IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HZqMYfpyMfdfHfQja15Vpq6.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\ax62Lo_zBXq90uwBqgwbr3X.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\rTXApvaKL9yw6N5oqHITZ9U.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_236d6df2-efc0-4d22-90e1-905525e0d691\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_27e5690c-112c-4d22-9e99-8c6f0b14382c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_5bbc99b4-587d-40fe-ac59-0cbe63303745\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_5efb3555-bb77-4635-b3c4-88d10f7fc557\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_65d98138-d915-4355-b808-11207aa2a205\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_71a1c664-e693-463e-9310-d4cb42099473\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_7cf8ce8f-1aed-4201-8a63-0b00abb7edea\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_868d590d-f3fc-44f0-b341-e996dca8898b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_8e82ae91-098c-43c8-af98-78b98945d2fd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_76a8b624aa1c3f63e51b8c46f4549fe453f20_664b7b5e_9107bfeb-e283-447b-b7fc-1a197446dc21\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_26e483d4-fbd0-4cc6-b45d-6b9e29e77863\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_30d4bf65-0144-4d41-a1e5-2d1f034d6932\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_30f7c2e0-e953-4274-809a-130ac21e06ea\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_350cc484-f125-4e6a-a9b7-37b821553dcf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_51c1b91c-177b-4c73-b33d-0ffa0a872ffd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_a77f59a8-8b59-4992-86c8-63a5f0627f3c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_abb99b7dbfb2236439a53546d25fcd4b72b99ec0_b211229c_daed0f05-904b-4a99-8e36-6a836ebbd0ab\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER134.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1D7.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:04:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2C2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2F2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA91.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB1F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB3F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC95.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD03.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD23.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF06.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF74.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDFA4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1A6.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE281.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2B1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE3B9.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE4B4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE4F3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE511.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE5DD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE5FD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE9A4.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA42.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA62.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECD1.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED6E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDAE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5BA.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF637.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6A6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6D4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF704.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF714.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF935.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF964.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFABC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFADD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB1A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB5A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFCDE.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD6C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD8C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDD8.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFE95.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFEC5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFEC.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 20 18:05:10 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobejdT_84zuiGXP\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobejdT_84zuiGXP\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobejdT_84zuiGXP\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobepjTpZimyl6qo\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobepjTpZimyl6qo\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobepjTpZimyl6qo\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobezQtRch0ZmSou\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobezQtRch0ZmSou\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobezQtRch0ZmSou\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\1FcP9eUeV0_qWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\79XSsViDXoczHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\8MhogtJMRILwHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\IO6Zwb2pZcpALogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\IXC06WTABbSzCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\Sbg9DSp7lstNHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\W5ItwnbOEWbrLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\ZAfgfBvVuQKNWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\iTUZG7291Qb8Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\p5yNjy0gJTQpWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\s_jDytUw5zVDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\thdijlfvXXi5History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\trdFrTbEn6pPLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidijdT_84zuiGXP\w6NCEqkWwTcAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\14vKYSMfhshSLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\6GKpONOgQCQDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\7CSy0IxQh1VlHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\CEYAAajxdr9QLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\MBYfBCnDVQSSHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\amggfY1X012lWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\fzOGBVhWIKhlHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\gyqRvWXIZE5OWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\iaBWdi4Fnhz1Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\njJisi0cnX_KWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\rdVUsVkL4QbQWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\sANT26gQMwt7History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\sWrnFSWiPcWWCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidipjTpZimyl6qo\tTQUAdIiirY8Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\1xsvu65yyJa4Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\8HRycHnVbK4iWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\8ZJZxxoSigJTHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\Bu4fqjuvymtRLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\Gf8hzmQcfGHfWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\JDpwntiCRWhZWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\Lk65jVXnM3gHWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\TuqMWxaa7e_CCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\YbzjBYrL0NXcHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\Z2XBcxuCaxhxHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\bPe6T3UEPwG2Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\rdNYuR1GWMoBWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\uUNSZzd9cNCaHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidizQtRch0ZmSou\zgOZJSvD4T6RWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 128 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 808
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 960
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 972
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 976
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 776
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 976
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 1396
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 996
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 920
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 888
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 908
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 884
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 936
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 900
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 936
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 908
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.167/cost/lenin.exe
unknown
malicious
https://db-ip.com/demo/home.php?s=81.181.57.52o
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52l
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.me/RiseProSUPPORTs
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://db-ip.com/
unknown
https://ipinfo.io/widget/demo/81.181.57.52u
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://db-ip.com/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://t.me/RiseProSUPPORTa
unknown
http://193.233.132.167/cost/go.exe
unknown
https://ipinfo.io/widget/demo/81.181.57.52b
unknown
https://db-ip.com:443/demo/home.php?s=81.181.57.52d
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52
unknown
https://ipinfo.io/widget/demo/81.181.57.52ey
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/risepro_botisepro_bot
unknown
http://193.233.132.167/cost/go.exeIdser
unknown
http://193.233.132.167/cost/lenin.exe81.57.52
unknown
https://db-ip.com:443/demo/home.php?s=81.181.57.52
unknown
http://193.233.132.167/cost/lenin.exeUser
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/M2_&
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://147.45.47.102:57893/hera/amadka.exef
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://193.233.132.167/cost/go.exeomanialisherQ
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/81.181.57.52
34.117.186.192
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://t.me/RiseProSUPPORT0o
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
http://193.233.132.167/cost/lenin.exe.exeData.
unknown
https://t.S
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52u_
unknown
https://ipinfo.io/
unknown
https://t.me/risepro_both
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52
104.26.4.15
http://193.233.132.167/cost/go.exelater
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://ipinfo.io/=R
unknown
http://www.winimage.com/zLibDll
unknown
http://193.233.132.167/cost/go.exeoin7FwmBKlOFG
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://193.233.132.167/cost/lenin.exeerty.jaxx
unknown
https://t.me/risepro_botlaterT
unknown
http://193.233.132.167/cost/lenin.exeania
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://t.me/RiseProSUPPORT~
unknown
http://193.233.132.167/cost/go.exe/
unknown
http://www.winimage.com/zLibDllDpRTpR
unknown
https://t.me/risepro_botriseproon1
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{f627d59e-6bff-686b-4d15-a6779042deeb}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{c030c10f-dbdb-ada3-ba5e-42b7d949a003}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A40000
direct allocation
page read and write
malicious
6728000
heap
page read and write
malicious
1B1E000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
3830000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
3890000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
39F0000
direct allocation
page read and write
malicious
38E0000
direct allocation
page execute and read and write
malicious
3990000
direct allocation
page read and write
malicious
6720000
heap
page read and write
malicious
6730000
heap
page read and write
malicious
67C7000
heap
page read and write
6754000
heap
page read and write
676E000
heap
page read and write
678B000
heap
page read and write
2D0E000
unkown
page read and write
677F000
heap
page read and write
6771000
heap
page read and write
678B000
heap
page read and write
7141000
heap
page read and write
67C6000
heap
page read and write
6BB0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6792000
heap
page read and write
6762000
heap
page read and write
1C02000
heap
page read and write
401000
unkown
page execute read
6AB0000
trusted library allocation
page read and write
676E000
heap
page read and write
1B55000
heap
page read and write
676D000
heap
page read and write
6789000
heap
page read and write
678B000
heap
page read and write
67DF000
heap
page read and write
6150000
remote allocation
page read and write
67B5000
heap
page read and write
680F000
heap
page read and write
6792000
heap
page read and write
67C6000
heap
page read and write
672E000
stack
page read and write
67DF000
heap
page read and write
6784000
heap
page read and write
67CB000
heap
page read and write
67B8000
heap
page read and write
6795000
heap
page read and write
6799000
heap
page read and write
6760000
heap
page read and write
2DF0000
heap
page read and write
67DF000
heap
page read and write
6773000
heap
page read and write
6781000
heap
page read and write
6772000
heap
page read and write
67B4000
heap
page read and write
5CAE000
stack
page read and write
6788000
heap
page read and write
6784000
heap
page read and write
6787000
heap
page read and write
6782000
heap
page read and write
67D2000
heap
page read and write
1BFB000
heap
page read and write
676E000
heap
page read and write
1C08000
heap
page read and write
6752000
heap
page read and write
1B7C000
heap
page read and write
64ED000
stack
page read and write
3B40000
heap
page read and write
604D000
stack
page read and write
1F5F000
stack
page read and write
6795000
heap
page read and write
29E0000
heap
page read and write
1B40000
heap
page read and write
678C000
heap
page read and write
6781000
heap
page read and write
675B000
heap
page read and write
67A7000
heap
page read and write
67AD000
heap
page read and write
67C4000
heap
page read and write
67A2000
heap
page read and write
6780000
heap
page read and write
676D000
heap
page read and write
67A6000
heap
page read and write
6BB0000
trusted library allocation
page read and write
67A2000
heap
page read and write
678A000
heap
page read and write
676E000
heap
page read and write
3820000
heap
page read and write
1B58000
heap
page read and write
1B81000
heap
page read and write
67E1000
heap
page read and write
1C07000
heap
page read and write
676F000
heap
page read and write
67A0000
heap
page read and write
1CE7000
heap
page read and write
65DE000
stack
page read and write
67AD000
heap
page read and write
676E000
heap
page read and write
1BEB000
heap
page read and write
6731000
heap
page read and write
1C7E000
stack
page read and write
1C02000
heap
page read and write
7121000
heap
page read and write
1A99000
unkown
page read and write
677C000
heap
page read and write
6780000
heap
page read and write
1C31000
heap
page read and write
678B000
heap
page read and write
6792000
heap
page read and write
6793000
heap
page read and write
6AB0000
heap
page read and write
6792000
heap
page read and write
1CEC000
heap
page read and write
1BB5000
heap
page read and write
3707000
heap
page execute and read and write
3A5D000
stack
page read and write
677D000
heap
page read and write
6788000
heap
page read and write
679F000
heap
page read and write
5FFE000
stack
page read and write
6763000
heap
page read and write
676E000
heap
page read and write
2D4E000
stack
page read and write
305E000
stack
page read and write
36F0000
heap
page read and write
67A9000
heap
page read and write
67D4000
heap
page read and write
67BF000
heap
page read and write
673B000
heap
page read and write
6765000
heap
page read and write
67C4000
heap
page read and write
676C000
heap
page read and write
6760000
heap
page read and write
67AF000
heap
page read and write
672C000
heap
page read and write
6782000
heap
page read and write
6780000
heap
page read and write
678C000
heap
page read and write
675E000
heap
page read and write
1C60000
heap
page read and write
6773000
heap
page read and write
678B000
heap
page read and write
6787000
heap
page read and write
6781000
heap
page read and write
1A9B000
unkown
page readonly
6763000
heap
page read and write
6794000
heap
page read and write
67DF000
heap
page read and write
6780000
heap
page read and write
3AA0000
heap
page read and write
677B000
heap
page read and write
676E000
heap
page read and write
9B000
stack
page read and write
6788000
heap
page read and write
1C03000
heap
page read and write
411000
unkown
page readonly
676A000
heap
page read and write
6788000
heap
page read and write
6787000
heap
page read and write
6797000
heap
page read and write
678D000
heap
page read and write
6792000
heap
page read and write
64DD000
stack
page read and write
3720000
heap
page read and write
32C0000
heap
page read and write
1C4C000
heap
page read and write
6764000
heap
page read and write
6795000
heap
page read and write
676F000
heap
page read and write
67B4000
heap
page read and write
6771000
heap
page read and write
67A7000
heap
page read and write
9B000
stack
page read and write
1E5E000
stack
page read and write
6771000
heap
page read and write
6AC0000
trusted library allocation
page read and write
3170000
heap
page read and write
603D000
stack
page read and write
5ECD000
stack
page read and write
676A000
heap
page read and write
1C00000
heap
page read and write
6782000
heap
page read and write
1C62000
heap
page read and write
676F000
heap
page read and write
19A000
stack
page read and write
676E000
heap
page read and write
419000
unkown
page write copy
679D000
heap
page read and write
67A0000
heap
page read and write
67F6000
heap
page read and write
5EAE000
stack
page read and write
18D000
stack
page read and write
1A9B000
unkown
page readonly
676F000
heap
page read and write
6781000
heap
page read and write
5C8E000
stack
page read and write
215F000
stack
page read and write
6721000
heap
page read and write
678B000
heap
page read and write
6780000
heap
page read and write
67F6000
heap
page read and write
67DF000
heap
page read and write
9B000
stack
page read and write
3800000
heap
page read and write
2DE0000
heap
page read and write
6BB0000
trusted library allocation
page read and write
6780000
heap
page read and write
67A8000
heap
page read and write
1A9B000
unkown
page readonly
6782000
heap
page read and write
6766000
heap
page read and write
6797000
heap
page read and write
604D000
stack
page read and write
6780000
heap
page read and write
6792000
heap
page read and write
6BB0000
trusted library allocation
page read and write
6757000
heap
page read and write
6797000
heap
page read and write
676E000
heap
page read and write
675B000
heap
page read and write
67DF000
heap
page read and write
2990000
heap
page read and write
6797000
heap
page read and write
6787000
heap
page read and write
6150000
remote allocation
page read and write
677E000
heap
page read and write
5AA3000
heap
page read and write
67C5000
heap
page read and write
677D000
heap
page read and write
5C4E000
stack
page read and write
676E000
heap
page read and write
67B6000
heap
page read and write
678E000
heap
page read and write
613E000
stack
page read and write
662D000
stack
page read and write
1C85000
heap
page read and write
677B000
heap
page read and write
1A9B000
unkown
page readonly
600E000
stack
page read and write
6780000
heap
page read and write
678E000
heap
page read and write
67D2000
heap
page read and write
6160000
remote allocation
page read and write
6AC0000
trusted library allocation
page read and write
6786000
heap
page read and write
2D60000
heap
page read and write
1B79000
heap
page read and write
676F000
heap
page read and write
7120000
heap
page read and write
1BF9000
heap
page read and write
6779000
heap
page read and write
6791000
heap
page read and write
1A9B000
unkown
page readonly
1CE7000
heap
page read and write
678F000
heap
page read and write
370D000
heap
page execute and read and write
1CF8000
heap
page read and write
67CA000
heap
page read and write
675B000
heap
page read and write
676C000
heap
page read and write
3A2D000
stack
page read and write
6791000
heap
page read and write
6758000
heap
page read and write
6792000
heap
page read and write
6795000
heap
page read and write
6AC0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
1BF9000
heap
page read and write
67B3000
heap
page read and write
676E000
heap
page read and write
6BB0000
trusted library allocation
page read and write
35A1000
heap
page execute and read and write
6782000
heap
page read and write
6AB0000
trusted library allocation
page read and write
6793000
heap
page read and write
677D000
heap
page read and write
67E1000
heap
page read and write
67AB000
heap
page read and write
7240000
trusted library allocation
page read and write
679D000
heap
page read and write
6797000
heap
page read and write
67B3000
heap
page read and write
67F6000
heap
page read and write
67AF000
heap
page read and write
6771000
heap
page read and write
67B6000
heap
page read and write
3A1D000
stack
page read and write
8AD000
stack
page read and write
67DC000
heap
page read and write
1F0000
heap
page read and write
6770000
heap
page read and write
67A5000
heap
page read and write
19A000
stack
page read and write
1C0E000
heap
page read and write
401000
unkown
page execute read
679D000
heap
page read and write
67A7000
heap
page read and write
676E000
heap
page read and write
678D000
heap
page read and write
677B000
heap
page read and write
6764000
heap
page read and write
1F0000
heap
page read and write
6788000
heap
page read and write
6764000
heap
page read and write
67A8000
heap
page read and write
67A7000
heap
page read and write
5EFD000
stack
page read and write
676F000
heap
page read and write
1BF9000
heap
page read and write
6782000
heap
page read and write
676A000
heap
page read and write
67AD000
heap
page read and write
67F8000
heap
page read and write
676F000
heap
page read and write
6BB0000
trusted library allocation
page read and write
678A000
heap
page read and write
1C91000
heap
page read and write
6792000
heap
page read and write
6773000
heap
page read and write
6790000
heap
page read and write
678C000
heap
page read and write
6780000
heap
page read and write
676A000
heap
page read and write
6780000
heap
page read and write
67B6000
heap
page read and write
6763000
heap
page read and write
1BFA000
heap
page read and write
6795000
heap
page read and write
678B000
heap
page read and write
1B63000
heap
page read and write
6774000
heap
page read and write
6796000
heap
page read and write
6775000
heap
page read and write
676F000
heap
page read and write
6AC0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
67DF000
heap
page read and write
67DC000
heap
page read and write
67A7000
heap
page read and write
677D000
heap
page read and write
678C000
heap
page read and write
67DF000
heap
page read and write
6AC0000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
6744000
heap
page read and write
1C68000
heap
page read and write
1D1E000
stack
page read and write
6AB0000
trusted library allocation
page read and write
676E000
heap
page read and write
678B000
heap
page read and write
1BF2000
heap
page read and write
67AB000
heap
page read and write
1B6F000
heap
page read and write
67D8000
heap
page read and write
6744000
heap
page read and write
7220000
trusted library allocation
page read and write
67AE000
heap
page read and write
19A000
stack
page read and write
6771000
heap
page read and write
1C02000
heap
page read and write
677B000
heap
page read and write
6785000
heap
page read and write
67D9000
heap
page read and write
677D000
heap
page read and write
6150000
remote allocation
page read and write
679C000
heap
page read and write
677F000
heap
page read and write
3A9D000
stack
page read and write
1BF8000
heap
page read and write
6793000
heap
page read and write
41F000
unkown
page write copy
1B96000
heap
page read and write
674C000
heap
page read and write
677E000
heap
page read and write
679A000
heap
page read and write
676C000
heap
page read and write
1B90000
heap
page read and write
6771000
heap
page read and write
5D8D000
stack
page read and write
67F6000
heap
page read and write
678C000
heap
page read and write
67A4000
heap
page read and write
6792000
heap
page read and write
678F000
heap
page read and write
677F000
heap
page read and write
675B000
heap
page read and write
67BB000
heap
page read and write
6721000
heap
page read and write
67B6000
heap
page read and write
6740000
heap
page read and write
6792000
heap
page read and write
676C000
heap
page read and write
67A7000
heap
page read and write
6752000
heap
page read and write
1C45000
heap
page read and write
5F0D000
stack
page read and write
6791000
heap
page read and write
2DAE000
unkown
page read and write
65EE000
stack
page read and write
67D2000
heap
page read and write
6150000
remote allocation
page read and write
6791000
heap
page read and write
6781000
heap
page read and write
6780000
heap
page read and write
6BB0000
trusted library allocation
page read and write
677D000
heap
page read and write
676B000
heap
page read and write
37E0000
heap
page read and write
679E000
heap
page read and write
6792000
heap
page read and write
67DF000
heap
page read and write
6792000
heap
page read and write
677F000
heap
page read and write
1B6B000
heap
page read and write
1B96000
heap
page read and write
5DCD000
stack
page read and write
2D8E000
stack
page read and write
6780000
heap
page read and write
1A99000
unkown
page read and write
6778000
heap
page read and write
6795000
heap
page read and write
67E2000
heap
page read and write
679D000
heap
page read and write
6160000
remote allocation
page read and write
41F000
unkown
page write copy
1B37000
heap
page read and write
6782000
heap
page read and write
677A000
heap
page read and write
676E000
heap
page read and write
6760000
heap
page read and write
676F000
heap
page read and write
677E000
heap
page read and write
369E000
stack
page read and write
2CFA000
stack
page read and write
18D000
stack
page read and write
6793000
heap
page read and write
677A000
heap
page read and write
1BFF000
heap
page read and write
6802000
heap
page read and write
1B83000
heap
page read and write
679E000
heap
page read and write
1A9B000
unkown
page readonly
411000
unkown
page readonly
1C03000
heap
page read and write
678B000
heap
page read and write
6787000
heap
page read and write
67E8000
heap
page read and write
1BF3000
heap
page read and write
6764000
heap
page read and write
676F000
heap
page read and write
6AC0000
trusted library allocation
page read and write
1C09000
heap
page read and write
1BF9000
heap
page read and write
6795000
heap
page read and write
676F000
heap
page read and write
6761000
heap
page read and write
1C47000
heap
page read and write
6784000
heap
page read and write
677C000
heap
page read and write
38D0000
heap
page read and write
6795000
heap
page read and write
6760000
heap
page read and write
614E000
stack
page read and write
676E000
heap
page read and write
6795000
heap
page read and write
1C02000
heap
page read and write
1B8A000
heap
page read and write
6796000
heap
page read and write
6780000
heap
page read and write
67A5000
heap
page read and write
1A99000
unkown
page read and write
678C000
heap
page read and write
6778000
heap
page read and write
5F0D000
stack
page read and write
1B4F000
heap
page read and write
6AC0000
trusted library allocation
page read and write
6771000
heap
page read and write
678F000
heap
page read and write
677B000
heap
page read and write
6784000
heap
page read and write
6787000
heap
page read and write
1BFB000
heap
page read and write
67A0000
heap
page read and write
6AC0000
trusted library allocation
page read and write
5ADC000
heap
page read and write
677E000
heap
page read and write
67A6000
heap
page read and write
6150000
remote allocation
page read and write
675B000
heap
page read and write
67DF000
heap
page read and write
6764000
heap
page read and write
18D000
stack
page read and write
678B000
heap
page read and write
67BD000
heap
page read and write
677E000
heap
page read and write
67AE000
heap
page read and write
6785000
heap
page read and write
677D000
heap
page read and write
1CF3000
heap
page read and write
6784000
heap
page read and write
676C000
heap
page read and write
678E000
heap
page read and write
6771000
heap
page read and write
679E000
heap
page read and write
1B0E000
heap
page read and write
1AD0000
heap
page read and write
1C02000
heap
page read and write
679E000
heap
page read and write
6795000
heap
page read and write
1BF2000
heap
page read and write
3060000
heap
page read and write
6AB0000
trusted library allocation
page read and write
67A1000
heap
page read and write
6795000
heap
page read and write
5ECD000
stack
page read and write
6768000
heap
page read and write
3020000
heap
page read and write
680F000
heap
page read and write
6780000
heap
page read and write
1BF9000
heap
page read and write
67A4000
heap
page read and write
5DAD000
stack
page read and write
67A6000
heap
page read and write
41F000
unkown
page write copy
6780000
heap
page read and write
6150000
remote allocation
page read and write
6781000
heap
page read and write
1CF8000
heap
page read and write
679D000
heap
page read and write
67A9000
heap
page read and write
1B56000
heap
page read and write
6788000
heap
page read and write
677F000
heap
page read and write
2CBD000
stack
page read and write
6771000
heap
page read and write
6792000
heap
page read and write
5C8D000
stack
page read and write
6760000
heap
page read and write
1C4A000
heap
page read and write
6789000
heap
page read and write
382F000
stack
page read and write
67CA000
heap
page read and write
6AC0000
trusted library allocation
page read and write
1BF9000
heap
page read and write
328F000
stack
page read and write
67DF000
heap
page read and write
6AC0000
trusted library allocation
page read and write
3A6D000
stack
page read and write
1B72000
heap
page read and write
67A7000
heap
page read and write
6792000
heap
page read and write
678D000
heap
page read and write
67A7000
heap
page read and write
67DF000
heap
page read and write
1BB0000
heap
page read and write
678B000
heap
page read and write
671E000
stack
page read and write
1B65000
heap
page read and write
6788000
heap
page read and write
67CD000
heap
page read and write
2DEB000
heap
page read and write
677F000
heap
page read and write
1B60000
heap
page read and write
1B8A000
heap
page read and write
1C02000
heap
page read and write
67D4000
heap
page read and write
6744000
heap
page read and write
1B0A000
heap
page read and write
677B000
heap
page read and write
1C01000
heap
page read and write
676F000
heap
page read and write
1B7B000
heap
page read and write
6AB0000
trusted library allocation
page read and write
678B000
heap
page read and write
6795000
heap
page read and write
6784000
heap
page read and write
67CF000
heap
page read and write
67AE000
heap
page read and write
679B000
heap
page read and write
6737000
heap
page read and write
6764000
heap
page read and write
5DCD000
stack
page read and write
1B5E000
heap
page read and write
6795000
heap
page read and write
677B000
heap
page read and write
67A1000
heap
page read and write
6763000
heap
page read and write
6740000
heap
page read and write
6AB0000
trusted library allocation
page read and write
65DE000
stack
page read and write
678C000
heap
page read and write
67AF000
heap
page read and write
6730000
heap
page read and write
1C80000
heap
page read and write
6742000
heap
page read and write
3A43000
heap
page read and write
3880000
heap
page read and write
676F000
heap
page read and write
6AC0000
trusted library allocation
page read and write
6760000
heap
page read and write
6AB0000
trusted library allocation
page read and write
1B79000
heap
page read and write
678E000
heap
page read and write
676E000
heap
page read and write
6791000
heap
page read and write
678B000
heap
page read and write
67DF000
heap
page read and write
67A2000
heap
page read and write
67E0000
heap
page read and write
680F000
heap
page read and write
67AD000
heap
page read and write
67A7000
heap
page read and write
6BB0000
trusted library allocation
page read and write
6781000
heap
page read and write
6720000
heap
page read and write
67BD000
heap
page read and write
6795000
heap
page read and write
306A000
heap
page read and write
677E000
heap
page read and write
67BD000
heap
page read and write
67E0000
heap
page read and write
67B9000
heap
page read and write
6764000
heap
page read and write
678D000
heap
page read and write
1C41000
heap
page read and write
6160000
remote allocation
page read and write
679D000
heap
page read and write
1F5000
heap
page read and write
6785000
heap
page read and write
67B9000
heap
page read and write
675B000
heap
page read and write
6AB0000
trusted library allocation
page read and write
600E000
stack
page read and write
1C00000
heap
page read and write
676F000
heap
page read and write
6741000
heap
page read and write
6721000
heap
page read and write
67E8000
heap
page read and write
67DC000
heap
page read and write
67AD000
heap
page read and write
6AB0000
trusted library allocation
page read and write
679C000
heap
page read and write
6792000
heap
page read and write
1B32000
heap
page read and write
64DD000
stack
page read and write
6792000
heap
page read and write
29F0000
heap
page read and write
67DF000
heap
page read and write
1DFF000
stack
page read and write
389D000
stack
page read and write
6799000
heap
page read and write
677D000
heap
page read and write
679D000
heap
page read and write
6797000
heap
page read and write
678B000
heap
page read and write
1E1F000
stack
page read and write
6765000
heap
page read and write
6760000
heap
page read and write
6764000
heap
page read and write
67BE000
heap
page read and write
6744000
heap
page read and write
6787000
heap
page read and write
676B000
heap
page read and write
676E000
heap
page read and write
6764000
heap
page read and write
661D000
stack
page read and write
6760000
heap
page read and write
5D8D000
stack
page read and write
676C000
heap
page read and write
1BFF000
heap
page read and write
400000
unkown
page readonly
676F000
heap
page read and write
1E5F000
stack
page read and write
676F000
heap
page read and write
6792000
heap
page read and write
67D4000
heap
page read and write
67DF000
heap
page read and write
614E000
stack
page read and write
1BB7000
heap
page read and write
6773000
heap
page read and write
6760000
heap
page read and write
1B1A000
heap
page read and write
1C6F000
heap
page read and write
676D000
heap
page read and write
6785000
heap
page read and write
6795000
heap
page read and write
1CF3000
heap
page read and write
1B83000
heap
page read and write
6780000
heap
page read and write
3A90000
heap
page read and write
678A000
heap
page read and write
6757000
heap
page read and write
6784000
heap
page read and write
679E000
heap
page read and write
67A9000
heap
page read and write
67DF000
heap
page read and write
67A2000
heap
page read and write
6786000
heap
page read and write
1C0E000
heap
page read and write
67BD000
heap
page read and write
411000
unkown
page readonly
6AB0000
trusted library allocation
page read and write
67B7000
heap
page read and write
6782000
heap
page read and write
677D000
heap
page read and write
6744000
heap
page read and write
676E000
heap
page read and write
2DEF000
unkown
page read and write
6760000
heap
page read and write
67E8000
heap
page read and write
67DF000
heap
page read and write
6774000
heap
page read and write
677B000
heap
page read and write
678C000
heap
page read and write
36D0000
heap
page read and write
1C95000
heap
page read and write
678D000
heap
page read and write
675B000
heap
page read and write
1CF8000
heap
page read and write
6766000
heap
page read and write
677B000
heap
page read and write
67D8000
heap
page read and write
6782000
heap
page read and write
6760000
heap
page read and write
6795000
heap
page read and write
67DF000
heap
page read and write
6771000
heap
page read and write
67AD000
heap
page read and write
67A6000
heap
page read and write
678D000
heap
page read and write
67E0000
heap
page read and write
676E000
heap
page read and write
6795000
heap
page read and write
1AC0000
heap
page read and write
673A000
heap
page read and write
6BB0000
trusted library allocation
page read and write
6728000
heap
page read and write
67C9000
heap
page read and write
6780000
heap
page read and write
6AC0000
trusted library allocation
page read and write
67B6000
heap
page read and write
679D000
heap
page read and write
67C5000
heap
page read and write
1C2E000
heap
page read and write
400000
unkown
page readonly
1C7C000
heap
page read and write
67DF000
heap
page read and write
677D000
heap
page read and write
6793000
heap
page read and write
6782000
heap
page read and write
678B000
heap
page read and write
1BF9000
heap
page read and write
6792000
heap
page read and write
1B67000
heap
page read and write
679D000
heap
page read and write
419000
unkown
page write copy
67B5000
heap
page read and write
3840000
heap
page read and write
1BFE000
stack
page read and write
6781000
heap
page read and write
6777000
heap
page read and write
6797000
heap
page read and write
1CF3000
heap
page read and write
6795000
heap
page read and write
676F000
heap
page read and write
6778000
heap
page read and write
1B4D000
heap
page read and write
6771000
heap
page read and write
6795000
heap
page read and write
67DF000
heap
page read and write
674A000
heap
page read and write
671E000
stack
page read and write
6787000
heap
page read and write
6764000
heap
page read and write
1B45000
heap
page read and write
6780000
heap
page read and write
6792000
heap
page read and write
401000
unkown
page execute read
6784000
heap
page read and write
6780000
heap
page read and write
67DF000
heap
page read and write
29DE000
unkown
page read and write
6795000
heap
page read and write
67AD000
heap
page read and write
1C87000
heap
page read and write
679D000
heap
page read and write
6778000
heap
page read and write
676E000
heap
page read and write
676A000
heap
page read and write
6752000
heap
page read and write
6786000
heap
page read and write
1C51000
heap
page read and write
67DF000
heap
page read and write
6BB0000
trusted library allocation
page read and write
6780000
heap
page read and write
1CEC000
heap
page read and write
67CF000
heap
page read and write
67B4000
heap
page read and write
1B2A000
heap
page read and write
67A1000
heap
page read and write
677A000
heap
page read and write
6777000
heap
page read and write
678E000
heap
page read and write
1BFE000
heap
page read and write
1C35000
heap
page read and write
67CD000
heap
page read and write
3A60000
heap
page read and write
8EA000
stack
page read and write
6786000
heap
page read and write
67AB000
heap
page read and write
400000
unkown
page readonly
5AC0000
heap
page read and write
6792000
heap
page read and write
67A5000
heap
page read and write
1BFD000
heap
page read and write
6788000
heap
page read and write
6791000
heap
page read and write
67A3000
heap
page read and write
678C000
heap
page read and write
675B000
heap
page read and write
1B5C000
heap
page read and write
1B10000
heap
page read and write
1B5A000
heap
page read and write
1C03000
heap
page read and write
6AB0000
trusted library allocation
page read and write
1F0000
heap
page read and write
6792000
heap
page read and write
419000
unkown
page write copy
6AC0000
trusted library allocation
page read and write
67C6000
heap
page read and write
6AC0000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
6754000
heap
page read and write
67A2000
heap
page read and write
6BB0000
trusted library allocation
page read and write
67A7000
heap
page read and write
675B000
heap
page read and write
6778000
heap
page read and write
1B52000
heap
page read and write
1CF6000
heap
page read and write
676F000
heap
page read and write
1BF9000
heap
page read and write
678C000
heap
page read and write
676E000
heap
page read and write
679D000
heap
page read and write
1C3E000
stack
page read and write
67BB000
heap
page read and write
5ABF000
heap
page read and write
6784000
heap
page read and write
67B7000
heap
page read and write
6782000
heap
page read and write
1B00000
heap
page read and write
6794000
heap
page read and write
679D000
heap
page read and write
6788000
heap
page read and write
6781000
heap
page read and write
680F000
heap
page read and write
6785000
heap
page read and write
67B5000
heap
page read and write
7140000
heap
page read and write
661D000
stack
page read and write
1AC0000
heap
page read and write
6795000
heap
page read and write
67A0000
heap
page read and write
678E000
heap
page read and write
676E000
heap
page read and write
676E000
heap
page read and write
6787000
heap
page read and write
1C5D000
heap
page read and write
6771000
heap
page read and write
7210000
trusted library allocation
page read and write
6793000
heap
page read and write
6795000
heap
page read and write
There are 867 hidden memdumps, click here to show them.