and write
62B5000
heap
page read and write
5D5D000
heap
page read and write
5DB1000
heap
page read and write
F44000
heap
page read and write
6387000
heap
page read and write
3EAE000
stack
page read and write
5DC7000
heap
page read and write
625B000
heap
page read and write
5D2F000
heap
page read and write
5ABD000
stack
page read and write
AAB000
heap
page read and write
5D3D000
heap
page read and write
5D57000
heap
page read and write
309F000
stack
page read and write
AAC000
heap
page read and write
AAA000
heap
page read and write
1131000
unkown
page execute and read and write
54A0000
direct allocation
page execute and read and write
1130000
heap
page read and write
5D64000
heap
page read and write
58AE000
stack
page read and write
AAC000
heap
page read and write
5D76000
heap
page read and write
5DB1000
heap
page read and write
5D63000
heap
page read and write
5D35000
heap
page read and write
623A000
heap
page read and write
F0B000
heap
page read and write
5390000
direct allocation
page execute and read and write
5D9E000
heap
page read and write
984000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5D5A000
heap
page read and write
5D53000
heap
page read and write
535D000
direct allocation
page read and write
F44000
heap
page read and write
5E00000
trusted library allocation
page read and write
AAC000
heap
page read and write
31EF000
stack
page read and write
B54000
heap
page read and write
5D7E000
heap
page read and write
15A0000
heap
page read and write
637C000
heap
page read and write
1470000
direct allocation
page read and write
F44000
heap
page read and write
1650000
heap
page read and write
173B000
heap
page read and write
1424000
heap
page read and write
5DE8000
heap
page read and write
5390000
direct allocation
page execute and read and write
9B0000
heap
page read and write
B54000
heap
page read and write
637B000
heap
page read and write
B54000
heap
page read and write
C07000
unkown
page execute and read and write
173C000
heap
page read and write
5DE4000
heap
page read and write
439E000
stack
page read and write
1713000
heap
page read and write
510000
heap
page read and write
624B000
heap
page read and write
5DA7000
heap
page read and write
5D90000
trusted library allocation
page read and write
5DBA000
heap
page read and write
5DDA000
heap
page read and write
637D000
heap
page read and write
2C4E000
stack
page read and write
5D6F000
heap
page read and write
984000
heap
page read and write
5D47000
heap
page read and write
1640000
direct allocation
page read and write
5DB1000
heap
page read and write
49A0000
direct allocation
page read and write
173B000
heap
page read and write
4861000
heap
page read and write
5D5B000
heap
page read and write
FE0000
heap
page read and write
F05000
heap
page read and write
5D35000
heap
page read and write
E77000
unkown
page execute and read and write
AAC000
heap
page read and write
5D18000
heap
page read and write
3A9F000
stack
page read and write
5D70000
heap
page read and write
5C7E000
stack
page read and write
59EE000
stack
page read and write
4D91000
heap
page read and write
5D4D000
heap
page read and write
1424000
heap
page read and write
5DE8000
heap
page read and write
5DCF000
heap
page read and write
A95000
heap
page read and write
639A000
heap
page read and write
1640000
direct allocation
page read and write
FF7000
unkown
page execute and read and write
1470000
direct allocation
page read and write
5210000
remote allocation
page read and write
5D6C000
heap
page read and write
5DDE000
heap
page read and write
408E000
stack
page read and write
49B1000
heap
page read and write
5D46000
heap
page read and write
1424000
heap
page read and write
5D5F000
heap
page read and write
1160000
heap
page read and write
5D1C000
heap
page read and write
5D64000
heap
page read and write
624C000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5DB8000
heap
page read and write
B54000
heap
page read and write
1568000
heap
page read and write
5D2D000
stack
page read and write
5D65000
heap
page read and write
49A0000
direct allocation
page read and write
A0F000
heap
page read and write
A8C000
heap
page read and write
6310000
trusted library allocation
page read and write
637B000
heap
page read and write
984000
heap
page read and write
F05000
heap
page read and write
984000
heap
page read and write
4D91000
heap
page read and write
3D9E000
stack
page read and write
F44000
heap
page read and write
2AD7000
heap
page read and write
12D6000
unkown
page execute and read and write
F0B000
heap
page read and write
5D2F000
heap
page read and write
4F70000
direct allocation
page execute and read and write
5D66000
heap
page read and write
63A5000
heap
page read and write
45D000
stack
page read and write
318E000
stack
page read and write
984000
heap
page read and write
984000
heap
page read and write
984000
heap
page read and write
1470000
direct allocation
page read and write
63C7000
heap
page read and write
2C5D000
heap
page read and write
637C000
heap
page read and write
14D4000
heap
page read and write
106E000
stack
page read and write
339E000
stack
page read and write
5D1B000
heap
page read and write
63A4000
heap
page read and write
4DA1000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
173A000
heap
page read and write
5DB8000
heap
page read and write
2E5E000
stack
page read and write
4DA1000
heap
page read and write
1738000
heap
page read and write
5D98000
heap
page read and write
63B3000
heap
page read and write
63A4000
heap
page read and write
62B7000
heap
page read and write
5D2F000
heap
page read and write
4D91000
heap
page read and write
A8C000
heap
page read and write
623A000
heap
page read and write
984000
heap
page read and write
354E000
stack
page read and write
5DDB000
heap
page read and write
399E000
stack
page read and write
60C0000
trusted library allocation
page read and write
49A000
stack
page read and write
63A7000
heap
page read and write
63A4000
heap
page read and write
5DB8000
heap
page read and write
4861000
heap
page read and write
3BEF000
stack
page read and write
E57000
heap
page read and write
985000
heap
page read and write
629A000
heap
page read and write
5D6C000
heap
page read and write
5D7F000
heap
page read and write
6246000
heap
page read and write
5DF0000
heap
page read and write
5D4F000
heap
page read and write
5D60000
heap
page read and write
5D9D000
heap
page read and write
5040000
direct allocation
page execute and read and write
4911000
heap
page read and write
5DEB000
heap
page read and write
5430000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4911000
heap
page read and write
3EDE000
stack
page read and write
4F20000
direct allocation
page execute and read and write
395F000
stack
page read and write
623B000
heap
page read and write
62B5000
heap
page read and write
1424000
heap
page read and write
3FDE000
stack
page read and write
4861000
heap
page read and write
984000
heap
page read and write
4AC0000
trusted library allocation
page read and write
5D62000
heap
page read and write
26CB000
heap
page read and write
385E000
stack
page read and write
3FEE000
stack
page read and write
5390000
trusted library allocation
page read and write
63AE000
heap
page read and write
300F000
stack
page read and write
63C2000
heap
page read and write
625B000
heap
page read and write
5D9D000
heap
page read and write
14D2000
heap
page read and write
B54000
heap
page read and write
458E000
stack
page read and write
1577000
heap
page read and write
5D4D000
heap
page read and write
53C0000
direct allocation
page execute and read and write
381F000
stack
page read and write
B54000
heap
page read and write
5DBA000
heap
page read and write
421F000
stack
page read and write
173C000
heap
page read and write
1424000
heap
page read and write
1470000
direct allocation
page read and write
4AB0000
heap
page read and write
5E10000
trusted library allocation
page read and write
B54000
heap
page read and write
984000
heap
page read and write
5D46000
heap
page read and write
5DD7000
heap
page read and write
5DBA000
heap
page read and write
6399000
heap
page read and write
5D60000
heap
page read and write
173A000
heap
page read and write
1424000
heap
page read and write
5D35000
heap
page read and write
5880000
remote allocation
page read and write
10C1000
heap
page read and write
625B000
heap
page read and write
4911000
heap
page read and write
5DCD000
heap
page read and write
1131000
unkown
page execute and read and write
6256000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
B54000
heap
page read and write
4D91000
heap
page read and write
6258000
heap
page read and write
1578000
heap
page read and write
B54000
heap
page read and write
158E000
stack
page read and write
40DF000
stack
page read and write
63B3000
heap
page read and write
5D65000
heap
page read and write
63A4000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5D4F000
heap
page read and write
4911000
heap
page read and write
6263000
heap
page read and write
AAD000
heap
page read and write
637C000
heap
page read and write
572E000
stack
page read and write
5DB8000
heap
page read and write
5D54000
heap
page read and write
1578000
heap
page read and write
63A4000
heap
page read and write
AA9000
heap
page read and write
5D00000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
117A000
heap
page read and write
146E000
stack
page read and write
5E1D000
heap
page read and write
12FB000
stack
page read and write
5DE9000
heap
page read and write
4D91000
heap
page read and write
3E0E000
stack
page read and write
5DB8000
heap
page read and write
1160000
heap
page read and write
5E00000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
5360000
remote allocation
page read and write
3B8E000
stack
page read and write
3CCE000
stack
page read and write
F44000
heap
page read and write
5DFE000
heap
page read and write
5D9F000
heap
page read and write
5D90000
heap
page read and write
1640000
direct allocation
page read and write
CDE000
stack
page read and write
1739000
heap
page read and write
5D2F000
heap
page read and write
3A9F000
stack
page read and write
62B5000
heap
page read and write
16A3000
heap
page read and write
30DE000
stack
page read and write
63BA000
heap
page read and write
5F7F000
stack
page read and write
A8C000
heap
page read and write
5DFF000
heap
page read and write
5DB8000
heap
page read and write
984000
heap
page read and write
5DA7000
heap
page read and write
4911000
heap
page read and write
4D91000
heap
page read and write
5CDF000
stack
page read and write
5D65000
heap
page read and write
6227000
heap
page read and write
5D60000
heap
page read and write
10DD000
unkown
page execute and read and write
5E21000
heap
page read and write
4DA1000
heap
page read and write
1551000
heap
page read and write
E77000
unkown
page execute and read and write
4FD0000
direct allocation
page execute and read and write
1697000
heap
page read and write
2B60000
direct allocation
page read and write
6360000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
4861000
heap
page read and write
5D9D000
heap
page read and write
4D90000
heap
page read and write
4861000
heap
page read and write
4D91000
heap
page read and write
5D4E000
heap
page read and write
984000
heap
page read and write
AAA000
heap
page read and write
3B4F000
stack
page read and write
5DA7000
heap
page read and write
4861000
heap
page read and write
1578000
heap
page read and write
113F000
heap
page read and write
AA9000
heap
page read and write
4911000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
6366000
heap
page read and write
4911000
heap
page read and write
F44000
heap
page read and write
639B000
heap
page read and write
1640000
direct allocation
page read and write
5DF1000
heap
page read and write
1424000
heap
page read and write
638D000
heap
page read and write
9D1000
heap
page read and write
5DB8000
heap
page read and write
1485000
heap
page read and write
5D9B000
heap
page read and write
F04000
heap
page read and write
4911000
heap
page read and write
54B0000
heap
page read and write
6394000
heap
page read and write
5D40000
heap
page read and write
5DDE000
heap
page read and write
350F000
stack
page read and write
117C000
heap
page read and write
5D5B000
heap
page read and write
5D62000
heap
page read and write
49B1000
heap
page read and write
5D35000
heap
page read and write
5D3D000
heap
page read and write
5DC7000
heap
page read and write
5D60000
heap
page read and write
4C6E000
stack
page read and write
2A10000
heap
page read and write
5D3D000
heap
page read and write
5BDE000
stack
page read and write
984000
heap
page read and write
F44000
heap
page read and write
1131000
unkown
page execute and write copy
984000
heap
page read and write
4D91000
heap
page read and write
984000
heap
page read and write
5DA7000
heap
page read and write
4911000
heap
page read and write
157C000
heap
page read and write
6256000
heap
page read and write
1470000
direct allocation
page read and write
E1A000
heap
page read and write
639A000
heap
page read and write
5E10000
trusted library allocation
page read and write
63EF000
heap
page read and write
2AC0000
direct allocation
page read and write
4F2D000
stack
page read and write
625B000
heap
page read and write
573000
unkown
page read and write
53D0000
direct allocation
page execute and read and write
5D10000
trusted library allocation
page read and write
10D8000
heap
page read and write
5D57000
heap
page read and write
980000
heap
page read and write
624B000
heap
page read and write
5D7C000
heap
page read and write
399E000
stack
page read and write
1424000
heap
page read and write
174D000
heap
page read and write
5DAB000
heap
page read and write
63EF000
heap
page read and write
5910000
remote allocation
page read and write
3D2F000
stack
page read and write
53B0000
direct allocation
page execute and read and write
629E000
heap
page read and write
984000
heap
page read and write
530000
heap
page read and write
5D3D000
heap
page read and write
16A7000
heap
page read and write
4DA1000
heap
page read and write
4861000
heap
page read and write
984000
heap
page read and write
4861000
heap
page read and write
637C000
heap
page read and write
5D9E000
heap
page read and write
A9C000
heap
page read and write
623B000
heap
page read and write
36DF000
stack
page read and write
371F000
stack
page read and write
4F20000
direct allocation
page execute and read and write
984000
heap
page read and write
984000
heap
page read and write
5DDD000
heap
page read and write
4D91000
heap
page read and write
340E000
stack
page read and write
5D4B000
heap
page read and write
1424000
heap
page read and write
B54000
heap
page read and write
5D5B000
heap
page read and write
638D000
heap
page read and write
63AB000
heap
page read and write
5D9D000
heap
page read and write
322E000
stack
page read and write
1560000
heap
page read and write
63EE000
heap
page read and write
63A4000
heap
page read and write
475F000
stack
page read and write
335F000
stack
page read and write
573000
unkown
page write copy
6262000
heap
page read and write
5DB1000
heap
page read and write
5DB8000
heap
page read and write
5D9A000
heap
page read and write
5D61000
heap
page read and write
1424000
heap
page read and write
5DA7000
heap
page read and write
4DDC000
stack
page read and write
63A5000
heap
page read and write
985000
heap
page read and write
5D9D000
heap
page read and write
F44000
heap
page read and write
5D90000
trusted library allocation
page read and write
F04000
heap
page read and write
1424000
heap
page read and write
AA5000
heap
page read and write
639B000
heap
page read and write
3F9F000
stack
page read and write
5390000
trusted library allocation
page read and write
63A4000
heap
page read and write
6256000
heap
page read and write
43AE000
stack
page read and write
35AF000
stack
page read and write
4E8E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5D48000
heap
page read and write
57BF000
stack
page read and write
173A000
heap
page read and write
328F000
stack
page read and write
5DFB000
heap
page read and write
34DE000
stack
page read and write
6260000
heap
page read and write
1424000
heap
page read and write
15FE000
stack
page read and write
1132000
unkown
page execute and write copy
4DA1000
heap
page read and write
173A000
heap
page read and write
1120000
heap
page read and write
62B5000
heap
page read and write
4D90000
direct allocation
page read and write
4E3F000
stack
page read and write
1560000
heap
page read and write
4E90000
direct allocation
page execute and read and write
63BA000
heap
page read and write
532E000
stack
page read and write
5D1B000
heap
page read and write
984000
heap
page read and write
627A000
heap
page read and write
5DD7000
heap
page read and write
1551000
heap
page read and write
2ABC000
stack
page read and write
63AB000
heap
page read and write
F44000
heap
page read and write
5D1B000
heap
page read and write
40DF000
stack
page read and write
54AE000
stack
page read and write
1424000
heap
page read and write
AA9000
heap
page read and write
AAE000
heap
page read and write
AAC000
heap
page read and write
5D5F000
heap
page read and write
5D22000
heap
page read and write
5DB8000
heap
page read and write
395F000
stack
page read and write
4D91000
heap
page read and write
984000
heap
page read and write
984000
heap
page read and write
346F000
stack
page read and write
5D9E000
heap
page read and write
5D10000
trusted library allocation
page read and write
5D76000
heap
page read and write
984000
heap
page read and write
1424000
heap
page read and write
984000
heap
page read and write
5DB8000
heap
page read and write
63A5000
heap
page read and write
5D7F000
heap
page read and write
E7B000
heap
page read and write
B54000
heap
page read and write
5DD6000
heap
page read and write
5360000
remote allocation
page read and write
5DE3000
heap
page read and write
5D6A000
heap
page read and write
4F20000
direct allocation
page execute and read and write
623B000
heap
page read and write
F01000
heap
page read and write
49B1000
heap
page read and write
441000
unkown
page execute and read and write
5DC7000
heap
page read and write
59AF000
stack
page read and write
A87000
unkown
page execute and read and write
5DDE000
heap
page read and write
6210000
trusted library allocation
page read and write
984000
heap
page read and write
AAC000
heap
page read and write
B54000
heap
page read and write
5CFF000
stack
page read and write
5D4B000
heap
page read and write
5D59000
heap
page read and write
49B1000
heap
page read and write
9E4000
heap
page read and write
5DBA000
heap
page read and write
526B000
stack
page read and write
3E6F000
stack
page read and write
984000
heap
page read and write
4960000
trusted library allocation
page read and write
597E000
stack
page read and write
63AB000
heap
page read and write
5D5A000
heap
page read and write
5490000
direct allocation
page execute and read and write
5DB8000
heap
page read and write
F44000
heap
page read and write
573000
unkown
page read and write
6254000
heap
page read and write
49B1000
heap
page read and write
5DD7000
heap
page read and write
5420000
direct allocation
page execute and read and write
1424000
heap
page read and write
173B000
heap
page read and write
6368000
heap
page read and write
2B60000
direct allocation
page read and write
1424000
heap
page read and write
415E000
stack
page read and write
F44000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5DF1000
heap
page read and write
638D000
heap
page read and write
5DD5000
heap
page read and write
4A1E000
stack
page read and write
D2A000
unkown
page execute and read and write
14F8000
heap
page read and write
4C2F000
stack
page read and write
5D76000
heap
page read and write
A8B000
heap
page read and write
E94000
heap
page read and write
6210000
trusted library allocation
page read and write
5D9A000
heap
page read and write
154B000
heap
page read and write
B54000
heap
page read and write
570D000
stack
page read and write
B54000
heap
page read and write
5A80000
trusted library allocation
page read and write
5E1D000
heap
page read and write
5D48000
heap
page read and write
63A7000
heap
page read and write
E73000
unkown
page read and write
624E000
stack
page read and write
5DB1000
heap
page read and write
6360000
trusted library allocation
page read and write
5D35000
heap
page read and write
B54000
heap
page read and write
49A0000
direct allocation
page read and write
5D53000
heap
page read and write
1131000
unkown
page execute and write copy
52DD000
stack
page read and write
5D9F000
heap
page read and write
1640000
direct allocation
page read and write
4F20000
direct allocation
page execute and read and write
5DDE000
heap
page read and write
6360000
trusted library allocation
page read and write
6392000
heap
page read and write
5DC8000
heap
page read and write
B54000
heap
page read and write
A8E000
heap
page read and write
63AB000
heap
page read and write
2B60000
direct allocation
page read and write
984000
heap
page read and write
2F9E000
stack
page read and write
638D000
heap
page read and write
624B000
heap
page read and write
489F000
stack
page read and write
1424000
heap
page read and write
AAC000
heap
page read and write
83B000
stack
page read and write
5D9E000
heap
page read and write
1424000
heap
page read and write
10DD000
unkown
page execute and read and write
14DC000
heap
page read and write
1424000
heap
page read and write
49B1000
heap
page read and write
63B6000
heap
page read and write
63AC000
heap
page read and write
53EE000
stack
page read and write
172D000
heap
page read and write
F0B000
heap
page read and write
3AEE000
stack
page read and write
426E000
stack
page read and write
5DDE000
heap
page read and write
5DDC000
heap
page read and write
539E000
stack
page read and write
535F000
stack
page read and write
5D4F000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5D53000
heap
page read and write
5D5B000
heap
page read and write
5D40000
heap
page read and write
5D10000
heap
page read and write
5DB8000
heap
page read and write
5DDC000
heap
page read and write
B54000
heap
page read and write
361E000
stack
page read and write
63E2000
heap
page read and write
F44000
heap
page read and write
B54000
heap
page read and write
5102000
heap
page read and write
623A000
heap
page read and write
113A000
heap
page read and write
30EF000
stack
page read and write
5DB1000
heap
page read and write
1739000
heap
page read and write
5D65000
heap
page read and write
6460000
trusted library allocation
page read and write
471F000
stack
page read and write
599D000
stack
page read and write
5D46000
heap
page read and write
2E1F000
stack
page read and write
3ADE000
stack
page read and write
5DEA000
heap
page read and write
4CF0000
direct allocation
page read and write
5D50000
heap
page read and write
B50000
heap
page read and write
5390000
direct allocation
page execute and read and write
984000
heap
page read and write
5D60000
heap
page read and write
4861000
heap
page read and write
AA9000
heap
page read and write
5DBA000
heap
page read and write
10C4000
heap
page read and write
B54000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
475E000
stack
page read and write
6285000
heap
page read and write
4D91000
heap
page read and write
625D000
heap
page read and write
5E7E000
stack
page read and write
5D46000
heap
page read and write
4EDF000
stack
page read and write
6360000
trusted library allocation
page read and write
A05000
heap
page read and write
486F000
stack
page read and write
4E80000
direct allocation
page execute and read and write
167F000
stack
page read and write
984000
heap
page read and write
5D5B000
heap
page read and write
AAB000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1640000
direct allocation
page read and write
1578000
heap
page read and write
5D42000
heap
page read and write
62B5000
heap
page read and write
5D90000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
39DE000
stack
page read and write
1424000
heap
page read and write
5A7F000
stack
page read and write
63A4000
heap
page read and write
5D40000
heap
page read and write
5D2F000
heap
page read and write
DD0000
heap
page read and write
6285000
heap
page read and write
50B0000
direct allocation
page execute and read and write
63AB000
heap
page read and write
5DB8000
heap
page read and write
5D9C000
heap
page read and write
5D70000
heap
page read and write
534D000
direct allocation
page read and write
6387000
heap
page read and write
6397000
heap
page read and write
F05000
heap
page read and write
5D4B000
heap
page read and write
984000
heap
page read and write
5D62000
heap
page read and write
5DDF000
heap
page read and write
5070000
direct allocation
page execute and read and write
A8D000
heap
page read and write
6239000
heap
page read and write
6220000
heap
page read and write
1577000
heap
page read and write
2C30000
heap
page read and write
62B7000
heap
page read and write
2AC0000
direct allocation
page read and write
4861000
heap
page read and write
5D35000
heap
page read and write
5D48000
heap
page read and write
321E000
stack
page read and write
4DA1000
heap
page read and write
53E0000
direct allocation
page execute and read and write
984000
heap
page read and write
D41000
unkown
page execute and read and write
4DA1000
heap
page read and write
1550000
heap
page read and write
1576000
heap
page read and write
465E000
stack
page read and write
63A4000
heap
page read and write
5D48000
heap
page read and write
5BEE000
stack
page read and write
5AEE000
stack
page read and write
325E000
stack
page read and write
63AB000
heap
page read and write
35EE000
stack
page read and write
6360000
heap
page read and write
2900000
heap
page read and write
44DF000
stack
page read and write
5D3D000
heap
page read and write
425E000
stack
page read and write
4DA1000
heap
page read and write
173A000
heap
page read and write
5D6C000
heap
page read and write
5D60000
heap
page read and write
62B7000
heap
page read and write
1470000
direct allocation
page read and write
63AB000
heap
page read and write
5DDB000
heap
page read and write
461E000
stack
page read and write
5D41000
heap
page read and write
1739000
heap
page read and write
63E6000
heap
page read and write
F04000
heap
page read and write
5D49000
heap
page read and write
E73000
unkown
page write copy
B54000
heap
page read and write
6216000
heap
page read and write
5D7C000
heap
page read and write
5DA8000
heap
page read and write
63A8000
heap
page read and write
F04000
heap
page read and write
5D14000
heap
page read and write
422F000
stack
page read and write
4D91000
heap
page read and write
984000
heap
page read and write
5D3D000
heap
page read and write
1561000
heap
page read and write
5D6C000
heap
page read and write
62A5000
heap
page read and write
349F000
stack
page read and write
6256000
heap
page read and write
63B1000
heap
page read and write
1470000
direct allocation
page read and write
5D10000
trusted library allocation
page read and write
404F000
stack
page read and write
6245000
heap
page read and write
6460000
trusted library allocation
page read and write
536D000
stack
page read and write
3C5E000
stack
page read and write
4ECD000
direct allocation
page read and write
5D60000
heap
page read and write
3FDF000
stack
page read and write
625B000
heap
page read and write
5D9F000
heap
page read and write
525C000
stack
page read and write
5D6A000
heap
page read and write
1640000
direct allocation
page read and write
62B5000
heap
page read and write
634F000
stack
page read and write
5DF2000
heap
page read and write
AA9000
heap
page read and write
63D3000
heap
page read and write
5E00000
trusted library allocation
page read and write
625B000
heap
page read and write
F44000
heap
page read and write
63A9000
heap
page read and write
B54000
heap
page read and write
335E000
stack
page read and write
5D91000
heap
page read and write
639B000
heap
page read and write
577000
unkown
page execute and read and write
4861000
heap
page read and write
4920000
heap
page read and write
5D35000
heap
page read and write
5470000
direct allocation
page execute and read and write
56E000
unkown
page execute and read and write
63AB000
heap
page read and write
5090000
direct allocation
page execute and read and write
62B7000
heap
page read and write
3D1F000
stack
page read and write
425E000
stack
page read and write
5D50000
heap
page read and write
985000
heap
page read and write
5D3D000
heap
page read and write
F44000
heap
page read and write
5D4C000
heap
page read and write
44DE000
stack
page read and write
3B1E000
stack
page read and write
4D91000
heap
page read and write
372E000
stack
page read and write
485F000
stack
page read and write
831000
unkown
page execute and write copy
440000
unkown
page read and write
628F000
heap
page read and write
984000
heap
page read and write
5D54000
heap
page read and write
5D4B000
heap
page read and write
15B0000
heap
page read and write
63AB000
heap
page read and write
542D000
stack
page read and write
AAA000
heap
page read and write
1640000
direct allocation
page read and write
623B000
heap
page read and write
5D64000
heap
page read and write
1578000
heap
page read and write
6210000
trusted library allocation
page read and write
5DBA000
heap
page read and write
F0B000
heap
page read and write
375E000
stack
page read and write
638D000
heap
page read and write
F44000
heap
page read and write
5DDE000
heap
page read and write
AAA000
heap
page read and write
5D9D000
heap
page read and write
F44000
heap
page read and write
476E000
stack
page read and write
5D79000
heap
page read and write
5DA7000
heap
page read and write
4911000
heap
page read and write
3FAF000
stack
page read and write
1575000
heap
page read and write
4861000
heap
page read and write
5DD7000
heap
page read and write
111A000
unkown
page execute and read and write
5DCB000
heap
page read and write
2B60000
direct allocation
page read and write
F06000
heap
page read and write
116D000
heap
page read and write
984000
heap
page read and write
AAC000
heap
page read and write
5430000
direct allocation
page execute and read and write
63A4000
heap
page read and write
F44000
heap
page read and write
A66000
heap
page read and write
1134000
heap
page read and write
6273000
heap
page read and write
440000
unkown
page readonly
6210000
trusted library allocation
page read and write
10CB000
heap
page read and write
385F000
stack
page read and write
49B1000
heap
page read and write
63A4000
heap
page read and write
35DF000
stack
page read and write
173A000
heap
page read and write
5D9D000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5A5F000
stack
page read and write
F44000
heap
page read and write
5E00000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
5D3A000
heap
page read and write
62B7000
heap
page read and write
4911000
heap
page read and write
5D35000
heap
page read and write
49AF000
stack
page read and write
E65000
heap
page read and write
5D1C000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
5D4E000
heap
page read and write
4911000
heap
page read and write
4F60000
direct allocation
page execute and read and write
57BE000
stack
page read and write
5DFD000
heap
page read and write
5D46000
heap
page read and write
4D91000
heap
page read and write
2AC0000
direct allocation
page read and write
42CF000
stack
page read and write
E9A000
heap
page read and write
5D10000
trusted library allocation
page read and write
5DA7000
heap
page read and write
5D7F000
stack
page read and write
F44000
heap
page read and write
157C000
heap
page read and write
5D6A000
heap
page read and write
3A4E000
stack
page read and write
624E000
heap
page read and write
63BF000
heap
page read and write
5DC7000
heap
page read and write
5D9A000
heap
page read and write
5D60000
heap
page read and write
5D06000
heap
page read and write
49A0000
direct allocation
page read and write
5D59000
heap
page read and write
5D35000
heap
page read and write
1424000
heap
page read and write
1578000
heap
page read and write
5DB1000
heap
page read and write
F06000
heap
page read and write
5D1B000
heap
page read and write
624A000
heap
page read and write
3C2E000
stack
page read and write
4DA1000
heap
page read and write
624D000
heap
page read and write
5DEA000
heap
page read and write
5D4A000
heap
page read and write
B54000
heap
page read and write
1531000
heap
page read and write
2AC0000
direct allocation
page read and write
53F0000
direct allocation
page execute and read and write
184F000
stack
page read and write
590F000
stack
page read and write
5DA7000
heap
page read and write
A8B000
heap
page read and write
F44000
heap
page read and write
12D6000
unkown
page execute and read and write
A82000
heap
page read and write
626B000
heap
page read and write
D41000
unkown
page execute and read and write
6260000
heap
page read and write
1424000
heap
page read and write
444E000
stack
page read and write
B54000
heap
page read and write
1577000
heap
page read and write
1424000
heap
page read and write
5D47000
heap
page read and write
5E21000
heap
page read and write
1424000
heap
page read and write
E6A000
heap
page read and write
1424000
heap
page read and write
4E80000
direct allocation
page execute and read and write
6249000
heap
page read and write
2BDF000
stack
page read and write
5D50000
heap
page read and write
6277000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5DC8000
heap
page read and write
F04000
heap
page read and write
6272000
heap
page read and write
4F10000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
4D91000
heap
page read and write
5DE8000
heap
page read and write
5D58000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
63C2000
heap
page read and write
5380000
heap
page read and write
2B87000
heap
page read and write
62A6000
heap
page read and write
5D35000
heap
page read and write
62B7000
heap
page read and write
546D000
stack
page read and write
4D91000
heap
page read and write
6254000
heap
page read and write
50D0000
direct allocation
page execute and read and write
623A000
heap
page read and write
5D48000
heap
page read and write
1735000
heap
page read and write
5DDA000
heap
page read and write
5D49000
heap
page read and write
62A6000
heap
page read and write
5A9D000
stack
page read and write
620E000
stack
page read and write
5D48000
heap
page read and write
283E000
stack
page read and write
4D91000
heap
page read and write
5D35000
heap
page read and write
63C3000
heap
page read and write
412E000
stack
page read and write
6394000
heap
page read and write
5DC8000
heap
page read and write
1739000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
6256000
heap
page read and write
F06000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
D5E000
stack
page read and write
5DA3000
heap
page read and write
5E3F000
stack
page read and write
49B1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
5E00000
trusted library allocation
page read and write
4D91000
heap
page read and write
480E000
stack
page read and write
1424000
heap
page read and write
5D60000
heap
page read and write
27AA000
stack
page read and write
62B7000
heap
page read and write
2AC0000
direct allocation
page read and write
5D24000
heap
page read and write
63AB000
heap
page read and write
F05000
heap
page read and write
63BD000
heap
page read and write
44DE000
stack
page read and write
5B3E000
stack
page read and write
638A000
heap
page read and write
2F00000
heap
page read and write
4E50000
direct allocation
page read and write
378F000
stack
page read and write
578E000
stack
page read and write
49A0000
direct allocation
page read and write
5DC5000
heap
page read and write
5DB1000
heap
page read and write
F0B000
heap
page read and write
62B7000
heap
page read and write
639A000
heap
page read and write
62B7000
heap
page read and write
4A10000
trusted library allocation
page read and write
F0B000
heap
page read and write
BEE000
stack
page read and write
5210000
remote allocation
page read and write
5DF6000
heap
page read and write
304E000
stack
page read and write
573000
unkown
page write copy
5D97000
heap
page read and write
5D59000
heap
page read and write
32CE000
stack
page read and write
6310000
trusted library allocation
page read and write
171E000
heap
page read and write
3BDF000
stack
page read and write
5D4F000
heap
page read and write
1739000
heap
page read and write
3D5E000
stack
page read and write
5D73000
heap
page read and write
984000
heap
page read and write
F44000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5D50000
heap
page read and write
5D50000
heap
page read and write
4E60000
direct allocation
page read and write
5D73000
heap
page read and write
5DC4000
heap
page read and write
5D1A000
heap
page read and write
45EF000
stack
page read and write
5DF4000
heap
page read and write
4911000
heap
page read and write
5DC7000
heap
page read and write
5DEA000
heap
page read and write
173C000
heap
page read and write
63A4000
heap
page read and write
5020000
direct allocation
page execute and read and write
49A0000
direct allocation
page read and write
5DDA000
heap
page read and write
5D6B000
heap
page read and write
5E7E000
stack
page read and write
B54000
heap
page read and write
5D3D000
heap
page read and write
173A000
heap
page read and write
1470000
direct allocation
page read and write
62B7000
heap
page read and write
F44000
heap
page read and write
1424000
heap
page read and write
5D57000
heap
page read and write
2F70000
direct allocation
page read and write
4F30000
direct allocation
page execute and read and write
EEE000
stack
page read and write
4D91000
heap
page read and write
7DD000
unkown
page execute and read and write
418F000
stack
page read and write
2DCE000
stack
page read and write
A8C000
heap
page read and write
5D7B000
heap
page read and write
5000000
direct allocation
page execute and read and write
F04000
heap
page read and write
449F000
stack
page read and write
B54000
heap
page read and write
173E000
heap
page read and write
3C1E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
1424000
heap
page read and write
5220000
direct allocation
page read and write
5D00000
trusted library allocation
page read and write
5D6E000
heap
page read and write
5D60000
heap
page read and write
2AC0000
direct allocation
page read and write
4E50000
direct allocation
page execute and read and write
823000
unkown
page execute and read and write
AAC000
heap
page read and write
5390000
trusted library allocation
page read and write
5D58000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
35DE000
stack
page read and write
5D5B000
heap
page read and write
984000
heap
page read and write
5DFA000
heap
page read and write
499F000
stack
page read and write
B54000
heap
page read and write
430E000
stack
page read and write
5DD7000
heap
page read and write
63EE000
heap
page read and write
637C000
heap
page read and write
AA5000
heap
page read and write
5D2F000
heap
page read and write
626D000
heap
page read and write
3C1F000
stack
page read and write
984000
heap
page read and write
63A9000
heap
page read and write
D6B000
stack
page read and write
63A9000
heap
page read and write
F44000
heap
page read and write
5DDB000
heap
page read and write
49B1000
heap
page read and write
6272000
heap
page read and write
5D5E000
heap
page read and write
2B80000
heap
page read and write
1739000
heap
page read and write
984000
heap
page read and write
81A000
unkown
page execute and read and write
F06000
heap
page read and write
A8F000
heap
page read and write
5D3D000
heap
page read and write
5D3D000
heap
page read and write
B54000
heap
page read and write
2E20000
trusted library allocation
page read and write
5DA7000
heap
page read and write
5D47000
heap
page read and write
5390000
direct allocation
page execute and read and write
4C9E000
stack
page read and write
16B0000
heap
page read and write
127F000
stack
page read and write
5DEE000
heap
page read and write
6360000
trusted library allocation
page read and write
1578000
heap
page read and write
5D9E000
heap
page read and write
5DFD000
heap
page read and write
637B000
heap
page read and write
62B7000
heap
page read and write
AAA000
heap
page read and write
1424000
heap
page read and write
There are 2583 hidden memdumps, click here to show them.