IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\2_C6p3QXcbFFG3yY8Vep02N.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\HtNUleLIfFhVUxnsVhhlEVf.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_9b2024c8db3f7a3ba3e8b636e85604d8e567a71_2d68038f_9ccc1465-ce0d-4ddb-ad67-ef51766f36e4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_861171296e904e2fbf4fe342343ec91fba117fc8_4dfd30ff_1c4eff64-5a2e-4623-aab8-a101cb0d8c92\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1291.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 12:56:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13F9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1458.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF072.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 12:56:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF258.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF278.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\6AsX3PZQEi__History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\Fuz6d05rd5d_Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\I8LtFzZYJFu4History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\JgjRqBl3kSn2History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\KQfwLD90xfy2Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\NRoHFXouNkKTWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\TvHqb8n20cdiHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\U3E4o6W1bd9oWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\hDUVUC5Zf9GICookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\j44dHwFGO1_uWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\osgHqV3MkXKdCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\pT7TyWFkl2bLWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\tsgP7fT1HmuYWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\wtDAV7Il5MiyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanHBptD8Z9NXQJ\x1tQOcIn67slLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\5QcWXnxsFk6dHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\7xvFXvFzglyOWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\BIpsYmuYT2AYLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\Bz3MXLi1DqouLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\IdK_yZmlaFHAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\J8072rt_APCaWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\OQFRVFwkzb7pHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\OxXHYAwzO_HHWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\QG6LiMOk_890Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\SvJj67aG9W02Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\WAGl7Ki4njgMHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\av2RCK9OiD33Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\f7xCPlKItbCGCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\mLJtYhsCB1QLWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spane5Dx2IH2dgzD\xGlKYWF0qKvWHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixyHBptD8Z9NXQJ\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyHBptD8Z9NXQJ\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyHBptD8Z9NXQJ\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixye5Dx2IH2dgzD\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixye5Dx2IH2dgzD\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixye5Dx2IH2dgzD\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 11:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 11:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 11:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 11:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 11:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 126
ASCII text, with very long lines (1746)
downloaded
Chrome Cache Entry: 127
ASCII text, with very long lines (794)
downloaded
Chrome Cache Entry: 128
ASCII text
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 130
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 131
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 132
ASCII text, with very long lines (2124)
downloaded
There are 62 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 1988
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2008,i,7110459155309458570,504723634449211635,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1968
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.167/cost/lenin.exeser
unknown
malicious
http://193.233.132.167/cost/lenin.exe
unknown
malicious
https://db-ip.com/demo/home.php?s=149.18.24.96atacam
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/149.18.24.96
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96.
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
https://ipinfo.io/ons
unknown
https://ipinfo.io/widget/demo/149.18.24.96LJu
unknown
https://t.me/risepro_botbpf
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://ipinfo.io/3(
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://t.me/RiseProSUPPORTi
unknown
http://193.233.132.167/cost/lenin.exe%&it
unknown
https://db-ip.com/
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://t.me/RiseProSUPPORT_
unknown
https://t.me/risepro
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
https://t.me/risepro_bot.96
unknown
http://193.233.132.167/cost/go.exe
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96Wp
unknown
https://csp.withgoogle.com/csp/lcreport/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/s
unknown
https://t.me/risepro_botepi
unknown
https://t.me/risepro_bot8&
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.253.63.105
https://apis.google.com
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96Cybe
unknown
https://db-ip.com/ms
unknown
https://t.me/risepro_botrisepro
unknown
https://ipinfo.io/widget/demo/149.18.24.961
unknown
https://ipinfo.io/widget/demo/149.18.24.96.
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96
104.26.5.15
http://193.233.132.167/cost/lenin.exeer
unknown
https://domains.google.com/suggest/flow
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96l
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com/demo/home.php?s=149.18.24.967&
unknown
https://t./
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.B
unknown
http://193.233.132.167/cost/go.exedka.exe
unknown
https://www.google.com/async/newtab_promos
172.253.63.105
http://upx.sf.net
unknown
https://t.D
unknown
https://t.me/RiseProSUPPORT
unknown
https://db-ip.com:443/demo/home.php?s=149.18.24.96?v
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com/$#lt
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96t
unknown
https://plus.google.com
unknown
https://ipinfo.io/F
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.253.63.105
http://193.233.132.167/cost/go.exe6
unknown
https://ipinfo.io/
unknown
https://db-ip.com/demo/home.php?s=149.18.24.96J
unknown
http://pki-ocsp.symauth.com0
unknown
https://db-ip.com/y
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0ypM
unknown
https://db-ip.com:443/demo/home.php?s=149.18.24.96
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
142.251.111.100
http://193.233.132.167/cost/lenin.exepro_bot
unknown
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io/widget/demo/149.18.24.96
34.117.186.192
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/widget/demo/149.18.24.96m
unknown
https://clients6.google.com
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.251.111.100
ipinfo.io
34.117.186.192
www.google.com
172.253.63.105
db-ip.com
104.26.5.15
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
142.251.111.100
plus.l.google.com
United States
104.26.5.15
db-ip.com
United States
172.253.63.105
www.google.com
United States
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{f60a8b7f-68b8-dc80-65c9-b73a4e6e751c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7670000
heap
page read and write
malicious
18E6000
heap
page read and write
malicious
17FE000
heap
page read and write
malicious
160D000
heap
page read and write
malicious
18E7000
heap
page read and write
malicious
1713000
heap
page read and write
75A0000
trusted library allocation
page read and write
7944000
heap
page read and write
CAB000
stack
page read and write
176B000
heap
page read and write
B42000
unkown
page execute and read and write
1957000
heap
page read and write
6DAD000
stack
page read and write
1922000
heap
page read and write
76C0000
heap
page read and write
1949000
heap
page read and write
195D000
heap
page read and write
1A2E000
stack
page read and write
1945000
heap
page read and write
4100000
remote allocation
page read and write
14F0000
heap
page read and write
1BA8000
heap
page read and write
1945000
heap
page read and write
1BB2000
heap
page read and write
B61000
unkown
page readonly
18EC000
heap
page read and write
15DE000
stack
page read and write
6D6D000
stack
page read and write
1938000
heap
page read and write
753A000
heap
page read and write
32A0000
heap
page read and write
261000
unkown
page readonly
14C8000
heap
page read and write
79F6000
heap
page read and write
1954000
heap
page read and write
74F0000
trusted library allocation
page read and write
3B5F000
stack
page read and write
7121000
heap
page read and write
1649000
heap
page read and write
36A4000
direct allocation
page execute and read and write
3830000
direct allocation
page execute and read and write
1E6F000
stack
page read and write
769A000
heap
page read and write
19B9000
heap
page read and write
1EAE000
stack
page read and write
793B000
heap
page read and write
17FA000
heap
page read and write
3693000
direct allocation
page execute and read and write
79F1000
heap
page read and write
71C1000
heap
page read and write
1912000
heap
page read and write
3C10000
direct allocation
page execute and read and write
405D000
stack
page read and write
1922000
heap
page read and write
7CD0000
trusted library allocation
page read and write
76D3000
heap
page read and write
45CF000
stack
page read and write
6BCE000
stack
page read and write
65CD000
stack
page read and write
6A4E000
stack
page read and write
676D000
stack
page read and write
76C4000
heap
page read and write
78F1000
heap
page read and write
1938000
heap
page read and write
1978000
heap
page read and write
812000
unkown
page execute and read and write
14B9000
heap
page read and write
7BFF000
heap
page read and write
6EB0000
remote allocation
page read and write
1922000
heap
page read and write
188D000
heap
page read and write
1B50000
heap
page read and write
76CD000
heap
page read and write
3EDF000
stack
page read and write
75A0000
trusted library allocation
page read and write
198A000
heap
page read and write
19B9000
heap
page read and write
19B9000
heap
page read and write
170B000
heap
page read and write
3F2D000
stack
page read and write
3FC0000
remote allocation
page read and write
7F060000
direct allocation
page execute and read and write
1955000
heap
page read and write
76CB000
heap
page read and write
190F000
heap
page read and write
76DB000
heap
page read and write
7856000
heap
page read and write
76B4000
heap
page read and write
1713000
heap
page read and write
632E000
stack
page read and write
13ED000
stack
page read and write
1BBC000
heap
page read and write
7928000
heap
page read and write
14FA000
heap
page read and write
76CC000
heap
page read and write
36A4000
direct allocation
page execute and read and write
14AF000
heap
page read and write
3B80000
heap
page read and write
3C80000
heap
page read and write
3290000
heap
page read and write
76E9000
heap
page read and write
7F770000
direct allocation
page execute and read and write
76D6000
heap
page read and write
175E000
heap
page read and write
13C0000
heap
page read and write
1948000
heap
page read and write
76E5000
heap
page read and write
67AE000
stack
page read and write
76E9000
heap
page read and write
722E000
stack
page read and write
76A8000
heap
page read and write
1723000
heap
page read and write
1CD4000
heap
page read and write
7855000
heap
page read and write
76D3000
heap
page read and write
194D000
heap
page read and write
18F5000
heap
page read and write
1405000
heap
page read and write
17B7000
heap
page read and write
B67000
unkown
page execute and write copy
73CC000
heap
page read and write
D40000
unkown
page execute and read and write
1996000
heap
page read and write
162D000
stack
page read and write
7CD0000
trusted library allocation
page read and write
7719000
heap
page read and write
784E000
stack
page read and write
79F1000
heap
page read and write
1519000
heap
page read and write
7771000
heap
page read and write
776F000
stack
page read and write
76D5000
heap
page read and write
1957000
heap
page read and write
14B2000
heap
page read and write
7CB2000
heap
page read and write
19B9000
heap
page read and write
19B9000
heap
page read and write
1AE0000
heap
page read and write
190F000
heap
page read and write
195B000
heap
page read and write
76A7000
heap
page read and write
19E2000
heap
page read and write
19B9000
heap
page read and write
397000
unkown
page execute and read and write
1987000
heap
page read and write
3890000
heap
page read and write
1942000
heap
page read and write
1876000
heap
page read and write
34A0000
heap
page read and write
184E000
heap
page read and write
1942000
heap
page read and write
3C43000
direct allocation
page execute and read and write
3720000
heap
page read and write
4100000
remote allocation
page read and write
76F9000
heap
page read and write
79FF000
heap
page read and write
76A8000
heap
page read and write
76B5000
heap
page read and write
76A8000
heap
page read and write
18F7000
heap
page read and write
773A000
heap
page read and write
971000
unkown
page execute and read and write
261000
unkown
page readonly
39E0000
direct allocation
page execute and read and write
1938000
heap
page read and write
7120000
trusted library allocation
page read and write
76E3000
heap
page read and write
143E000
heap
page read and write
12F0000
unkown
page execute and read and write
190F000
heap
page read and write
1942000
heap
page read and write
755E000
heap
page read and write
76C2000
heap
page read and write
76E9000
heap
page read and write
615A000
heap
page read and write
1965000
heap
page read and write
760F000
stack
page read and write
1967000
heap
page read and write
76E9000
heap
page read and write
3C54000
direct allocation
page execute and read and write
36F3000
heap
page read and write
38E0000
direct allocation
page execute and read and write
764E000
stack
page read and write
1922000
heap
page read and write
9F0000
unkown
page execute and read and write
7127000
heap
page read and write
18F6000
heap
page read and write
190F000
heap
page read and write
1997000
heap
page read and write
195F000
heap
page read and write
76E3000
heap
page read and write
1A10000
heap
page read and write
771D000
heap
page read and write
76E9000
heap
page read and write
1945000
heap
page read and write
73C3000
heap
page read and write
76E9000
heap
page read and write
7231000
heap
page read and write
76E3000
heap
page read and write
7CD0000
trusted library allocation
page read and write
3C63000
direct allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
195C000
heap
page read and write
CB1000
unkown
page execute and read and write
264000
unkown
page readonly
3B1000
unkown
page execute and read and write
1942000
heap
page read and write
712B000
heap
page read and write
76E7000
heap
page read and write
1FDE000
stack
page read and write
4000000
heap
page read and write
7719000
heap
page read and write
14A9000
heap
page read and write
688A000
heap
page read and write
76E9000
heap
page read and write
3850000
direct allocation
page execute and read and write
76C0000
heap
page read and write
3770000
heap
page read and write
1954000
heap
page read and write
1938000
heap
page read and write
3D00000
direct allocation
page execute and read and write
7CA7000
heap
page read and write
3478000
direct allocation
page execute and read and write
1942000
heap
page read and write
1942000
heap
page read and write
76B4000
heap
page read and write
6BEF000
stack
page read and write
678C000
heap
page read and write
6E2F000
stack
page read and write
1B91000
heap
page read and write
76D6000
heap
page read and write
18F6000
heap
page read and write
1C3A000
heap
page read and write
C0000
unkown
page readonly
1957000
heap
page read and write
9F0000
unkown
page execute and write copy
1590000
heap
page read and write
76E9000
heap
page read and write
693F000
heap
page read and write
3C54000
direct allocation
page execute and read and write
7120000
trusted library allocation
page read and write
1868000
heap
page read and write
7BF4000
heap
page read and write
76AD000
heap
page read and write
B52000
unkown
page execute and write copy
1954000
heap
page read and write
18F2000
heap
page read and write
7A19000
heap
page read and write
3EF0000
heap
page read and write
3C54000
direct allocation
page execute and read and write
1938000
heap
page read and write
74F0000
trusted library allocation
page read and write
1968000
heap
page read and write
D40000
unkown
page execute and read and write
3890000
heap
page read and write
1922000
heap
page read and write
1539000
heap
page read and write
1AE5000
heap
page read and write
7D7C000
heap
page read and write
15F0000
direct allocation
page execute and read and write
C97000
unkown
page execute and read and write
242000
unkown
page execute and write copy
129E000
stack
page read and write
195A000
heap
page read and write
C1000
unkown
page execute and write copy
1938000
heap
page read and write
76B5000
heap
page read and write
14B3000
heap
page read and write
76B4000
heap
page read and write
3C88000
direct allocation
page execute and read and write
B52000
unkown
page execute and read and write
3694000
direct allocation
page execute and read and write
1945000
heap
page read and write
B52000
unkown
page execute and read and write
7A02000
heap
page read and write
1412000
heap
page read and write
D0F000
unkown
page execute and read and write
375D000
stack
page read and write
3A80000
direct allocation
page execute and read and write
14DD000
heap
page read and write
76E7000
heap
page read and write
14DB000
heap
page read and write
1957000
heap
page read and write
19B9000
heap
page read and write
190F000
heap
page read and write
78F1000
heap
page read and write
76B5000
heap
page read and write
1945000
heap
page read and write
7125000
heap
page read and write
1922000
heap
page read and write
76E6000
heap
page read and write
1938000
heap
page read and write
DF0000
heap
page read and write
3460000
direct allocation
page execute and read and write
1770000
heap
page read and write
196D000
heap
page read and write
1C58000
heap
page read and write
7856000
heap
page read and write
9C1000
unkown
page execute and write copy
7CD0000
trusted library allocation
page read and write
76E6000
heap
page read and write
167D000
heap
page read and write
76D9000
heap
page read and write
6E6E000
stack
page read and write
B64000
unkown
page readonly
76A9000
heap
page read and write
B64000
unkown
page readonly
1690000
heap
page read and write
19B9000
heap
page read and write
7719000
heap
page read and write
3EAD000
stack
page read and write
1942000
heap
page read and write
79F1000
heap
page read and write
73C8000
heap
page read and write
1938000
heap
page read and write
76AB000
heap
page read and write
1947000
heap
page read and write
79F1000
heap
page read and write
9C0000
unkown
page readonly
76C4000
heap
page read and write
315F000
stack
page read and write
3560000
direct allocation
page execute and read and write
76B5000
heap
page read and write
6EB0000
remote allocation
page read and write
3660000
remote allocation
page read and write
1968000
heap
page read and write
748A000
heap
page read and write
1C41000
heap
page read and write
76CA000
heap
page read and write
196A000
heap
page read and write
76E7000
heap
page read and write
1997000
heap
page read and write
3D44000
direct allocation
page execute and read and write
159D000
stack
page read and write
36A4000
direct allocation
page execute and read and write
74F0000
trusted library allocation
page read and write
1B3E000
stack
page read and write
163B000
heap
page read and write
3BC0000
heap
page read and write
656D000
stack
page read and write
76D9000
heap
page read and write
C1000
unkown
page execute and write copy
1993000
heap
page read and write
7550000
heap
page read and write
1922000
heap
page read and write
3464000
direct allocation
page execute and read and write
3D58000
direct allocation
page execute and read and write
1938000
heap
page read and write
3C74000
direct allocation
page execute and read and write
7D8D000
heap
page read and write
163A000
stack
page read and write
7BF4000
heap
page read and write
B5C000
unkown
page readonly
1942000
heap
page read and write
1C2E000
stack
page read and write
7554000
heap
page read and write
76C6000
heap
page read and write
76D6000
heap
page read and write
7F990000
direct allocation
page execute and read and write
3C54000
direct allocation
page execute and read and write
76D9000
heap
page read and write
1250000
heap
page read and write
76BD000
heap
page read and write
19AF000
heap
page read and write
66DD000
heap
page read and write
1738000
heap
page read and write
76AB000
heap
page read and write
9C0000
unkown
page readonly
36A4000
direct allocation
page execute and read and write
25C000
unkown
page readonly
74F0000
trusted library allocation
page read and write
76D5000
heap
page read and write
1858000
heap
page read and write
19FC000
stack
page read and write
14EB000
heap
page read and write
364E000
stack
page read and write
7450000
remote allocation
page read and write
141E000
heap
page read and write
821000
unkown
page readonly
76CE000
heap
page read and write
79FB000
heap
page read and write
166B000
heap
page read and write
76E9000
heap
page read and write
13A0000
heap
page read and write
195C000
heap
page read and write
680000
unkown
page readonly
1942000
heap
page read and write
190F000
heap
page read and write
242000
unkown
page execute and write copy
190F000
heap
page read and write
76E9000
heap
page read and write
3453000
direct allocation
page execute and read and write
14C8000
heap
page read and write
78F1000
heap
page read and write
190F000
heap
page read and write
13FF000
heap
page read and write
74F0000
trusted library allocation
page read and write
1993000
heap
page read and write
1945000
heap
page read and write
1657000
heap
page read and write
71C1000
heap
page read and write
79FD000
heap
page read and write
1C30000
heap
page read and write
1C65000
heap
page read and write
3C80000
direct allocation
page execute and read and write
7671000
heap
page read and write
1C5E000
heap
page read and write
1957000
heap
page read and write
769C000
heap
page read and write
3320000
direct allocation
page execute and read and write
76B5000
heap
page read and write
76D6000
heap
page read and write
1922000
heap
page read and write
79FB000
heap
page read and write
71C1000
heap
page read and write
16E4000
heap
page read and write
18EA000
heap
page read and write
78F1000
heap
page read and write
3B90000
heap
page read and write
76E4000
heap
page read and write
14FA000
heap
page read and write
1905000
heap
page read and write
732F000
stack
page read and write
1924000
heap
page read and write
1954000
heap
page read and write
1BCE000
heap
page read and write
1434000
heap
page read and write
75A0000
trusted library allocation
page read and write
195F000
heap
page read and write
1938000
heap
page read and write
7725000
heap
page read and write
79FB000
heap
page read and write
B42000
unkown
page execute and write copy
69AF000
stack
page read and write
1953000
heap
page read and write
B67000
unkown
page execute and read and write
3E71000
heap
page read and write
25C000
unkown
page readonly
3B83000
heap
page read and write
1B96000
heap
page read and write
74F0000
trusted library allocation
page read and write
76C6000
heap
page read and write
74F0000
trusted library allocation
page read and write
76E3000
heap
page read and write
16FD000
heap
page read and write
C0000
unkown
page readonly
198B000
heap
page read and write
18F7000
heap
page read and write
7DF0000
heap
page read and write
165F000
heap
page read and write
1938000
heap
page read and write
194B000
heap
page read and write
267000
unkown
page execute and read and write
1C73000
heap
page read and write
7120000
trusted library allocation
page read and write
7A02000
heap
page read and write
76A8000
heap
page read and write
3D44000
direct allocation
page execute and read and write
1447000
heap
page read and write
1945000
heap
page read and write
1949000
heap
page read and write
3710000
heap
page read and write
7120000
trusted library allocation
page read and write
3D33000
direct allocation
page execute and read and write
190F000
heap
page read and write
79FB000
heap
page read and write
1853000
heap
page read and write
19AF000
heap
page read and write
7CB8000
heap
page read and write
79FB000
heap
page read and write
7231000
heap
page read and write
7548000
heap
page read and write
76BA000
heap
page read and write
6C8E000
stack
page read and write
18EE000
heap
page read and write
79F0000
heap
page read and write
1958000
heap
page read and write
4160000
heap
page read and write
1945000
heap
page read and write
793B000
heap
page read and write
76B5000
heap
page read and write
190F000
heap
page read and write
1922000
heap
page read and write
79FF000
heap
page read and write
71C1000
heap
page read and write
76D6000
heap
page read and write
190F000
heap
page read and write
76CE000
heap
page read and write
68C2000
heap
page read and write
197A000
heap
page read and write
492F000
stack
page read and write
3730000
direct allocation
page execute and read and write
1957000
heap
page read and write
1667000
heap
page read and write
7CD0000
trusted library allocation
page read and write
76C6000
heap
page read and write
1434000
heap
page read and write
79F1000
heap
page read and write
164E000
heap
page read and write
190F000
heap
page read and write
1957000
heap
page read and write
821000
unkown
page readonly
1957000
heap
page read and write
14E8000
heap
page read and write
264000
unkown
page readonly
1677000
heap
page read and write
B67000
unkown
page execute and read and write
18F6000
heap
page read and write
752F000
stack
page read and write
195C000
heap
page read and write
1948000
heap
page read and write
75A0000
trusted library allocation
page read and write
1938000
heap
page read and write
771C000
heap
page read and write
76C1000
heap
page read and write
18EC000
heap
page read and write
76BA000
heap
page read and write
B5C000
unkown
page readonly
195D000
heap
page read and write
7450000
remote allocation
page read and write
74F0000
trusted library allocation
page read and write
6FCD000
stack
page read and write
264000
unkown
page readonly
76B7000
heap
page read and write
1949000
heap
page read and write
3910000
heap
page read and write
1C2B000
heap
page read and write
19B9000
heap
page read and write
1948000
heap
page read and write
15C0000
heap
page read and write
32B0000
heap
page read and write
36B8000
direct allocation
page execute and read and write
1C49000
heap
page read and write
1922000
heap
page read and write
1963000
heap
page read and write
B52000
unkown
page execute and write copy
76C7000
heap
page read and write
440000
unkown
page execute and read and write
7488000
heap
page read and write
76B5000
heap
page read and write
76C6000
heap
page read and write
1437000
heap
page read and write
7719000
heap
page read and write
1C3B000
heap
page read and write
6F1E000
stack
page read and write
1922000
heap
page read and write
1948000
heap
page read and write
75A0000
trusted library allocation
page read and write
7719000
heap
page read and write
18EA000
heap
page read and write
183A000
heap
page read and write
3FDD000
stack
page read and write
1C2D000
heap
page read and write
19B9000
heap
page read and write
1447000
heap
page read and write
75A0000
trusted library allocation
page read and write
264000
unkown
page readonly
3C74000
direct allocation
page execute and read and write
79F1000
heap
page read and write
76D6000
heap
page read and write
76D9000
heap
page read and write
1447000
heap
page read and write
76E5000
heap
page read and write
76E4000
heap
page read and write
76E5000
heap
page read and write
6A29000
heap
page read and write
712B000
heap
page read and write
76D4000
heap
page read and write
7890000
trusted library allocation
page read and write
7D7E000
heap
page read and write
7853000
heap
page read and write
76E7000
heap
page read and write
76D6000
heap
page read and write
681000
unkown
page execute and read and write
371E000
stack
page read and write
76E5000
heap
page read and write
78F1000
heap
page read and write
769A000
heap
page read and write
1C6E000
stack
page read and write
7944000
heap
page read and write
3464000
direct allocation
page execute and read and write
76B5000
heap
page read and write
140E000
heap
page read and write
6D2E000
stack
page read and write
1948000
heap
page read and write
1BEE000
heap
page read and write
1945000
heap
page read and write
76C8000
heap
page read and write
1713000
heap
page read and write
1965000
heap
page read and write
1BFE000
stack
page read and write
3464000
direct allocation
page execute and read and write
186E000
heap
page read and write
1C45000
heap
page read and write
18F6000
heap
page read and write
76CC000
heap
page read and write
19FE000
stack
page read and write
1905000
heap
page read and write
74BE000
stack
page read and write
1938000
heap
page read and write
6B10000
heap
page read and write
14D5000
heap
page read and write
79F1000
heap
page read and write
252000
unkown
page execute and read and write
7120000
trusted library allocation
page read and write
7719000
heap
page read and write
76C6000
heap
page read and write
21A000
unkown
page execute and write copy
18F6000
heap
page read and write
3C68000
direct allocation
page execute and read and write
472F000
stack
page read and write
195A000
heap
page read and write
1791000
heap
page read and write
1420000
heap
page read and write
794E000
heap
page read and write
76A8000
heap
page read and write
1942000
heap
page read and write
3C74000
direct allocation
page execute and read and write
7A23000
heap
page read and write
9C1000
unkown
page execute and read and write
1942000
heap
page read and write
7A56000
heap
page read and write
6A0D000
stack
page read and write
1922000
heap
page read and write
B61000
unkown
page readonly
3464000
direct allocation
page execute and read and write
680D000
stack
page read and write
14C8000
heap
page read and write
76A8000
heap
page read and write
1922000
heap
page read and write
1447000
heap
page read and write
242000
unkown
page execute and read and write
79FC000
heap
page read and write
1B70000
heap
page read and write
B1A000
unkown
page execute and write copy
74F0000
trusted library allocation
page read and write
14DD000
heap
page read and write
17B0000
heap
page read and write
261000
unkown
page readonly
1713000
heap
page read and write
76C6000
heap
page read and write
D10000
heap
page read and write
71EF000
stack
page read and write
78F1000
heap
page read and write
17BF000
stack
page read and write
3A7F000
stack
page read and write
74F0000
trusted library allocation
page read and write
76E5000
heap
page read and write
190F000
heap
page read and write
3C54000
direct allocation
page execute and read and write
3F3F000
stack
page read and write
76B5000
heap
page read and write
76D5000
heap
page read and write
1969000
heap
page read and write
1922000
heap
page read and write
76AB000
heap
page read and write
76DA000
heap
page read and write
B61000
unkown
page readonly
1675000
heap
page read and write
79FB000
heap
page read and write
18F6000
heap
page read and write
1BC4000
heap
page read and write
1938000
heap
page read and write
69EE000
stack
page read and write
76CC000
heap
page read and write
1957000
heap
page read and write
76E5000
heap
page read and write
1942000
heap
page read and write
76D5000
heap
page read and write
7D72000
heap
page read and write
1922000
heap
page read and write
79FB000
heap
page read and write
13C7000
heap
page read and write
3E3E000
stack
page read and write
7771000
heap
page read and write
1504000
heap
page read and write
1914000
heap
page read and write
FB0000
unkown
page execute and write copy
76E5000
heap
page read and write
9ED000
unkown
page execute and write copy
71C1000
heap
page read and write
C0000
unkown
page readonly
19AF000
heap
page read and write
1916000
heap
page read and write
3C44000
direct allocation
page execute and read and write
19B9000
heap
page read and write
76A9000
heap
page read and write
748C000
heap
page read and write
190F000
heap
page read and write
7671000
heap
page read and write
1942000
heap
page read and write
3464000
direct allocation
page execute and read and write
1922000
heap
page read and write
17B7000
heap
page read and write
79F1000
heap
page read and write
802000
unkown
page execute and read and write
18EC000
heap
page read and write
3D44000
direct allocation
page execute and read and write
1938000
heap
page read and write
196A000
heap
page read and write
19B9000
heap
page read and write
76D3000
heap
page read and write
1950000
heap
page read and write
196A000
heap
page read and write
1432000
heap
page read and write
76C6000
heap
page read and write
21A000
unkown
page execute and write copy
1954000
heap
page read and write
76B5000
heap
page read and write
76C4000
heap
page read and write
73C5000
heap
page read and write
67D8000
heap
page read and write
3C74000
direct allocation
page execute and read and write
160A000
heap
page read and write
14DB000
heap
page read and write
9C1000
unkown
page execute and read and write
7A08000
heap
page read and write
261000
unkown
page readonly
76E6000
heap
page read and write
1938000
heap
page read and write
1938000
heap
page read and write
401E000
stack
page read and write
76A8000
heap
page read and write
1987000
heap
page read and write
6209000
heap
page read and write
36A0000
direct allocation
page execute and read and write
75A0000
trusted library allocation
page read and write
3FC0000
remote allocation
page read and write
74F0000
trusted library allocation
page read and write
1B87000
heap
page read and write
76D5000
heap
page read and write
194A000
heap
page read and write
6B6E000
stack
page read and write
184C000
heap
page read and write
7EF00000
direct allocation
page execute and read and write
190F000
heap
page read and write
7709000
heap
page read and write
15C3000
heap
page read and write
79F1000
heap
page read and write
3660000
remote allocation
page read and write
76E4000
heap
page read and write
7CD0000
trusted library allocation
page read and write
14ED000
heap
page read and write
79F5000
heap
page read and write
14E6000
heap
page read and write
7CB6000
heap
page read and write
14D5000
heap
page read and write
1738000
heap
page read and write
B5C000
unkown
page readonly
1938000
heap
page read and write
79F1000
heap
page read and write
F8B000
stack
page read and write
6E8F000
stack
page read and write
19B9000
heap
page read and write
680000
unkown
page readonly
190F000
heap
page read and write
76E3000
heap
page read and write
76BA000
heap
page read and write
B67000
unkown
page execute and write copy
76CC000
heap
page read and write
76CD000
heap
page read and write
1CCA000
heap
page read and write
1BBA000
heap
page read and write
76D6000
heap
page read and write
18E8000
heap
page read and write
3C54000
direct allocation
page execute and read and write
76C6000
heap
page read and write
1713000
heap
page read and write
1938000
heap
page read and write
7CD0000
trusted library allocation
page read and write
6FEE000
stack
page read and write
14E6000
heap
page read and write
73CE000
stack
page read and write
33A0000
direct allocation
page execute and read and write
19B9000
heap
page read and write
1942000
heap
page read and write
12F0000
unkown
page execute and read and write
76C6000
heap
page read and write
658E000
stack
page read and write
7719000
heap
page read and write
76CA000
heap
page read and write
1713000
heap
page read and write
74F000
unkown
page execute and read and write
7120000
trusted library allocation
page read and write
74F000
unkown
page execute and read and write
3660000
remote allocation
page read and write
3D50000
direct allocation
page execute and read and write
79F1000
heap
page read and write
79F7000
heap
page read and write
1752000
heap
page read and write
388E000
stack
page read and write
748C000
heap
page read and write
3FAE000
stack
page read and write
1866000
heap
page read and write
1987000
heap
page read and write
165D000
heap
page read and write
1745000
heap
page read and write
6B0E000
stack
page read and write
B64000
unkown
page readonly
1713000
heap
page read and write
802000
unkown
page execute and write copy
1B2E000
stack
page read and write
76FE000
stack
page read and write
18EC000
heap
page read and write
1452000
heap
page read and write
156D000
heap
page read and write
1BEA000
heap
page read and write
771D000
heap
page read and write
3D3F000
stack
page read and write
1419000
heap
page read and write
C97000
unkown
page execute and read and write
7CD0000
trusted library allocation
page read and write
165B000
heap
page read and write
76C0000
heap
page read and write
123E000
stack
page read and write
1BE5000
heap
page read and write
76A8000
heap
page read and write
3B1E000
stack
page read and write
1504000
heap
page read and write
182D000
heap
page read and write
1956000
heap
page read and write
76A9000
heap
page read and write
242000
unkown
page execute and read and write
1947000
heap
page read and write
1945000
heap
page read and write
19A2000
heap
page read and write
19B9000
heap
page read and write
1942000
heap
page read and write
76E7000
heap
page read and write
76B4000
heap
page read and write
71CF000
stack
page read and write
143C000
heap
page read and write
18F7000
heap
page read and write
B64000
unkown
page readonly
7708000
heap
page read and write
1713000
heap
page read and write
7770000
heap
page read and write
76C6000
heap
page read and write
1662000
heap
page read and write
78F1000
heap
page read and write
176B000
heap
page read and write
1924000
heap
page read and write
6EB0000
remote allocation
page read and write
1C39000
heap
page read and write
1945000
heap
page read and write
3C50000
direct allocation
page execute and read and write
34B0000
heap
page read and write
3420000
direct allocation
page execute and read and write
3454000
direct allocation
page execute and read and write
1C4C000
heap
page read and write
16FD000
heap
page read and write
76C4000
heap
page read and write
7BF2000
heap
page read and write
771B000
heap
page read and write
74F0000
trusted library allocation
page read and write
1711000
heap
page read and write
3D44000
direct allocation
page execute and read and write
3C54000
direct allocation
page execute and read and write
18E4000
heap
page read and write
7BFD000
heap
page read and write
1949000
heap
page read and write
78FE000
stack
page read and write
1948000
heap
page read and write
198C000
heap
page read and write
3F40000
heap
page read and write
196E000
heap
page read and write
1938000
heap
page read and write
13F5000
heap
page read and write
1938000
heap
page read and write
1942000
heap
page read and write
3BA0000
heap
page read and write
824000
unkown
page readonly
190F000
heap
page read and write
76E3000
heap
page read and write
7D8C000
heap
page read and write
3B80000
heap
page read and write
16F3000
heap
page read and write
81C000
unkown
page readonly
14CD000
heap
page read and write
390E000
stack
page read and write
14AF000
heap
page read and write
7121000
heap
page read and write
190F000
heap
page read and write
252000
unkown
page execute and write copy
194F000
heap
page read and write
36A4000
direct allocation
page execute and read and write
183E000
heap
page read and write
67CD000
stack
page read and write
73C3000
heap
page read and write
76E9000
heap
page read and write
78F1000
heap
page read and write
3880000
heap
page read and write
1C56000
heap
page read and write
14EF000
heap
page read and write
3F6E000
stack
page read and write
136E000
stack
page read and write
1949000
heap
page read and write
76E9000
heap
page read and write
6F2D000
stack
page read and write
1414000
heap
page read and write
12F0000
direct allocation
page execute and read and write
190F000
heap
page read and write
1953000
heap
page read and write
1942000
heap
page read and write
19B9000
heap
page read and write
7450000
remote allocation
page read and write
3160000
direct allocation
page execute and read and write
13FA000
stack
page read and write
76CE000
heap
page read and write
681000
unkown
page execute and write copy
69F1000
heap
page read and write
17F0000
heap
page read and write
6C4F000
stack
page read and write
76F9000
heap
page read and write
3C64000
direct allocation
page execute and read and write
190F000
heap
page read and write
1B57000
heap
page read and write
1950000
heap
page read and write
3C30000
direct allocation
page execute and read and write
1952000
heap
page read and write
76B5000
heap
page read and write
18F6000
heap
page read and write
15AB000
stack
page read and write
19B9000
heap
page read and write
1711000
heap
page read and write
7120000
trusted library allocation
page read and write
79F1000
heap
page read and write
6C2E000
stack
page read and write
38D0000
heap
page read and write
196A000
heap
page read and write
19B9000
heap
page read and write
1942000
heap
page read and write
711F000
stack
page read and write
19B7000
heap
page read and write
79F1000
heap
page read and write
7CB5000
heap
page read and write
1942000
heap
page read and write
1713000
heap
page read and write
12ED000
unkown
page execute and write copy
46BF000
stack
page read and write
176B000
heap
page read and write
1965000
heap
page read and write
76E6000
heap
page read and write
712B000
heap
page read and write
19B9000
heap
page read and write
196A000
heap
page read and write
18F6000
heap
page read and write
3B5E000
stack
page read and write
1848000
heap
page read and write
15E0000
heap
page read and write
76F9000
heap
page read and write
7CD0000
trusted library allocation
page read and write
394E000
stack
page read and write
76B8000
heap
page read and write
76E7000
heap
page read and write
38D0000
heap
page read and write
409D000
stack
page read and write
195E000
heap
page read and write
38CE000
stack
page read and write
190F000
heap
page read and write
76B4000
heap
page read and write
76E9000
heap
page read and write
190F000
heap
page read and write
76B8000
heap
page read and write
196A000
heap
page read and write
1922000
heap
page read and write
18F4000
heap
page read and write
156E000
heap
page read and write
7A02000
heap
page read and write
76BF000
stack
page read and write
1BC9000
heap
page read and write
76B5000
heap
page read and write
1691000
heap
page read and write
3FC0000
remote allocation
page read and write
1955000
heap
page read and write
6DCC000
stack
page read and write
195D000
heap
page read and write
1C3E000
heap
page read and write
196A000
heap
page read and write
71C0000
heap
page read and write
1958000
heap
page read and write
76AB000
heap
page read and write
38A0000
direct allocation
page execute and read and write
76D6000
heap
page read and write
36F0000
heap
page read and write
620C000
heap
page read and write
1922000
heap
page read and write
397000
unkown
page execute and read and write
76DC000
heap
page read and write
CB1000
unkown
page execute and read and write
195D000
heap
page read and write
1BCE000
stack
page read and write
7CA9000
heap
page read and write
190F000
heap
page read and write
712E000
stack
page read and write
40DE000
stack
page read and write
9ED000
unkown
page execute and write copy
740E000
stack
page read and write
79FB000
heap
page read and write
190F000
heap
page read and write
17E0000
heap
page read and write
4100000
remote allocation
page read and write
76D6000
heap
page read and write
76D6000
heap
page read and write
7687000
heap
page read and write
9F0000
unkown
page execute and read and write
3D44000
direct allocation
page execute and read and write
76D0000
heap
page read and write
1958000
heap
page read and write
C1000
unkown
page execute and read and write
1948000
heap
page read and write
76C8000
heap
page read and write
74F0000
trusted library allocation
page read and write
36B0000
direct allocation
page execute and read and write
1664000
heap
page read and write
3C68000
direct allocation
page execute and read and write
7CD0000
trusted library allocation
page read and write
3B60000
direct allocation
page execute and read and write
1870000
heap
page read and write
76C6000
heap
page read and write
1BD9000
heap
page read and write
B5C000
unkown
page readonly
690E000
stack
page read and write
7CD0000
trusted library allocation
page read and write
143B000
stack
page read and write
76D7000
heap
page read and write
7DA000
unkown
page execute and write copy
3E7B000
heap
page read and write
76D5000
heap
page read and write
7DF1000
heap
page read and write
79FB000
heap
page read and write
7725000
heap
page read and write
1922000
heap
page read and write
19B9000
heap
page read and write
3EEE000
stack
page read and write
1BAE000
heap
page read and write
5F43000
heap
page read and write
1922000
heap
page read and write
104F000
unkown
page execute and read and write
76A8000
heap
page read and write
17D2000
heap
page read and write
7D87000
heap
page read and write
18EC000
heap
page read and write
67C7000
heap
page read and write
14C8000
heap
page read and write
252000
unkown
page execute and read and write
1922000
heap
page read and write
76A8000
heap
page read and write
602D000
heap
page read and write
1948000
heap
page read and write
76D6000
heap
page read and write
957000
unkown
page execute and read and write
19A2000
heap
page read and write
1954000
heap
page read and write
18F6000
heap
page read and write
1945000
heap
page read and write
190F000
heap
page read and write
3C74000
direct allocation
page execute and read and write
3C88000
direct allocation
page execute and read and write
5FF5000
heap
page read and write
18EC000
heap
page read and write
1B9F000
heap
page read and write
1993000
heap
page read and write
706F000
stack
page read and write
13A5000
heap
page read and write
16FE000
heap
page read and write
678F000
heap
page read and write
12F0000
unkown
page execute and write copy
7D87000
heap
page read and write
12ED000
unkown
page execute and write copy
1BAA000
heap
page read and write
7771000
heap
page read and write
19B9000
heap
page read and write
1BA3000
heap
page read and write
185D000
heap
page read and write
1400000
heap
page read and write
76E3000
heap
page read and write
19B9000
heap
page read and write
76C0000
heap
page read and write
76AB000
heap
page read and write
3780000
direct allocation
page execute and read and write
3D58000
direct allocation
page execute and read and write
3C74000
direct allocation
page execute and read and write
78F1000
heap
page read and write
3470000
direct allocation
page execute and read and write
1917000
heap
page read and write
76CC000
heap
page read and write
B42000
unkown
page execute and read and write
40DF000
stack
page read and write
7708000
heap
page read and write
76A8000
heap
page read and write
6244000
heap
page read and write
1684000
heap
page read and write
7BFF000
heap
page read and write
76E6000
heap
page read and write
7850000
heap
page read and write
76A8000
heap
page read and write
827000
unkown
page execute and read and write
76E7000
heap
page read and write
25C000
unkown
page readonly
7CD0000
trusted library allocation
page read and write
5FF2000
heap
page read and write
812000
unkown
page execute and write copy
12E0000
heap
page read and write
76E7000
heap
page read and write
7719000
heap
page read and write
1942000
heap
page read and write
3680000
heap
page read and write
25C000
unkown
page readonly
71C1000
heap
page read and write
76BA000
heap
page read and write
76DB000
heap
page read and write
9C0000
unkown
page readonly
194A000
heap
page read and write
7470000
heap
page read and write
1440000
heap
page read and write
652D000
stack
page read and write
7853000
heap
page read and write
1922000
heap
page read and write
638E000
stack
page read and write
3464000
direct allocation
page execute and read and write
7A02000
heap
page read and write
1900000
heap
page read and write
76CB000
heap
page read and write
195A000
heap
page read and write
3B1000
unkown
page execute and read and write
1953000
heap
page read and write
81C000
unkown
page readonly
824000
unkown
page readonly
104F000
unkown
page execute and read and write
7725000
heap
page read and write
3478000
direct allocation
page execute and read and write
267000
unkown
page execute and write copy
15E0000
heap
page read and write
440000
unkown
page execute and read and write
3C60000
direct allocation
page execute and read and write
9C1000
unkown
page execute and write copy
79F1000
heap
page read and write
1AF0000
heap
page read and write
267000
unkown
page execute and read and write
76E9000
heap
page read and write
1945000
heap
page read and write
36A4000
direct allocation
page execute and read and write
76E9000
heap
page read and write
755B000
heap
page read and write
76D6000
heap
page read and write
195C000
heap
page read and write
1942000
heap
page read and write
1BE0000
heap
page read and write
1947000
heap
page read and write
76B5000
heap
page read and write
1922000
heap
page read and write
3C90000
heap
page read and write
1945000
heap
page read and write
7915000
heap
page read and write
C1000
unkown
page execute and read and write
FF0000
heap
page read and write
3BB0000
heap
page read and write
9F0000
unkown
page execute and write copy
76E5000
heap
page read and write
7F740000
direct allocation
page execute and read and write
79F1000
heap
page read and write
79F1000
heap
page read and write
1910000
heap
page read and write
3C74000
direct allocation
page execute and read and write
7CD0000
trusted library allocation
page read and write
252000
unkown
page execute and write copy
176B000
heap
page read and write
756E000
stack
page read and write
73CA000
heap
page read and write
1965000
heap
page read and write
9C0000
unkown
page readonly
76E5000
heap
page read and write
3F73000
heap
page read and write
7A55000
heap
page read and write
1F4F000
stack
page read and write
7858000
heap
page read and write
75A0000
trusted library allocation
page read and write
7708000
heap
page read and write
FB0000
unkown
page execute and read and write
7688000
heap
page read and write
78F1000
heap
page read and write
3C70000
direct allocation
page execute and read and write
A00000
unkown
page execute and read and write
742F000
stack
page read and write
3D40000
direct allocation
page execute and read and write
19BA000
heap
page read and write
18F6000
heap
page read and write
73C2000
heap
page read and write
1938000
heap
page read and write
754A000
heap
page read and write
1942000
heap
page read and write
1870000
heap
page read and write
3C70000
heap
page read and write
69EE000
heap
page read and write
195D000
heap
page read and write
7A02000
heap
page read and write
155E000
stack
page read and write
76E2000
heap
page read and write
190F000
heap
page read and write
7A61000
heap
page read and write
1945000
heap
page read and write
747B000
heap
page read and write
B42000
unkown
page execute and write copy
1B80000
heap
page read and write
11FB000
stack
page read and write
36A4000
direct allocation
page execute and read and write
1942000
heap
page read and write
1964000
heap
page read and write
6887000
heap
page read and write
707C000
heap
page read and write
C0000
unkown
page readonly
76CE000
heap
page read and write
18F6000
heap
page read and write
18F7000
heap
page read and write
827000
unkown
page execute and write copy
7688000
heap
page read and write
267000
unkown
page execute and write copy
1881000
heap
page read and write
76E4000
heap
page read and write
1957000
heap
page read and write
3950000
heap
page read and write
76B7000
heap
page read and write
76C0000
heap
page read and write
1945000
heap
page read and write
79F1000
heap
page read and write
1445000
heap
page read and write
19B7000
heap
page read and write
76B5000
heap
page read and write
14EB000
heap
page read and write
3D34000
direct allocation
page execute and read and write
7A02000
heap
page read and write
7CD0000
trusted library allocation
page read and write
76C2000
heap
page read and write
20AF000
stack
page read and write
76E4000
heap
page read and write
47CF000
stack
page read and write
12F0000
unkown
page execute and write copy
194D000
heap
page read and write
1310000
heap
page read and write
17B5000
heap
page read and write
76D9000
heap
page read and write
76E6000
heap
page read and write
19B9000
heap
page read and write
1C43000
heap
page read and write
36B8000
direct allocation
page execute and read and write
3683000
heap
page read and write
1954000
heap
page read and write
1948000
heap
page read and write
74F0000
trusted library allocation
page read and write
76F9000
heap
page read and write
3D44000
direct allocation
page execute and read and write
76E3000
heap
page read and write
7BFF000
heap
page read and write
FAD000
unkown
page execute and write copy
3464000
direct allocation
page execute and read and write
18F6000
heap
page read and write
76D4000
heap
page read and write
6FAD000
stack
page read and write
79F1000
heap
page read and write
3550000
heap
page read and write
1713000
heap
page read and write
1B9B000
heap
page read and write
76E0000
heap
page read and write
18F6000
heap
page read and write
3260000
heap
page read and write
18F0000
heap
page read and write
1938000
heap
page read and write
7472000
heap
page read and write
1922000
heap
page read and write
75A0000
trusted library allocation
page read and write
18F7000
heap
page read and write
1958000
heap
page read and write
B61000
unkown
page readonly
7671000
heap
page read and write
17B7000
heap
page read and write
18F5000
heap
page read and write
B1A000
unkown
page execute and write copy
1B8E000
heap
page read and write
76B7000
heap
page read and write
7CD0000
trusted library allocation
page read and write
19B9000
heap
page read and write
1942000
heap
page read and write
1B85000
heap
page read and write
1600000
heap
page read and write
1900000
heap
page read and write
155B000
stack
page read and write
78F0000
heap
page read and write
44BF000
stack
page read and write
3F70000
heap
page read and write
14AF000
heap
page read and write
3660000
direct allocation
page execute and read and write
3D44000
direct allocation
page execute and read and write
19FC000
stack
page read and write
79FB000
heap
page read and write
71C1000
heap
page read and write
16E9000
heap
page read and write
1938000
heap
page read and write
3870000
heap
page read and write
7CA9000
heap
page read and write
76E9000
heap
page read and write
19B9000
heap
page read and write
3E7E000
stack
page read and write
There are 1293 hidden memdumps, click here to show them.