IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D1SiR_BVePEjKzuadHx_JwJ.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\zDi5_AnRQpJszWGhtVDPo4q.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_4ff78eb511e9ac22ab5b6b8041e2eba262b7b25a_2d68038f_84e3953a-ab19-442c-8262-786cc4f1cd99\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_9b2024c8db3f7a3ba3e8b636e85604d8e567a71_2d68038f_a7b37e25-c665-4199-a1e0-432f73aba11d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_861171296e904e2fbf4fe342343ec91fba117fc8_4dfd30ff_7f5da373-70e7-4ba0-984f-dfac6096d171\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC95.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 22:53:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF07.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDFA5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8A9.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 22:53:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8C8.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 22:53:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA50.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA9E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA9F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB1C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\5SfIAaVD9oRDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\BJtf3N0URFctWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\DgbFyZ2gQkyGWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\E05DgKxmZ5xKLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\ExhiT_zPNV5SWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\JVSmqGXSj18IWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\N8fO9phUQXWwCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\NWmsdsaUFVHXLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\OO2Bqv93MkgOHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\a1KlZpjmP4O8History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\aRBnYAb2lZ31Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\dmMdc6wGPOe6History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\wBpYvtxChBkNCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\xjtv3h4wcgDZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDvMMPshNHUug\zXnAr1pXr2StWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\5k6XxOEVUvZtWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\81609gJM6QXLCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\EbTrCphTFGEiLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\I88nKSjxTtJmLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\Y2rNL3WQyey7Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\_FPOfGimSz5aWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\dbX0S2FxXNMEHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\isXoWbVzeQ_7History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\rdzly67tvrUhHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\rmH5cGwVgWQQHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\rsW1M0DuZr3eWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\sQbc2vl85l1MWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\wVW4ruIipVjCCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\x_O9By5ZxB3ULogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanebzrpNNMwijz\zQWs_Oe9McXZWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\trixyDvMMPshNHUug\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyDvMMPshNHUug\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyDvMMPshNHUug\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyebzrpNNMwijz\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyebzrpNNMwijz\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyebzrpNNMwijz\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 21:53:06 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 21:53:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 21:53:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 21:53:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 21:53:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 133
ASCII text, with very long lines (797)
downloaded
There are 60 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1656 --field-trial-handle=2044,i,2102298994970093420,638329119076366736,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1592 --field-trial-handle=2044,i,2102298994970093420,638329119076366736,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5996 -s 2040
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1060
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7608 -s 1976
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://147.45.47.102:57893/hera/amadka.exe
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225v
unknown
http://crl.microsoft
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGM-Py7EGIjAcQKAitKqMUDtLRvKqfuyC23FhLvjISe5YubFOHGlwiTqxFBVIZH0lidwOcKuqd9YyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.132
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225av
unknown
https://db-ip.com/
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225q
unknown
http://193.233.132.56/cost/go.exeb
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225P=
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.225P
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://193.233.132.56/cost/lenin.exe3.Y
unknown
https://t.me/risepro
unknown
https://t.me/risepro_botO
unknown
http://193.233.132.56/cost/lenin.exeser
unknown
http://193.233.132.56/cost/go.exe
unknown
https://ipinfo.io/widget/demo/191.96.150.225w&rc
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/s
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225/A
unknown
https://t.me/RiseProSUPPORTI
unknown
https://ipinfo.io/g
unknown
https://ipinfo.io/widget/demo/191.96.150.225
34.117.186.192
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.40.132
https://db-ip.com:443/demo/home.php?s=191.96.150.225
unknown
http://147.45.47.102:57893/hera/amadka.exeetslZ
unknown
http://193.233.132.56/cost/lenin.exenlataa
unknown
https://t.me/risepro_botrisepro
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGM-Py7EGIjD8QrEj1gFdvHchlLTa-4si6HNrr72UxT2vpiqG82uHrppu3FZXoKV_deHD3oWlfcwyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.132
https://t.me/RiseProSUPPORTAM
unknown
http://193.233.132.56/cost/go.exeadka.exeata
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://t.me/risepro_bot&.N
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.251.40.132
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225im
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225
unknown
https://www.ecosia.org/newtab/
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225
172.67.75.166
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/191.96.150.225ao
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://t.=
unknown
http://193.233.132.56/cost/go.exe50.225
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225h
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.40.132
https://t.me/risepro_botlater
unknown
https://ipinfo.io/
unknown
http://pki-ocsp.symauth.com0
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://147.45.47.102:57893/hera/amadka.exeets
unknown
http://193.233.132.56/cost/lenin.exeiner
unknown
http://193.233.132.56/cost/lenin.exey
unknown
http://193.233.132.56/cost/lenin.exe
unknown
http://www.winimage.com/zLibDll
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.2256
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225k
unknown
https://support.mozilla.org
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225f
unknown
http://193.233.132.56/cost/go.exeI
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/#
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
www.google.com
142.251.40.132
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States
142.251.40.132
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.14
unknown
unknown
142.251.41.4
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{aeac8850-4865-2649-4d5b-4ee20a1a7ca0}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 40 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2120000
heap
page read and write
malicious
89F000
heap
page read and write
malicious
15FE000
heap
page read and write
malicious
7C7000
heap
page read and write
malicious
16DA000
heap
page read and write
malicious
203D000
heap
page read and write
malicious
2177000
heap
page read and write
malicious
172F000
heap
page read and write
6D1E000
stack
page read and write
219D000
heap
page read and write
F74000
unkown
page readonly
94B000
heap
page read and write
91B000
heap
page read and write
754C000
heap
page read and write
7553000
heap
page read and write
7EC50000
direct allocation
page execute and read and write
8E9000
heap
page read and write
7441000
heap
page read and write
3798000
direct allocation
page execute and read and write
909000
heap
page read and write
21A9000
heap
page read and write
1707000
heap
page read and write
8D0000
heap
page read and write
7ECD000
heap
page read and write
3790000
direct allocation
page execute and read and write
91E000
heap
page read and write
73E0000
trusted library allocation
page read and write
7467000
heap
page read and write
7441000
heap
page read and write
45A0000
remote allocation
page read and write
957000
heap
page read and write
A50000
heap
page read and write
21B8000
heap
page read and write
96D000
heap
page read and write
219A000
heap
page read and write
4174000
direct allocation
page execute and read and write
982000
heap
page read and write
7457000
heap
page read and write
70D6000
heap
page read and write
FF1000
unkown
page readonly
4BAF000
stack
page read and write
945000
heap
page read and write
96D000
heap
page read and write
945000
heap
page read and write
2092000
heap
page read and write
172C000
heap
page read and write
94D000
heap
page read and write
907000
heap
page read and write
1FF0000
heap
page read and write
946000
heap
page read and write
744D000
heap
page read and write
945000
heap
page read and write
44A0000
remote allocation
page read and write
6E7F000
stack
page read and write
94D000
heap
page read and write
75AD000
heap
page read and write
DBE000
stack
page read and write
38A0000
heap
page read and write
1B7000
heap
page read and write
FAA000
unkown
page execute and write copy
926000
heap
page read and write
907000
heap
page read and write
219D000
heap
page read and write
33B0000
heap
page read and write
945000
heap
page read and write
21BA000
heap
page read and write
75AE000
heap
page read and write
70D5000
heap
page read and write
2000000
heap
page read and write
2182000
heap
page read and write
218A000
heap
page read and write
73AE000
stack
page read and write
3780000
direct allocation
page execute and read and write
21AB000
heap
page read and write
213F000
heap
page read and write
20E8000
heap
page read and write
920000
heap
page read and write
17B000
stack
page read and write
1734000
heap
page read and write
745A000
heap
page read and write
1EC0000
heap
page read and write
AB0000
heap
page read and write
213F000
heap
page read and write
1029000
unkown
page execute and read and write
11D0000
unkown
page execute and read and write
7441000
heap
page read and write
214B000
heap
page read and write
907000
heap
page read and write
173E000
heap
page read and write
F62000
unkown
page execute and read and write
91E000
heap
page read and write
1749000
heap
page read and write
959000
heap
page read and write
3774000
direct allocation
page execute and read and write
754F000
heap
page read and write
1F67000
heap
page read and write
218A000
heap
page read and write
8F3000
heap
page read and write
40CF000
stack
page read and write
178F000
unkown
page execute and write copy
6CDF000
stack
page read and write
958000
heap
page read and write
2193000
heap
page read and write
3A2A000
heap
page read and write
203A000
heap
page read and write
909000
heap
page read and write
95D000
heap
page read and write
172F000
heap
page read and write
2183000
heap
page read and write
1657000
heap
page read and write
7450000
heap
page read and write
45E0000
heap
page read and write
6010000
heap
page read and write
754F000
heap
page read and write
754B000
heap
page read and write
1747000
heap
page read and write
21A9000
heap
page read and write
3330000
heap
page read and write
4188000
direct allocation
page execute and read and write
907000
heap
page read and write
2182000
heap
page read and write
170B000
heap
page read and write
7ECD000
heap
page read and write
173E000
heap
page read and write
8FC000
heap
page read and write
329E000
stack
page read and write
218C000
heap
page read and write
1775000
heap
page read and write
4030000
heap
page read and write
78C1000
heap
page read and write
794E000
stack
page read and write
16D6000
heap
page read and write
1DFB000
stack
page read and write
170B000
heap
page read and write
3390000
direct allocation
page execute and read and write
219D000
heap
page read and write
94D000
heap
page read and write
213F000
heap
page read and write
6ACD000
stack
page read and write
957000
heap
page read and write
2198000
heap
page read and write
167F000
heap
page read and write
8F1000
heap
page read and write
8070000
trusted library allocation
page read and write
957000
heap
page read and write
2196000
heap
page read and write
7546000
heap
page read and write
44CD000
stack
page read and write
1EB0000
heap
page read and write
176A000
heap
page read and write
D10000
unkown
page execute and read and write
3784000
direct allocation
page execute and read and write
907000
heap
page read and write
8FC000
heap
page read and write
1747000
heap
page read and write
166D000
heap
page read and write
94D000
heap
page read and write
973000
heap
page read and write
907000
heap
page read and write
2198000
heap
page read and write
DD1000
unkown
page execute and read and write
4100000
heap
page read and write
8E4000
heap
page read and write
429F000
stack
page read and write
1747000
heap
page read and write
9B7000
heap
page read and write
33A0000
heap
page read and write
6C7E000
stack
page read and write
21AB000
heap
page read and write
7541000
heap
page read and write
9B7000
heap
page read and write
2196000
heap
page read and write
173E000
heap
page read and write
218C000
heap
page read and write
3564000
direct allocation
page execute and read and write
79EE000
stack
page read and write
960000
heap
page read and write
17A8000
heap
page read and write
71AE000
stack
page read and write
249F000
stack
page read and write
409F000
stack
page read and write
957000
heap
page read and write
4254000
direct allocation
page execute and read and write
3784000
direct allocation
page execute and read and write
1709000
heap
page read and write
1709000
heap
page read and write
7820000
trusted library allocation
page read and write
754C000
heap
page read and write
4254000
direct allocation
page execute and read and write
957000
heap
page read and write
957000
heap
page read and write
8E4000
heap
page read and write
919000
heap
page read and write
745C000
heap
page read and write
16FA000
heap
page read and write
219B000
heap
page read and write
754C000
heap
page read and write
9B7000
heap
page read and write
3F7E000
stack
page read and write
172F000
heap
page read and write
919000
heap
page read and write
3880000
remote allocation
page read and write
4164000
direct allocation
page execute and read and write
1747000
heap
page read and write
8180000
heap
page read and write
1747000
heap
page read and write
21AC000
heap
page read and write
220E000
heap
page read and write
7BF1000
heap
page read and write
178F000
unkown
page execute and read and write
19EF000
stack
page read and write
219B000
heap
page read and write
3798000
direct allocation
page execute and read and write
73A3000
heap
page read and write
946000
heap
page read and write
2186000
heap
page read and write
951000
heap
page read and write
7543000
heap
page read and write
17BB000
heap
page read and write
7540000
trusted library allocation
page read and write
21AB000
heap
page read and write
960000
heap
page read and write
2184000
heap
page read and write
3784000
direct allocation
page execute and read and write
11D0000
unkown
page execute and read and write
2168000
heap
page read and write
3784000
direct allocation
page execute and read and write
8EF000
heap
page read and write
817000
heap
page read and write
957000
heap
page read and write
957000
heap
page read and write
913000
heap
page read and write
7452000
heap
page read and write
1141000
unkown
page execute and read and write
8E9000
heap
page read and write
44B3000
heap
page read and write
1673000
heap
page read and write
8FE000
stack
page read and write
63C9000
heap
page read and write
8F2000
heap
page read and write
70C5000
heap
page read and write
3780000
heap
page read and write
91B000
heap
page read and write
8D1000
heap
page read and write
2191000
heap
page read and write
94E000
heap
page read and write
1747000
heap
page read and write
172F000
heap
page read and write
7450000
heap
page read and write
20EE000
heap
page read and write
745A000
heap
page read and write
914000
heap
page read and write
957000
heap
page read and write
945000
heap
page read and write
7458000
heap
page read and write
7ECB000
heap
page read and write
219B000
heap
page read and write
21D4000
heap
page read and write
16FD000
heap
page read and write
971000
heap
page read and write
F52000
unkown
page execute and write copy
1765000
heap
page read and write
3740000
direct allocation
page execute and read and write
91B000
heap
page read and write
955000
heap
page read and write
76AF000
stack
page read and write
7440000
heap
page read and write
1E30000
heap
page read and write
78EF000
stack
page read and write
DD1000
unkown
page execute and write copy
95E000
heap
page read and write
837000
heap
page read and write
635B000
heap
page read and write
1734000
heap
page read and write
70CB000
heap
page read and write
957000
heap
page read and write
1747000
heap
page read and write
173E000
heap
page read and write
1787000
heap
page read and write
7454000
heap
page read and write
945000
heap
page read and write
926000
heap
page read and write
2186000
heap
page read and write
7EDD000
heap
page read and write
FF4000
unkown
page readonly
4268000
direct allocation
page execute and read and write
20E5000
heap
page read and write
173E000
heap
page read and write
17BB000
heap
page read and write
78D2000
heap
page read and write
907000
heap
page read and write
70C5000
heap
page read and write
1734000
heap
page read and write
20A0000
heap
page read and write
172F000
heap
page read and write
744B000
heap
page read and write
754C000
heap
page read and write
94E000
heap
page read and write
2169000
heap
page read and write
75AD000
heap
page read and write
3160000
direct allocation
page execute and read and write
7541000
heap
page read and write
7748000
heap
page read and write
172F000
heap
page read and write
20F4000
heap
page read and write
70E000
stack
page read and write
3563000
direct allocation
page execute and read and write
DD0000
unkown
page readonly
3574000
direct allocation
page execute and read and write
8FC000
heap
page read and write
7456000
heap
page read and write
66CE000
stack
page read and write
931000
heap
page read and write
8E4000
heap
page read and write
173E000
heap
page read and write
173E000
heap
page read and write
4320000
heap
page read and write
7820000
trusted library allocation
page read and write
8E9000
heap
page read and write
7ED9000
heap
page read and write
173E000
heap
page read and write
4174000
direct allocation
page execute and read and write
1FB0000
heap
page read and write
407E000
stack
page read and write
2189000
heap
page read and write
7541000
heap
page read and write
171C000
heap
page read and write
6C0F000
stack
page read and write
20F9000
heap
page read and write
1F4E000
stack
page read and write
206A000
heap
page read and write
218C000
heap
page read and write
219D000
heap
page read and write
1127000
unkown
page execute and read and write
8FC000
heap
page read and write
7546000
heap
page read and write
8070000
trusted library allocation
page read and write
5ED000
stack
page read and write
21A9000
heap
page read and write
907000
heap
page read and write
3798000
direct allocation
page execute and read and write
7546000
heap
page read and write
8FC000
heap
page read and write
928000
heap
page read and write
2181000
heap
page read and write
94D000
heap
page read and write
21B8000
heap
page read and write
38B0000
heap
page read and write
FE2000
unkown
page execute and write copy
68CD000
stack
page read and write
945000
heap
page read and write
21AB000
heap
page read and write
78FF000
heap
page read and write
2182000
heap
page read and write
8F1000
heap
page read and write
21E2000
heap
page read and write
FF7000
unkown
page execute and read and write
8B0000
heap
page read and write
F77000
unkown
page execute and write copy
8EA000
heap
page read and write
B34000
unkown
page readonly
945000
heap
page read and write
3A5D000
stack
page read and write
702E000
stack
page read and write
8F1000
heap
page read and write
7750000
heap
page read and write
780A000
heap
page read and write
2177000
heap
page read and write
172F000
heap
page read and write
4BFF000
stack
page read and write
907000
heap
page read and write
7EC1000
heap
page read and write
7441000
heap
page read and write
7907000
heap
page read and write
3FB0000
heap
page read and write
170A000
heap
page read and write
3B00000
heap
page read and write
170B000
heap
page read and write
2182000
heap
page read and write
909000
heap
page read and write
E50000
unkown
page readonly
4260000
direct allocation
page execute and read and write
1B3E000
stack
page read and write
F77000
unkown
page execute and read and write
21BB000
heap
page read and write
7820000
trusted library allocation
page read and write
94D000
heap
page read and write
1F9D000
stack
page read and write
7ED3000
heap
page read and write
172F000
heap
page read and write
7540000
trusted library allocation
page read and write
170F000
unkown
page execute and write copy
3A9E000
stack
page read and write
3640000
direct allocation
page execute and read and write
8E4000
heap
page read and write
3FFE000
stack
page read and write
7F1F0000
direct allocation
page execute and read and write
759E000
heap
page read and write
7844000
heap
page read and write
368E000
stack
page read and write
94D000
heap
page read and write
21D4000
heap
page read and write
2182000
heap
page read and write
79AE000
stack
page read and write
934000
heap
page read and write
746D000
stack
page read and write
915000
heap
page read and write
95A000
heap
page read and write
7454000
heap
page read and write
173E000
heap
page read and write
8FC000
heap
page read and write
174A000
heap
page read and write
945000
heap
page read and write
173E000
heap
page read and write
218F000
heap
page read and write
94D000
heap
page read and write
1127000
unkown
page execute and read and write
21BA000
heap
page read and write
945000
heap
page read and write
49FF000
stack
page read and write
21A9000
heap
page read and write
F77000
unkown
page execute and write copy
7820000
trusted library allocation
page read and write
8F1000
heap
page read and write
173E000
heap
page read and write
7EC1000
heap
page read and write
1469000
unkown
page execute and read and write
3F90000
heap
page read and write
7ED3000
heap
page read and write
173E000
heap
page read and write
17BB000
heap
page read and write
7542000
heap
page read and write
7552000
heap
page read and write
3E40000
direct allocation
page execute and read and write
979000
heap
page read and write
B22000
unkown
page execute and read and write
7540000
trusted library allocation
page read and write
8F1000
heap
page read and write
9B7000
heap
page read and write
2181000
heap
page read and write
7EEC000
heap
page read and write
2155000
heap
page read and write
91E000
heap
page read and write
7541000
heap
page read and write
7441000
heap
page read and write
744B000
heap
page read and write
2182000
heap
page read and write
957000
heap
page read and write
7592000
heap
page read and write
F2A000
unkown
page execute and write copy
7446000
heap
page read and write
1747000
heap
page read and write
1F60000
heap
page read and write
1150000
unkown
page execute and read and write
7ECD000
heap
page read and write
945000
heap
page read and write
94E000
heap
page read and write
15FA000
heap
page read and write
744B000
heap
page read and write
70C5000
heap
page read and write
715F000
stack
page read and write
7463000
heap
page read and write
2119000
heap
page read and write
2077000
heap
page read and write
2182000
heap
page read and write
7820000
trusted library allocation
page read and write
6ECF000
stack
page read and write
945000
heap
page read and write
7ED5000
heap
page read and write
2177000
heap
page read and write
94D000
heap
page read and write
658D000
stack
page read and write
219D000
heap
page read and write
957000
heap
page read and write
2181000
heap
page read and write
715F000
stack
page read and write
B22000
unkown
page execute and write copy
70C5000
heap
page read and write
8F1000
heap
page read and write
74C5000
heap
page read and write
8F1000
heap
page read and write
375D000
stack
page read and write
6EF0000
remote allocation
page read and write
178F000
unkown
page execute and read and write
8F1000
heap
page read and write
8E4000
heap
page read and write
174D000
heap
page read and write
916000
heap
page read and write
B31000
unkown
page readonly
4174000
direct allocation
page execute and read and write
1707000
heap
page read and write
8E4000
heap
page read and write
8C8000
heap
page read and write
CC0000
direct allocation
page execute and read and write
F52000
unkown
page execute and read and write
2180000
heap
page read and write
3F4F000
stack
page read and write
744B000
heap
page read and write
219A000
heap
page read and write
2186000
heap
page read and write
AF3000
heap
page read and write
21AB000
heap
page read and write
957000
heap
page read and write
206D000
heap
page read and write
7443000
heap
page read and write
21A4000
heap
page read and write
2155000
heap
page read and write
922000
heap
page read and write
7C11000
heap
page read and write
1708000
heap
page read and write
70C5000
heap
page read and write
945000
heap
page read and write
8FC000
heap
page read and write
1775000
heap
page read and write
172F000
heap
page read and write
916000
heap
page read and write
1754000
heap
page read and write
6DBA000
heap
page read and write
21A9000
heap
page read and write
6C10000
remote allocation
page read and write
172F000
heap
page read and write
8070000
trusted library allocation
page read and write
20AE000
heap
page read and write
7540000
heap
page read and write
454E000
stack
page read and write
75B1000
heap
page read and write
208D000
heap
page read and write
7ECD000
heap
page read and write
1734000
heap
page read and write
6EF0000
remote allocation
page read and write
67CE000
stack
page read and write
4244000
direct allocation
page execute and read and write
21A9000
heap
page read and write
74C5000
heap
page read and write
745B000
heap
page read and write
945000
heap
page read and write
94D000
heap
page read and write
E40000
heap
page read and write
75E000
stack
page read and write
1F0E000
stack
page read and write
8E7000
heap
page read and write
916000
heap
page read and write
747C000
heap
page read and write
73A2000
heap
page read and write
21B8000
heap
page read and write
213F000
heap
page read and write
F6C000
unkown
page readonly
69CF000
stack
page read and write
339D000
stack
page read and write
A7A000
heap
page read and write
4254000
direct allocation
page execute and read and write
6F5E000
stack
page read and write
45A0000
remote allocation
page read and write
8F1000
heap
page read and write
91B000
heap
page read and write
91B000
heap
page read and write
3580000
direct allocation
page execute and read and write
2184000
heap
page read and write
8F1000
heap
page read and write
4090000
heap
page read and write
780D000
heap
page read and write
3550000
direct allocation
page execute and read and write
173E000
heap
page read and write
35AE000
stack
page read and write
21A9000
heap
page read and write
8070000
trusted library allocation
page read and write
10A7000
unkown
page execute and read and write
8C9000
heap
page read and write
7ED4000
heap
page read and write
21B0000
heap
page read and write
173E000
heap
page read and write
7455000
heap
page read and write
20FD000
heap
page read and write
16F5000
heap
page read and write
8E4000
heap
page read and write
7462000
heap
page read and write
3588000
direct allocation
page execute and read and write
2182000
heap
page read and write
94D000
heap
page read and write
1787000
heap
page read and write
1709000
heap
page read and write
6E69000
heap
page read and write
3AD0000
heap
page read and write
7484000
heap
page read and write
2185000
heap
page read and write
174C000
heap
page read and write
945000
heap
page read and write
945000
heap
page read and write
8E4000
heap
page read and write
83C000
heap
page read and write
8F1000
heap
page read and write
458E000
stack
page read and write
35B0000
heap
page read and write
8F1000
heap
page read and write
91B000
heap
page read and write
74C4000
heap
page read and write
4174000
direct allocation
page execute and read and write
17BB000
heap
page read and write
B31000
unkown
page readonly
F52000
unkown
page execute and read and write
21BA000
heap
page read and write
7441000
heap
page read and write
909000
heap
page read and write
21A9000
heap
page read and write
7459000
heap
page read and write
722C000
stack
page read and write
70D6000
heap
page read and write
7441000
heap
page read and write
7541000
heap
page read and write
2181000
heap
page read and write
982000
heap
page read and write
E2E000
stack
page read and write
12CF000
unkown
page execute and write copy
DD1000
unkown
page execute and read and write
7ED5000
heap
page read and write
915000
heap
page read and write
7EC1000
heap
page read and write
654D000
stack
page read and write
7BEF000
stack
page read and write
17BB000
heap
page read and write
1708000
heap
page read and write
E51000
unkown
page execute and write copy
75AD000
stack
page read and write
70C7000
heap
page read and write
10C1000
unkown
page execute and read and write
7540000
trusted library allocation
page read and write
980000
heap
page read and write
1747000
heap
page read and write
1F0000
heap
page read and write
FD2000
unkown
page execute and write copy
92B000
heap
page read and write
2181000
heap
page read and write
208B000
heap
page read and write
70C5000
heap
page read and write
E50000
unkown
page readonly
2181000
heap
page read and write
1150000
unkown
page execute and read and write
178C000
unkown
page execute and write copy
70D7000
heap
page read and write
15E0000
heap
page read and write
8070000
trusted library allocation
page read and write
832000
heap
page read and write
7452000
heap
page read and write
2186000
heap
page read and write
1469000
unkown
page execute and read and write
6EF0000
remote allocation
page read and write
F71000
unkown
page readonly
21AB000
heap
page read and write
3740000
direct allocation
page execute and read and write
90E000
heap
page read and write
7558000
heap
page read and write
AEC000
heap
page read and write
849000
heap
page read and write
70D5000
heap
page read and write
1749000
heap
page read and write
7540000
trusted library allocation
page read and write
1F65000
heap
page read and write
744B000
heap
page read and write
16FD000
heap
page read and write
7EE0000
heap
page read and write
2198000
heap
page read and write
7548000
heap
page read and write
70C5000
heap
page read and write
75C3000
heap
page read and write
1734000
heap
page read and write
979000
heap
page read and write
73AA000
heap
page read and write
2142000
heap
page read and write
20A7000
heap
page read and write
4210000
direct allocation
page execute and read and write
163D000
heap
page read and write
987000
heap
page read and write
7820000
trusted library allocation
page read and write
164B000
heap
page read and write
2182000
heap
page read and write
957000
heap
page read and write
176B000
heap
page read and write
212B000
heap
page read and write
4110000
direct allocation
page execute and read and write
745B000
heap
page read and write
90F000
heap
page read and write
94D000
heap
page read and write
21E2000
heap
page read and write
2169000
heap
page read and write
172F000
heap
page read and write
4DAF000
stack
page read and write
F6C000
unkown
page readonly
6A0E000
stack
page read and write
7441000
heap
page read and write
21AB000
heap
page read and write
95E000
heap
page read and write
915000
heap
page read and write
907000
heap
page read and write
1C5B000
stack
page read and write
7820000
trusted library allocation
page read and write
2183000
heap
page read and write
7552000
heap
page read and write
73A3000
heap
page read and write
215B000
heap
page read and write
907000
heap
page read and write
7BF1000
heap
page read and write
754C000
heap
page read and write
ABE000
heap
page read and write
DD0000
unkown
page readonly
1747000
heap
page read and write
7EC5000
heap
page read and write
ACF000
heap
page read and write
170C000
unkown
page execute and write copy
21A3000
heap
page read and write
21B8000
heap
page read and write
218C000
heap
page read and write
219A000
heap
page read and write
965000
heap
page read and write
2182000
heap
page read and write
8FC000
heap
page read and write
957000
heap
page read and write
8FC000
heap
page read and write
21AB000
heap
page read and write
20C0000
heap
page read and write
7554000
heap
page read and write
784C000
heap
page read and write
3430000
direct allocation
page execute and read and write
219D000
heap
page read and write
7EE2000
heap
page read and write
9B7000
heap
page read and write
174F000
heap
page read and write
21D4000
heap
page read and write
754C000
heap
page read and write
7562000
heap
page read and write
4188000
direct allocation
page execute and read and write
91B000
heap
page read and write
759E000
heap
page read and write
957000
heap
page read and write
7ECB000
heap
page read and write
20A4000
heap
page read and write
1687000
heap
page read and write
1747000
heap
page read and write
170B000
heap
page read and write
7465000
heap
page read and write
E51000
unkown
page execute and write copy
7441000
heap
page read and write
987000
heap
page read and write
1754000
heap
page read and write
178F000
unkown
page execute and write copy
1E4D000
stack
page read and write
2169000
heap
page read and write
7ED0000
heap
page read and write
2181000
heap
page read and write
2126000
heap
page read and write
94D000
heap
page read and write
2185000
heap
page read and write
219A000
heap
page read and write
7441000
heap
page read and write
72D0000
trusted library allocation
page read and write
70C1000
heap
page read and write
10C1000
unkown
page execute and read and write
917000
heap
page read and write
F62000
unkown
page execute and write copy
2177000
heap
page read and write
2197000
heap
page read and write
164D000
heap
page read and write
2182000
heap
page read and write
3784000
direct allocation
page execute and read and write
17BB000
heap
page read and write
218C000
heap
page read and write
21EC000
heap
page read and write
4120000
heap
page read and write
754C000
heap
page read and write
907000
heap
page read and write
748B000
heap
page read and write
FF7000
unkown
page execute and read and write
8070000
trusted library allocation
page read and write
70C6000
heap
page read and write
971000
heap
page read and write
219D000
heap
page read and write
8F1000
heap
page read and write
20AE000
heap
page read and write
855000
heap
page read and write
1747000
heap
page read and write
3490000
direct allocation
page execute and read and write
754E000
heap
page read and write
2196000
heap
page read and write
16FA000
heap
page read and write
7441000
heap
page read and write
FE2000
unkown
page execute and write copy
94E000
heap
page read and write
170F000
unkown
page execute and read and write
3570000
direct allocation
page execute and read and write
756B000
heap
page read and write
7741000
heap
page read and write
916000
heap
page read and write
2155000
heap
page read and write
6391000
heap
page read and write
800000
heap
page read and write
7EC3000
heap
page read and write
AFF000
heap
page read and write
915000
heap
page read and write
1709000
heap
page read and write
7BF0000
heap
page read and write
4268000
direct allocation
page execute and read and write
73A1000
heap
page read and write
8D1000
heap
page read and write
907000
heap
page read and write
62AC000
heap
page read and write
20D7000
heap
page read and write
74AE000
stack
page read and write
92B000
heap
page read and write
907000
heap
page read and write
828000
heap
page read and write
FEC000
unkown
page readonly
AC8000
heap
page read and write
173E000
heap
page read and write
DD0000
unkown
page readonly
21A4000
heap
page read and write
8FC000
heap
page read and write
7820000
trusted library allocation
page read and write
21A9000
heap
page read and write
C81000
unkown
page execute and read and write
173E000
heap
page read and write
3798000
direct allocation
page execute and read and write
1647000
heap
page read and write
8E9000
heap
page read and write
4254000
direct allocation
page execute and read and write
7441000
heap
page read and write
6396000
heap
page read and write
1747000
heap
page read and write
907000
heap
page read and write
2155000
heap
page read and write
909000
heap
page read and write
8070000
trusted library allocation
page read and write
7541000
heap
page read and write
3ABE000
stack
page read and write
174A000
heap
page read and write
8F1000
heap
page read and write
7ED7000
heap
page read and write
945000
heap
page read and write
754C000
heap
page read and write
7548000
heap
page read and write
96D000
heap
page read and write
7467000
heap
page read and write
2181000
heap
page read and write
A7E000
heap
page read and write
172F000
heap
page read and write
77F1000
heap
page read and write
745A000
heap
page read and write
92C000
heap
page read and write
8F1000
heap
page read and write
945000
heap
page read and write
94D000
heap
page read and write
7DF0000
trusted library allocation
page read and write
907000
heap
page read and write
1709000
heap
page read and write
91B000
heap
page read and write
1FC0000
direct allocation
page execute and read and write
909000
heap
page read and write
218A000
heap
page read and write
21B8000
heap
page read and write
219A000
heap
page read and write
3588000
direct allocation
page execute and read and write
21AB000
heap
page read and write
6CED000
heap
page read and write
1190000
unkown
page execute and read and write
17BB000
heap
page read and write
17BB000
heap
page read and write
170B000
heap
page read and write
7EC3000
heap
page read and write
7FB000
heap
page read and write
7741000
heap
page read and write
1709000
heap
page read and write
70BF000
stack
page read and write
7540000
trusted library allocation
page read and write
8FC000
heap
page read and write
17BB000
heap
page read and write
1747000
heap
page read and write
935000
heap
page read and write
93E000
stack
page read and write
2196000
heap
page read and write
173E000
heap
page read and write
943000
heap
page read and write
172F000
heap
page read and write
8FC000
heap
page read and write
8F1000
heap
page read and write
7548000
heap
page read and write
3730000
heap
page read and write
8FC000
heap
page read and write
21B0000
heap
page read and write
7443000
heap
page read and write
70D9000
heap
page read and write
1754000
heap
page read and write
945000
heap
page read and write
20F7000
heap
page read and write
F74000
unkown
page readonly
1747000
heap
page read and write
94E000
heap
page read and write
2023000
heap
page read and write
90C000
heap
page read and write
216C000
heap
page read and write
174A000
heap
page read and write
2099000
heap
page read and write
FE2000
unkown
page execute and read and write
755C000
heap
page read and write
219D000
heap
page read and write
710000
heap
page read and write
8EB000
heap
page read and write
2189000
heap
page read and write
2191000
heap
page read and write
21A9000
heap
page read and write
92E000
heap
page read and write
94E000
heap
page read and write
7742000
heap
page read and write
7EC1000
heap
page read and write
805000
heap
page read and write
2177000
heap
page read and write
F71000
unkown
page readonly
21A9000
heap
page read and write
FEC000
unkown
page readonly
7F000000
direct allocation
page execute and read and write
991000
unkown
page execute and write copy
1747000
heap
page read and write
BBF000
stack
page read and write
7454000
heap
page read and write
7441000
heap
page read and write
4254000
direct allocation
page execute and read and write
907000
heap
page read and write
DC0000
direct allocation
page execute and read and write
8E4000
heap
page read and write
1652000
heap
page read and write
2191000
heap
page read and write
1735000
heap
page read and write
17BB000
heap
page read and write
14E9000
unkown
page execute and read and write
211D000
heap
page read and write
1709000
heap
page read and write
7ED7000
heap
page read and write
FF7000
unkown
page execute and write copy
957000
heap
page read and write
1749000
heap
page read and write
219F000
heap
page read and write
7F8F0000
direct allocation
page execute and read and write
3AFE000
stack
page read and write
957000
heap
page read and write
3530000
direct allocation
page execute and read and write
34D3000
heap
page read and write
FD2000
unkown
page execute and read and write
3784000
direct allocation
page execute and read and write
70C1000
heap
page read and write
21A9000
heap
page read and write
634E000
stack
page read and write
909000
heap
page read and write
3784000
direct allocation
page execute and read and write
919000
heap
page read and write
FD2000
unkown
page execute and read and write
221A000
heap
page read and write
6048000
heap
page read and write
7BF1000
heap
page read and write
FAA000
unkown
page execute and write copy
172F000
heap
page read and write
170B000
heap
page read and write
21A9000
heap
page read and write
7820000
trusted library allocation
page read and write
173E000
heap
page read and write
91F000
heap
page read and write
746C000
heap
page read and write
78D4000
heap
page read and write
913000
heap
page read and write
E51000
unkown
page execute and read and write
2184000
heap
page read and write
172F000
heap
page read and write
8E9000
heap
page read and write
218A000
heap
page read and write
20AC000
heap
page read and write
1E5A000
stack
page read and write
AD7000
heap
page read and write
726D000
stack
page read and write
8E9000
heap
page read and write
7CF1000
heap
page read and write
7456000
heap
page read and write
7ECE000
heap
page read and write
754C000
heap
page read and write
1141000
unkown
page execute and read and write
207C000
heap
page read and write
2020000
heap
page read and write
745D000
heap
page read and write
7563000
heap
page read and write
448E000
stack
page read and write
931000
heap
page read and write
21A4000
heap
page read and write
3780000
direct allocation
page execute and read and write
2182000
heap
page read and write
3784000
direct allocation
page execute and read and write
909000
heap
page read and write
1747000
heap
page read and write
7EE4000
heap
page read and write
AE4000
heap
page read and write
4080000
heap
page read and write
1708000
heap
page read and write
916000
heap
page read and write
3A22000
heap
page read and write
8B9000
heap
page read and write
4163000
direct allocation
page execute and read and write
172F000
heap
page read and write
91B000
heap
page read and write
945000
heap
page read and write
94D000
heap
page read and write
957000
heap
page read and write
218C000
heap
page read and write
719D000
stack
page read and write
21EC000
heap
page read and write
8070000
trusted library allocation
page read and write
9FE000
stack
page read and write
174A000
heap
page read and write
173E000
heap
page read and write
953000
heap
page read and write
907000
heap
page read and write
895000
heap
page read and write
7441000
heap
page read and write
635E000
heap
page read and write
21A9000
heap
page read and write
218C000
heap
page read and write
E50000
unkown
page readonly
21A9000
heap
page read and write
941000
heap
page read and write
907000
heap
page read and write
16FB000
heap
page read and write
ADA000
heap
page read and write
74C5000
heap
page read and write
F6C000
unkown
page readonly
450D000
stack
page read and write
754C000
heap
page read and write
2177000
heap
page read and write
2196000
heap
page read and write
909000
heap
page read and write
918000
heap
page read and write
80E000
heap
page read and write
21F4000
heap
page read and write
218C000
heap
page read and write
950000
heap
page read and write
8070000
trusted library allocation
page read and write
7F560000
direct allocation
page execute and read and write
945000
heap
page read and write
94D000
heap
page read and write
21A9000
heap
page read and write
909000
heap
page read and write
7EE7000
heap
page read and write
7540000
trusted library allocation
page read and write
8F1000
heap
page read and write
7C11000
heap
page read and write
FEC000
unkown
page readonly
43ED000
stack
page read and write
2155000
heap
page read and write
907000
heap
page read and write
7540000
trusted library allocation
page read and write
7ECD000
heap
page read and write
94D000
heap
page read and write
3790000
direct allocation
page execute and read and write
94E000
heap
page read and write
745E000
heap
page read and write
21AB000
heap
page read and write
774A000
heap
page read and write
7457000
heap
page read and write
94D000
heap
page read and write
6C10000
remote allocation
page read and write
3D4F000
stack
page read and write
79CB000
heap
page read and write
907000
heap
page read and write
21A1000
heap
page read and write
CB0000
heap
page read and write
213F000
heap
page read and write
8070000
trusted library allocation
page read and write
1747000
heap
page read and write
2198000
heap
page read and write
8F1000
heap
page read and write
8E9000
heap
page read and write
16F8000
heap
page read and write
4130000
direct allocation
page execute and read and write
2155000
heap
page read and write
81D000
heap
page read and write
8FC000
heap
page read and write
2155000
heap
page read and write
7441000
heap
page read and write
79D5000
heap
page read and write
7546000
heap
page read and write
9B7000
heap
page read and write
17BB000
heap
page read and write
21AB000
heap
page read and write
77F9000
heap
page read and write
3773000
direct allocation
page execute and read and write
7CF1000
heap
page read and write
909000
heap
page read and write
945000
heap
page read and write
909000
heap
page read and write
21BB000
heap
page read and write
17BB000
heap
page read and write
754F000
heap
page read and write
6EA4000
heap
page read and write
7741000
heap
page read and write
754C000
heap
page read and write
2198000
heap
page read and write
4254000
direct allocation
page execute and read and write
7741000
heap
page read and write
3574000
direct allocation
page execute and read and write
3350000
heap
page read and write
3774000
direct allocation
page execute and read and write
6FEE000
stack
page read and write
6F5E000
stack
page read and write
3784000
direct allocation
page execute and read and write
170B000
heap
page read and write
8FC000
heap
page read and write
17BB000
heap
page read and write
935000
heap
page read and write
DD0000
unkown
page readonly
1B0000
heap
page read and write
7449000
heap
page read and write
4174000
direct allocation
page execute and read and write
21A9000
heap
page read and write
170B000
heap
page read and write
7B8E000
stack
page read and write
21AC000
heap
page read and write
7820000
trusted library allocation
page read and write
967000
heap
page read and write
1747000
heap
page read and write
2182000
heap
page read and write
9A2000
heap
page read and write
7ED2000
heap
page read and write
2169000
heap
page read and write
218B000
heap
page read and write
E51000
unkown
page execute and read and write
CA0000
heap
page read and write
8A7000
heap
page read and write
759D000
heap
page read and write
7EE2000
heap
page read and write
7540000
trusted library allocation
page read and write
F71000
unkown
page readonly
1747000
heap
page read and write
171D000
heap
page read and write
754F000
heap
page read and write
739E000
stack
page read and write
94D000
heap
page read and write
8B4000
heap
page read and write
1747000
heap
page read and write
7CF0000
heap
page read and write
7453000
heap
page read and write
678D000
stack
page read and write
4180000
direct allocation
page execute and read and write
7EE3000
heap
page read and write
21A4000
heap
page read and write
70D7000
heap
page read and write
3784000
direct allocation
page execute and read and write
F71000
unkown
page readonly
7740000
heap
page read and write
7540000
trusted library allocation
page read and write
914000
heap
page read and write
2010000
direct allocation
page execute and read and write
A70000
heap
page read and write
178C000
unkown
page execute and write copy
17BB000
heap
page read and write
7820000
trusted library allocation
page read and write
945000
heap
page read and write
4170000
direct allocation
page execute and read and write
172F000
heap
page read and write
7552000
heap
page read and write
1707000
heap
page read and write
941000
heap
page read and write
21A9000
heap
page read and write
92E000
heap
page read and write
7572000
heap
page read and write
2155000
heap
page read and write
DC0000
direct allocation
page execute and read and write
7D8E000
stack
page read and write
744C000
heap
page read and write
1BEE000
stack
page read and write
754C000
heap
page read and write
1747000
heap
page read and write
907000
heap
page read and write
170B000
heap
page read and write
931000
heap
page read and write
5FA000
stack
page read and write
2177000
heap
page read and write
913000
heap
page read and write
9B7000
heap
page read and write
213F000
heap
page read and write
10A7000
unkown
page execute and read and write
7B0000
heap
page read and write
B37000
unkown
page execute and write copy
7457000
heap
page read and write
3880000
remote allocation
page read and write
7454000
heap
page read and write
F62000
unkown
page execute and write copy
172F000
heap
page read and write
7ED7000
heap
page read and write
F74000
unkown
page readonly
991000
unkown
page execute and read and write
2113000
heap
page read and write
B0D000
heap
page read and write
1711000
heap
page read and write
7441000
heap
page read and write
FF1000
unkown
page readonly
F6C000
unkown
page readonly
6CB2000
heap
page read and write
746C000
heap
page read and write
94D000
heap
page read and write
170F000
unkown
page execute and write copy
7EC1000
heap
page read and write
387E000
stack
page read and write
218C000
heap
page read and write
94D000
heap
page read and write
3574000
direct allocation
page execute and read and write
34D0000
heap
page read and write
B2C000
unkown
page readonly
42CF000
stack
page read and write
2169000
heap
page read and write
1747000
heap
page read and write
173E000
heap
page read and write
17BB000
heap
page read and write
919000
heap
page read and write
1749000
heap
page read and write
70C1000
heap
page read and write
94E000
heap
page read and write
94D000
heap
page read and write
5F5E000
heap
page read and write
7BF1000
heap
page read and write
7453000
heap
page read and write
9B7000
heap
page read and write
F52000
unkown
page execute and write copy
8070000
trusted library allocation
page read and write
915000
heap
page read and write
7452000
heap
page read and write
1747000
heap
page read and write
219F000
heap
page read and write
1749000
heap
page read and write
1761000
heap
page read and write
9B7000
heap
page read and write
7540000
trusted library allocation
page read and write
17BB000
heap
page read and write
170F000
unkown
page execute and read and write
24FE000
stack
page read and write
957000
heap
page read and write
218C000
heap
page read and write
7EC1000
heap
page read and write
746B000
heap
page read and write
8AB000
heap
page read and write
76EE000
stack
page read and write
94D000
heap
page read and write
B12000
unkown
page execute and read and write
E43000
heap
page read and write
3A3D000
stack
page read and write
890000
heap
page read and write
7748000
heap
page read and write
173E000
heap
page read and write
6CCF000
stack
page read and write
7ED5000
heap
page read and write
17BB000
heap
page read and write
2182000
heap
page read and write
1110000
unkown
page execute and read and write
FEC000
unkown
page readonly
1749000
heap
page read and write
21A9000
heap
page read and write
1709000
heap
page read and write
9A8000
heap
page read and write
1747000
heap
page read and write
78D3000
heap
page read and write
2085000
heap
page read and write
669E000
stack
page read and write
957000
heap
page read and write
1639000
heap
page read and write
7801000
heap
page read and write
8EE000
heap
page read and write
1FD0000
heap
page read and write
8A0000
heap
page read and write
8EB000
heap
page read and write
AE6000
heap
page read and write
71D1000
heap
page read and write
909000
heap
page read and write
2115000
heap
page read and write
45A0000
remote allocation
page read and write
8E4000
heap
page read and write
7541000
heap
page read and write
65B000
stack
page read and write
218F000
heap
page read and write
172F000
heap
page read and write
7C0000
heap
page read and write
7820000
trusted library allocation
page read and write
1B5000
heap
page read and write
8FC000
heap
page read and write
754C000
heap
page read and write
DD1000
unkown
page execute and write copy
1747000
heap
page read and write
21ED000
heap
page read and write
7456000
heap
page read and write
170C000
unkown
page execute and write copy
173E000
heap
page read and write
909000
heap
page read and write
7552000
heap
page read and write
7459000
heap
page read and write
92B000
heap
page read and write
8F1000
heap
page read and write
16F3000
heap
page read and write
1709000
heap
page read and write
6A9D000
stack
page read and write
B37000
unkown
page execute and read and write
945000
heap
page read and write
913000
heap
page read and write
7546000
heap
page read and write
7540000
trusted library allocation
page read and write
4250000
direct allocation
page execute and read and write
8F1000
heap
page read and write
7EE2000
heap
page read and write
44B0000
heap
page read and write
173E000
heap
page read and write
213F000
heap
page read and write
920000
heap
page read and write
2196000
heap
page read and write
2169000
heap
page read and write
7B4F000
stack
page read and write
91C000
heap
page read and write
8070000
trusted library allocation
page read and write
1747000
heap
page read and write
8FC000
heap
page read and write
70C0000
heap
page read and write
43F0000
heap
page read and write
91D000
heap
page read and write
F2A000
unkown
page execute and write copy
92B000
heap
page read and write
173E000
heap
page read and write
1667000
heap
page read and write
73A7000
heap
page read and write
16EF000
heap
page read and write
2030000
heap
page read and write
1709000
heap
page read and write
6C10000
remote allocation
page read and write
FE2000
unkown
page execute and read and write
C67000
unkown
page execute and read and write
21AB000
heap
page read and write
7441000
heap
page read and write
2155000
heap
page read and write
3574000
direct allocation
page execute and read and write
7541000
heap
page read and write
39FD000
stack
page read and write
8F1000
heap
page read and write
3310000
heap
page read and write
8E4000
heap
page read and write
20F2000
heap
page read and write
62DF000
heap
page read and write
7820000
trusted library allocation
page read and write
8E9000
heap
page read and write
AEA000
unkown
page execute and write copy
945000
heap
page read and write
FD2000
unkown
page execute and write copy
21FA000
heap
page read and write
21A9000
heap
page read and write
70D9000
heap
page read and write
95D000
heap
page read and write
8070000
trusted library allocation
page read and write
3773000
direct allocation
page execute and read and write
94D000
heap
page read and write
7551000
heap
page read and write
83A000
stack
page read and write
219F000
heap
page read and write
7EC0000
heap
page read and write
1731000
heap
page read and write
6F1F000
stack
page read and write
FF7000
unkown
page execute and write copy
21A3000
heap
page read and write
8FC000
heap
page read and write
21D4000
heap
page read and write
20D5000
heap
page read and write
94E000
heap
page read and write
174A000
heap
page read and write
20A6000
heap
page read and write
1665000
heap
page read and write
957000
heap
page read and write
AD1000
heap
page read and write
218A000
heap
page read and write
7820000
trusted library allocation
page read and write
7441000
heap
page read and write
7540000
trusted library allocation
page read and write
1719000
heap
page read and write
74C5000
heap
page read and write
B2C000
unkown
page readonly
8FC000
heap
page read and write
213D000
heap
page read and write
1749000
heap
page read and write
70D8000
heap
page read and write
2182000
heap
page read and write
172F000
heap
page read and write
2169000
heap
page read and write
44A0000
remote allocation
page read and write
7EE6000
heap
page read and write
1734000
heap
page read and write
2127000
heap
page read and write
FF4000
unkown
page readonly
AB9000
heap
page read and write
744B000
heap
page read and write
218C000
heap
page read and write
4330000
heap
page read and write
E50000
unkown
page readonly
3FA0000
direct allocation
page execute and read and write
907000
heap
page read and write
170A000
heap
page read and write
95E000
heap
page read and write
82D000
stack
page read and write
7ECD000
heap
page read and write
7450000
heap
page read and write
2182000
heap
page read and write
8C9000
heap
page read and write
7552000
heap
page read and write
812000
heap
page read and write
218A000
heap
page read and write
3520000
heap
page read and write
3500000
heap
page read and write
2187000
heap
page read and write
15F0000
heap
page read and write
172F000
heap
page read and write
3540000
heap
page read and write
9A8000
heap
page read and write
8070000
trusted library allocation
page read and write
4254000
direct allocation
page execute and read and write
1709000
heap
page read and write
73A4000
heap
page read and write
173E000
heap
page read and write
218C000
heap
page read and write
8E9000
heap
page read and write
FF4000
unkown
page readonly
70C6000
heap
page read and write
F62000
unkown
page execute and read and write
7448000
heap
page read and write
71D0000
heap
page read and write
1190000
unkown
page execute and read and write
3574000
direct allocation
page execute and read and write
14E9000
unkown
page execute and read and write
923000
heap
page read and write
162C000
heap
page read and write
2196000
heap
page read and write
1F50000
heap
page read and write
7441000
heap
page read and write
B60000
heap
page read and write
749E000
heap
page read and write
20B5000
heap
page read and write
12CC000
unkown
page execute and write copy
8F1000
heap
page read and write
173E000
heap
page read and write
FF1000
unkown
page readonly
3784000
direct allocation
page execute and read and write
219A000
heap
page read and write
689D000
stack
page read and write
945000
heap
page read and write
219D000
heap
page read and write
B34000
unkown
page readonly
7ED0000
heap
page read and write
7466000
heap
page read and write
F77000
unkown
page execute and read and write
7544000
heap
page read and write
219B000
heap
page read and write
8FC000
heap
page read and write
7443000
heap
page read and write
99A000
heap
page read and write
8E4000
heap
page read and write
7ECB000
heap
page read and write
7ECB000
heap
page read and write
3523000
heap
page read and write
218F000
heap
page read and write
8F1000
heap
page read and write
6CB5000
heap
page read and write
7568000
heap
page read and write
356E000
stack
page read and write
172F000
heap
page read and write
3574000
direct allocation
page execute and read and write
957000
heap
page read and write
957000
heap
page read and write
819000
heap
page read and write
353E000
stack
page read and write
2155000
heap
page read and write
8E4000
heap
page read and write
78CC000
heap
page read and write
2177000
heap
page read and write
3880000
remote allocation
page read and write
946000
heap
page read and write
7441000
heap
page read and write
1F4E000
stack
page read and write
63B000
stack
page read and write
7540000
trusted library allocation
page read and write
94D000
heap
page read and write
4174000
direct allocation
page execute and read and write
8070000
trusted library allocation
page read and write
16EA000
heap
page read and write
173E000
heap
page read and write
7ECE000
heap
page read and write
909000
heap
page read and write
6E6C000
heap
page read and write
7820000
trusted library allocation
page read and write
2169000
heap
page read and write
9B0000
heap
page read and write
990000
unkown
page readonly
21A9000
heap
page read and write
3784000
direct allocation
page execute and read and write
20DE000
heap
page read and write
7F2000
heap
page read and write
85C000
stack
page read and write
17BB000
heap
page read and write
172F000
heap
page read and write
4174000
direct allocation
page execute and read and write
F74000
unkown
page readonly
B12000
unkown
page execute and write copy
7556000
heap
page read and write
91B000
heap
page read and write
70C5000
heap
page read and write
6ADE000
stack
page read and write
91E000
heap
page read and write
92B000
heap
page read and write
175A000
heap
page read and write
6C03000
heap
page read and write
4243000
direct allocation
page execute and read and write
17BB000
heap
page read and write
745C000
heap
page read and write
219F000
heap
page read and write
8FC000
heap
page read and write
21AB000
heap
page read and write
19CB000
stack
page read and write
7BF1000
heap
page read and write
3A7D000
stack
page read and write
20D7000
heap
page read and write
600D000
heap
page read and write
7540000
trusted library allocation
page read and write
2095000
heap
page read and write
21DA000
heap
page read and write
94D000
heap
page read and write
7BF1000
heap
page read and write
931000
heap
page read and write
7541000
heap
page read and write
218F000
heap
page read and write
1F67000
heap
page read and write
94D000
heap
page read and write
FF1000
unkown
page readonly
1D3E000
stack
page read and write
2182000
heap
page read and write
1749000
heap
page read and write
95D000
heap
page read and write
35C0000
heap
page read and write
1FD5000
heap
page read and write
77AF000
stack
page read and write
179E000
heap
page read and write
1707000
heap
page read and write
7ECF000
heap
page read and write
3574000
direct allocation
page execute and read and write
3EA0000
direct allocation
page execute and read and write
909000
heap
page read and write
12CF000
unkown
page execute and read and write
9B7000
heap
page read and write
3784000
direct allocation
page execute and read and write
8FC000
heap
page read and write
44A0000
remote allocation
page read and write
8F1000
heap
page read and write
8FC000
heap
page read and write
7EE9000
heap
page read and write
2185000
heap
page read and write
21BA000
heap
page read and write
218B000
heap
page read and write
91A000
heap
page read and write
FF4000
unkown
page readonly
8FC000
heap
page read and write
A3E000
stack
page read and write
990000
unkown
page readonly
70C1000
heap
page read and write
34E0000
heap
page read and write
21AB000
heap
page read and write
7454000
heap
page read and write
9B7000
heap
page read and write
269E000
stack
page read and write
92F000
heap
page read and write
3784000
direct allocation
page execute and read and write
6EBE000
stack
page read and write
907000
heap
page read and write
26FE000
stack
page read and write
7541000
heap
page read and write
21AC000
heap
page read and write
2080000
heap
page read and write
638E000
heap
page read and write
979000
heap
page read and write
207E000
stack
page read and write
218C000
heap
page read and write
There are 1570 hidden memdumps, click here to show them.