IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1YMX7UxRgh318S1TWXmjgUx.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\HCwgibNvhQ3gDx_DWG1aNau.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_c7733ed6211f554fcfc5ee43638ebe35de626d7b_d1a40e08_31f9afae-1cd9-4f56-a64f-1215315a588c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_58fad3732ffecccafd3e19178e69f9a63423f5_394a0634_de233a83-76a7-4005-9f01-53431517d840\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE18D.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 18:36:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE298.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2C8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0C0.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 18:36:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF18C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1AC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\3INegG9g_MMlWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\97CwebNjFmiiHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\9xtv4_r0ULbpHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\A0nn51lsZJRNHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\MQHnFYhPldB3Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\NwbTBYLMclw6Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\OhQNgUJ0X5NgLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\XQcivVrU5A5HWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\Y9g_BlDmKPtZWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\gUON0R4KuJ74Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\m3tOv5lvb9V0History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\sdYAsTf3586cLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\siP8GPpHPPEwCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\vfVkgJBrrUDWWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span68JizlX_sufx\zvXv7gzjmXYkLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\6UYtHiDj5kF4Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\7PzLqHtz21igLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\ATGc9MJX9PreWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\FnKWlcBrreY1Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\NMxkTlMy11FaLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\PVnzSVZUtU5KHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\S0Pov5vdwAn3Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\Tuv7Vpshq2JqHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\_sFxHwGCbLcsCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\aRmFUB4TfJpPWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\aVbhqrHeZ9kZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\nKeiourMZbKyHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\tQzi7j4yFcLSWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\uRAVepYZlvuOCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanFqsK1kll1Gc3\zeSJ9T1kwjwWWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\trixy68JizlX_sufx\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy68JizlX_sufx\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy68JizlX_sufx\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyFqsK1kll1Gc3\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyFqsK1kll1Gc3\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyFqsK1kll1Gc3\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5688 -s 1948
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 1152
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.167/cost/go.exe(i
unknown
malicious
http://193.233.132.167/cost/go.exe
unknown
malicious
http://193.233.132.167/cost/lenin.exe
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/widget/demo/185.152.66.230
34.117.186.192
https://db-ip.com:443/demo/home.php?s=185.152.66.230P
unknown
https://duckduckgo.com/ac/?q=
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
http://147.45.47.102:57893/hera/amadka.exe42359
unknown
https://ipinfo.io/6K
unknown
https://db-ip.com/
unknown
http://147.45.47.102:57893/hera/amadka.exe&i
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://t.me/risepro
unknown
https://db-ip.com:443/demo/home.php?s=185.152.66.230
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/s
unknown
https://ipinfo.io:443/widget/demo/185.152.66.230Qd
unknown
https://t.me/risepro_botisepro_bot
unknown
http://147.45.47.102:57893/hera/amadka.exeop
unknown
https://t.me/risepro_bot7
unknown
https://ipinfo.io/m
unknown
https://ipinfo.io/widget/demo/185.152.66.230q
unknown
https://t.me/RiseProSUPPORT.tPVx
unknown
http://193.233.132.167/cost/lenin.exeegent
unknown
https://db-ip.com:443/demo/home.php?s=185.152.66.230.datapacket.com
unknown
https://t.me/risepro_bot6.230
unknown
https://t.me/RiseProSUPPORT3
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/O
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230
104.26.5.15
http://193.233.132.167/cost/go.exedka.exe
unknown
http://193.233.132.167/cost/go.exeerver
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://t.me/risepro_botist
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230i
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
unknown
https://ipinfo.io/1
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230Xl
unknown
https://ipinfo.io:443/widget/demo/185.152.66.230
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://t.me/risepro_botsA
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/risepro_botlatere_(
unknown
http://193.233.132.167/cost/lenin.exeerH_
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/jM
unknown
There are 47 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{8c34f919-0ff5-8218-9d1f-529aa7f4d18e}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5D90000
heap
page read and write
malicious
5DC4000
heap
page read and write
malicious
59B0000
heap
page read and write
malicious
52BE000
stack
page read and write
5864000
heap
page read and write
5C14000
heap
page read and write
5DD2000
heap
page read and write
F20000
heap
page read and write
5E37000
heap
page read and write
5E9C000
heap
page read and write
19B8000
heap
page read and write
7A1000
unkown
page execute read
1010000
heap
page read and write
5D40000
trusted library allocation
page read and write
5A16000
heap
page read and write
F8D000
unkown
page readonly
56BD000
heap
page read and write
16E0000
direct allocation
page read and write
1A32000
heap
page read and write
5E11000
heap
page read and write
5DD2000
heap
page read and write
5DE0000
heap
page read and write
FAA000
unkown
page readonly
5DB2000
heap
page read and write
5E42000
heap
page read and write
9F0000
direct allocation
page read and write
5DEE000
heap
page read and write
1102000
heap
page read and write
1760000
heap
page read and write
6121000
heap
page read and write
1185000
heap
page read and write
5DC9000
heap
page read and write
5E9D000
heap
page read and write
5DEE000
heap
page read and write
5DC4000
heap
page read and write
61CE000
heap
page read and write
5E43000
heap
page read and write
5A33000
heap
page read and write
53C0000
remote allocation
page read and write
3EA000
unkown
page readonly
517E000
stack
page read and write
F92000
unkown
page readonly
5E02000
heap
page read and write
9F0000
direct allocation
page read and write
FF0000
direct allocation
page read and write
5A16000
heap
page read and write
241000
unkown
page execute read
10CB000
heap
page read and write
10F4000
heap
page read and write
5DE0000
heap
page read and write
F67000
heap
page read and write
117A000
heap
page read and write
2B20000
direct allocation
page read and write
5A43000
heap
page read and write
59C0000
heap
page read and write
9F6000
direct allocation
page read and write
FAA000
unkown
page readonly
3E0000
unkown
page write copy
5AB0000
heap
page read and write
1870000
heap
page read and write
FA0000
direct allocation
page read and write
5DD3000
heap
page read and write
5A34000
heap
page read and write
571E000
stack
page read and write
5A2C000
heap
page read and write
9F0000
direct allocation
page read and write
5DD3000
heap
page read and write
3C7000
unkown
page readonly
5D91000
heap
page read and write
5DEC000
heap
page read and write
10DB000
heap
page read and write
5BB0000
trusted library allocation
page read and write
F9C000
unkown
page write copy
5E0E000
heap
page read and write
56C0000
heap
page read and write
169E000
stack
page read and write
5DCA000
heap
page read and write
F67000
heap
page read and write
10B5000
heap
page read and write
5C05000
heap
page read and write
6121000
heap
page read and write
3E7000
unkown
page readonly
5D94000
heap
page read and write
5A05000
heap
page read and write
5DD2000
heap
page read and write
5DEC000
heap
page read and write
5EE3000
heap
page read and write
59B1000
heap
page read and write
2CCD000
stack
page read and write
5F49000
heap
page read and write
5DF2000
heap
page read and write
5921000
heap
page read and write
612F000
heap
page read and write
AFD000
unkown
page execute and read and write
19B0000
heap
page read and write
5DE0000
heap
page read and write
E01000
unkown
page execute read
5F26000
heap
page read and write
1423000
heap
page read and write
5E9B000
heap
page read and write
5DB2000
heap
page read and write
612F000
heap
page read and write
514E000
stack
page read and write
6121000
heap
page read and write
5ABA000
heap
page read and write
930000
unkown
page readonly
5DF5000
heap
page read and write
5E9C000
heap
page read and write
1165000
unkown
page execute and read and write
6187000
heap
page read and write
61D3000
heap
page read and write
350F000
stack
page read and write
5AF000
unkown
page execute and read and write
1186000
heap
page read and write
5DD2000
heap
page read and write
59FC000
heap
page read and write
5DF3000
heap
page read and write
FEE000
stack
page read and write
5DCA000
heap
page read and write
5D40000
trusted library allocation
page read and write
588B000
heap
page read and write
109D000
heap
page read and write
DF0000
direct allocation
page read and write
13DB000
heap
page read and write
92D000
unkown
page readonly
5A05000
heap
page read and write
6141000
heap
page read and write
59FB000
heap
page read and write
15D0000
direct allocation
page read and write
93C000
unkown
page read and write
5A18000
heap
page read and write
50BE000
heap
page read and write
5DEE000
heap
page read and write
59F9000
heap
page read and write
5DB2000
heap
page read and write
612C000
heap
page read and write
2CF0000
heap
page read and write
5A65000
heap
page read and write
1000000
direct allocation
page read and write
1300000
unkown
page execute read
115B000
unkown
page execute and read and write
55DE000
stack
page read and write
B41000
unkown
page execute and read and write
5AD000
unkown
page execute and read and write
5ABA000
heap
page read and write
11A1000
unkown
page execute and read and write
3D0000
unkown
page readonly
5BB0000
trusted library allocation
page read and write
2E70000
direct allocation
page read and write
5A3000
unkown
page execute and read and write
5E17000
heap
page read and write
6120000
trusted library allocation
page read and write
5E1C000
heap
page read and write
FA0000
unkown
page read and write
5ABA000
heap
page read and write
5DF8000
heap
page read and write
612D000
heap
page read and write
5A43000
heap
page read and write
1194000
unkown
page execute and read and write
5E49000
heap
page read and write
2E80000
direct allocation
page read and write
5EE3000
heap
page read and write
59CD000
heap
page read and write
5A2F000
heap
page read and write
4F0D000
stack
page read and write
9F0000
direct allocation
page read and write
5DEE000
heap
page read and write
5A7F000
heap
page read and write
5D4000
unkown
page execute and read and write
F67000
heap
page read and write
5E08000
heap
page read and write
10E1000
heap
page read and write
F67000
heap
page read and write
5DE0000
heap
page read and write
5AB9000
heap
page read and write
5BB0000
trusted library allocation
page read and write
18D6000
heap
page read and write
3C0000
unkown
page readonly
5D99000
heap
page read and write
50C4000
heap
page read and write
39B000
unkown
page execute and read and write
585E000
stack
page read and write
5A05000
heap
page read and write
B0F000
unkown
page execute and read and write
5DD3000
heap
page read and write
600E000
stack
page read and write
5A08000
heap
page read and write
5A0D000
heap
page read and write
57A0000
remote allocation
page read and write
2B1F000
stack
page read and write
59CD000
heap
page read and write
5E11000
heap
page read and write
F67000
heap
page read and write
5DEC000
heap
page read and write
5E01000
heap
page read and write
599E000
stack
page read and write
1997000
heap
page read and write
5DE0000
heap
page read and write
612D000
heap
page read and write
5AB4000
heap
page read and write
E00000
unkown
page readonly
3E2000
unkown
page readonly
5DC4000
heap
page read and write
5DCC000
heap
page read and write
5DEC000
heap
page read and write
189E000
heap
page read and write
5E17000
heap
page read and write
F8D000
unkown
page readonly
5D94000
heap
page read and write
61A5000
heap
page read and write
19B0000
remote allocation
page read and write
4D0E000
heap
page read and write
5A9000
unkown
page execute and read and write
5DD2000
heap
page read and write
1A32000
heap
page read and write
6202000
heap
page read and write
5A36000
heap
page read and write
5A18000
heap
page read and write
5E49000
heap
page read and write
2F9E000
stack
page read and write
1167000
unkown
page execute and read and write
116D000
unkown
page execute and read and write
2E70000
direct allocation
page read and write
FA2000
unkown
page readonly
1184000
heap
page read and write
5E36000
heap
page read and write
5C20000
heap
page read and write
1087000
heap
page read and write
10C6000
heap
page read and write
561E000
stack
page read and write
115D000
unkown
page execute and read and write
BD9000
stack
page read and write
5A2F000
heap
page read and write
5BB0000
trusted library allocation
page read and write
5DFC000
heap
page read and write
5852000
heap
page read and write
5E11000
heap
page read and write
1186000
heap
page read and write
15D0000
direct allocation
page read and write
10D5000
heap
page read and write
3CD000
unkown
page readonly
5DEC000
heap
page read and write
32F0000
direct allocation
page read and write
5E2F000
heap
page read and write
BE0000
heap
page read and write
5A06000
heap
page read and write
6121000
heap
page read and write
6121000
heap
page read and write
5BB0000
trusted library allocation
page read and write
5BB0000
heap
page read and write
D80000
heap
page read and write
94A000
unkown
page readonly
6142000
heap
page read and write
5DE0000
heap
page read and write
F67000
heap
page read and write
16E0000
direct allocation
page read and write
6121000
heap
page read and write
571D000
stack
page read and write
F67000
heap
page read and write
E50000
heap
page read and write
5DE0000
heap
page read and write
10C7000
heap
page read and write
5DD2000
heap
page read and write
DF0000
direct allocation
page read and write
6154000
heap
page read and write
575D000
stack
page read and write
5DD3000
heap
page read and write
10E8000
heap
page read and write
13F2000
heap
page read and write
5DD4000
heap
page read and write
5BDF000
stack
page read and write
115F000
unkown
page execute and read and write
5F34000
heap
page read and write
5E37000
heap
page read and write
59F000
unkown
page execute and read and write
5DFF000
heap
page read and write
5DF8000
heap
page read and write
1155000
heap
page read and write
6120000
trusted library allocation
page read and write
5E6E000
heap
page read and write
5D40000
trusted library allocation
page read and write
5A05000
heap
page read and write
5DE0000
heap
page read and write
1186000
heap
page read and write
5DD2000
heap
page read and write
5F8E000
heap
page read and write
CA0000
unkown
page execute read
1159000
unkown
page execute and read and write
587B000
heap
page read and write
5DFC000
heap
page read and write
5A23000
heap
page read and write
6154000
heap
page read and write
5393000
heap
page read and write
5A0C000
heap
page read and write
5A41000
heap
page read and write
198F000
heap
page read and write
FAE000
stack
page read and write
117C000
heap
page read and write
582B000
heap
page read and write
5AB0000
trusted library allocation
page read and write
F82000
unkown
page read and write
5E1000
unkown
page execute and read and write
3C7000
unkown
page readonly
5D40000
trusted library allocation
page read and write
5DC4000
heap
page read and write
19E3000
heap
page read and write
1163000
unkown
page execute and read and write
5C02000
heap
page read and write
3C2000
unkown
page read and write
5860000
heap
page read and write
5DEC000
heap
page read and write
16E0000
direct allocation
page read and write
5E68000
heap
page read and write
116B000
unkown
page execute and read and write
5A8D000
heap
page read and write
5A06000
heap
page read and write
5A31000
heap
page read and write
58E0000
heap
page read and write
FF9000
direct allocation
page read and write
E70000
direct allocation
page read and write
5A61000
heap
page read and write
F67000
heap
page read and write
FA2000
unkown
page readonly
5E08000
heap
page read and write
5D98000
heap
page read and write
5A18000
heap
page read and write
5DE0000
heap
page read and write
5DC4000
heap
page read and write
3C2000
unkown
page read and write
6010000
heap
page read and write
5DD3000
heap
page read and write
FF0000
direct allocation
page read and write
F5A000
unkown
page readonly
5E51000
heap
page read and write
595000
unkown
page execute and read and write
5AB0000
trusted library allocation
page read and write
16E0000
direct allocation
page read and write
5B4E000
stack
page read and write
5AB0000
trusted library allocation
page read and write
5A2C000
heap
page read and write
932000
unkown
page readonly
135E000
stack
page read and write
16E0000
direct allocation
page read and write
584D000
heap
page read and write
6154000
heap
page read and write
18EC000
heap
page read and write
5A08000
heap
page read and write
158B000
stack
page read and write
5DFC000
heap
page read and write
59B000
unkown
page execute and read and write
5DD2000
heap
page read and write
5E10000
heap
page read and write
5E68000
heap
page read and write
5DE0000
heap
page read and write
1940000
remote allocation
page read and write
59F0000
heap
page read and write
5A46000
heap
page read and write
F65000
heap
page read and write
5F31000
heap
page read and write
5DF8000
heap
page read and write
F67000
heap
page read and write
5E0B000
heap
page read and write
5DFD000
heap
page read and write
169E000
stack
page read and write
597000
unkown
page execute and read and write
5DEC000
heap
page read and write
565F000
stack
page read and write
947000
unkown
page readonly
1000000
direct allocation
page read and write
5DC6000
heap
page read and write
5E37000
heap
page read and write
612F000
heap
page read and write
360E000
stack
page read and write
1458000
heap
page read and write
FA2000
unkown
page readonly
5E09000
heap
page read and write
16E6000
direct allocation
page read and write
5DB2000
heap
page read and write
5DEC000
heap
page read and write
FF0000
direct allocation
page read and write
9F0000
direct allocation
page read and write
5DEC000
heap
page read and write
1300000
unkown
page execute read
6187000
heap
page read and write
5B8E000
stack
page read and write
116E000
heap
page read and write
5BB0000
trusted library allocation
page read and write
616E000
stack
page read and write
5DF3000
heap
page read and write
DF6000
direct allocation
page read and write
5D49000
heap
page read and write
5A1D000
heap
page read and write
5B5D000
heap
page read and write
5A61000
heap
page read and write
1940000
remote allocation
page read and write
5DD2000
heap
page read and write
F67000
heap
page read and write
1710000
direct allocation
page read and write
612B000
heap
page read and write
116F000
unkown
page execute and read and write
6121000
heap
page read and write
5A0D000
heap
page read and write
612C000
heap
page read and write
138F000
heap
page read and write
5A16000
heap
page read and write
3610000
heap
page read and write
109A000
heap
page read and write
5A7F000
heap
page read and write
11A1000
unkown
page execute and read and write
1765000
heap
page read and write
2E70000
direct allocation
page read and write
117A000
heap
page read and write
5A10000
heap
page read and write
10F7000
heap
page read and write
5DE0000
heap
page read and write
2F27000
heap
page read and write
D90000
heap
page read and write
8FB000
unkown
page execute and read and write
F9C000
unkown
page write copy
6011000
heap
page read and write
6324000
heap
page read and write
19C5000
heap
page read and write
1167000
unkown
page execute and read and write
5839000
heap
page read and write
5D40000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
1186000
heap
page read and write
1915000
heap
page read and write
2A10000
heap
page read and write
5DEE000
heap
page read and write
2B30000
direct allocation
page read and write
6125000
heap
page read and write
5DEC000
heap
page read and write
59FD000
heap
page read and write
5621000
heap
page read and write
5E49000
heap
page read and write
59F7000
heap
page read and write
5A0D000
heap
page read and write
2F5E000
stack
page read and write
612F000
heap
page read and write
5A0D000
heap
page read and write
FF0000
heap
page read and write
5DE0000
heap
page read and write
1109000
heap
page read and write
5DFF000
heap
page read and write
6120000
trusted library allocation
page read and write
5E11000
heap
page read and write
6120000
trusted library allocation
page read and write
2EA0000
direct allocation
page read and write
5A31000
heap
page read and write
5839000
heap
page read and write
5DB2000
heap
page read and write
5DB2000
heap
page read and write
1930000
heap
page read and write
5DF1000
heap
page read and write
5A52000
heap
page read and write
5D94000
heap
page read and write
5A11000
heap
page read and write
632C000
heap
page read and write
5A28000
heap
page read and write
5BB0000
trusted library allocation
page read and write
5DE0000
heap
page read and write
AF7000
unkown
page execute and read and write
15D0000
direct allocation
page read and write
59FD000
heap
page read and write
5A18000
heap
page read and write
5DD2000
heap
page read and write
18E2000
heap
page read and write
FF0000
direct allocation
page read and write
920000
unkown
page readonly
5A81000
heap
page read and write
F67000
heap
page read and write
10B7000
heap
page read and write
5B56000
heap
page read and write
1155000
unkown
page execute and read and write
5DFD000
heap
page read and write
5DEE000
heap
page read and write
5A05000
heap
page read and write
FF7000
heap
page read and write
1186000
heap
page read and write
5DE0000
heap
page read and write
5E28000
heap
page read and write
5A6D000
heap
page read and write
1155000
unkown
page execute and read and write
F92000
unkown
page readonly
199F000
heap
page read and write
6020000
heap
page read and write
295D000
stack
page read and write
5A0D000
heap
page read and write
1183000
heap
page read and write
5A15000
heap
page read and write
5A01000
heap
page read and write
4B24000
heap
page read and write
16F0000
direct allocation
page read and write
5E11000
heap
page read and write
5A82000
heap
page read and write
1165000
unkown
page execute and read and write
F67000
heap
page read and write
29E0000
remote allocation
page read and write
115D000
unkown
page execute and read and write
61A4000
heap
page read and write
5DE0000
heap
page read and write
5A0B000
heap
page read and write
612B000
heap
page read and write
F67000
heap
page read and write
5D93000
heap
page read and write
5DF2000
heap
page read and write
612F000
heap
page read and write
513D000
stack
page read and write
3010000
heap
page read and write
5DEF000
heap
page read and write
5E43000
heap
page read and write
5DFF000
heap
page read and write
5DD3000
heap
page read and write
240000
unkown
page readonly
1179000
heap
page read and write
5E11000
heap
page read and write
5DEE000
heap
page read and write
5E58000
heap
page read and write
19CC000
heap
page read and write
57A0000
remote allocation
page read and write
5A31000
heap
page read and write
59F9000
heap
page read and write
5E43000
heap
page read and write
10EB000
heap
page read and write
5E95000
heap
page read and write
6132000
heap
page read and write
6121000
heap
page read and write
6120000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
59FB000
heap
page read and write
5A1C000
heap
page read and write
1890000
heap
page read and write
3DC000
unkown
page read and write
1186000
heap
page read and write
58BD000
heap
page read and write
590D000
stack
page read and write
5DF5000
heap
page read and write
F5B000
unkown
page execute and read and write
5D91000
heap
page read and write
59F000
unkown
page execute and read and write
FA0000
unkown
page write copy
16E0000
direct allocation
page read and write
541D000
stack
page read and write
2E76000
direct allocation
page read and write
5DC4000
heap
page read and write
E00000
unkown
page readonly
13B3000
heap
page read and write
3E7000
unkown
page readonly
16E9000
direct allocation
page read and write
5A22000
heap
page read and write
3DC000
unkown
page read and write
5A0B000
heap
page read and write
E70000
direct allocation
page read and write
10D4000
heap
page read and write
5E2A000
heap
page read and write
5DEE000
heap
page read and write
59D6000
heap
page read and write
5A4E000
stack
page read and write
5FE1000
heap
page read and write
612C000
heap
page read and write
115B000
unkown
page execute and read and write
F67000
heap
page read and write
5D4000
unkown
page execute and read and write
FA0000
unkown
page write copy
612D000
heap
page read and write
6124000
heap
page read and write
5D9B000
heap
page read and write
5E27000
heap
page read and write
E70000
direct allocation
page read and write
940000
unkown
page write copy
117F000
heap
page read and write
5A0C000
heap
page read and write
538A000
heap
page read and write
5F32000
heap
page read and write
5DD2000
heap
page read and write
5D91000
heap
page read and write
138E000
stack
page read and write
740000
unkown
page execute read
18E7000
heap
page read and write
5A1000
unkown
page execute and read and write
5E01000
heap
page read and write
5DB2000
heap
page read and write
2E70000
direct allocation
page read and write
5A22000
heap
page read and write
116F000
unkown
page execute and read and write
5DD3000
heap
page read and write
B0B000
unkown
page execute and read and write
5D94000
heap
page read and write
3D2000
unkown
page readonly
5A17000
heap
page read and write
5BB0000
trusted library allocation
page read and write
1182000
heap
page read and write
18FD000
heap
page read and write
BD0000
heap
page read and write
740000
unkown
page execute read
240000
unkown
page readonly
1080000
heap
page read and write
2E50000
heap
page read and write
F67000
heap
page read and write
5A1C000
heap
page read and write
5A29000
heap
page read and write
5D93000
heap
page read and write
2F28000
heap
page read and write
5A02000
heap
page read and write
1163000
unkown
page execute and read and write
16E0000
direct allocation
page read and write
10E0000
heap
page read and write
5F37000
heap
page read and write
3C7000
unkown
page readonly
5D93000
heap
page read and write
5E49000
heap
page read and write
5A6D000
heap
page read and write
612D000
heap
page read and write
19C1000
heap
page read and write
5E11000
heap
page read and write
33FD000
stack
page read and write
6121000
heap
page read and write
5D46000
heap
page read and write
5F38000
heap
page read and write
583A000
heap
page read and write
19B0000
remote allocation
page read and write
5E93000
heap
page read and write
53C0000
remote allocation
page read and write
59E0000
heap
page read and write
5A01000
heap
page read and write
FF0000
direct allocation
page read and write
B34000
unkown
page execute and read and write
922000
unkown
page read and write
5DB2000
heap
page read and write
FA7000
unkown
page readonly
5A27000
heap
page read and write
B01000
unkown
page execute and read and write
5DF8000
heap
page read and write
5B5E000
heap
page read and write
599000
unkown
page execute and read and write
5A33000
heap
page read and write
13CD000
heap
page read and write
5A1C000
heap
page read and write
5DC4000
heap
page read and write
6121000
heap
page read and write
3C7000
unkown
page readonly
241000
unkown
page execute read
59F9000
heap
page read and write
158C000
stack
page read and write
5DEC000
heap
page read and write
6123000
heap
page read and write
5DF4000
heap
page read and write
5DFC000
heap
page read and write
F90000
unkown
page readonly
5A43000
heap
page read and write
2E50000
direct allocation
page read and write
5DEE000
heap
page read and write
5E8F000
heap
page read and write
F80000
unkown
page readonly
59FB000
heap
page read and write
1185000
heap
page read and write
32EE000
stack
page read and write
922000
unkown
page write copy
5A05000
heap
page read and write
5D8F000
stack
page read and write
3E2000
unkown
page readonly
7A1000
unkown
page execute read
59C9000
heap
page read and write
5A1000
unkown
page execute and read and write
5DE0000
heap
page read and write
59E1000
heap
page read and write
5E8F000
heap
page read and write
B0D000
unkown
page execute and read and write
585C000
heap
page read and write
5028000
heap
page read and write
56B7000
heap
page read and write
5A9F000
stack
page read and write
5BB0000
trusted library allocation
page read and write
5DF5000
heap
page read and write
595000
unkown
page execute and read and write
1161000
unkown
page execute and read and write
5DEC000
heap
page read and write
5E0C000
heap
page read and write
13A2000
heap
page read and write
60BE000
stack
page read and write
59D000
unkown
page execute and read and write
5C10000
heap
page read and write
3E0000
unkown
page read and write
5C8E000
stack
page read and write
5DFD000
heap
page read and write
5E49000
heap
page read and write
5AB0000
trusted library allocation
page read and write
337D000
stack
page read and write
1A3B000
heap
page read and write
5DEE000
heap
page read and write
CA0000
unkown
page execute read
5DEE000
heap
page read and write
4E0E000
stack
page read and write
1957000
heap
page read and write
53C0000
remote allocation
page read and write
50C7000
heap
page read and write
AF5000
unkown
page execute and read and write
5BB0000
trusted library allocation
page read and write
145A000
heap
page read and write
6011000
heap
page read and write
1903000
heap
page read and write
5DEE000
heap
page read and write
5D41000
heap
page read and write
5A1D000
heap
page read and write
57A0000
remote allocation
page read and write
5D40000
trusted library allocation
page read and write
4BC0000
heap
page read and write
FA7000
unkown
page readonly
191E000
heap
page read and write
581E000
stack
page read and write
5EB4000
heap
page read and write
5DEC000
heap
page read and write
612B000
heap
page read and write
942000
unkown
page readonly
5DEC000
heap
page read and write
927000
unkown
page readonly
5BB0000
trusted library allocation
page read and write
3E7000
unkown
page readonly
F67000
heap
page read and write
6121000
heap
page read and write
5D40000
trusted library allocation
page read and write
5A7000
unkown
page execute and read and write
5E0E000
heap
page read and write
5E11000
heap
page read and write
16F0000
direct allocation
page read and write
527F000
stack
page read and write
5A1D000
heap
page read and write
6120000
trusted library allocation
page read and write
5A5000
unkown
page execute and read and write
19C0000
heap
page read and write
500D000
stack
page read and write
FAE000
stack
page read and write
5AB0000
trusted library allocation
page read and write
5B5E000
heap
page read and write
5A18000
heap
page read and write
1186000
heap
page read and write
1169000
unkown
page execute and read and write
5D49000
heap
page read and write
6167000
heap
page read and write
5EE3000
heap
page read and write
118B000
heap
page read and write
B09000
unkown
page execute and read and write
5A02000
heap
page read and write
AFF000
unkown
page execute and read and write
58BE000
heap
page read and write
612B000
heap
page read and write
5DEE000
heap
page read and write
6154000
heap
page read and write
612B000
heap
page read and write
39A000
unkown
page readonly
5E49000
heap
page read and write
5B6E000
heap
page read and write
1117000
heap
page read and write
5FE2000
heap
page read and write
5A19000
heap
page read and write
555E000
stack
page read and write
5E9D000
heap
page read and write
5DEF000
heap
page read and write
4DAD000
heap
page read and write
F67000
heap
page read and write
1400000
heap
page read and write
3DC000
unkown
page write copy
5C14000
heap
page read and write
1169000
unkown
page execute and read and write
F9C000
unkown
page read and write
F67000
heap
page read and write
B6B000
stack
page read and write
13AC000
heap
page read and write
3510000
direct allocation
page read and write
5DEE000
heap
page read and write
612B000
heap
page read and write
E0D000
stack
page read and write
5DEC000
heap
page read and write
5F4E000
heap
page read and write
5A0D000
heap
page read and write
531E000
stack
page read and write
240000
unkown
page readonly
5DD9000
heap
page read and write
5A19000
heap
page read and write
59ED000
heap
page read and write
E01000
unkown
page execute read
BCD000
stack
page read and write
5DEC000
heap
page read and write
5A05000
heap
page read and write
FF5000
heap
page read and write
33BE000
stack
page read and write
59FB000
heap
page read and write
6142000
heap
page read and write
5DEE000
heap
page read and write
F87000
unkown
page readonly
1186000
heap
page read and write
5DC8000
heap
page read and write
3E2000
unkown
page readonly
510F000
stack
page read and write
136E000
heap
page read and write
5DF7000
heap
page read and write
190F000
heap
page read and write
569E000
stack
page read and write
1981000
heap
page read and write
58AE000
stack
page read and write
5DC4000
heap
page read and write
3D2000
unkown
page readonly
2FD0000
direct allocation
page read and write
2E80000
direct allocation
page read and write
2C8E000
stack
page read and write
F87000
unkown
page readonly
5DE0000
heap
page read and write
59D000
unkown
page execute and read and write
13EF000
heap
page read and write
1B9F000
stack
page read and write
F67000
heap
page read and write
5DEE000
heap
page read and write
13B5000
heap
page read and write
5A7000
unkown
page execute and read and write
5DFF000
heap
page read and write
5390000
heap
page read and write
5DF9000
heap
page read and write
F67000
heap
page read and write
5EA0000
heap
page read and write
59F9000
heap
page read and write
1300000
unkown
page execute read
5A66000
heap
page read and write
1162000
heap
page read and write
5DE0000
heap
page read and write
DF0000
direct allocation
page read and write
9F9000
direct allocation
page read and write
10C8000
heap
page read and write
5A9000
unkown
page execute and read and write
5A2C000
heap
page read and write
115F000
unkown
page execute and read and write
FAA000
unkown
page readonly
5DBA000
heap
page read and write
5F1C000
heap
page read and write
740000
unkown
page execute read
5DF7000
heap
page read and write
F82000
unkown
page write copy
FA2000
unkown
page readonly
E95000
heap
page read and write
5FA0000
trusted library allocation
page read and write
612D000
heap
page read and write
5E14000
heap
page read and write
5EB4000
heap
page read and write
5E05000
heap
page read and write
5DD2000
heap
page read and write
16DE000
stack
page read and write
5E3B000
heap
page read and write
5E00000
heap
page read and write
8FA000
unkown
page readonly
1360000
heap
page read and write
3D0000
unkown
page readonly
F67000
heap
page read and write
5A70000
heap
page read and write
4BBA000
heap
page read and write
1186000
heap
page read and write
F67000
heap
page read and write
942000
unkown
page readonly
584A000
heap
page read and write
582B000
heap
page read and write
55DE000
stack
page read and write
FA7000
unkown
page readonly
3C0000
unkown
page readonly
5A2C000
heap
page read and write
3E0000
unkown
page read and write
5DB2000
heap
page read and write
579F000
stack
page read and write
607F000
stack
page read and write
5A1D000
heap
page read and write
6120000
trusted library allocation
page read and write
5C4F000
stack
page read and write
15D0000
direct allocation
page read and write
EBB000
stack
page read and write
5DE0000
heap
page read and write
5E95000
heap
page read and write
6321000
heap
page read and write
10BF000
heap
page read and write
18DD000
heap
page read and write
5DD4000
heap
page read and write
6121000
heap
page read and write
5DEC000
heap
page read and write
5B4F000
stack
page read and write
5C1B000
heap
page read and write
F67000
heap
page read and write
3EE000
unkown
page execute and read and write
1161000
unkown
page execute and read and write
2FDD000
stack
page read and write
2FF0000
heap
page read and write
59ED000
heap
page read and write
5A22000
heap
page read and write
5DF4000
heap
page read and write
D1B000
stack
page read and write
5A05000
heap
page read and write
5A0D000
stack
page read and write
FAE000
unkown
page execute and read and write
5DB2000
heap
page read and write
E01000
unkown
page execute read
6329000
heap
page read and write
5E70000
heap
page read and write
5DFA000
heap
page read and write
59FB000
heap
page read and write
1999000
heap
page read and write
5E11000
heap
page read and write
F40000
heap
page read and write
600C000
heap
page read and write
3DC000
unkown
page write copy
1123000
heap
page read and write
F80000
unkown
page readonly
5A5000
unkown
page execute and read and write
5DEC000
heap
page read and write
5AD000
unkown
page execute and read and write
1186000
heap
page read and write
5E11000
heap
page read and write
5A22000
heap
page read and write
5A70000
heap
page read and write
5A13000
heap
page read and write
740000
unkown
page execute read
5870000
heap
page read and write
5A0C000
heap
page read and write
9F0000
direct allocation
page read and write
E01000
unkown
page execute read
6120000
trusted library allocation
page read and write
94E000
unkown
page execute and read and write
1986000
heap
page read and write
5DC8000
heap
page read and write
F40000
direct allocation
page read and write
13CB000
heap
page read and write
5DEC000
heap
page read and write
1000000
direct allocation
page read and write
5A05000
heap
page read and write
626F000
stack
page read and write
1989000
heap
page read and write
6325000
heap
page read and write
5E07000
heap
page read and write
5DEC000
heap
page read and write
3E2000
unkown
page readonly
6121000
heap
page read and write
5DBA000
heap
page read and write
DF9000
direct allocation
page read and write
5DF2000
heap
page read and write
1157000
unkown
page execute and read and write
5A2F000
heap
page read and write
1979000
heap
page read and write
116B000
unkown
page execute and read and write
5DF8000
heap
page read and write
1090000
heap
page read and write
5DF6000
heap
page read and write
6121000
heap
page read and write
5C8F000
stack
page read and write
5DF2000
heap
page read and write
18E4000
heap
page read and write
59C2000
heap
page read and write
5A39000
heap
page read and write
53BF000
stack
page read and write
61D2000
heap
page read and write
CFB000
stack
page read and write
299E000
stack
page read and write
5E30000
heap
page read and write
3C2000
unkown
page write copy
6120000
trusted library allocation
page read and write
F5B000
unkown
page execute and read and write
5DFD000
heap
page read and write
ADB000
stack
page read and write
29F0000
heap
page read and write
5A41000
heap
page read and write
5E11000
heap
page read and write
5DEC000
heap
page read and write
5A1D000
heap
page read and write
5A42000
heap
page read and write
5FF5000
heap
page read and write
10E2000
heap
page read and write
5A0D000
heap
page read and write
5A31000
heap
page read and write
6179000
heap
page read and write
59DC000
heap
page read and write
29E0000
remote allocation
page read and write
5A34000
heap
page read and write
F67000
heap
page read and write
F67000
heap
page read and write
5ABE000
heap
page read and write
95B000
stack
page read and write
599000
unkown
page execute and read and write
DF0000
direct allocation
page read and write
1169000
heap
page read and write
1194000
unkown
page execute and read and write
612D000
heap
page read and write
6120000
heap
page read and write
5DD2000
heap
page read and write
5DE0000
heap
page read and write
3C2000
unkown
page write copy
1940000
remote allocation
page read and write
5E08000
heap
page read and write
5DF3000
heap
page read and write
5A32000
heap
page read and write
FF6000
direct allocation
page read and write
5DE0000
heap
page read and write
59F9000
heap
page read and write
128E000
stack
page read and write
5DD2000
heap
page read and write
5A06000
heap
page read and write
5E04000
heap
page read and write
6003000
heap
page read and write
59F9000
heap
page read and write
5A33000
heap
page read and write
3E0000
unkown
page write copy
1186000
heap
page read and write
F90000
unkown
page readonly
FAA000
unkown
page readonly
5DC4000
heap
page read and write
5B52000
heap
page read and write
5A1D000
heap
page read and write
39A000
unkown
page readonly
3400000
heap
page read and write
5DF1000
heap
page read and write
5DCF000
heap
page read and write
5DD2000
heap
page read and write
597000
unkown
page execute and read and write
E00000
unkown
page readonly
10D1000
heap
page read and write
59F9000
heap
page read and write
DDE000
stack
page read and write
10FC000
heap
page read and write
10DF000
heap
page read and write
5AB0000
trusted library allocation
page read and write
5DEF000
heap
page read and write
5DC9000
heap
page read and write
6187000
heap
page read and write
927000
unkown
page readonly
5DF7000
heap
page read and write
5E01000
heap
page read and write
F67000
heap
page read and write
5820000
heap
page read and write
610E000
stack
page read and write
5DC8000
heap
page read and write
155E000
stack
page read and write
5EE8000
heap
page read and write
94A000
unkown
page readonly
FA0000
unkown
page read and write
5DD2000
heap
page read and write
5DE0000
heap
page read and write
5D91000
heap
page read and write
5A01000
heap
page read and write
5DB5000
heap
page read and write
2B8E000
stack
page read and write
5AB000
unkown
page execute and read and write
5A08000
heap
page read and write
2E79000
direct allocation
page read and write
5DEE000
heap
page read and write
584E000
heap
page read and write
1950000
heap
page read and write
5D40000
trusted library allocation
page read and write
5A42000
heap
page read and write
9C0000
heap
page read and write
61BB000
heap
page read and write
18D3000
heap
page read and write
5A1D000
heap
page read and write
5DE0000
heap
page read and write
5BB0000
trusted library allocation
page read and write
5A1F000
heap
page read and write
61A5000
heap
page read and write
5A1C000
heap
page read and write
5DD3000
heap
page read and write
5DB2000
heap
page read and write
5A3A000
heap
page read and write
613A000
heap
page read and write
116D000
unkown
page execute and read and write
16F0000
direct allocation
page read and write
1184000
heap
page read and write
612F000
heap
page read and write
6121000
heap
page read and write
5D46000
heap
page read and write
5A23000
heap
page read and write
5F7E000
stack
page read and write
5DE0000
heap
page read and write
5A33000
heap
page read and write
5E11000
heap
page read and write
4BC3000
heap
page read and write
5E03000
heap
page read and write
5DD2000
heap
page read and write
19B0000
remote allocation
page read and write
59FB000
heap
page read and write
5A21000
heap
page read and write
59FD000
heap
page read and write
59C5000
heap
page read and write
F60000
heap
page read and write
18FD000
stack
page read and write
5DEC000
heap
page read and write
18E0000
heap
page read and write
5E11000
heap
page read and write
18E9000
heap
page read and write
3EA000
unkown
page readonly
5E43000
heap
page read and write
5E11000
heap
page read and write
1300000
unkown
page execute read
E90000
heap
page read and write
15CE000
stack
page read and write
5D41000
heap
page read and write
947000
unkown
page readonly
FAE000
unkown
page execute and read and write
5A1C000
heap
page read and write
5E98000
heap
page read and write
18CE000
heap
page read and write
1454000
heap
page read and write
5DE0000
heap
page read and write
10B1000
heap
page read and write
612D000
heap
page read and write
59F7000
heap
page read and write
5A0C000
heap
page read and write
240000
unkown
page readonly
59FB000
heap
page read and write
2E70000
direct allocation
page read and write
5DFD000
heap
page read and write
503D000
stack
page read and write
5DEC000
heap
page read and write
5DEC000
heap
page read and write
612C000
heap
page read and write
61F8000
heap
page read and write
F5A000
unkown
page readonly
5E43000
heap
page read and write
59C0000
heap
page read and write
3EA000
unkown
page readonly
5E18000
heap
page read and write
5E0A000
heap
page read and write
5DFF000
heap
page read and write
5A46000
heap
page read and write
10EF000
heap
page read and write
5BB0000
trusted library allocation
page read and write
612F000
heap
page read and write
19EB000
heap
page read and write
190A000
heap
page read and write
8FA000
unkown
page readonly
29DE000
stack
page read and write
F67000
heap
page read and write
61D3000
heap
page read and write
29E0000
remote allocation
page read and write
10FC000
heap
page read and write
5ADE000
stack
page read and write
5E0E000
heap
page read and write
59F9000
heap
page read and write
5AB0000
trusted library allocation
page read and write
F67000
heap
page read and write
1186000
heap
page read and write
F9E000
stack
page read and write
5D4C000
heap
page read and write
59CD000
heap
page read and write
61D2000
heap
page read and write
6120000
trusted library allocation
page read and write
5A05000
heap
page read and write
59FB000
heap
page read and write
E70000
direct allocation
page read and write
59E0000
heap
page read and write
5AB000
unkown
page execute and read and write
105E000
stack
page read and write
5A06000
heap
page read and write
7A0000
unkown
page readonly
576E000
stack
page read and write
5DF1000
heap
page read and write
5DEC000
heap
page read and write
19AE000
heap
page read and write
F5A000
unkown
page readonly
1020000
direct allocation
page read and write
13E6000
heap
page read and write
5DEE000
heap
page read and write
5E94000
heap
page read and write
5A05000
heap
page read and write
1310000
heap
page read and write
5E0E000
heap
page read and write
5DE0000
heap
page read and write
5FEE000
heap
page read and write
39B000
unkown
page execute and read and write
5A2D000
heap
page read and write
F82000
unkown
page write copy
5A61000
heap
page read and write
1230000
heap
page read and write
4DAA000
heap
page read and write
5DCF000
heap
page read and write
FF0000
direct allocation
page read and write
5E37000
heap
page read and write
6120000
trusted library allocation
page read and write
5E1000
unkown
page execute and read and write
18FB000
heap
page read and write
4DA4000
heap
page read and write
DF0000
direct allocation
page read and write
136A000
heap
page read and write
6244000
heap
page read and write
5821000
heap
page read and write
139E000
heap
page read and write
5A41000
heap
page read and write
5DE0000
heap
page read and write
5DB2000
heap
page read and write
7A0000
unkown
page readonly
52F4000
heap
page read and write
1159000
unkown
page execute and read and write
3EE000
unkown
page execute and read and write
10CF000
heap
page read and write
E4E000
stack
page read and write
5BB0000
trusted library allocation
page read and write
1456000
heap
page read and write
15D0000
direct allocation
page read and write
5FF7000
heap
page read and write
551E000
stack
page read and write
5DEC000
heap
page read and write
5F55000
heap
page read and write
5EBA000
heap
page read and write
5DEC000
heap
page read and write
3E7000
unkown
page readonly
6141000
heap
page read and write
3EA000
unkown
page readonly
5DE0000
heap
page read and write
3CD000
unkown
page readonly
940000
unkown
page read and write
5DFD000
heap
page read and write
524F000
stack
page read and write
5865000
heap
page read and write
159E000
stack
page read and write
FA7000
unkown
page readonly
5D91000
heap
page read and write
E00000
unkown
page readonly
F87000
unkown
page readonly
5A32000
heap
page read and write
5DC4000
heap
page read and write
117C000
heap
page read and write
5DD2000
heap
page read and write
6120000
trusted library allocation
page read and write
241000
unkown
page execute read
56DF000
stack
page read and write
1186000
heap
page read and write
5DE0000
heap
page read and write
186E000
stack
page read and write
5AF000
unkown
page execute and read and write
10E6000
heap
page read and write
19B2000
heap
page read and write
5DC8000
heap
page read and write
5A0B000
heap
page read and write
B05000
unkown
page execute and read and write
6120000
trusted library allocation
page read and write
6320000
heap
page read and write
5DEC000
heap
page read and write
39A000
unkown
page readonly
5BB0000
trusted library allocation
page read and write
6326000
heap
page read and write
5E01000
heap
page read and write
5DB2000
heap
page read and write
5E42000
heap
page read and write
5DC4000
heap
page read and write
6245000
heap
page read and write
5DE0000
heap
page read and write
5A08000
heap
page read and write
E40000
heap
page read and write
DF0000
direct allocation
page read and write
5D93000
heap
page read and write
B07000
unkown
page execute and read and write
5DC4000
heap
page read and write
5A06000
heap
page read and write
5B52000
heap
page read and write
5D93000
heap
page read and write
5E05000
heap
page read and write
6120000
trusted library allocation
page read and write
1157000
unkown
page execute and read and write
5DEE000
heap
page read and write
586F000
stack
page read and write
5E18000
heap
page read and write
5DD2000
heap
page read and write
AFB000
unkown
page execute and read and write
5E37000
heap
page read and write
5A18000
heap
page read and write
AF9000
unkown
page execute and read and write
4FFD000
stack
page read and write
5DF4000
heap
page read and write
1981000
heap
page read and write
2E70000
direct allocation
page read and write
5E11000
heap
page read and write
1160000
heap
page read and write
241000
unkown
page execute read
1730000
heap
page read and write
10FA000
heap
page read and write
5A6D000
heap
page read and write
5E3B000
heap
page read and write
2E80000
direct allocation
page read and write
5DFD000
heap
page read and write
13BB000
heap
page read and write
13D3000
heap
page read and write
93C000
unkown
page write copy
59AF000
stack
page read and write
5A3000
unkown
page execute and read and write
5DFA000
heap
page read and write
5A1D000
heap
page read and write
5A32000
heap
page read and write
189A000
heap
page read and write
59B000
unkown
page execute and read and write
5EC7000
heap
page read and write
5E02000
heap
page read and write
5DEE000
heap
page read and write
612F000
heap
page read and write
5DC4000
heap
page read and write
9D0000
heap
page read and write
F9C000
unkown
page read and write
F82000
unkown
page read and write
5E17000
heap
page read and write
F5A000
unkown
page readonly
5A32000
heap
page read and write
1900000
heap
page read and write
5EA1000
heap
page read and write
6011000
heap
page read and write
5E0B000
heap
page read and write
F87000
unkown
page readonly
FBA000
stack
page read and write
6187000
heap
page read and write
61BF000
stack
page read and write
116B000
heap
page read and write
5DF2000
heap
page read and write
5DB2000
heap
page read and write
B03000
unkown
page execute and read and write
39A000
unkown
page readonly
There are 1303 hidden memdumps, click here to show them.