IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\fOmlyjeWLzh5Tv38_jR4gFx.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\v3LvRqxzMigkZO4sGSn3NDv.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_ec619316d435a0621ba3667744ac4ba198646d78_d1a40e08_5a4c7c3f-49b6-4eb3-8d5b-bf782d5388aa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_ec619316d435a0621ba3667744ac4ba198646d78_d1a40e08_afb271d8-43e5-41cb-b5ef-4dcf3dfdaae0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_a2a636d6b528a3cf542617edd8df83f41ab1c4b_394a0634_aa0059fc-b7e6-4132-8e38-83f092b6ad00\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2651.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 22:06:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26CF.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 22:06:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26D0.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 22:06:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2828.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2867.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2886.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28E4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2940.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29DD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\2fkbH95MIiIVHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\6BEpSEEJK2MRWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\CrDw0uiZyBrjWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\KACSF2aZBIrqHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\MSeCMsgcpAM6Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\S8KxQcloANgRLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\TWdqXpwjKJgnHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\chbVhxN5Q4oALogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\kKUZo8xfUQP6Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\n216lelIOnitWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\oxPSCaI8jrzXHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\pWdX6oy0wMh6Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\tsK6qQZ5zZkiWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanQFZsogCtLsji\ywWhbVJPCEiWWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\3FmY8Y3VZKUdHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\3T4iUC1W1QN1Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\FLoEPq542D1GHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\LE8muCHAK5sLWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\LXuFiEXG0EkqWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\MTRqRtKLov0rWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\OAknfdtzctwSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\YdijmPRhuNDcWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\aU71U5Q3u0g5Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\iLjAv5QAc_NyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\qxceeLkUXC0mCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\rAZQ7hw0IO5UWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\spvsXarvltR2Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanax8MrfHUT7go\zXxF9mapGYi0History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixyQFZsogCtLsji\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyQFZsogCtLsji\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyQFZsogCtLsji\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyax8MrfHUT7go\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyax8MrfHUT7go\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyax8MrfHUT7go\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6208 -s 1900
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 1936
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 1196
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.167/cost/lenin.exe
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://t.me/risepro_botAB
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ipinfo.io/widget/demo/154.16.105.36O
unknown
https://ipinfo.io/y8
unknown
http://147.45.47.102:57893/hera/amadka.exe68.07S
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
http://www.microsoft.co
unknown
http://147.45.47.102:57893/hera/amadka.exeot
unknown
https://db-ip.com/
unknown
https://t.me/RiseProSUPPORTg
unknown
https://db-ip.com/1
unknown
https://ipinfo.io/widget/demo/154.16.105.36d
unknown
http://193.233.132.167/cost/go.exeliber
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://ipinfo.io/O0
unknown
http://193.233.132.167/cost/go.exe
unknown
https://ipinfo.io:443/widget/demo/154.16.105.36P
unknown
https://ipinfo.io/o
unknown
https://ipinfo.io:443/widget/demo/154.16.105.36
unknown
https://t.me/RiseProSUPPORTM
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://db-ip.com/7
unknown
https://t.me/risepro_botisepro_bot
unknown
https://t.me/RiseProSUPPORTF
unknown
https://ipinfo.io/#&
unknown
https://db-ip.com/F
unknown
https://t.me/RiseProSUPPORTHi
unknown
https://db-ip.com:443/demo/home.php?s=154.16.105.36w
unknown
https://ipinfo.io:443/widget/demo/154.16.105.36p
unknown
https://db-ip.com:443/demo/home.php?s=154.16.105.36
unknown
https://t.7
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://147.45.47.102:57893/hera/amadka.exee
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://db-ip.com/demo/home.php?s=154.16.105.36s
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://t.me/risepro_botrisepro0;09
unknown
https://www.ecosia.org/newtab/
unknown
https://db-ip.com/demo/home.php?s=154.16.105.36y
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com/demo/home.php?s=154.16.105.36
172.67.75.166
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
http://crl.m
unknown
https://ipinfo.io/widget/demo/154.16.105.361
unknown
https://t.me/risepro_botlater
unknown
https://db-ip.com/m#
unknown
https://db-ip.com:443/demo/home.php?s=154.16.105.36P
unknown
https://ipinfo.io/
unknown
https://t.me/RiseProSUPPORT27.20130
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://t.me/risepro_bot4-3500
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://ipinfo.io/widget/demo/154.16.105.36
34.117.186.192
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/widget/demo/154.16.105.36$I3
unknown
https://t.me/risepro_boto
unknown
https://db-ip.com:443/demo/home.php?s=154.16.105.369
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{ed4650c1-e2bf-d5de-0fca-e2ebdb9a618e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
There are 41 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5F70000
heap
page read and write
malicious
5D31000
heap
page read and write
malicious
5D31000
heap
page read and write
malicious
6111000
heap
page read and write
malicious
140E000
heap
page read and write
malicious
6112000
heap
page read and write
malicious
5CD0000
heap
page read and write
malicious
6111000
heap
page read and write
malicious
5D79000
heap
page read and write
malicious
5D31000
heap
page read and write
malicious
5D31000
heap
page read and write
malicious
5D31000
heap
page read and write
malicious
6FD000
unkown
page readonly
5780000
remote allocation
page read and write
5D1C000
heap
page read and write
AF4000
unkown
page execute and read and write
5780000
remote allocation
page read and write
5E25000
heap
page read and write
5D89000
heap
page read and write
5E03000
heap
page read and write
70C000
unkown
page write copy
5FC1000
heap
page read and write
14FA000
heap
page read and write
B06000
unkown
page execute and read and write
5E2A000
heap
page read and write
B45000
unkown
page execute and read and write
5D1A000
heap
page read and write
571000
unkown
page execute read
5D5E000
heap
page read and write
6F2000
unkown
page read and write
5D54000
heap
page read and write
514A000
heap
page read and write
5D34000
heap
page read and write
5D4B000
heap
page read and write
610D000
heap
page read and write
5D4E000
heap
page read and write
5D46000
heap
page read and write
B7A000
unkown
page readonly
982000
unkown
page readonly
41B000
stack
page read and write
BB2000
unkown
page readonly
12C2000
heap
page read and write
6100000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
5D44000
heap
page read and write
5FEB000
heap
page read and write
2FDD000
stack
page read and write
5E05000
heap
page read and write
5D18000
heap
page read and write
98A000
unkown
page readonly
5FEF000
heap
page read and write
1445000
heap
page read and write
6100000
trusted library allocation
page read and write
5CEE000
heap
page read and write
892000
unkown
page execute and read and write
5E10000
heap
page read and write
6111000
heap
page read and write
5D38000
heap
page read and write
6111000
heap
page read and write
FE0000
heap
page read and write
5DB9000
heap
page read and write
1429000
heap
page read and write
5D4B000
heap
page read and write
5D18000
heap
page read and write
6007000
heap
page read and write
138A000
heap
page read and write
6138000
heap
page read and write
143D000
heap
page read and write
5D29000
heap
page read and write
5C6E000
stack
page read and write
5D29000
heap
page read and write
6100000
trusted library allocation
page read and write
5FF8000
heap
page read and write
5E15000
heap
page read and write
14F6000
heap
page read and write
987000
unkown
page readonly
5E35000
heap
page read and write
6122000
heap
page read and write
600F000
heap
page read and write
BBC000
unkown
page write copy
B4B000
unkown
page execute and read and write
15D7000
heap
page read and write
125D000
stack
page read and write
894000
unkown
page execute and read and write
913000
unkown
page execute and read and write
980000
unkown
page read and write
5D70000
heap
page read and write
5FE7000
heap
page read and write
5E03000
heap
page read and write
1423000
heap
page read and write
D87000
unkown
page execute and read and write
5D21000
heap
page read and write
F77000
heap
page read and write
FE0000
heap
page read and write
8DF000
unkown
page execute and read and write
3050000
direct allocation
page read and write
1297000
heap
page read and write
6039000
heap
page read and write
AF8000
unkown
page execute and read and write
5F9C000
heap
page read and write
14F2000
heap
page read and write
144B000
heap
page read and write
140D000
heap
page read and write
5FEF000
heap
page read and write
5DB4000
heap
page read and write
5FDA000
heap
page read and write
5D37000
heap
page read and write
5D34000
heap
page read and write
6300000
trusted library allocation
page read and write
1260000
heap
page read and write
1179000
direct allocation
page read and write
6006000
heap
page read and write
1510000
heap
page read and write
153E000
stack
page read and write
D48000
unkown
page execute and read and write
601E000
heap
page read and write
5E34000
heap
page read and write
4F10000
heap
page read and write
987000
unkown
page readonly
6100000
trusted library allocation
page read and write
6007000
heap
page read and write
8DD000
unkown
page execute and read and write
5E10000
heap
page read and write
1400000
heap
page read and write
5E0A000
heap
page read and write
155F000
stack
page read and write
571000
unkown
page execute read
3050000
direct allocation
page read and write
5D40000
heap
page read and write
145F000
stack
page read and write
3030000
heap
page read and write
6045000
heap
page read and write
886000
unkown
page execute and read and write
14F7000
heap
page read and write
1170000
direct allocation
page read and write
610F000
heap
page read and write
142D000
heap
page read and write
98A000
unkown
page readonly
5DBC000
heap
page read and write
6300000
trusted library allocation
page read and write
5CCF000
stack
page read and write
144B000
heap
page read and write
14FB000
heap
page read and write
5D7A000
heap
page read and write
53DE000
stack
page read and write
8E1000
unkown
page execute and read and write
5E03000
heap
page read and write
6300000
trusted library allocation
page read and write
5FA5000
heap
page read and write
B47000
unkown
page execute and read and write
2A40000
direct allocation
page read and write
5D52000
heap
page read and write
6025000
heap
page read and write
962000
unkown
page write copy
5D2A000
heap
page read and write
6113000
heap
page read and write
D91000
unkown
page execute and read and write
5FEF000
heap
page read and write
B7B000
unkown
page execute and read and write
6138000
heap
page read and write
6140000
heap
page read and write
5B2E000
stack
page read and write
BCA000
unkown
page readonly
6430000
trusted library allocation
page read and write
1380000
heap
page read and write
133D000
heap
page read and write
6F0000
unkown
page readonly
71A000
unkown
page readonly
5FCA000
heap
page read and write
B37000
unkown
page execute and read and write
6060000
trusted library allocation
page read and write
5E15000
heap
page read and write
987000
unkown
page readonly
142E000
heap
page read and write
4E9E000
stack
page read and write
611F000
heap
page read and write
6130000
heap
page read and write
E80000
direct allocation
page read and write
12AD000
heap
page read and write
5D5D000
heap
page read and write
98A000
unkown
page readonly
1423000
heap
page read and write
712000
unkown
page readonly
5D4B000
heap
page read and write
1030000
heap
page read and write
FE0000
direct allocation
page read and write
5FCE000
heap
page read and write
308E000
stack
page read and write
D38000
unkown
page execute and read and write
515E000
stack
page read and write
5DB6000
heap
page read and write
ECE000
heap
page read and write
5E17000
heap
page read and write
6111000
heap
page read and write
600B000
heap
page read and write
14F7000
heap
page read and write
14F6000
heap
page read and write
5FB9000
heap
page read and write
14F0000
heap
page read and write
5FEF000
heap
page read and write
14FA000
heap
page read and write
F79000
heap
page read and write
6138000
heap
page read and write
5E01000
heap
page read and write
5FB7000
heap
page read and write
5FCE000
heap
page read and write
A1B000
stack
page read and write
600A000
heap
page read and write
2E0E000
stack
page read and write
1398000
heap
page read and write
89A000
unkown
page execute and read and write
5FC9000
heap
page read and write
1200000
heap
page read and write
55ED000
stack
page read and write
5E03000
heap
page read and write
B37000
unkown
page execute and read and write
1382000
heap
page read and write
B49000
unkown
page execute and read and write
2E50000
remote allocation
page read and write
6300000
trusted library allocation
page read and write
5F82000
heap
page read and write
A70000
unkown
page execute read
AFE000
unkown
page execute and read and write
142E000
heap
page read and write
612B000
heap
page read and write
BA2000
unkown
page read and write
139A000
heap
page read and write
5B3F000
stack
page read and write
302E000
stack
page read and write
6109000
heap
page read and write
600A000
heap
page read and write
1310000
direct allocation
page read and write
575F000
stack
page read and write
AF2000
unkown
page execute and read and write
14F8000
heap
page read and write
5D27000
heap
page read and write
6101000
heap
page read and write
B76000
unkown
page execute and read and write
97C000
unkown
page write copy
1423000
heap
page read and write
523B000
heap
page read and write
5DB4000
heap
page read and write
EE0000
heap
page read and write
5E05000
heap
page read and write
2D3E000
stack
page read and write
602A000
heap
page read and write
1424000
heap
page read and write
DC3000
unkown
page execute and read and write
6131000
heap
page read and write
6430000
trusted library allocation
page read and write
E60000
heap
page read and write
6014000
heap
page read and write
710000
unkown
page write copy
5D85000
heap
page read and write
5FCA000
heap
page read and write
7E0000
unkown
page readonly
30AE000
stack
page read and write
BC0000
unkown
page read and write
142E000
heap
page read and write
5D18000
heap
page read and write
12C8000
heap
page read and write
1330000
heap
page read and write
D3C000
unkown
page execute and read and write
6F7000
unkown
page readonly
548E000
stack
page read and write
BC2000
unkown
page readonly
8E1000
unkown
page execute and read and write
6002000
heap
page read and write
6140000
heap
page read and write
70C000
unkown
page read and write
D8B000
unkown
page execute and read and write
EE3000
heap
page read and write
1180000
direct allocation
page read and write
97C000
unkown
page read and write
3059000
direct allocation
page read and write
93A000
unkown
page readonly
5DB1000
heap
page read and write
5E03000
heap
page read and write
5FDA000
heap
page read and write
B3B000
unkown
page execute and read and write
6026000
heap
page read and write
6139000
heap
page read and write
93B000
unkown
page execute and read and write
610D000
heap
page read and write
1427000
heap
page read and write
D7F000
unkown
page execute and read and write
613A000
heap
page read and write
5D40000
heap
page read and write
D7B000
unkown
page execute and read and write
571000
unkown
page execute read
8C9000
unkown
page execute and read and write
8D3000
unkown
page execute and read and write
6045000
heap
page read and write
6045000
heap
page read and write
4F13000
heap
page read and write
5D40000
heap
page read and write
5E71000
heap
page read and write
6100000
trusted library allocation
page read and write
1423000
heap
page read and write
142E000
heap
page read and write
13CE000
heap
page read and write
1170000
direct allocation
page read and write
14F6000
heap
page read and write
30D0000
remote allocation
page read and write
5D58000
heap
page read and write
6F2000
unkown
page write copy
5FB7000
heap
page read and write
142E000
heap
page read and write
159E000
stack
page read and write
5E05000
heap
page read and write
5D27000
heap
page read and write
6101000
heap
page read and write
6F2000
unkown
page write copy
610A000
heap
page read and write
6111000
heap
page read and write
A70000
unkown
page execute read
142E000
heap
page read and write
1170000
direct allocation
page read and write
ED2000
heap
page read and write
1367000
heap
page read and write
5E2A000
heap
page read and write
B76000
unkown
page execute and read and write
4FDD000
stack
page read and write
5A3E000
stack
page read and write
15B0000
direct allocation
page read and write
D46000
unkown
page execute and read and write
B4F000
unkown
page execute and read and write
E9A000
heap
page read and write
551E000
stack
page read and write
5D36000
heap
page read and write
5FE1000
heap
page read and write
5D51000
heap
page read and write
F99000
stack
page read and write
6CA000
unkown
page readonly
BB0000
unkown
page readonly
2B8D000
stack
page read and write
6140000
heap
page read and write
2D40000
direct allocation
page read and write
610D000
heap
page read and write
890000
unkown
page execute and read and write
6100000
trusted library allocation
page read and write
B08000
unkown
page execute and read and write
5D18000
heap
page read and write
5FF2000
heap
page read and write
5F7D000
heap
page read and write
1419000
heap
page read and write
2F20000
direct allocation
page read and write
B3F000
unkown
page execute and read and write
972000
unkown
page readonly
AF2000
unkown
page execute and read and write
6001000
heap
page read and write
612F000
heap
page read and write
1356000
direct allocation
page read and write
5141000
heap
page read and write
5D83000
heap
page read and write
5D4E000
heap
page read and write
139F000
heap
page read and write
1300000
direct allocation
page read and write
3170000
remote allocation
page read and write
6113000
heap
page read and write
B39000
unkown
page execute and read and write
12D4000
heap
page read and write
EEB000
heap
page read and write
F3B000
stack
page read and write
1359000
direct allocation
page read and write
5DC2000
heap
page read and write
5D2F000
heap
page read and write
5E0A000
heap
page read and write
5DAF000
heap
page read and write
145C000
heap
page read and write
6100000
heap
page read and write
2E4E000
stack
page read and write
1300000
direct allocation
page read and write
146C000
heap
page read and write
8C7000
unkown
page execute and read and write
5370000
remote allocation
page read and write
13A6000
heap
page read and write
D30000
unkown
page execute and read and write
898000
unkown
page execute and read and write
5D34000
heap
page read and write
5D31000
heap
page read and write
142D000
heap
page read and write
EE7000
heap
page read and write
6100000
trusted library allocation
page read and write
717000
unkown
page readonly
14F8000
heap
page read and write
600A000
heap
page read and write
6127000
heap
page read and write
880000
unkown
page execute and read and write
5FEB000
heap
page read and write
5370000
remote allocation
page read and write
E10000
heap
page read and write
BA2000
unkown
page write copy
602A000
heap
page read and write
5D1C000
heap
page read and write
60A0000
trusted library allocation
page read and write
5D8B000
heap
page read and write
5E05000
heap
page read and write
5FF6000
heap
page read and write
6FD000
unkown
page readonly
5FF6000
heap
page read and write
D34000
unkown
page execute and read and write
1471000
heap
page read and write
896000
unkown
page execute and read and write
8C9000
unkown
page execute and read and write
5D52000
heap
page read and write
610D000
heap
page read and write
5FB7000
heap
page read and write
E9B000
stack
page read and write
302D000
stack
page read and write
7E0000
unkown
page readonly
967000
unkown
page readonly
5DBC000
heap
page read and write
12B0000
heap
page read and write
B04000
unkown
page execute and read and write
5D27000
heap
page read and write
14F8000
heap
page read and write
6101000
heap
page read and write
6100000
trusted library allocation
page read and write
AFC000
unkown
page execute and read and write
5D1A000
heap
page read and write
E80000
direct allocation
page read and write
610A000
heap
page read and write
2E50000
remote allocation
page read and write
B45000
unkown
page execute and read and write
7E0000
unkown
page readonly
511E000
stack
page read and write
5E17000
heap
page read and write
960000
unkown
page readonly
6100000
trusted library allocation
page read and write
5FA1000
heap
page read and write
5D2A000
heap
page read and write
BAD000
unkown
page readonly
710000
unkown
page write copy
2FE0000
heap
page read and write
B51000
unkown
page execute and read and write
8D1000
unkown
page execute and read and write
2A40000
direct allocation
page read and write
5E24000
heap
page read and write
12DB000
heap
page read and write
88C000
unkown
page execute and read and write
5D36000
heap
page read and write
1384000
heap
page read and write
1300000
heap
page read and write
5D02000
heap
page read and write
5FDA000
heap
page read and write
898000
unkown
page execute and read and write
137B000
heap
page read and write
17AE000
stack
page read and write
8CB000
unkown
page execute and read and write
5D7A000
heap
page read and write
6951000
heap
page read and write
EE5000
heap
page read and write
2BA0000
heap
page read and write
3090000
heap
page read and write
5FF6000
heap
page read and write
7E1000
unkown
page execute read
6300000
trusted library allocation
page read and write
4C49000
heap
page read and write
12E8000
heap
page read and write
E00000
heap
page read and write
13C7000
heap
page read and write
6430000
trusted library allocation
page read and write
1391000
heap
page read and write
5D37000
heap
page read and write
702000
unkown
page readonly
B3D000
unkown
page execute and read and write
5F93000
heap
page read and write
5E17000
heap
page read and write
8D9000
unkown
page execute and read and write
888000
unkown
page execute and read and write
2A40000
direct allocation
page read and write
11A0000
direct allocation
page read and write
613A000
heap
page read and write
1292000
heap
page read and write
B3D000
unkown
page execute and read and write
12A8000
heap
page read and write
1360000
heap
page read and write
5D71000
heap
page read and write
6139000
heap
page read and write
B00000
unkown
page execute and read and write
5DE8000
heap
page read and write
B3F000
unkown
page execute and read and write
5D8B000
heap
page read and write
5E17000
heap
page read and write
6060000
trusted library allocation
page read and write
5E03000
heap
page read and write
B83000
unkown
page execute and read and write
5E06000
heap
page read and write
14EE000
heap
page read and write
2B30000
heap
page read and write
6CB000
unkown
page execute and read and write
5232000
heap
page read and write
D81000
unkown
page execute and read and write
167E000
stack
page read and write
519C000
heap
page read and write
F8D000
stack
page read and write
E90000
heap
page read and write
5D60000
heap
page read and write
5D49000
heap
page read and write
BA7000
unkown
page readonly
5FFB000
heap
page read and write
2AE0000
direct allocation
page read and write
12C0000
heap
page read and write
5FEB000
heap
page read and write
13B6000
heap
page read and write
98E000
unkown
page execute and read and write
2D40000
direct allocation
page read and write
5FEB000
heap
page read and write
59FF000
stack
page read and write
1486000
heap
page read and write
6300000
trusted library allocation
page read and write
5F6F000
stack
page read and write
6F7000
unkown
page readonly
5199000
heap
page read and write
5E1C000
heap
page read and write
2DB0000
heap
page read and write
5F93000
heap
page read and write
142E000
heap
page read and write
E86000
direct allocation
page read and write
5D29000
heap
page read and write
962000
unkown
page read and write
6120000
heap
page read and write
712000
unkown
page readonly
71E000
unkown
page execute and read and write
5E03000
heap
page read and write
5FDA000
heap
page read and write
5D6F000
heap
page read and write
6019000
heap
page read and write
5DB1000
heap
page read and write
14E2000
heap
page read and write
5DB1000
heap
page read and write
5D7A000
heap
page read and write
4C4F000
heap
page read and write
888000
unkown
page execute and read and write
8DF000
unkown
page execute and read and write
B39000
unkown
page execute and read and write
5FA1000
heap
page read and write
14F8000
heap
page read and write
6018000
heap
page read and write
30D0000
remote allocation
page read and write
1433000
heap
page read and write
5FEA000
heap
page read and write
6060000
trusted library allocation
page read and write
54DD000
stack
page read and write
5D5F000
heap
page read and write
5FD7000
heap
page read and write
613E000
heap
page read and write
5D18000
heap
page read and write
5E10000
heap
page read and write
6060000
trusted library allocation
page read and write
5FC1000
heap
page read and write
5E10000
heap
page read and write
1423000
heap
page read and write
5D34000
heap
page read and write
CE0000
unkown
page execute read
8D7000
unkown
page execute and read and write
5780000
remote allocation
page read and write
5E03000
heap
page read and write
1456000
heap
page read and write
6029000
heap
page read and write
5D97000
heap
page read and write
B49000
unkown
page execute and read and write
15D5000
heap
page read and write
892000
unkown
page execute and read and write
E65000
heap
page read and write
A70000
unkown
page execute read
980000
unkown
page write copy
6138000
heap
page read and write
896000
unkown
page execute and read and write
5D84000
heap
page read and write
3050000
direct allocation
page read and write
115E000
stack
page read and write
5E6E000
stack
page read and write
519C000
heap
page read and write
4C52000
heap
page read and write
5D70000
heap
page read and write
6400000
trusted library allocation
page read and write
2DC0000
heap
page read and write
6002000
heap
page read and write
13C3000
heap
page read and write
5E15000
heap
page read and write
146A000
heap
page read and write
6CA000
unkown
page readonly
6300000
trusted library allocation
page read and write
5FD9000
heap
page read and write
6011000
heap
page read and write
5D4B000
heap
page read and write
5DB6000
heap
page read and write
5FDD000
heap
page read and write
5D36000
heap
page read and write
13A8000
heap
page read and write
6120000
heap
page read and write
1350000
direct allocation
page read and write
141F000
heap
page read and write
6CB000
unkown
page execute and read and write
5D18000
heap
page read and write
D75000
unkown
page execute and read and write
BBC000
unkown
page read and write
6007000
heap
page read and write
71A000
unkown
page readonly
30D0000
remote allocation
page read and write
5F84000
heap
page read and write
DB6000
unkown
page execute and read and write
5E2A000
heap
page read and write
AFE000
unkown
page execute and read and write
982000
unkown
page readonly
142A000
heap
page read and write
5E35000
heap
page read and write
D3A000
unkown
page execute and read and write
B51000
unkown
page execute and read and write
5D96000
heap
page read and write
906000
unkown
page execute and read and write
570000
unkown
page readonly
8C7000
unkown
page execute and read and write
5D01000
heap
page read and write
142E000
heap
page read and write
967000
unkown
page readonly
F7C000
stack
page read and write
5D4B000
heap
page read and write
5D1D000
heap
page read and write
B02000
unkown
page execute and read and write
710000
unkown
page read and write
5D99000
heap
page read and write
F0B000
heap
page read and write
D83000
unkown
page execute and read and write
5370000
remote allocation
page read and write
155E000
stack
page read and write
595F000
stack
page read and write
142E000
heap
page read and write
D79000
unkown
page execute and read and write
5D91000
heap
page read and write
5D92000
heap
page read and write
1306000
direct allocation
page read and write
53EE000
stack
page read and write
E80000
direct allocation
page read and write
6120000
heap
page read and write
5D44000
heap
page read and write
603D000
heap
page read and write
5F82000
heap
page read and write
5D45000
heap
page read and write
987000
unkown
page readonly
5D2A000
heap
page read and write
570000
unkown
page readonly
710000
unkown
page read and write
6111000
heap
page read and write
5E05000
heap
page read and write
8D5000
unkown
page execute and read and write
1395000
heap
page read and write
143F000
heap
page read and write
5D34000
heap
page read and write
140A000
heap
page read and write
5F9E000
heap
page read and write
5D18000
heap
page read and write
5D5F000
heap
page read and write
B35000
unkown
page execute and read and write
A20000
unkown
page readonly
145B000
heap
page read and write
5193000
heap
page read and write
6138000
heap
page read and write
88A000
unkown
page execute and read and write
8D3000
unkown
page execute and read and write
5BCE000
stack
page read and write
F15000
heap
page read and write
B83000
unkown
page execute and read and write
611F000
heap
page read and write
600F000
heap
page read and write
5F93000
heap
page read and write
71A000
unkown
page readonly
5D37000
heap
page read and write
D42000
unkown
page execute and read and write
5D7F000
heap
page read and write
5D2A000
heap
page read and write
4BB3000
heap
page read and write
5D24000
heap
page read and write
5E03000
heap
page read and write
5E05000
heap
page read and write
5FCA000
heap
page read and write
15D0000
heap
page read and write
D77000
unkown
page execute and read and write
5D1C000
heap
page read and write
7E1000
unkown
page execute read
6140000
heap
page read and write
5D5E000
heap
page read and write
6006000
heap
page read and write
5FC9000
heap
page read and write
1300000
direct allocation
page read and write
14FA000
heap
page read and write
1350000
direct allocation
page read and write
6331000
heap
page read and write
EFB000
heap
page read and write
6060000
trusted library allocation
page read and write
6120000
heap
page read and write
6120000
heap
page read and write
5E15000
heap
page read and write
570000
unkown
page readonly
5FEF000
heap
page read and write
894000
unkown
page execute and read and write
1307000
heap
page read and write
5D1A000
heap
page read and write
AF6000
unkown
page execute and read and write
570000
unkown
page readonly
700000
unkown
page readonly
5FDA000
heap
page read and write
6008000
heap
page read and write
118D000
stack
page read and write
2A40000
direct allocation
page read and write
5D52000
heap
page read and write
712000
unkown
page readonly
882000
unkown
page execute and read and write
5E10000
heap
page read and write
B47000
unkown
page execute and read and write
5D59000
heap
page read and write
700000
unkown
page readonly
97C000
unkown
page read and write
6019000
heap
page read and write
5D98000
heap
page read and write
5D27000
heap
page read and write
6029000
heap
page read and write
14F9000
heap
page read and write
5D70000
heap
page read and write
5FF5000
heap
page read and write
6113000
heap
page read and write
56EF000
stack
page read and write
717000
unkown
page readonly
560D000
stack
page read and write
906000
unkown
page execute and read and write
6140000
heap
page read and write
972000
unkown
page readonly
F20000
unkown
page execute read
6011000
heap
page read and write
2D40000
direct allocation
page read and write
5E11000
heap
page read and write
AFA000
unkown
page execute and read and write
1170000
direct allocation
page read and write
5D18000
heap
page read and write
AF0000
unkown
page execute and read and write
1199000
stack
page read and write
1300000
direct allocation
page read and write
5D37000
heap
page read and write
6025000
heap
page read and write
6106000
heap
page read and write
588E000
stack
page read and write
E89000
direct allocation
page read and write
B43000
unkown
page execute and read and write
6019000
heap
page read and write
5D38000
heap
page read and write
6101000
heap
page read and write
BA0000
unkown
page readonly
6060000
trusted library allocation
page read and write
5D2A000
heap
page read and write
5E06000
heap
page read and write
585E000
stack
page read and write
574E000
stack
page read and write
6F7000
unkown
page readonly
D36000
unkown
page execute and read and write
5D00000
heap
page read and write
967000
unkown
page readonly
6300000
trusted library allocation
page read and write
5FC1000
heap
page read and write
5FDA000
heap
page read and write
5D29000
heap
page read and write
5E1E000
heap
page read and write
5FF5000
heap
page read and write
962000
unkown
page write copy
6139000
heap
page read and write
B4D000
unkown
page execute and read and write
155E000
stack
page read and write
8CB000
unkown
page execute and read and write
6010000
heap
page read and write
5FEF000
heap
page read and write
1451000
heap
page read and write
E7B000
stack
page read and write
1441000
heap
page read and write
5DA5000
heap
page read and write
88C000
unkown
page execute and read and write
5DB9000
heap
page read and write
2B2E000
stack
page read and write
5E70000
heap
page read and write
149A000
heap
page read and write
5D7F000
heap
page read and write
5E24000
heap
page read and write
D32000
unkown
page execute and read and write
5D40000
heap
page read and write
884000
unkown
page execute and read and write
BC7000
unkown
page readonly
B00000
unkown
page execute and read and write
5E1E000
heap
page read and write
88E000
unkown
page execute and read and write
5D6E000
stack
page read and write
611F000
heap
page read and write
1387000
heap
page read and write
B02000
unkown
page execute and read and write
1350000
direct allocation
page read and write
616F000
heap
page read and write
B04000
unkown
page execute and read and write
6F7000
unkown
page readonly
8C5000
unkown
page execute and read and write
5D35000
heap
page read and write
5E04000
heap
page read and write
5E0A000
heap
page read and write
D8F000
unkown
page execute and read and write
5D46000
heap
page read and write
6138000
heap
page read and write
5E24000
heap
page read and write
6300000
trusted library allocation
page read and write
2EC0000
direct allocation
page read and write
1090000
heap
page read and write
5E35000
heap
page read and write
6139000
heap
page read and write
12ED000
stack
page read and write
5FEB000
heap
page read and write
BC7000
unkown
page readonly
5D4E000
heap
page read and write
30A0000
direct allocation
page read and write
96D000
unkown
page readonly
5FD3000
heap
page read and write
882000
unkown
page execute and read and write
561F000
stack
page read and write
6111000
heap
page read and write
6132000
heap
page read and write
5CEF000
heap
page read and write
5CED000
heap
page read and write
5FAD000
heap
page read and write
5FDE000
heap
page read and write
5D40000
heap
page read and write
147A000
heap
page read and write
A21000
unkown
page execute read
2D9E000
stack
page read and write
145D000
heap
page read and write
13A7000
heap
page read and write
142D000
heap
page read and write
616F000
heap
page read and write
FC0000
heap
page read and write
13B3000
heap
page read and write
12BD000
heap
page read and write
1310000
direct allocation
page read and write
55CE000
stack
page read and write
6122000
heap
page read and write
962000
unkown
page read and write
1500000
heap
page read and write
3170000
remote allocation
page read and write
5FCA000
heap
page read and write
142E000
heap
page read and write
F75000
heap
page read and write
5FC1000
heap
page read and write
5E03000
heap
page read and write
50DD000
stack
page read and write
6100000
trusted library allocation
page read and write
7E1000
unkown
page execute read
EDC000
heap
page read and write
CE0000
unkown
page execute read
6138000
heap
page read and write
5FD7000
heap
page read and write
5D88000
heap
page read and write
5FA1000
heap
page read and write
5D34000
heap
page read and write
50FD000
heap
page read and write
3180000
heap
page read and write
5FEF000
heap
page read and write
142E000
heap
page read and write
1419000
heap
page read and write
6006000
heap
page read and write
5D2A000
heap
page read and write
6100000
trusted library allocation
page read and write
6140000
heap
page read and write
5F71000
heap
page read and write
AFA000
unkown
page execute and read and write
30E0000
heap
page read and write
5D2A000
heap
page read and write
5D0A000
heap
page read and write
13FA000
heap
page read and write
A70000
unkown
page execute read
8DB000
unkown
page execute and read and write
F20000
unkown
page execute read
717000
unkown
page readonly
5D4C000
heap
page read and write
1423000
heap
page read and write
5D2A000
heap
page read and write
306D000
stack
page read and write
5D18000
heap
page read and write
5E44000
heap
page read and write
5D45000
heap
page read and write
572E000
stack
page read and write
6125000
heap
page read and write
AF0000
unkown
page execute and read and write
5D2A000
heap
page read and write
AF6000
unkown
page execute and read and write
5FDA000
heap
page read and write
6950000
heap
page read and write
B4B000
unkown
page execute and read and write
5E0A000
heap
page read and write
6120000
heap
page read and write
5E1E000
heap
page read and write
980000
unkown
page read and write
6101000
heap
page read and write
6039000
heap
page read and write
BA7000
unkown
page readonly
6300000
trusted library allocation
page read and write
1427000
heap
page read and write
6CA000
unkown
page readonly
570D000
stack
page read and write
8CF000
unkown
page execute and read and write
5FFB000
heap
page read and write
8CF000
unkown
page execute and read and write
5D45000
heap
page read and write
177E000
stack
page read and write
5FEB000
heap
page read and write
5FD9000
heap
page read and write
BCA000
unkown
page readonly
6330000
heap
page read and write
6F2000
unkown
page read and write
3060000
direct allocation
page read and write
6138000
heap
page read and write
FB0000
heap
page read and write
5147000
heap
page read and write
5FB7000
heap
page read and write
5D40000
heap
page read and write
5E34000
heap
page read and write
5DBB000
heap
page read and write
6137000
heap
page read and write
5D64000
heap
page read and write
5FFC000
heap
page read and write
93A000
unkown
page readonly
5C2F000
stack
page read and write
5D28000
heap
page read and write
5FEF000
heap
page read and write
535F000
stack
page read and write
5F8F000
heap
page read and write
58FE000
stack
page read and write
133A000
heap
page read and write
611F000
heap
page read and write
582F000
stack
page read and write
5FEB000
heap
page read and write
8DB000
unkown
page execute and read and write
5D7B000
heap
page read and write
6060000
trusted library allocation
page read and write
F70000
heap
page read and write
5DBB000
heap
page read and write
D8D000
unkown
page execute and read and write
717000
unkown
page readonly
6331000
heap
page read and write
93A000
unkown
page readonly
1497000
heap
page read and write
1472000
heap
page read and write
6111000
heap
page read and write
1267000
heap
page read and write
D4A000
unkown
page execute and read and write
14F6000
heap
page read and write
6070000
trusted library allocation
page read and write
13AF000
heap
page read and write
6039000
heap
page read and write
6130000
heap
page read and write
6F0000
unkown
page readonly
BC0000
unkown
page write copy
6060000
trusted library allocation
page read and write
5FEB000
heap
page read and write
571E000
stack
page read and write
12F9000
stack
page read and write
5D1C000
heap
page read and write
610D000
heap
page read and write
6106000
heap
page read and write
3050000
direct allocation
page read and write
8D9000
unkown
page execute and read and write
14F8000
heap
page read and write
1305000
heap
page read and write
5E05000
heap
page read and write
1426000
heap
page read and write
1300000
direct allocation
page read and write
6113000
heap
page read and write
890000
unkown
page execute and read and write
598F000
stack
page read and write
EC5000
heap
page read and write
1416000
heap
page read and write
5D1D000
heap
page read and write
B41000
unkown
page execute and read and write
581F000
stack
page read and write
12E0000
heap
page read and write
B0A000
unkown
page execute and read and write
6113000
heap
page read and write
5E1C000
heap
page read and write
5D36000
heap
page read and write
96D000
unkown
page readonly
5E2F000
stack
page read and write
1180000
direct allocation
page read and write
6011000
heap
page read and write
B41000
unkown
page execute and read and write
B43000
unkown
page execute and read and write
134E000
stack
page read and write
5F7A000
heap
page read and write
71A000
unkown
page readonly
6430000
trusted library allocation
page read and write
5FCF000
heap
page read and write
6310000
trusted library allocation
page read and write
8D7000
unkown
page execute and read and write
6100000
trusted library allocation
page read and write
5E03000
heap
page read and write
2EBE000
stack
page read and write
5D15000
heap
page read and write
5E1E000
heap
page read and write
B08000
unkown
page execute and read and write
6101000
heap
page read and write
967000
unkown
page readonly
5E25000
heap
page read and write
880000
unkown
page execute and read and write
5D41000
heap
page read and write
1350000
direct allocation
page read and write
8D1000
unkown
page execute and read and write
E80000
direct allocation
page read and write
88A000
unkown
page execute and read and write
89A000
unkown
page execute and read and write
712000
unkown
page readonly
B0A000
unkown
page execute and read and write
1423000
heap
page read and write
5D72000
heap
page read and write
5D84000
heap
page read and write
5FEA000
heap
page read and write
571000
unkown
page execute read
6100000
trusted library allocation
page read and write
3060000
direct allocation
page read and write
535E000
stack
page read and write
5FAD000
heap
page read and write
5D36000
heap
page read and write
612F000
heap
page read and write
CE0000
unkown
page execute read
5D57000
heap
page read and write
BC2000
unkown
page readonly
70C000
unkown
page write copy
3060000
direct allocation
page read and write
913000
unkown
page execute and read and write
6430000
trusted library allocation
page read and write
5E05000
heap
page read and write
5E2A000
heap
page read and write
93B000
unkown
page execute and read and write
14FA000
heap
page read and write
5D7A000
heap
page read and write
960000
unkown
page readonly
119E000
stack
page read and write
980000
unkown
page write copy
1309000
direct allocation
page read and write
102E000
stack
page read and write
5D4C000
heap
page read and write
6006000
heap
page read and write
2A40000
direct allocation
page read and write
AF4000
unkown
page execute and read and write
886000
unkown
page execute and read and write
5F9C000
heap
page read and write
6025000
heap
page read and write
5E01000
heap
page read and write
5D50000
heap
page read and write
5D23000
heap
page read and write
2D00000
heap
page read and write
5D50000
heap
page read and write
50AB000
heap
page read and write
6300000
trusted library allocation
page read and write
1170000
direct allocation
page read and write
6026000
heap
page read and write
2F20000
direct allocation
page read and write
5D5D000
heap
page read and write
88E000
unkown
page execute and read and write
5E05000
heap
page read and write
8CD000
unkown
page execute and read and write
EFD000
heap
page read and write
1310000
direct allocation
page read and write
5D34000
heap
page read and write
97C000
unkown
page write copy
970000
unkown
page readonly
D3E000
unkown
page execute and read and write
2AD0000
heap
page read and write
4F9D000
stack
page read and write
5D46000
heap
page read and write
5D60000
heap
page read and write
970000
unkown
page readonly
129F000
stack
page read and write
5D44000
heap
page read and write
2D40000
direct allocation
page read and write
6300000
trusted library allocation
page read and write
98A000
unkown
page readonly
5DC2000
heap
page read and write
D44000
unkown
page execute and read and write
6101000
heap
page read and write
1442000
heap
page read and write
5D46000
heap
page read and write
5D7F000
heap
page read and write
13A0000
heap
page read and write
5E03000
heap
page read and write
145F000
heap
page read and write
1170000
direct allocation
page read and write
8C5000
unkown
page execute and read and write
71E000
unkown
page execute and read and write
5D40000
heap
page read and write
142E000
heap
page read and write
E9E000
heap
page read and write
5E71000
heap
page read and write
3080000
direct allocation
page read and write
3170000
remote allocation
page read and write
D85000
unkown
page execute and read and write
3050000
direct allocation
page read and write
1350000
direct allocation
page read and write
13DA000
heap
page read and write
54EC000
stack
page read and write
6008000
heap
page read and write
5FEF000
heap
page read and write
3056000
direct allocation
page read and write
12D0000
heap
page read and write
5FDA000
heap
page read and write
611E000
heap
page read and write
8DD000
unkown
page execute and read and write
555F000
stack
page read and write
5D37000
heap
page read and write
1176000
direct allocation
page read and write
13E8000
heap
page read and write
12F7000
heap
page read and write
5E71000
heap
page read and write
5D59000
heap
page read and write
D7D000
unkown
page execute and read and write
5D24000
heap
page read and write
5FFC000
heap
page read and write
1095000
heap
page read and write
6111000
heap
page read and write
521F000
stack
page read and write
14F6000
heap
page read and write
5238000
heap
page read and write
127C000
heap
page read and write
145D000
heap
page read and write
5FEB000
heap
page read and write
1307000
heap
page read and write
5D2E000
stack
page read and write
51C000
stack
page read and write
6111000
heap
page read and write
525D000
stack
page read and write
B06000
unkown
page execute and read and write
3090000
heap
page read and write
610D000
heap
page read and write
AFC000
unkown
page execute and read and write
5FC9000
heap
page read and write
8CD000
unkown
page execute and read and write
5D7A000
heap
page read and write
98E000
unkown
page execute and read and write
13BF000
heap
page read and write
1300000
direct allocation
page read and write
2E50000
remote allocation
page read and write
7E0000
unkown
page readonly
5DB1000
heap
page read and write
5E0A000
heap
page read and write
5FF6000
heap
page read and write
6140000
heap
page read and write
702000
unkown
page readonly
AF8000
unkown
page execute and read and write
B4F000
unkown
page execute and read and write
BCE000
unkown
page execute and read and write
15B0000
heap
page read and write
93A000
unkown
page readonly
F23000
heap
page read and write
13C1000
heap
page read and write
5E10000
heap
page read and write
6060000
trusted library allocation
page read and write
142E000
heap
page read and write
584F000
stack
page read and write
5DBC000
heap
page read and write
5F7A000
heap
page read and write
D89000
unkown
page execute and read and write
70C000
unkown
page read and write
5FDA000
heap
page read and write
314E000
stack
page read and write
107D000
stack
page read and write
142E000
heap
page read and write
6025000
heap
page read and write
1180000
direct allocation
page read and write
603D000
heap
page read and write
5DB5000
heap
page read and write
18AE000
stack
page read and write
5D64000
heap
page read and write
1350000
direct allocation
page read and write
E80000
direct allocation
page read and write
5FDB000
heap
page read and write
14F1000
heap
page read and write
14F7000
heap
page read and write
539A000
heap
page read and write
5D0B000
heap
page read and write
F77000
heap
page read and write
1170000
direct allocation
page read and write
CE0000
unkown
page execute read
5CEE000
heap
page read and write
2D5E000
stack
page read and write
E5E000
stack
page read and write
6300000
trusted library allocation
page read and write
5D7B000
heap
page read and write
5D1E000
heap
page read and write
5D1C000
heap
page read and write
1371000
heap
page read and write
2E60000
heap
page read and write
5DA6000
heap
page read and write
545F000
stack
page read and write
7E1000
unkown
page execute read
5FA3000
heap
page read and write
5DAF000
heap
page read and write
B4D000
unkown
page execute and read and write
5E24000
heap
page read and write
4F0A000
heap
page read and write
5D57000
heap
page read and write
5E11000
heap
page read and write
12FD000
heap
page read and write
603E000
heap
page read and write
5FCA000
heap
page read and write
F03000
heap
page read and write
5D56000
heap
page read and write
5D8B000
heap
page read and write
5FCA000
heap
page read and write
5FD4000
heap
page read and write
611F000
heap
page read and write
A21000
unkown
page execute read
565E000
stack
page read and write
2D40000
direct allocation
page read and write
3050000
direct allocation
page read and write
5F9C000
heap
page read and write
982000
unkown
page readonly
525E000
stack
page read and write
6300000
trusted library allocation
page read and write
1423000
heap
page read and write
144B000
heap
page read and write
2F2E000
stack
page read and write
5D21000
heap
page read and write
136B000
heap
page read and write
5D15000
heap
page read and write
5D18000
heap
page read and write
54CD000
stack
page read and write
1423000
heap
page read and write
163E000
stack
page read and write
E80000
direct allocation
page read and write
6140000
heap
page read and write
5D59000
heap
page read and write
B7A000
unkown
page readonly
5D82000
heap
page read and write
6430000
trusted library allocation
page read and write
5D1D000
heap
page read and write
12A6000
heap
page read and write
8D5000
unkown
page execute and read and write
5E05000
heap
page read and write
6CA000
unkown
page readonly
6951000
heap
page read and write
6100000
trusted library allocation
page read and write
A20000
unkown
page readonly
600D000
heap
page read and write
D40000
unkown
page execute and read and write
5FCA000
heap
page read and write
5FC9000
heap
page read and write
5FEF000
heap
page read and write
5FAC000
heap
page read and write
B3B000
unkown
page execute and read and write
5D91000
heap
page read and write
5D4F000
heap
page read and write
144B000
heap
page read and write
982000
unkown
page readonly
12A0000
heap
page read and write
5D28000
heap
page read and write
5395000
heap
page read and write
884000
unkown
page execute and read and write
B35000
unkown
page execute and read and write
4E74000
heap
page read and write
539D000
stack
page read and write
2D00000
direct allocation
page read and write
144F000
heap
page read and write
There are 1253 hidden memdumps, click here to show them.