IOC Report
SecuriteInfo.com.Win32.PWSX-gen.11739.16980.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.11739.16980.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6vITM1PSugWZudEYSR57YQU.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\_GC5VU0C8TlDHIYOayOodaC.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\gWpl3DKIKrL9jhWS6lgcZ2J.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_234a68b484188ee7734158a9c3c1f48d2f1fcf9_2d68038f_092f1c61-e679-4284-adf0-35641287d6cd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_f7fc5d77e4181bfc8c190387d813954cf99dd80_2d68038f_ba0e7d69-f458-483a-978e-dbc15423d24c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_c38d378e10faade69745bd4221c06297b5b1c26_d8abc321_c45c5e10-8fde-4227-81f3-86e9161f7cf4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_703cab63ddfc30e52e5285a77dd3d65328718bd_cadc5c4f_ca1ea967-fef8-45d7-a94d-43811e9047c7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER713D.tmp.dmp
Mini DuMP crash report, 15 streams, Fri May 3 05:23:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72D4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73DE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA0F7.tmp.dmp
Mini DuMP crash report, 15 streams, Fri May 3 05:23:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA126.tmp.dmp
Mini DuMP crash report, 15 streams, Fri May 3 05:23:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA2BC.tmp.dmp
Mini DuMP crash report, 15 streams, Fri May 3 05:23:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA2BD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA2DD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA31C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA32C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4D1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA510.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\00Qerm5hMGZOWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\2HnRxWloJpRxHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\7ibVfOWFZmYgCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\BhdF3peWZ8fDWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\EL3MdOIyyqKgHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\HoyMk7Hm8HKeWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\PQaNvpNdlCcNHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\TgQ4S6c4BAPSLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\fPrkUqiJIt7RWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\i1yIsS8bZnbMHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\jDDay9fAZ27tLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\lq_FzBPDtiFFLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\oqtF7Wr83gO8Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span0OWCnipDVXAW\zbISjRzl0odeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\0K7_4ZPCGxHpWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\3QUvDHLQIpPQHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\8vdkeD2saVbHLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\9cOnGTGkShnWHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\IzCsjzm3CcKuLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\J0sWIHsIkGHTWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\KschALC58KiLLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\ThIg7B_auiTHHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\UI_98ko8uFErWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\dzUtof_Rrg2ECookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\gHpDxztGM2ghWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\jW0rcT_5J3lyWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\jdYGzsyj2RgAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanUfhewXukFAeX\ofPO1RwvHkuAHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\2a4LP_xtRLdaWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\4t8dExv_LQdMWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\7infWL2dpE0JWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\9JNno5wiVu1XCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\FAL14YoTdbqiHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\FbUnNuCw4_bKLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\FwanxoY0CagqHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\IeONn8JkiDm1Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\emvi1AuFmRezLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\i2J5b3z7gLf2Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\s8bxXxQRUwKxWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\v2cU2ORgmdjCWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\zJuLTaGAiOucHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spandBSgyOXmoj0v\zwkX_OnYAPDqHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixy0OWCnipDVXAW\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy0OWCnipDVXAW\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy0OWCnipDVXAW\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyUfhewXukFAeX\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyUfhewXukFAeX\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyUfhewXukFAeX\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixydBSgyOXmoj0v\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixydBSgyOXmoj0v\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixydBSgyOXmoj0v\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 76 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.11739.16980.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.11739.16980.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=2032,i,13373424599956482758,2622410995844212760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1904,i,4433995280801359943,15790253874222841577,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 --field-trial-handle=2032,i,13373424599956482758,2622410995844212760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 1980
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8700 -s 2004
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7212 -s 1260
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6788 -s 1896
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.me/risepro_boteb
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://t.me/RiseProSUPPORTl
unknown
https://t.me/risepro_bot7.219
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://147.45.47.102:57893/hera/amadka.exeot
unknown
https://db-ip.com/
unknown
https://ipinfo.io/widget/demo/191.96.227.2190
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS_YOPbGLbp0bEGIjDNZc3MZHlf1E0orMqnosUmz6W763DCXYHXDGytrbaZJcGJLjun_vRC8GiTovYLXb8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.72.100
http://147.45.47.102:57893/hera/amadka.exetspX(
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219n?x
unknown
https://t.me/RiseProSUPPORTh
unknown
http://193.233.132.56/cost/lenin.exeXb5?7
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219
104.26.5.15
http://147.45.47.102:57893/hera/amadka.exe68.0
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0x
unknown
https://db-ip.com/demo/home.php?s=191.96.227.2191s
unknown
https://t.me/risepro
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219ot
unknown
https://db-ip.com/A
unknown
http://193.233.132.56/cost/go.exe
unknown
https://t.me/RiseProSUPPORTV
unknown
https://t.me/risepro_bot)
unknown
http://193.233.132.56/cost/go.execeIdser
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219.outloo
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219D
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://db-ip.com:443/demo/home.php?s=191.96.227.219
unknown
https://ipinfo.io/widget/demo/191.96.227.219hE
unknown
https://t.me/risepro_botL#2
unknown
https://ipinfo.io/#:
unknown
http://193.233.132.56/cost/lenin.exeUs
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.72.100
https://ipinfo.io/widget/demo/191.96.227.219E
unknown
https://t.me/RiseProSUPPORT=
unknown
https://db-ip.com/c
unknown
https://t.me/RiseProSUPPORT4
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/widget/demo/191.96.227.219
34.117.186.192
http://193.233.132.56/cost/lenin.exeka.exbota
unknown
https://ipinfo.io/widget/demo/191.96.227.219S2
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.72.100
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com:443/demo/home.php?s=191.96.227.219r)
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219QW
unknown
https://ipinfo.io:443/widget/demo/191.96.227.219
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.72.100
http://193.233.132.56/cost/lenin.exeka.ex;
unknown
https://t.me/risepro_bot
unknown
https://db-ip.com:443/demo/home.php?s=191.96.227.219P
unknown
https://t.me/risepro_bot7.219H
unknown
https://t.me/risepro_botAb
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YOPbGLbp0bEGIjA9RjS4dnTf9TMc_WNOZoEqYCGZPMusvyHbkcGkBp0b60YgEyf8aWQGPDnoAkT6yZQyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.72.100
https://ipinfo.io/
unknown
http://pki-ocsp.symauth.com0
unknown
http://147.45.47.102:57893/hera/amadka.exejaxxwa
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219IuG
unknown
http://193.233.132.56/cost/lenin.exe
unknown
http://www.winimage.com/zLibDll
unknown
https://db-ip.com:443/demo/home.php?s=191.96.227.219lu
unknown
https://support.mozilla.org
unknown
https://t.me/risepro_botb#D
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://193.233.132.56/cost/lenin.exer
unknown
https://db-ip.com/demo/home.php?s=191.96.227.219yUk
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://193.233.132.56/cost/go.exeisepro_bot
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
google.com
172.217.4.46
ipinfo.io
34.117.186.192
www.google.com
142.250.72.100
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
142.250.176.196
unknown
United States
104.26.5.15
db-ip.com
United States
239.255.255.250
unknown
Reserved
142.250.72.100
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
ProgramId
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
FileId
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
LowerCaseLongPath
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
LongPathHash
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
Name
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
OriginalFileName
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
Publisher
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
Version
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
BinFileVersion
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
BinaryType
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
ProductName
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
ProductVersion
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
LinkDate
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
BinProductVersion
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
AppxPackageFullName
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
AppxPackageRelativeId
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
Size
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
Language
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\securiteinfo.com|f3a218e0f737bdf
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{a96fc141-5003-88a8-753f-53138109be08}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 42 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AB2000
heap
page read and write
malicious
1983000
heap
page read and write
malicious
1994000
heap
page read and write
malicious
1A27000
heap
page read and write
malicious
1B18000
heap
page read and write
malicious
1993000
heap
page read and write
malicious
183E000
heap
page read and write
malicious
186E000
heap
page read and write
malicious
1890000
heap
page read and write
malicious
1890000
heap
page read and write
malicious
1890000
heap
page read and write
malicious
1892000
heap
page read and write
malicious
1B61000
heap
page read and write
malicious
173D000
heap
page read and write
malicious
1894000
heap
page read and write
malicious
1983000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1B62000
heap
page read and write
malicious
1B6B000
heap
page read and write
malicious
1B6C000
heap
page read and write
malicious
186E000
heap
page read and write
malicious
1B16000
heap
page read and write
malicious
1984000
heap
page read and write
1B81000
heap
page read and write
1B31000
heap
page read and write
1BA2000
heap
page read and write
19EE000
heap
page read and write
76E5000
heap
page read and write
7920000
trusted library allocation
page read and write
7260000
remote allocation
page read and write
16A4000
heap
page read and write
17FA000
stack
page read and write
1A18000
heap
page read and write
187F000
heap
page read and write
18B9000
heap
page read and write
3AA4000
direct allocation
page execute and read and write
7380000
heap
page read and write
35B4000
direct allocation
page execute and read and write
3800000
heap
page read and write
1B0D000
heap
page read and write
1BD0000
heap
page read and write
7716000
heap
page read and write
38E0000
direct allocation
page execute and read and write
1896000
heap
page read and write
760000
unkown
page readonly
37D0000
direct allocation
page execute and read and write
1B7D000
heap
page read and write
1891000
heap
page read and write
74A1000
heap
page read and write
1907000
heap
page read and write
1B91000
heap
page read and write
1B6D000
heap
page read and write
1B6D000
heap
page read and write
1B50000
heap
page read and write
1971000
heap
page read and write
1A64000
heap
page read and write
1BA2000
heap
page read and write
1BB4000
heap
page read and write
6AAF000
stack
page read and write
7711000
heap
page read and write
7664000
heap
page read and write
187F000
heap
page read and write
1971000
heap
page read and write
7656000
heap
page read and write
187D000
heap
page read and write
3AA4000
direct allocation
page execute and read and write
1A7F000
heap
page read and write
1988000
heap
page read and write
1B55000
heap
page read and write
7665000
heap
page read and write
3AFE000
stack
page read and write
155F000
heap
page read and write
1947000
heap
page read and write
72E4000
heap
page read and write
1BC0000
heap
page read and write
1B8F000
heap
page read and write
187F000
heap
page read and write
74B2000
heap
page read and write
1B26000
heap
page read and write
6365000
heap
page read and write
1B1A000
heap
page read and write
72D4000
heap
page read and write
185A000
heap
page read and write
18A7000
heap
page read and write
188D000
heap
page read and write
37C4000
direct allocation
page execute and read and write
7750000
trusted library allocation
page read and write
16A4000
heap
page read and write
18BB000
heap
page read and write
7338000
heap
page read and write
19A7000
heap
page read and write
1BBA000
heap
page read and write
644F000
heap
page read and write
8BC000
unkown
page readonly
3CC0000
heap
page read and write
7662000
heap
page read and write
6F7F000
stack
page read and write
1690000
heap
page read and write
19A4000
heap
page read and write
3AC4000
direct allocation
page execute and read and write
1B83000
heap
page read and write
1B15000
heap
page read and write
35D0000
direct allocation
page execute and read and write
7323000
heap
page read and write
18BB000
heap
page read and write
18EE000
stack
page read and write
186E000
heap
page read and write
1B66000
heap
page read and write
1830000
heap
page read and write
1B70000
heap
page read and write
1B83000
heap
page read and write
13D0000
heap
page read and write
1B75000
heap
page read and write
74A8000
heap
page read and write
18BB000
heap
page read and write
1A18000
heap
page read and write
18B8000
heap
page read and write
1BB0000
heap
page read and write
871000
unkown
page execute and read and write
16A4000
heap
page read and write
1B1C000
heap
page read and write
1B90000
heap
page read and write
721000
unkown
page execute and write copy
1B96000
heap
page read and write
7650000
heap
page read and write
7711000
heap
page read and write
18B8000
heap
page read and write
1BAB000
heap
page read and write
14AD000
stack
page read and write
38E0000
heap
page read and write
7EAE0000
direct allocation
page execute and read and write
1B72000
heap
page read and write
8571000
heap
page read and write
35B4000
direct allocation
page execute and read and write
74B6000
heap
page read and write
154F000
heap
page read and write
1994000
heap
page read and write
712000
unkown
page execute and write copy
1AA6000
heap
page read and write
7920000
trusted library allocation
page read and write
1864000
heap
page read and write
3980000
direct allocation
page execute and read and write
35C0000
direct allocation
page execute and read and write
6671000
heap
page read and write
1B7F000
heap
page read and write
1B1B000
heap
page read and write
6555000
heap
page read and write
18AC000
heap
page read and write
35A4000
direct allocation
page execute and read and write
900000
unkown
page execute and read and write
6DBD000
stack
page read and write
18B8000
heap
page read and write
16A4000
heap
page read and write
16A4000
heap
page read and write
1098000
unkown
page execute and write copy
7481000
heap
page read and write
3DBD000
stack
page read and write
1971000
heap
page read and write
188A000
heap
page read and write
3914000
direct allocation
page execute and read and write
7920000
trusted library allocation
page read and write
1B96000
heap
page read and write
130B000
stack
page read and write
1967000
heap
page read and write
19A7000
heap
page read and write
18BE000
heap
page read and write
196A000
heap
page read and write
1B55000
heap
page read and write
72DB000
heap
page read and write
72DF000
heap
page read and write
7750000
trusted library allocation
page read and write
1954000
heap
page read and write
8FC000
unkown
page readonly
72F8000
heap
page read and write
1900000
heap
page read and write
1865000
heap
page read and write
18A4000
heap
page read and write
7728000
heap
page read and write
1BA2000
heap
page read and write
186E000
heap
page read and write
724000
unkown
page readonly
186E000
heap
page read and write
19F8000
heap
page read and write
1BA8000
heap
page read and write
720000
unkown
page readonly
74AB000
heap
page read and write
74A1000
heap
page read and write
74B9000
heap
page read and write
19BC000
heap
page read and write
1BA2000
heap
page read and write
19AC000
heap
page read and write
1967000
heap
page read and write
17FA000
stack
page read and write
7711000
heap
page read and write
1B5F000
heap
page read and write
187F000
heap
page read and write
35C8000
direct allocation
page execute and read and write
201F000
stack
page read and write
1892000
heap
page read and write
38D0000
heap
page read and write
8FC000
unkown
page readonly
8F2000
unkown
page execute and write copy
74AB000
heap
page read and write
3928000
direct allocation
page execute and read and write
18C6000
heap
page read and write
1865000
heap
page read and write
1B68000
heap
page read and write
19CF000
heap
page read and write
1818000
heap
page read and write
3A94000
direct allocation
page execute and read and write
1865000
heap
page read and write
761000
unkown
page execute and read and write
389E000
stack
page read and write
76A1000
heap
page read and write
66A9000
heap
page read and write
1865000
heap
page read and write
1B47000
heap
page read and write
1330000
heap
page read and write
18B0000
heap
page read and write
18D3000
heap
page read and write
749F000
stack
page read and write
1B96000
heap
page read and write
1B04000
heap
page read and write
581000
unkown
page execute and write copy
8C4000
unkown
page readonly
1B5F000
heap
page read and write
1B98000
heap
page read and write
19A4000
heap
page read and write
3803000
heap
page read and write
1994000
heap
page read and write
186E000
heap
page read and write
1B7E000
heap
page read and write
3AB8000
direct allocation
page execute and read and write
3AD8000
direct allocation
page execute and read and write
74CA000
heap
page read and write
1966000
heap
page read and write
189E000
heap
page read and write
1B17000
heap
page read and write
1B55000
heap
page read and write
1A20000
heap
page read and write
1966000
heap
page read and write
1890000
heap
page read and write
16A4000
heap
page read and write
1B98000
heap
page read and write
72E6000
heap
page read and write
185A000
heap
page read and write
6EAF000
stack
page read and write
1A92000
heap
page read and write
6FFF000
stack
page read and write
7338000
heap
page read and write
760000
unkown
page readonly
1848000
heap
page read and write
1995000
heap
page read and write
16A4000
heap
page read and write
15FA000
stack
page read and write
8C7000
unkown
page execute and write copy
727000
unkown
page execute and write copy
1BA2000
heap
page read and write
1969000
heap
page read and write
765D000
heap
page read and write
1BC1000
heap
page read and write
186E000
heap
page read and write
8BC000
unkown
page readonly
1B55000
heap
page read and write
3D40000
heap
page read and write
18D0000
heap
page read and write
8E2000
unkown
page execute and read and write
1970000
heap
page read and write
18A8000
heap
page read and write
1BCB000
heap
page read and write
19A7000
heap
page read and write
186E000
heap
page read and write
188D000
heap
page read and write
1B91000
heap
page read and write
72F8000
heap
page read and write
72D4000
heap
page read and write
37B4000
direct allocation
page execute and read and write
6171000
heap
page read and write
1983000
heap
page read and write
1890000
heap
page read and write
1B55000
heap
page read and write
186E000
heap
page read and write
1B71000
heap
page read and write
AE0000
unkown
page execute and read and write
723F000
stack
page read and write
1B64000
heap
page read and write
72E4000
heap
page read and write
7F0F0000
direct allocation
page execute and read and write
1B6A000
heap
page read and write
7380000
trusted library allocation
page read and write
772A000
heap
page read and write
8F2000
unkown
page execute and write copy
1994000
heap
page read and write
1B43000
heap
page read and write
1866000
heap
page read and write
1B12000
heap
page read and write
7480000
heap
page read and write
186E000
heap
page read and write
8F2000
unkown
page execute and read and write
1B46000
heap
page read and write
7656000
heap
page read and write
1B70000
heap
page read and write
1779000
heap
page read and write
19A1000
heap
page read and write
19DF000
heap
page read and write
185A000
heap
page read and write
152D000
heap
page read and write
18F9000
heap
page read and write
8F2000
unkown
page execute and read and write
109B000
unkown
page execute and read and write
1890000
heap
page read and write
1B55000
heap
page read and write
187F000
heap
page read and write
74A8000
heap
page read and write
1865000
heap
page read and write
1BA2000
heap
page read and write
1B5F000
heap
page read and write
3914000
direct allocation
page execute and read and write
1BD0000
heap
page read and write
17F3000
heap
page read and write
187F000
heap
page read and write
7B90000
trusted library allocation
page read and write
72D2000
heap
page read and write
3570000
direct allocation
page execute and read and write
1980000
heap
page read and write
1B68000
heap
page read and write
1587000
heap
page read and write
74CA000
heap
page read and write
703E000
stack
page read and write
1B91000
heap
page read and write
3D3E000
stack
page read and write
1BBC000
heap
page read and write
8E2000
unkown
page execute and write copy
7711000
heap
page read and write
7060000
remote allocation
page read and write
7716000
heap
page read and write
7653000
heap
page read and write
1300000
heap
page read and write
907000
unkown
page execute and write copy
1B9E000
heap
page read and write
C15000
unkown
page execute and read and write
1B7D000
heap
page read and write
1BA8000
heap
page read and write
1098000
unkown
page execute and write copy
1974000
heap
page read and write
1B4B000
heap
page read and write
1B90000
heap
page read and write
66AD000
stack
page read and write
19A7000
heap
page read and write
1B7D000
heap
page read and write
1AB1000
heap
page read and write
72E8000
heap
page read and write
1865000
heap
page read and write
1B86000
heap
page read and write
1B7D000
heap
page read and write
186E000
heap
page read and write
18A4000
heap
page read and write
1B6E000
heap
page read and write
15B0000
heap
page read and write
7326000
heap
page read and write
1898000
heap
page read and write
3B4E000
stack
page read and write
35B4000
direct allocation
page execute and read and write
17C0000
heap
page read and write
1B21000
heap
page read and write
717F000
stack
page read and write
1B72000
heap
page read and write
1B6D000
heap
page read and write
7B90000
trusted library allocation
page read and write
430F000
stack
page read and write
3A10000
remote allocation
page read and write
6391000
heap
page read and write
1B59000
heap
page read and write
1990000
heap
page read and write
61A9000
heap
page read and write
7260000
remote allocation
page read and write
1864000
heap
page read and write
8FC000
unkown
page readonly
37C4000
direct allocation
page execute and read and write
187F000
heap
page read and write
1A60000
heap
page read and write
1B85000
heap
page read and write
737F000
stack
page read and write
1A77000
heap
page read and write
760000
unkown
page readonly
76A1000
heap
page read and write
8BA000
unkown
page execute and write copy
72F8000
heap
page read and write
35B4000
direct allocation
page execute and read and write
1B96000
heap
page read and write
16A4000
heap
page read and write
186E000
heap
page read and write
580000
unkown
page readonly
65BF000
heap
page read and write
3950000
heap
page read and write
8E2000
unkown
page execute and write copy
1B34000
heap
page read and write
3903000
direct allocation
page execute and read and write
74BB000
heap
page read and write
15C0000
direct allocation
page execute and read and write
1968000
heap
page read and write
7676000
heap
page read and write
7B90000
trusted library allocation
page read and write
18D7000
heap
page read and write
1960000
heap
page read and write
1C2E000
stack
page read and write
8C7000
unkown
page execute and read and write
69AE000
stack
page read and write
1B3E000
heap
page read and write
1A84000
heap
page read and write
1848000
heap
page read and write
3750000
heap
page read and write
16A4000
heap
page read and write
182E000
heap
page read and write
19A4000
heap
page read and write
1B5F000
heap
page read and write
5FC000
stack
page read and write
1967000
heap
page read and write
7653000
heap
page read and write
9F7000
unkown
page execute and read and write
3A93000
direct allocation
page execute and read and write
19A7000
heap
page read and write
7338000
heap
page read and write
1A81000
heap
page read and write
1B8A000
heap
page read and write
7750000
trusted library allocation
page read and write
1BD3000
heap
page read and write
16A4000
heap
page read and write
6D7F000
stack
page read and write
3914000
direct allocation
page execute and read and write
1971000
heap
page read and write
1865000
heap
page read and write
DB5000
unkown
page execute and read and write
72D1000
heap
page read and write
370E000
stack
page read and write
DF5000
unkown
page execute and read and write
72EE000
heap
page read and write
16A4000
heap
page read and write
1984000
heap
page read and write
18A2000
heap
page read and write
18A7000
heap
page read and write
1B68000
heap
page read and write
72D1000
heap
page read and write
857000
unkown
page execute and read and write
DB5000
unkown
page execute and read and write
1940000
heap
page read and write
1BB0000
heap
page read and write
1B81000
heap
page read and write
7712000
heap
page read and write
186F000
heap
page read and write
18AE000
heap
page read and write
1BC1000
heap
page read and write
1865000
heap
page read and write
19CF000
heap
page read and write
187F000
heap
page read and write
1B93000
heap
page read and write
1B88000
heap
page read and write
72D1000
heap
page read and write
1B19000
heap
page read and write
19C5000
heap
page read and write
690000
heap
page read and write
187F000
heap
page read and write
185C000
heap
page read and write
1BFB000
heap
page read and write
19A4000
heap
page read and write
74AC000
heap
page read and write
3A80000
direct allocation
page execute and read and write
74AB000
heap
page read and write
16A4000
heap
page read and write
72D6000
heap
page read and write
3960000
direct allocation
page execute and read and write
74BF000
heap
page read and write
18D3000
heap
page read and write
1A18000
heap
page read and write
3AB8000
direct allocation
page execute and read and write
581000
unkown
page execute and read and write
7656000
heap
page read and write
7750000
trusted library allocation
page read and write
1A94000
heap
page read and write
18AF000
heap
page read and write
1B5F000
heap
page read and write
16A4000
heap
page read and write
37C0000
direct allocation
page execute and read and write
18A3000
heap
page read and write
19AC000
heap
page read and write
3290000
direct allocation
page execute and read and write
72D4000
heap
page read and write
138E000
stack
page read and write
18B8000
heap
page read and write
702000
unkown
page execute and write copy
901000
unkown
page readonly
1B70000
heap
page read and write
1BB7000
heap
page read and write
1BA2000
heap
page read and write
A37000
unkown
page execute and read and write
194D000
heap
page read and write
37D0000
direct allocation
page execute and read and write
187F000
heap
page read and write
1983000
heap
page read and write
1BB8000
heap
page read and write
3CD0000
heap
page read and write
19A6000
heap
page read and write
1983000
heap
page read and write
37D8000
direct allocation
page execute and read and write
186E000
heap
page read and write
1058000
unkown
page execute and write copy
8C1000
unkown
page readonly
3AB4000
direct allocation
page execute and read and write
7656000
heap
page read and write
6EE000
stack
page read and write
188D000
heap
page read and write
1BA2000
heap
page read and write
7729000
heap
page read and write
186E000
heap
page read and write
18D1000
heap
page read and write
19BE000
heap
page read and write
6E4E000
stack
page read and write
1B34000
heap
page read and write
1A7D000
heap
page read and write
17CD000
heap
page read and write
1BE8000
heap
page read and write
1848000
heap
page read and write
3780000
direct allocation
page execute and read and write
1B9C000
heap
page read and write
7656000
heap
page read and write
1850000
heap
page read and write
1600000
heap
page read and write
7750000
trusted library allocation
page read and write
1B62000
heap
page read and write
12BE000
stack
page read and write
1A8A000
heap
page read and write
1BDA000
heap
page read and write
72D6000
heap
page read and write
17AB000
heap
page read and write
3910000
direct allocation
page execute and read and write
702E000
stack
page read and write
1B86000
heap
page read and write
37B3000
direct allocation
page execute and read and write
7326000
heap
page read and write
18B0000
heap
page read and write
16A4000
heap
page read and write
1B1C000
heap
page read and write
1B6E000
heap
page read and write
1899000
heap
page read and write
74B9000
heap
page read and write
1B7D000
heap
page read and write
1968000
heap
page read and write
1B6E000
heap
page read and write
750E000
stack
page read and write
7600000
trusted library allocation
page read and write
1A6E000
heap
page read and write
1BC7000
heap
page read and write
1B6B000
heap
page read and write
186E000
heap
page read and write
1A7A000
heap
page read and write
1B8C000
heap
page read and write
1B8A000
heap
page read and write
7722000
heap
page read and write
1870000
heap
page read and write
197B000
heap
page read and write
1890000
heap
page read and write
33F0000
heap
page read and write
1BB0000
heap
page read and write
186E000
heap
page read and write
1B47000
heap
page read and write
74A8000
heap
page read and write
1B68000
heap
page read and write
1E2E000
stack
page read and write
19A7000
heap
page read and write
1BA8000
heap
page read and write
6CAF000
stack
page read and write
18B8000
heap
page read and write
19EE000
heap
page read and write
1B68000
heap
page read and write
1B96000
heap
page read and write
771F000
heap
page read and write
1B75000
heap
page read and write
1866000
heap
page read and write
1BDF000
heap
page read and write
1A2A000
heap
page read and write
3AA4000
direct allocation
page execute and read and write
1A75000
heap
page read and write
37E0000
remote allocation
page read and write
7750000
trusted library allocation
page read and write
1B66000
heap
page read and write
1430000
heap
page read and write
70CE000
stack
page read and write
7311000
heap
page read and write
1B4E000
heap
page read and write
178D000
heap
page read and write
1B4E000
heap
page read and write
1B72000
heap
page read and write
1848000
heap
page read and write
1B7D000
heap
page read and write
72EE000
heap
page read and write
1B72000
heap
page read and write
6BBE000
stack
page read and write
3920000
direct allocation
page execute and read and write
189B000
heap
page read and write
8FC000
unkown
page readonly
7B90000
trusted library allocation
page read and write
1BD0000
heap
page read and write
7338000
heap
page read and write
8C4000
unkown
page readonly
1B7D000
heap
page read and write
15D0000
heap
page read and write
6DFE000
stack
page read and write
17D0000
direct allocation
page execute and read and write
18A7000
heap
page read and write
1553000
heap
page read and write
8C1000
unkown
page readonly
1876000
heap
page read and write
19D5000
heap
page read and write
3AC4000
direct allocation
page execute and read and write
72FB000
heap
page read and write
384E000
stack
page read and write
14C0000
heap
page read and write
721000
unkown
page execute and read and write
724000
unkown
page readonly
186E000
heap
page read and write
74A8000
heap
page read and write
1971000
heap
page read and write
3914000
direct allocation
page execute and read and write
7F2A0000
direct allocation
page execute and read and write
18B8000
heap
page read and write
1B91000
heap
page read and write
197B000
heap
page read and write
1566000
heap
page read and write
185A000
heap
page read and write
43AF000
stack
page read and write
14F7000
heap
page read and write
1B66000
heap
page read and write
1971000
heap
page read and write
771B000
heap
page read and write
A51000
unkown
page execute and read and write
1B96000
heap
page read and write
16A4000
heap
page read and write
722F000
stack
page read and write
EBB000
unkown
page execute and write copy
9F7000
unkown
page execute and read and write
18BF000
heap
page read and write
1B48000
heap
page read and write
16A4000
heap
page read and write
1864000
heap
page read and write
16A4000
heap
page read and write
729E000
stack
page read and write
1865000
heap
page read and write
1B7E000
heap
page read and write
186E000
heap
page read and write
7722000
heap
page read and write
1B43000
heap
page read and write
6BAE000
stack
page read and write
3AC4000
direct allocation
page execute and read and write
72D5000
heap
page read and write
182E000
heap
page read and write
7653000
heap
page read and write
167E000
stack
page read and write
16A4000
heap
page read and write
176F000
heap
page read and write
1B7D000
heap
page read and write
1B47000
heap
page read and write
39EE000
stack
page read and write
AA0000
unkown
page execute and read and write
1B62000
heap
page read and write
109B000
unkown
page execute and write copy
1BA2000
heap
page read and write
1D2E000
stack
page read and write
904000
unkown
page readonly
1B97000
heap
page read and write
6440000
heap
page read and write
1994000
heap
page read and write
1B8E000
heap
page read and write
1537000
heap
page read and write
13CE000
stack
page read and write
182D000
heap
page read and write
1B95000
heap
page read and write
1B62000
heap
page read and write
1B49000
heap
page read and write
1B8B000
heap
page read and write
3B40000
heap
page read and write
1B47000
heap
page read and write
1866000
heap
page read and write
72E000
stack
page read and write
72F0000
heap
page read and write
37C4000
direct allocation
page execute and read and write
186E000
heap
page read and write
167E000
stack
page read and write
74A8000
heap
page read and write
186E000
heap
page read and write
17A0000
heap
page read and write
3AC0000
direct allocation
page execute and read and write
15D7000
heap
page read and write
1866000
heap
page read and write
72D1000
heap
page read and write
3AA4000
direct allocation
page execute and read and write
72EC000
heap
page read and write
1890000
heap
page read and write
7230000
remote allocation
page read and write
7380000
trusted library allocation
page read and write
1BBC000
heap
page read and write
1B62000
heap
page read and write
3B8E000
stack
page read and write
1965000
heap
page read and write
37C4000
direct allocation
page execute and read and write
7920000
trusted library allocation
page read and write
1866000
heap
page read and write
7750000
trusted library allocation
page read and write
197B000
heap
page read and write
3AC4000
direct allocation
page execute and read and write
7230000
remote allocation
page read and write
1B59000
heap
page read and write
1A6E000
heap
page read and write
1BEB000
heap
page read and write
698D000
stack
page read and write
3AA4000
direct allocation
page execute and read and write
7481000
heap
page read and write
1B75000
heap
page read and write
7410000
trusted library allocation
page read and write
3AAE000
stack
page read and write
1B47000
heap
page read and write
74A1000
heap
page read and write
37E0000
remote allocation
page read and write
7729000
heap
page read and write
179A000
heap
page read and write
1B66000
heap
page read and write
1999000
heap
page read and write
19A3000
heap
page read and write
197B000
heap
page read and write
1930000
heap
page read and write
16A4000
heap
page read and write
7B90000
trusted library allocation
page read and write
6DAC000
stack
page read and write
7656000
heap
page read and write
17A5000
heap
page read and write
1876000
heap
page read and write
AE0000
unkown
page execute and read and write
3AA0000
direct allocation
page execute and read and write
18BB000
heap
page read and write
410F000
stack
page read and write
74B2000
heap
page read and write
1B3E000
heap
page read and write
197B000
heap
page read and write
18BA000
heap
page read and write
74B9000
heap
page read and write
72E6000
heap
page read and write
17C0000
heap
page read and write
1905000
heap
page read and write
771D000
heap
page read and write
19E7000
heap
page read and write
1B30000
heap
page read and write
1994000
heap
page read and write
1841000
heap
page read and write
163E000
stack
page read and write
1B1C000
heap
page read and write
105B000
unkown
page execute and read and write
186E000
heap
page read and write
1BA1000
heap
page read and write
72E9000
heap
page read and write
1781000
heap
page read and write
16A4000
heap
page read and write
1967000
heap
page read and write
187F000
heap
page read and write
64AE000
stack
page read and write
1A9C000
heap
page read and write
18CA000
heap
page read and write
1B7D000
heap
page read and write
1937000
heap
page read and write
16A4000
heap
page read and write
16A4000
heap
page read and write
697D000
stack
page read and write
105B000
unkown
page execute and read and write
901000
unkown
page readonly
7060000
remote allocation
page read and write
45AF000
stack
page read and write
1946000
heap
page read and write
68AE000
stack
page read and write
1B0A000
heap
page read and write
18A8000
heap
page read and write
1848000
heap
page read and write
190E000
heap
page read and write
1866000
heap
page read and write
1B3C000
heap
page read and write
1B68000
heap
page read and write
35B4000
direct allocation
page execute and read and write
74B0000
heap
page read and write
8BC000
unkown
page readonly
7B90000
trusted library allocation
page read and write
1BA2000
heap
page read and write
1994000
heap
page read and write
1B15000
heap
page read and write
1BD3000
heap
page read and write
18BE000
heap
page read and write
1B34000
heap
page read and write
1B97000
heap
page read and write
69CE000
stack
page read and write
1B72000
heap
page read and write
1B17000
heap
page read and write
1058000
unkown
page execute and write copy
1890000
heap
page read and write
193E000
heap
page read and write
155D000
heap
page read and write
7920000
trusted library allocation
page read and write
188D000
heap
page read and write
72DD000
heap
page read and write
6551000
heap
page read and write
1B5F000
heap
page read and write
74A0000
heap
page read and write
1828000
heap
page read and write
3B3E000
stack
page read and write
1BA8000
heap
page read and write
1A87000
heap
page read and write
70E000
stack
page read and write
674E000
stack
page read and write
72D1000
heap
page read and write
450F000
stack
page read and write
182D000
heap
page read and write
74B2000
heap
page read and write
3AC4000
direct allocation
page execute and read and write
1B43000
heap
page read and write
1BC5000
heap
page read and write
1B43000
heap
page read and write
693E000
stack
page read and write
1B72000
heap
page read and write
721000
unkown
page execute and read and write
72F8000
heap
page read and write
72F8000
heap
page read and write
1B7A000
heap
page read and write
1B15000
heap
page read and write
1893000
heap
page read and write
1A51000
heap
page read and write
647B000
heap
page read and write
13CD000
stack
page read and write
7800000
trusted library allocation
page read and write
14BA000
stack
page read and write
72E1000
heap
page read and write
1B34000
heap
page read and write
1B7E000
heap
page read and write
1897000
heap
page read and write
3D7E000
stack
page read and write
7323000
heap
page read and write
1BD0000
heap
page read and write
8BA000
unkown
page execute and write copy
1BA7000
heap
page read and write
1831000
heap
page read and write
35C8000
direct allocation
page execute and read and write
186E000
heap
page read and write
1865000
heap
page read and write
1B3A000
heap
page read and write
1994000
heap
page read and write
187F000
heap
page read and write
19A1000
heap
page read and write
16A0000
heap
page read and write
418F000
stack
page read and write
7B90000
trusted library allocation
page read and write
1B62000
heap
page read and write
1BA8000
heap
page read and write
105B000
unkown
page execute and write copy
A51000
unkown
page execute and read and write
72CE000
stack
page read and write
186E000
heap
page read and write
1B30000
heap
page read and write
1B90000
heap
page read and write
760000
unkown
page readonly
17B4000
heap
page read and write
1B7F000
heap
page read and write
1B6F000
heap
page read and write
AA0000
unkown
page execute and read and write
74B9000
heap
page read and write
1847000
heap
page read and write
74A8000
heap
page read and write
3AB3000
direct allocation
page execute and read and write
7711000
heap
page read and write
379D000
stack
page read and write
1435000
heap
page read and write
7B90000
trusted library allocation
page read and write
19A4000
heap
page read and write
1B62000
heap
page read and write
188D000
heap
page read and write
74CB000
heap
page read and write
186E000
heap
page read and write
74B9000
heap
page read and write
18E8000
heap
page read and write
EBB000
unkown
page execute and read and write
1865000
heap
page read and write
1B70000
heap
page read and write
74CF000
stack
page read and write
1E0000
heap
page read and write
1A9F000
heap
page read and write
393E000
stack
page read and write
6FEF000
stack
page read and write
185A000
heap
page read and write
72D2000
heap
page read and write
37C4000
direct allocation
page execute and read and write
7711000
heap
page read and write
7721000
heap
page read and write
72E8000
heap
page read and write
1B81000
heap
page read and write
1983000
heap
page read and write
188D000
heap
page read and write
1866000
heap
page read and write
1B96000
heap
page read and write
904000
unkown
page readonly
1B81000
heap
page read and write
1BC7000
heap
page read and write
7750000
trusted library allocation
page read and write
8A2000
unkown
page execute and write copy
18A7000
heap
page read and write
1B55000
heap
page read and write
3DE0000
heap
page read and write
1B96000
heap
page read and write
19AB000
heap
page read and write
1993000
heap
page read and write
35B4000
direct allocation
page execute and read and write
720000
unkown
page readonly
188B000
heap
page read and write
187F000
heap
page read and write
1A7D000
heap
page read and write
1A8A000
heap
page read and write
1BE8000
heap
page read and write
33E0000
heap
page read and write
1791000
heap
page read and write
1B96000
heap
page read and write
1876000
heap
page read and write
16A4000
heap
page read and write
1B70000
heap
page read and write
197B000
heap
page read and write
19A4000
heap
page read and write
74A1000
heap
page read and write
72FB000
heap
page read and write
1B74000
heap
page read and write
18C3000
heap
page read and write
188D000
heap
page read and write
35D0000
direct allocation
page execute and read and write
18A9000
heap
page read and write
1B4A000
heap
page read and write
8C1000
unkown
page readonly
3CC3000
heap
page read and write
1B68000
heap
page read and write
39AD000
stack
page read and write
1994000
heap
page read and write
34D0000
direct allocation
page execute and read and write
74A0000
trusted library allocation
page read and write
1B26000
heap
page read and write
7FA70000
direct allocation
page execute and read and write
1B81000
heap
page read and write
1890000
heap
page read and write
1BA8000
heap
page read and write
1BA2000
heap
page read and write
1B96000
heap
page read and write
1B72000
heap
page read and write
1B22000
heap
page read and write
7716000
heap
page read and write
70AE000
stack
page read and write
18B8000
heap
page read and write
1B4A000
heap
page read and write
7800000
trusted library allocation
page read and write
1866000
heap
page read and write
72DA000
heap
page read and write
33CD000
stack
page read and write
6B7D000
stack
page read and write
1B43000
heap
page read and write
1890000
heap
page read and write
1B16000
heap
page read and write
7338000
heap
page read and write
1BCB000
heap
page read and write
187F000
heap
page read and write
8E2000
unkown
page execute and read and write
19A7000
heap
page read and write
907000
unkown
page execute and read and write
18C3000
heap
page read and write
761000
unkown
page execute and write copy
3D20000
heap
page read and write
702000
unkown
page execute and read and write
907000
unkown
page execute and write copy
3AD0000
direct allocation
page execute and read and write
1B38000
heap
page read and write
3740000
heap
page read and write
19A4000
heap
page read and write
3760000
heap
page read and write
18C6000
heap
page read and write
38D3000
heap
page read and write
74AC000
heap
page read and write
19A7000
heap
page read and write
7675000
heap
page read and write
74A0000
heap
page read and write
1BA2000
heap
page read and write
1B61000
heap
page read and write
1BC7000
heap
page read and write
186E000
heap
page read and write
1E1F000
stack
page read and write
7380000
trusted library allocation
page read and write
1B72000
heap
page read and write
1BA8000
heap
page read and write
87A000
unkown
page execute and write copy
6A0000
heap
page read and write
7F6F0000
direct allocation
page execute and read and write
1A18000
heap
page read and write
8A2000
unkown
page execute and read and write
37DE000
stack
page read and write
7920000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
72F9000
heap
page read and write
187F000
heap
page read and write
36F0000
heap
page read and write
720000
unkown
page readonly
7729000
heap
page read and write
1993000
heap
page read and write
74A1000
heap
page read and write
7750000
trusted library allocation
page read and write
18B8000
heap
page read and write
6414000
heap
page read and write
1BB7000
heap
page read and write
1BA8000
heap
page read and write
109B000
unkown
page execute and read and write
7665000
heap
page read and write
18A9000
heap
page read and write
1BEF000
heap
page read and write
438F000
stack
page read and write
193E000
heap
page read and write
1B81000
heap
page read and write
1B30000
heap
page read and write
16A4000
heap
page read and write
194E000
stack
page read and write
8B2000
unkown
page execute and write copy
761000
unkown
page execute and write copy
72F0000
heap
page read and write
72F8000
heap
page read and write
1BA2000
heap
page read and write
1594000
heap
page read and write
DF5000
unkown
page execute and read and write
16A4000
heap
page read and write
187F000
heap
page read and write
1A88000
heap
page read and write
1B91000
heap
page read and write
1837000
heap
page read and write
87E0000
heap
page read and write
1B2E000
stack
page read and write
7481000
heap
page read and write
63B000
stack
page read and write
1993000
heap
page read and write
201F000
stack
page read and write
16A4000
heap
page read and write
15D7000
heap
page read and write
1B37000
heap
page read and write
19A1000
heap
page read and write
1BC0000
heap
page read and write
1865000
heap
page read and write
7800000
trusted library allocation
page read and write
7711000
heap
page read and write
72D4000
heap
page read and write
1BA2000
heap
page read and write
1B6E000
heap
page read and write
3928000
direct allocation
page execute and read and write
1B0E000
heap
page read and write
188D000
heap
page read and write
1BA2000
heap
page read and write
1BC0000
heap
page read and write
1998000
heap
page read and write
1950000
direct allocation
page execute and read and write
7656000
heap
page read and write
1A65000
heap
page read and write
1B7D000
heap
page read and write
16A4000
heap
page read and write
74A0000
trusted library allocation
page read and write
1B7D000
heap
page read and write
1964000
heap
page read and write
72D4000
heap
page read and write
1993000
heap
page read and write
16A4000
heap
page read and write
3914000
direct allocation
page execute and read and write
1993000
heap
page read and write
7800000
trusted library allocation
page read and write
178F000
heap
page read and write
7920000
trusted library allocation
page read and write
1960000
heap
page read and write
19A4000
heap
page read and write
1690000
heap
page read and write
197B000
heap
page read and write
3BC0000
heap
page read and write
7338000
heap
page read and write
3A20000
heap
page read and write
7060000
remote allocation
page read and write
16A4000
heap
page read and write
1B91000
heap
page read and write
7722000
heap
page read and write
186E000
heap
page read and write
1B75000
heap
page read and write
1BB7000
heap
page read and write
1B8B000
heap
page read and write
74CF000
heap
page read and write
72ED000
heap
page read and write
1B70000
heap
page read and write
697D000
stack
page read and write
1B67000
heap
page read and write
1BA8000
heap
page read and write
6E0F000
stack
page read and write
1B98000
heap
page read and write
7920000
trusted library allocation
page read and write
1A97000
heap
page read and write
1971000
heap
page read and write
7711000
heap
page read and write
3914000
direct allocation
page execute and read and write
72D0000
heap
page read and write
7B90000
trusted library allocation
page read and write
1A73000
heap
page read and write
18B8000
heap
page read and write
18B8000
heap
page read and write
1B7D000
heap
page read and write
1BA2000
heap
page read and write
1B43000
heap
page read and write
1380000
heap
page read and write
673E000
stack
page read and write
1B96000
heap
page read and write
7B90000
trusted library allocation
page read and write
37D8000
direct allocation
page execute and read and write
1BA7000
heap
page read and write
7B90000
trusted library allocation
page read and write
1B7E000
heap
page read and write
13FE000
stack
page read and write
65C5000
heap
page read and write
1993000
heap
page read and write
1B92000
heap
page read and write
7716000
heap
page read and write
3A10000
remote allocation
page read and write
7710000
heap
page read and write
1994000
heap
page read and write
901000
unkown
page readonly
1994000
heap
page read and write
1B7E000
heap
page read and write
1BC0000
heap
page read and write
1B54000
heap
page read and write
17ED000
stack
page read and write
727000
unkown
page execute and read and write
666E000
heap
page read and write
74A8000
heap
page read and write
771D000
heap
page read and write
7920000
trusted library allocation
page read and write
1B75000
heap
page read and write
1BEF000
heap
page read and write
1B68000
heap
page read and write
1B75000
heap
page read and write
187F000
heap
page read and write
7800000
trusted library allocation
page read and write
1B7E000
heap
page read and write
1931000
heap
page read and write
19A7000
heap
page read and write
76E4000
heap
page read and write
1855000
heap
page read and write
7380000
trusted library allocation
page read and write
187F000
heap
page read and write
1BA2000
heap
page read and write
1994000
heap
page read and write
1B8E000
heap
page read and write
74C2000
heap
page read and write
1898000
heap
page read and write
1BA2000
heap
page read and write
7750000
trusted library allocation
page read and write
1993000
heap
page read and write
1B55000
heap
page read and write
1B68000
heap
page read and write
1BA2000
heap
page read and write
15D5000
heap
page read and write
186A000
heap
page read and write
3914000
direct allocation
page execute and read and write
188D000
heap
page read and write
1B30000
heap
page read and write
1532000
heap
page read and write
720000
unkown
page readonly
7721000
heap
page read and write
7750000
trusted library allocation
page read and write
1BA8000
heap
page read and write
904000
unkown
page readonly
197B000
heap
page read and write
1B98000
heap
page read and write
197B000
heap
page read and write
1890000
heap
page read and write
7920000
trusted library allocation
page read and write
19A4000
heap
page read and write
1B8E000
heap
page read and write
1BA2000
heap
page read and write
72D1000
heap
page read and write
35B0000
direct allocation
page execute and read and write
1887000
heap
page read and write
1B75000
heap
page read and write
1B54000
heap
page read and write
6417000
heap
page read and write
19A0000
heap
page read and write
19A4000
heap
page read and write
3A60000
direct allocation
page execute and read and write
18BB000
heap
page read and write
1B46000
heap
page read and write
3AA4000
direct allocation
page execute and read and write
1994000
heap
page read and write
16A4000
heap
page read and write
8B2000
unkown
page execute and write copy
1990000
heap
page read and write
74AD000
heap
page read and write
40AF000
stack
page read and write
1864000
heap
page read and write
1540000
heap
page read and write
1994000
heap
page read and write
766A000
heap
page read and write
1370000
heap
page read and write
6443000
heap
page read and write
1AEF000
stack
page read and write
13B0000
heap
page read and write
1BA2000
heap
page read and write
37E0000
remote allocation
page read and write
1983000
heap
page read and write
1F0000
heap
page read and write
712000
unkown
page execute and read and write
7380000
trusted library allocation
page read and write
1BB7000
heap
page read and write
721000
unkown
page readonly
72D4000
heap
page read and write
1B3C000
heap
page read and write
7920000
trusted library allocation
page read and write
1866000
heap
page read and write
11E0000
heap
page read and write
580000
unkown
page readonly
188B000
heap
page read and write
7658000
heap
page read and write
19BC000
heap
page read and write
72CF000
stack
page read and write
18BB000
heap
page read and write
1B90000
heap
page read and write
74A0000
trusted library allocation
page read and write
1983000
heap
page read and write
38C0000
heap
page read and write
1B72000
heap
page read and write
134B000
stack
page read and write
1787000
heap
page read and write
1B55000
heap
page read and write
3904000
direct allocation
page execute and read and write
183A000
heap
page read and write
6513000
heap
page read and write
1B72000
heap
page read and write
1890000
heap
page read and write
8C7000
unkown
page execute and write copy
EB8000
unkown
page execute and write copy
1BCC000
heap
page read and write
1944000
heap
page read and write
1865000
heap
page read and write
16A4000
heap
page read and write
1897000
heap
page read and write
76A0000
heap
page read and write
16A4000
heap
page read and write
1966000
heap
page read and write
761000
unkown
page execute and read and write
1B97000
heap
page read and write
14BD000
stack
page read and write
18BE000
heap
page read and write
19D5000
heap
page read and write
16A4000
heap
page read and write
1984000
heap
page read and write
7750000
trusted library allocation
page read and write
1B98000
heap
page read and write
3470000
direct allocation
page execute and read and write
3970000
heap
page read and write
1B55000
heap
page read and write
16A4000
heap
page read and write
7711000
heap
page read and write
17ED000
stack
page read and write
771D000
heap
page read and write
1935000
heap
page read and write
1B6D000
heap
page read and write
907000
unkown
page execute and read and write
19A4000
heap
page read and write
1B7E000
heap
page read and write
1B4B000
heap
page read and write
1988000
heap
page read and write
704F000
stack
page read and write
38DE000
stack
page read and write
1B8E000
heap
page read and write
18C6000
heap
page read and write
8C4000
unkown
page readonly
1B7E000
heap
page read and write
197B000
heap
page read and write
8570000
heap
page read and write
8C7000
unkown
page execute and read and write
1B7E000
heap
page read and write
1B5F000
heap
page read and write
16A4000
heap
page read and write
7B90000
trusted library allocation
page read and write
1B6A000
heap
page read and write
187F000
heap
page read and write
1848000
heap
page read and write
173A000
heap
page read and write
1968000
heap
page read and write
1AA3000
heap
page read and write
16A4000
heap
page read and write
154B000
heap
page read and write
1797000
heap
page read and write
1B4C000
heap
page read and write
1897000
heap
page read and write
3AEE000
stack
page read and write
3710000
heap
page read and write
1B55000
heap
page read and write
182D000
heap
page read and write
1994000
heap
page read and write
1B1C000
heap
page read and write
7327000
heap
page read and write
1BE8000
heap
page read and write
3C8E000
stack
page read and write
3700000
heap
page read and write
1B96000
heap
page read and write
1A9C000
heap
page read and write
37C4000
direct allocation
page execute and read and write
18E2000
heap
page read and write
87E1000
heap
page read and write
1BD8000
heap
page read and write
16A4000
heap
page read and write
7722000
heap
page read and write
18C0000
heap
page read and write
3A10000
remote allocation
page read and write
1544000
heap
page read and write
1B8A000
heap
page read and write
1890000
heap
page read and write
1B7A000
heap
page read and write
1866000
heap
page read and write
15ED000
stack
page read and write
1971000
heap
page read and write
1B13000
heap
page read and write
1865000
heap
page read and write
1B98000
heap
page read and write
1966000
heap
page read and write
7665000
heap
page read and write
76A1000
heap
page read and write
7750000
trusted library allocation
page read and write
1730000
heap
page read and write
37C0000
direct allocation
page execute and read and write
18CA000
heap
page read and write
6DEE000
stack
page read and write
16A4000
heap
page read and write
1B72000
heap
page read and write
1E1F000
stack
page read and write
7750000
trusted library allocation
page read and write
19A4000
heap
page read and write
1983000
heap
page read and write
1B5F000
heap
page read and write
1872000
heap
page read and write
1B7D000
heap
page read and write
1B34000
heap
page read and write
72E2000
heap
page read and write
16A4000
heap
page read and write
74A8000
heap
page read and write
1848000
heap
page read and write
1865000
heap
page read and write
72F8000
heap
page read and write
187F000
heap
page read and write
1B75000
heap
page read and write
1890000
heap
page read and write
1BA8000
heap
page read and write
721000
unkown
page execute and write copy
182C000
heap
page read and write
7665000
heap
page read and write
7800000
trusted library allocation
page read and write
18A2000
heap
page read and write
16A4000
heap
page read and write
72D1000
heap
page read and write
1876000
heap
page read and write
1B8C000
heap
page read and write
1B47000
heap
page read and write
186E000
heap
page read and write
1983000
heap
page read and write
74AD000
heap
page read and write
1A18000
heap
page read and write
16A4000
heap
page read and write
18B8000
heap
page read and write
616E000
heap
page read and write
65FD000
heap
page read and write
1971000
heap
page read and write
8BC000
unkown
page readonly
1B75000
heap
page read and write
1B96000
heap
page read and write
156A000
heap
page read and write
7676000
heap
page read and write
1578000
heap
page read and write
1B8A000
heap
page read and write
18D0000
heap
page read and write
19A4000
heap
page read and write
74C2000
heap
page read and write
1998000
heap
page read and write
72E4000
heap
page read and write
74A1000
heap
page read and write
1968000
heap
page read and write
A11000
unkown
page execute and read and write
1971000
heap
page read and write
19A7000
heap
page read and write
18BB000
heap
page read and write
74A1000
heap
page read and write
1A5D000
heap
page read and write
72E8000
heap
page read and write
72DA000
heap
page read and write
1B96000
heap
page read and write
19A7000
heap
page read and write
1BE8000
heap
page read and write
71C000
unkown
page readonly
71C000
unkown
page readonly
6DA000
unkown
page execute and write copy
8A2000
unkown
page execute and write copy
177E000
heap
page read and write
187F000
heap
page read and write
1B30000
heap
page read and write
3AA4000
direct allocation
page execute and read and write
1BA2000
heap
page read and write
72F0000
heap
page read and write
185B000
heap
page read and write
8A2000
unkown
page execute and read and write
770F000
stack
page read and write
7750000
trusted library allocation
page read and write
17A3000
heap
page read and write
1310000
direct allocation
page execute and read and write
87A000
unkown
page execute and write copy
187F000
heap
page read and write
430F000
stack
page read and write
16A4000
heap
page read and write
19AD000
heap
page read and write
1BA2000
heap
page read and write
74C2000
heap
page read and write
3EAF000
stack
page read and write
1971000
heap
page read and write
1B4E000
heap
page read and write
199F000
heap
page read and write
188D000
heap
page read and write
7338000
heap
page read and write
1A78000
heap
page read and write
1885000
heap
page read and write
1993000
heap
page read and write
1993000
heap
page read and write
1B50000
heap
page read and write
105B000
unkown
page execute and write copy
677E000
stack
page read and write
8C4000
unkown
page readonly
1B8E000
heap
page read and write
15E5000
heap
page read and write
A37000
unkown
page execute and read and write
7656000
heap
page read and write
7712000
heap
page read and write
7800000
trusted library allocation
page read and write
1896000
heap
page read and write
1945000
heap
page read and write
1B5F000
heap
page read and write
1968000
heap
page read and write
1B91000
heap
page read and write
187F000
heap
page read and write
188E000
heap
page read and write
18DC000
heap
page read and write
74CF000
heap
page read and write
1BB5000
heap
page read and write
18D0000
heap
page read and write
16A4000
heap
page read and write
37C4000
direct allocation
page execute and read and write
6C0E000
stack
page read and write
1B7D000
heap
page read and write
185A000
heap
page read and write
16A4000
heap
page read and write
1B5F000
heap
page read and write
116B000
stack
page read and write
7800000
trusted library allocation
page read and write
1B81000
heap
page read and write
1A18000
heap
page read and write
197B000
heap
page read and write
18B8000
heap
page read and write
16A4000
heap
page read and write
74B4000
heap
page read and write
7260000
remote allocation
page read and write
17F0000
heap
page read and write
76A1000
heap
page read and write
1BD3000
heap
page read and write
186E000
heap
page read and write
14F0000
heap
page read and write
17B000
stack
page read and write
72D1000
heap
page read and write
74B9000
heap
page read and write
1A96000
heap
page read and write
1971000
heap
page read and write
72D4000
heap
page read and write
189C000
heap
page read and write
901000
unkown
page readonly
1B62000
heap
page read and write
721000
unkown
page readonly
72D4000
heap
page read and write
1BB8000
heap
page read and write
1B8E000
heap
page read and write
38D0000
direct allocation
page execute and read and write
7B90000
trusted library allocation
page read and write
186E000
heap
page read and write
18B5000
heap
page read and write
190E000
stack
page read and write
6B7D000
stack
page read and write
7800000
trusted library allocation
page read and write
771F000
heap
page read and write
1B6E000
heap
page read and write
1BD8000
heap
page read and write
189C000
heap
page read and write
1B81000
heap
page read and write
182D000
heap
page read and write
1B19000
heap
page read and write
1B7A000
heap
page read and write
8B2000
unkown
page execute and read and write
771F000
heap
page read and write
678E000
stack
page read and write
1B7C000
heap
page read and write
1890000
heap
page read and write
904000
unkown
page readonly
1BA0000
heap
page read and write
1B66000
heap
page read and write
18BB000
heap
page read and write
16DE000
stack
page read and write
8B2000
unkown
page execute and read and write
1B51000
heap
page read and write
72D4000
heap
page read and write
1866000
heap
page read and write
7230000
remote allocation
page read and write
1B6E000
heap
page read and write
185A000
heap
page read and write
74AD000
heap
page read and write
1B85000
heap
page read and write
1BDA000
heap
page read and write
11D0000
heap
page read and write
7800000
trusted library allocation
page read and write
7338000
heap
page read and write
1B34000
heap
page read and write
1B5F000
heap
page read and write
35B4000
direct allocation
page execute and read and write
3AD8000
direct allocation
page execute and read and write
1B0D000
heap
page read and write
74A6000
heap
page read and write
1968000
heap
page read and write
7314000
heap
page read and write
3950000
heap
page read and write
1B7E000
heap
page read and write
1B68000
heap
page read and write
186E000
heap
page read and write
1B63000
heap
page read and write
1A69000
heap
page read and write
109B000
unkown
page execute and write copy
1B7D000
heap
page read and write
1B49000
heap
page read and write
7A20000
trusted library allocation
page read and write
38FE000
stack
page read and write
1966000
heap
page read and write
1B8E000
heap
page read and write
188D000
heap
page read and write
1630000
heap
page read and write
1878000
heap
page read and write
1B75000
heap
page read and write
74CB000
heap
page read and write
1B80000
heap
page read and write
7675000
heap
page read and write
8C1000
unkown
page readonly
1549000
heap
page read and write
1B62000
heap
page read and write
74C2000
heap
page read and write
19A4000
heap
page read and write
18D8000
heap
page read and write
1B7E000
heap
page read and write
1B98000
heap
page read and write
3A6D000
stack
page read and write
188D000
heap
page read and write
1B72000
heap
page read and write
19B6000
heap
page read and write
3A23000
heap
page read and write
1937000
heap
page read and write
1B70000
heap
page read and write
16A4000
heap
page read and write
7B90000
trusted library allocation
page read and write
72D1000
heap
page read and write
35A3000
direct allocation
page execute and read and write
1937000
heap
page read and write
1983000
heap
page read and write
1983000
heap
page read and write
394E000
stack
page read and write
183C000
heap
page read and write
3AB0000
direct allocation
page execute and read and write
1B68000
heap
page read and write
1B71000
heap
page read and write
74C2000
heap
page read and write
7B90000
trusted library allocation
page read and write
6BCE000
stack
page read and write
1A20000
heap
page read and write
197B000
heap
page read and write
188D000
heap
page read and write
1BA2000
heap
page read and write
1963000
heap
page read and write
88E0000
trusted library allocation
page read and write
37C0000
direct allocation
page execute and read and write
1B62000
heap
page read and write
65C2000
heap
page read and write
74AC000
heap
page read and write
16A4000
heap
page read and write
1B70000
heap
page read and write
1B6E000
heap
page read and write
1831000
heap
page read and write
A11000
unkown
page execute and read and write
3AC4000
direct allocation
page execute and read and write
1B1A000
heap
page read and write
1B82000
heap
page read and write
772A000
heap
page read and write
60BF000
heap
page read and write
72E8000
heap
page read and write
1B7D000
heap
page read and write
74BB000
heap
page read and write
18BB000
heap
page read and write
1BD0000
heap
page read and write
3AC4000
direct allocation
page execute and read and write
1B83000
heap
page read and write
1B96000
heap
page read and write
187F000
heap
page read and write
74C2000
heap
page read and write
1A73000
heap
page read and write
There are 1602 hidden memdumps, click here to show them.