IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9wBRx7ST9VOnJqni_JpioUs.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\PSdiYEtw_DOSPKoK_uBheap.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\tC131VXqxqwXyoqOe7muh9i.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\wwigCWSFuz2MihL8u4G1uFC.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_f22e2bf49a32bf74f5adbe8cba848017948e65f7_0010bad0_640263cb-49b4-41b7-b487-4b818315d5ea\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_d8cfe4b0b9575b2ab71f14e55e4d6484872cb94_df5fde7b_aa9d6a92-8d2d-4559-99fe-1b134b7dfc56\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_d8cfe4b0b9575b2ab71f14e55e4d6484872cb94_df5fde7b_f3afe759-c551-431a-a54b-014b05a40ae0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_751fa919568148cae58711204775ef674bafd71f_50e30abd_2c1d9ae0-1b69-4126-ae64-d738448a55b5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER144F.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 6 18:08:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16F0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER172F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER220B.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 6 18:08:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2333.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 6 18:08:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2334.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2364.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER242E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER245E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D98.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 6 18:08:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E83.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7EB3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\1bA0iPxs1_tpWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\7Ndzc20NqBT6Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\LjKc4cZCdkn6Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\N00nD6NyQ3cLCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\NxTOOE3P877HHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\QALFCGqIe0GzWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\QZolPj_wU7yvHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\S9TwIATY7544Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\Y4Fgx64HQvbuWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\a7mDNvwnbxnHLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\erLXBsfZOb13History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\m736MhFnnhWLWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\ru4TymmQRM2zWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanHju_g2DxItFq\vd0z8wzGefD1History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\1TlhGNMGRIBAHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\4deeADJYPmpQWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\8ZyHikzPP6RfHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\Ip1jITBVvpfpWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\KD92s1mFJPJgLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\K_LAuSWvaNiyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\LhmhqtkXTkbYHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\N6snpryO8uf5Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\OXHUVahmxrt1Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\TLE_gXdWplrQLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\UqNl41FdpO7sHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\Y7ezkClN3tvGWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\c_G5qyHoUqdbWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanMW7ZIM5Bq6VF\sQSDtQYbXNYdWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\0bTBLNjSXQ3WWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\BhPLdlMH4HviHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\DOGuPW8VgXDwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\Hveaex_QIWEUWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\S1kWLfoUHhbSLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\Ss_aLcG4kfDuHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\Z82s7O924lLeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\ZhaKbTXVRlMcLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\iCl1DNg_vvFNHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\ruxveYYrnNxbWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\suF4nwudmtWhCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\uxiBTU0fcTIoHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\yabQsRD6rxEWLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanVDXBLDHnzSSM\ycP9pvgLeKxDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\42h4yDt09kAFWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\ELASOvMcSsNrHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\HQFayTHWA4CIWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\OAwfuvRJ7Zo3History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\OrF8rFJrkbX9Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\UaBkH_1UtTljHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\V9veGYQ701aZWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\cCZagzzOxnzSLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\h7vTUP6iIQXbLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\kGWzVJBhnyHSCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\l9WMfadWVY3RHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\ne2K7r4K6MmbWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\pSuV50rXNRR3Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spansEwF_O0f6T2F\pTWMc6sLNinTWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\trixyHju_g2DxItFq\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyHju_g2DxItFq\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyHju_g2DxItFq\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyMW7ZIM5Bq6VF\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyMW7ZIM5Bq6VF\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyMW7ZIM5Bq6VF\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyVDXBLDHnzSSM\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyVDXBLDHnzSSM\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyVDXBLDHnzSSM\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixysEwF_O0f6T2F\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixysEwF_O0f6T2F\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixysEwF_O0f6T2F\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 97 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7672 -s 1944
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7784 -s 1908
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 1980
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7584 -s 1960
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://db-ip.com/demo/home.php?s=84.17.40.101c
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.me/RiseProSUPPORTm
unknown
https://db-ip.com/demo/home.php?s=84.17.40.101g
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://db-ip.com/
unknown
https://db-ip.com/demo/home.php?s=84.17.40.101s
unknown
https://t.me/RiseProSUPPORTli
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://147.45.47.102:57893/hera/amadka.exeDatae
unknown
http://193.233.132.56/cost/lenin.exerbirdox/i
unknown
http://147.45.47.102:57893/hera/amadka.exeD)a#
unknown
https://t.me/risepro
unknown
http://193.233.132.56/cost/lenin.exe)
unknown
http://193.233.132.56/cost/go.exe
unknown
https://db-ip.com:443/demo/home.php?s=84.17.40.101e
unknown
https://t.me/risepro_bot&
unknown
https://t.me/risepro_bot#
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/risepro_botisepro_bot
unknown
http://193.233.132.56/cost/lenin.exesepro
unknown
https://ipinfo.io/widget/demo/84.17.40.101~W
unknown
https://db-ip.com/ggg
unknown
https://db-ip.com/demo/home.php?s=84.17.40.101
104.26.5.15
https://t.me/RiseProSUPPORT7
unknown
https://t.4
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com/demo/home.php?s=84.17.40.101(
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://193.233.132.56/cost/lenin.exeUser
unknown
https://t.me/risepro_bot4.17.40.101
unknown
http://upx.sf.net
unknown
https://db-ip.com:443/demo/home.php?s=84.17.40.101o
unknown
https://t.me/RiseProSUPPORT
unknown
http://193.233.132.56/cost/go.exe00.1
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://147.45.47.102:57893/hera/amadka.exeData
unknown
https://ipinfo.io/widget/demo/84.17.40.101
34.117.186.192
https://ac.ecosia.org/autocomplete?q=
unknown
http://193.233.132.56/cost/go.exe1
unknown
https://db-ip.com/demo/home.php?s=84.17.40.101D
unknown
https://t.me/risepro_bot
unknown
http://147.45.47.102:57893/hera/amadka.exeletsM
unknown
https://t.me/risepro_botlater
unknown
https://ipinfo.io/
unknown
http://pki-ocsp.symauth.com0
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://147.45.47.102:57893/hera/amadka.exeN
unknown
https://db-ip.com:443/demo/home.php?s=84.17.40.101
unknown
http://193.233.132.56/cost/lenin.exe
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://ipinfo.io:443/widget/demo/84.17.40.101
unknown
https://t.me/risepro_bots
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://193.233.132.56/cost/go.execoin
unknown
There are 58 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{6817fd7f-c853-c0ac-b728-c4b186e47153}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{d7917daf-10d4-94ea-ae44-98edc8eaddfc}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800EEFA4DDCA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1838000
heap
page read and write
malicious
1CEC000
heap
page read and write
malicious
1CE6000
heap
page read and write
malicious
191E000
heap
page read and write
malicious
1838000
heap
page read and write
malicious
1A18000
heap
page read and write
malicious
19F4000
heap
page read and write
malicious
1938000
heap
page read and write
malicious
174D000
heap
page read and write
malicious
3AD0000
heap
page read and write
18AC000
heap
page read and write
1A45000
heap
page read and write
1A95000
heap
page read and write
78F1000
heap
page read and write
7D81000
heap
page read and write
1A78000
heap
page read and write
1AC4000
heap
page read and write
1D21000
heap
page read and write
18EF000
heap
page read and write
1A98000
heap
page read and write
36F4000
direct allocation
page execute and read and write
1D42000
heap
page read and write
3960000
remote allocation
page read and write
1672000
heap
page read and write
6BAC000
stack
page read and write
1A73000
heap
page read and write
1A3F000
heap
page read and write
1A97000
heap
page read and write
1745000
heap
page read and write
1900000
heap
page read and write
795000
unkown
page execute and read and write
18C8000
heap
page read and write
611000
unkown
page execute and read and write
74E0000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
3250000
direct allocation
page execute and read and write
1A41000
heap
page read and write
1D6B000
heap
page read and write
1111000
unkown
page readonly
190A000
heap
page read and write
7A40000
trusted library allocation
page read and write
610000
unkown
page readonly
1A2D000
heap
page read and write
18A9000
heap
page read and write
1A42000
heap
page read and write
1A6C000
heap
page read and write
6B4E000
stack
page read and write
18DF000
heap
page read and write
1D84000
heap
page read and write
1A6F000
heap
page read and write
187D000
heap
page read and write
7910000
heap
page read and write
18D8000
heap
page read and write
1D3A000
heap
page read and write
7A40000
trusted library allocation
page read and write
1857000
heap
page read and write
1A61000
heap
page read and write
1A76000
heap
page read and write
33D0000
remote allocation
page read and write
1798000
heap
page read and write
1A6C000
heap
page read and write
18CB000
heap
page read and write
18A6000
heap
page read and write
1980000
heap
page read and write
36C8000
direct allocation
page execute and read and write
18A3000
heap
page read and write
74E0000
trusted library allocation
page read and write
1640000
heap
page read and write
18B8000
heap
page read and write
3F3F000
stack
page read and write
7A40000
trusted library allocation
page read and write
6FB0000
remote allocation
page read and write
1A7A000
heap
page read and write
1A4F000
heap
page read and write
1A7F000
heap
page read and write
7A40000
trusted library allocation
page read and write
1AAA000
heap
page read and write
18A9000
heap
page read and write
1D75000
heap
page read and write
1AB7000
heap
page read and write
DED000
stack
page read and write
1A63000
heap
page read and write
1A5F000
heap
page read and write
8EE000
unkown
page execute and read and write
1A7F000
heap
page read and write
1CE7000
heap
page read and write
2E0000
unkown
page readonly
7D70000
trusted library allocation
page read and write
1AB6000
heap
page read and write
1D03000
heap
page read and write
18CF000
heap
page read and write
1D3A000
heap
page read and write
6FBD000
stack
page read and write
3AA0000
heap
page read and write
1A76000
heap
page read and write
1D3A000
heap
page read and write
1A8E000
heap
page read and write
7D70000
trusted library allocation
page read and write
1AB4000
heap
page read and write
1A2D000
heap
page read and write
1AA1000
heap
page read and write
3960000
remote allocation
page read and write
3400000
heap
page read and write
3C84000
direct allocation
page execute and read and write
1869000
heap
page read and write
1AB6000
heap
page read and write
1886000
heap
page read and write
78EE000
stack
page read and write
1D43000
heap
page read and write
1884000
heap
page read and write
3410000
heap
page read and write
1D30000
heap
page read and write
18B5000
heap
page read and write
1A4C000
heap
page read and write
18CF000
heap
page read and write
1876000
heap
page read and write
1A76000
heap
page read and write
18EF000
heap
page read and write
1A55000
heap
page read and write
18B9000
heap
page read and write
1A42000
heap
page read and write
717E000
stack
page read and write
1A95000
heap
page read and write
16BC000
heap
page read and write
1CEB000
heap
page read and write
78E0000
trusted library allocation
page read and write
3C94000
direct allocation
page execute and read and write
7B1000
unkown
page readonly
1A55000
heap
page read and write
167F000
heap
page read and write
1AB1000
heap
page read and write
1D43000
heap
page read and write
1D62000
heap
page read and write
1A89000
heap
page read and write
179C000
heap
page read and write
1AB0000
heap
page read and write
1830000
heap
page read and write
611000
unkown
page execute and read and write
1A88000
heap
page read and write
1A7F000
heap
page read and write
1DB0000
heap
page read and write
78E0000
trusted library allocation
page read and write
1D65000
heap
page read and write
189A000
heap
page read and write
1A65000
heap
page read and write
1D0E000
stack
page read and write
1D5F000
heap
page read and write
1A61000
heap
page read and write
1A74000
heap
page read and write
1A46000
heap
page read and write
3D8E000
stack
page read and write
1A90000
heap
page read and write
1930000
heap
page read and write
3AE0000
heap
page read and write
1A61000
heap
page read and write
1A4F000
heap
page read and write
179E000
heap
page read and write
477000
unkown
page execute and write copy
610000
unkown
page readonly
1AAA000
heap
page read and write
36B4000
direct allocation
page execute and read and write
1D94000
heap
page read and write
3810000
direct allocation
page execute and read and write
1A76000
heap
page read and write
1DA4000
heap
page read and write
1A65000
heap
page read and write
1D42000
heap
page read and write
7D70000
trusted library allocation
page read and write
1AB7000
heap
page read and write
1A42000
heap
page read and write
18A9000
heap
page read and write
19AA000
heap
page read and write
3C90000
direct allocation
page execute and read and write
1A0F000
heap
page read and write
1D53000
heap
page read and write
5A0000
heap
page read and write
66CD000
stack
page read and write
1ABB000
heap
page read and write
18D5000
heap
page read and write
1869000
heap
page read and write
97C000
unkown
page execute and read and write
36D0000
direct allocation
page execute and read and write
1A61000
heap
page read and write
1C2C000
heap
page read and write
1D61000
heap
page read and write
1698000
heap
page read and write
18AD000
unkown
page execute and write copy
3708000
direct allocation
page execute and read and write
188E000
heap
page read and write
5D8000
unkown
page execute and read and write
1837000
heap
page read and write
188E000
heap
page read and write
17A3000
heap
page read and write
78E0000
trusted library allocation
page read and write
1A55000
heap
page read and write
477000
unkown
page execute and read and write
167A000
heap
page read and write
1A63000
heap
page read and write
178D000
stack
page read and write
1D57000
heap
page read and write
1D62000
heap
page read and write
189A000
heap
page read and write
18AC000
heap
page read and write
1847000
heap
page read and write
7081000
heap
page read and write
1A63000
heap
page read and write
34E0000
direct allocation
page execute and read and write
1D30000
heap
page read and write
76EE000
stack
page read and write
35C0000
direct allocation
page execute and read and write
1D75000
heap
page read and write
18CB000
heap
page read and write
1D23000
heap
page read and write
1A88000
heap
page read and write
1A76000
heap
page read and write
7D70000
trusted library allocation
page read and write
1A6C000
heap
page read and write
F50000
unkown
page execute and write copy
1A55000
heap
page read and write
1A79000
heap
page read and write
7440000
remote allocation
page read and write
18A5000
heap
page read and write
18CB000
heap
page read and write
18B5000
heap
page read and write
7440000
remote allocation
page read and write
3A30000
heap
page read and write
3700000
direct allocation
page execute and read and write
395D000
stack
page read and write
6EFE000
stack
page read and write
1675000
heap
page read and write
1A4F000
heap
page read and write
1ADA000
heap
page read and write
18B1000
heap
page read and write
36B0000
direct allocation
page execute and read and write
1A65000
heap
page read and write
1A76000
heap
page read and write
1A92000
heap
page read and write
634C000
heap
page read and write
CAC000
unkown
page execute and read and write
1D84000
heap
page read and write
196A000
heap
page read and write
7080000
heap
page read and write
1A6F000
heap
page read and write
F70000
unkown
page readonly
1841000
heap
page read and write
1A13000
heap
page read and write
1D54000
heap
page read and write
1A65000
heap
page read and write
1AD6000
heap
page read and write
1D42000
heap
page read and write
1A6F000
heap
page read and write
1A94000
heap
page read and write
1AA1000
heap
page read and write
1D30000
heap
page read and write
1A7F000
heap
page read and write
19D2000
heap
page read and write
1AAB000
heap
page read and write
1A99000
heap
page read and write
1740000
heap
page read and write
1A64000
heap
page read and write
1A95000
heap
page read and write
1D3A000
heap
page read and write
7A40000
trusted library allocation
page read and write
1A7A000
heap
page read and write
18DD000
heap
page read and write
1AEA000
heap
page read and write
1A66000
heap
page read and write
1D21000
heap
page read and write
39A0000
heap
page read and write
1A63000
heap
page read and write
1A30000
heap
page read and write
1D4C000
heap
page read and write
74E0000
trusted library allocation
page read and write
69AE000
stack
page read and write
18A1000
heap
page read and write
1A7F000
heap
page read and write
3810000
heap
page read and write
1A9F000
heap
page read and write
1A63000
heap
page read and write
7911000
heap
page read and write
1A8A000
heap
page read and write
35B4000
direct allocation
page execute and read and write
1D3A000
heap
page read and write
1A7B000
heap
page read and write
41FF000
stack
page read and write
1D61000
heap
page read and write
1973000
heap
page read and write
18B1000
heap
page read and write
1A2D000
heap
page read and write
64C0000
heap
page read and write
1995000
heap
page read and write
18A9000
heap
page read and write
1A77000
heap
page read and write
18B3000
heap
page read and write
1878000
heap
page read and write
7A7000
unkown
page execute and write copy
1C56000
heap
page read and write
1A7F000
heap
page read and write
656E000
stack
page read and write
676E000
stack
page read and write
1971000
heap
page read and write
18B0000
unkown
page execute and write copy
1A61000
heap
page read and write
1A7F000
heap
page read and write
6A7D000
stack
page read and write
1ABB000
heap
page read and write
1A63000
heap
page read and write
1A4F000
heap
page read and write
1FDE000
stack
page read and write
178F000
heap
page read and write
189C000
heap
page read and write
18E1000
heap
page read and write
17C5000
heap
page read and write
1987000
heap
page read and write
708A000
heap
page read and write
465000
unkown
page execute and write copy
1AEE000
heap
page read and write
1D3A000
heap
page read and write
1A8B000
heap
page read and write
1AD6000
heap
page read and write
1A7F000
heap
page read and write
3AD4000
direct allocation
page execute and read and write
1A63000
heap
page read and write
36B0000
direct allocation
page execute and read and write
10F5000
unkown
page execute and read and write
7D70000
trusted library allocation
page read and write
199B000
heap
page read and write
1903000
heap
page read and write
1A61000
heap
page read and write
1ADD000
heap
page read and write
1869000
heap
page read and write
1D43000
heap
page read and write
1D5F000
heap
page read and write
1D6F000
heap
page read and write
3A10000
heap
page read and write
48E000
unkown
page execute and read and write
1D43000
heap
page read and write
1D3A000
heap
page read and write
1AA5000
heap
page read and write
1A88000
heap
page read and write
18C0000
heap
page read and write
1A98000
heap
page read and write
1D16000
heap
page read and write
3A00000
heap
page read and write
1A95000
heap
page read and write
74E0000
trusted library allocation
page read and write
3823000
heap
page read and write
16B1000
heap
page read and write
EC0000
heap
page read and write
6231000
heap
page read and write
1D30000
heap
page read and write
35C4000
direct allocation
page execute and read and write
1902000
heap
page read and write
1ACA000
heap
page read and write
18B9000
heap
page read and write
2CE000
stack
page read and write
1691000
heap
page read and write
1AA3000
heap
page read and write
1D5F000
heap
page read and write
1A98000
heap
page read and write
18B0000
heap
page read and write
1A6F000
heap
page read and write
43D000
unkown
page execute and write copy
6145000
heap
page read and write
1839000
heap
page read and write
6CBE000
stack
page read and write
1A76000
heap
page read and write
1A4F000
heap
page read and write
74E0000
trusted library allocation
page read and write
1A92000
heap
page read and write
7911000
heap
page read and write
1D3A000
heap
page read and write
97C000
unkown
page execute and read and write
1ABC000
heap
page read and write
1D30000
heap
page read and write
1A8B000
heap
page read and write
1AAA000
heap
page read and write
3AE0000
direct allocation
page execute and read and write
36A3000
direct allocation
page execute and read and write
1A91000
heap
page read and write
1A6C000
heap
page read and write
6DBC000
stack
page read and write
1D3A000
heap
page read and write
3AD4000
direct allocation
page execute and read and write
33D0000
remote allocation
page read and write
1A63000
heap
page read and write
1ABD000
heap
page read and write
74E0000
trusted library allocation
page read and write
3C94000
direct allocation
page execute and read and write
F4D000
unkown
page execute and write copy
15EE000
stack
page read and write
18A9000
heap
page read and write
1D73000
heap
page read and write
1A4F000
heap
page read and write
3480000
direct allocation
page execute and read and write
18DF000
heap
page read and write
18B1000
heap
page read and write
F30000
direct allocation
page execute and read and write
45BF000
stack
page read and write
1A6C000
heap
page read and write
189A000
heap
page read and write
1A6F000
heap
page read and write
75D0000
heap
page read and write
676D000
stack
page read and write
1A91000
heap
page read and write
1F0E000
stack
page read and write
1D4C000
heap
page read and write
1A55000
heap
page read and write
ECB000
stack
page read and write
3F6F000
stack
page read and write
1D84000
heap
page read and write
6FB0000
remote allocation
page read and write
36C8000
direct allocation
page execute and read and write
7A40000
trusted library allocation
page read and write
1DB0000
heap
page read and write
18E7000
heap
page read and write
611000
unkown
page execute and write copy
18CB000
heap
page read and write
188E000
heap
page read and write
1830000
heap
page read and write
1D9F000
heap
page read and write
1A55000
heap
page read and write
1A84000
heap
page read and write
189A000
heap
page read and write
72A0000
trusted library allocation
page read and write
1A9B000
heap
page read and write
3AD4000
direct allocation
page execute and read and write
1D23000
heap
page read and write
1A63000
heap
page read and write
188E000
heap
page read and write
5FD000
stack
page read and write
7D70000
trusted library allocation
page read and write
3C94000
direct allocation
page execute and read and write
1A75000
heap
page read and write
1A61000
heap
page read and write
1A4F000
heap
page read and write
74E0000
trusted library allocation
page read and write
18C5000
heap
page read and write
908000
unkown
page execute and read and write
1A4D000
heap
page read and write
1873000
heap
page read and write
1985000
heap
page read and write
1D30000
heap
page read and write
1D30000
heap
page read and write
1D62000
heap
page read and write
78E0000
trusted library allocation
page read and write
1D53000
heap
page read and write
1AA4000
heap
page read and write
18C4000
heap
page read and write
1DA8000
heap
page read and write
1D23000
heap
page read and write
1876000
heap
page read and write
1A92000
heap
page read and write
1A63000
heap
page read and write
18A3000
heap
page read and write
1A61000
heap
page read and write
1A10000
heap
page read and write
1A65000
heap
page read and write
1AF6000
heap
page read and write
1A95000
heap
page read and write
DFA000
stack
page read and write
6E4E000
stack
page read and write
1ACE000
heap
page read and write
1D42000
heap
page read and write
18A7000
heap
page read and write
1D43000
heap
page read and write
198D000
heap
page read and write
7D70000
trusted library allocation
page read and write
18A9000
heap
page read and write
1A63000
heap
page read and write
1A95000
heap
page read and write
1D57000
heap
page read and write
17BD000
heap
page read and write
18BF000
heap
page read and write
35C4000
direct allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
1A87000
heap
page read and write
18C1000
heap
page read and write
163E000
stack
page read and write
189A000
heap
page read and write
1A4F000
heap
page read and write
1D3A000
heap
page read and write
672D000
stack
page read and write
1A23000
heap
page read and write
1696000
heap
page read and write
1A76000
heap
page read and write
1A6E000
heap
page read and write
1A7F000
heap
page read and write
36F4000
direct allocation
page execute and read and write
35D8000
direct allocation
page execute and read and write
1A55000
heap
page read and write
F8E000
stack
page read and write
C1D000
unkown
page execute and write copy
1A7F000
heap
page read and write
1AAB000
heap
page read and write
1A73000
heap
page read and write
1A45000
heap
page read and write
16A7000
heap
page read and write
171F000
heap
page read and write
18A7000
heap
page read and write
7D70000
trusted library allocation
page read and write
35D8000
direct allocation
page execute and read and write
1A2C000
heap
page read and write
189E000
heap
page read and write
1960000
heap
page read and write
188E000
heap
page read and write
3FFF000
stack
page read and write
18BF000
heap
page read and write
1111000
unkown
page readonly
1A84000
heap
page read and write
1D03000
heap
page read and write
1A63000
heap
page read and write
1D5F000
heap
page read and write
157E000
stack
page read and write
1A42000
heap
page read and write
8EE000
unkown
page execute and read and write
610000
unkown
page readonly
17E0000
heap
page read and write
1D49000
heap
page read and write
1D43000
heap
page read and write
18AD000
heap
page read and write
1847000
heap
page read and write
1A63000
heap
page read and write
C20000
unkown
page execute and read and write
1A2D000
heap
page read and write
17D7000
heap
page read and write
1857000
heap
page read and write
3F4D000
stack
page read and write
1D43000
heap
page read and write
1D43000
heap
page read and write
1D03000
heap
page read and write
19A5000
heap
page read and write
3C94000
direct allocation
page execute and read and write
18D8000
heap
page read and write
36B4000
direct allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
1A88000
heap
page read and write
18EF000
heap
page read and write
1AB6000
heap
page read and write
37E3000
heap
page read and write
7F040000
direct allocation
page execute and read and write
1ABC000
heap
page read and write
1A88000
heap
page read and write
1A8B000
heap
page read and write
1ADA000
heap
page read and write
188E000
heap
page read and write
1A76000
heap
page read and write
1740000
heap
page read and write
67C9000
heap
page read and write
1D53000
heap
page read and write
1AC3000
heap
page read and write
1C5C000
heap
page read and write
1873000
heap
page read and write
1AAA000
heap
page read and write
1ADC000
heap
page read and write
1A55000
heap
page read and write
1D1E000
heap
page read and write
16C8000
heap
page read and write
75D1000
heap
page read and write
1A64000
heap
page read and write
190A000
heap
page read and write
481000
unkown
page readonly
3FF0000
heap
page read and write
36F4000
direct allocation
page execute and read and write
1D61000
heap
page read and write
1884000
heap
page read and write
1D42000
heap
page read and write
1ACF000
heap
page read and write
1A91000
heap
page read and write
1A1A000
heap
page read and write
1A61000
heap
page read and write
1ABC000
heap
page read and write
1A42000
heap
page read and write
1A69000
heap
page read and write
189C000
heap
page read and write
1D23000
heap
page read and write
6FFD000
stack
page read and write
1D57000
heap
page read and write
18D8000
heap
page read and write
36B4000
direct allocation
page execute and read and write
6B6F000
stack
page read and write
1875000
heap
page read and write
1A4F000
heap
page read and write
3C94000
direct allocation
page execute and read and write
1D78000
heap
page read and write
1D83000
heap
page read and write
1107000
unkown
page execute and write copy
1A88000
heap
page read and write
35C4000
direct allocation
page execute and read and write
1AA5000
heap
page read and write
78E0000
trusted library allocation
page read and write
1A4F000
heap
page read and write
1A81000
heap
page read and write
1A79000
heap
page read and write
1833000
heap
page read and write
2E1000
unkown
page execute and read and write
63D4000
heap
page read and write
1A42000
heap
page read and write
1842000
heap
page read and write
6DEF000
stack
page read and write
18D1000
heap
page read and write
FCE000
stack
page read and write
7B1000
unkown
page readonly
683E000
stack
page read and write
1A92000
heap
page read and write
3FCD000
stack
page read and write
1AAA000
heap
page read and write
15D5000
heap
page read and write
1A30000
heap
page read and write
18D1000
heap
page read and write
1AD2000
heap
page read and write
1D79000
heap
page read and write
1AC4000
heap
page read and write
17B5000
heap
page read and write
1A73000
heap
page read and write
704F000
stack
page read and write
16D0000
direct allocation
page execute and read and write
1C3A000
heap
page read and write
78E0000
trusted library allocation
page read and write
1A61000
heap
page read and write
1AAC000
heap
page read and write
610000
unkown
page readonly
1D68000
heap
page read and write
185E000
heap
page read and write
725E000
stack
page read and write
7EAF0000
direct allocation
page execute and read and write
1A65000
heap
page read and write
1D03000
heap
page read and write
10F5000
unkown
page execute and write copy
13FC000
stack
page read and write
1A97000
heap
page read and write
6265000
heap
page read and write
18CD000
heap
page read and write
413F000
stack
page read and write
33CD000
stack
page read and write
1AAD000
heap
page read and write
1CF6000
heap
page read and write
189A000
heap
page read and write
189C000
heap
page read and write
18DE000
heap
page read and write
35C4000
direct allocation
page execute and read and write
477000
unkown
page execute and write copy
189A000
heap
page read and write
17A8000
heap
page read and write
3C50000
direct allocation
page execute and read and write
1A73000
heap
page read and write
1A84000
heap
page read and write
124E000
unkown
page execute and read and write
78E0000
trusted library allocation
page read and write
1877000
heap
page read and write
1D94000
heap
page read and write
17E5000
heap
page read and write
188E000
heap
page read and write
1BE0000
heap
page read and write
19AF000
heap
page read and write
1AFA000
heap
page read and write
1A73000
heap
page read and write
36F4000
direct allocation
page execute and read and write
18CB000
heap
page read and write
1D26000
heap
page read and write
36B4000
direct allocation
page execute and read and write
1A4D000
heap
page read and write
1884000
heap
page read and write
1873000
heap
page read and write
3800000
heap
page read and write
1D1D000
heap
page read and write
3820000
heap
page read and write
7F100000
direct allocation
page execute and read and write
1D30000
heap
page read and write
1A90000
heap
page read and write
1A42000
heap
page read and write
1A8C000
heap
page read and write
1A6D000
heap
page read and write
7BE000
unkown
page execute and read and write
1989000
heap
page read and write
1C62000
heap
page read and write
1D3E000
stack
page read and write
1C46000
heap
page read and write
190A000
heap
page read and write
1857000
heap
page read and write
74AE000
stack
page read and write
1A76000
heap
page read and write
1A8B000
heap
page read and write
7F670000
direct allocation
page execute and read and write
1D30000
heap
page read and write
1A81000
heap
page read and write
1869000
heap
page read and write
9BB000
stack
page read and write
18D8000
heap
page read and write
48E000
unkown
page execute and write copy
78F0000
trusted library allocation
page read and write
18B7000
heap
page read and write
18D1000
heap
page read and write
3F1C000
heap
page read and write
7110000
remote allocation
page read and write
18B0000
unkown
page execute and read and write
1A90000
heap
page read and write
36F4000
direct allocation
page execute and read and write
1A61000
heap
page read and write
15BD000
stack
page read and write
70FF000
stack
page read and write
7A40000
trusted library allocation
page read and write
18A7000
heap
page read and write
1D4C000
heap
page read and write
1D43000
heap
page read and write
1D3A000
heap
page read and write
7081000
heap
page read and write
3A90000
heap
page read and write
1D78000
heap
page read and write
1A74000
heap
page read and write
18B5000
heap
page read and write
F30000
heap
page read and write
15ED000
stack
page read and write
1410000
direct allocation
page execute and read and write
1AAB000
heap
page read and write
16B8000
heap
page read and write
1D78000
heap
page read and write
1D93000
heap
page read and write
1A46000
heap
page read and write
1D70000
heap
page read and write
198D000
heap
page read and write
1D49000
heap
page read and write
35B3000
direct allocation
page execute and read and write
189A000
heap
page read and write
C1D000
unkown
page execute and write copy
1A81000
heap
page read and write
1D42000
heap
page read and write
1A63000
heap
page read and write
7A40000
trusted library allocation
page read and write
1A93000
heap
page read and write
1A84000
heap
page read and write
33F0000
heap
page read and write
1647000
heap
page read and write
1D65000
heap
page read and write
1510000
direct allocation
page execute and read and write
189E000
heap
page read and write
1A7C000
heap
page read and write
3B50000
direct allocation
page execute and read and write
1A55000
heap
page read and write
1D30000
heap
page read and write
1A65000
heap
page read and write
3980000
direct allocation
page execute and read and write
18BF000
heap
page read and write
1A6C000
heap
page read and write
1873000
heap
page read and write
3CA8000
direct allocation
page execute and read and write
1A61000
heap
page read and write
15F0000
heap
page read and write
1D57000
heap
page read and write
1D78000
heap
page read and write
1D9F000
heap
page read and write
1C28000
heap
page read and write
1AA5000
heap
page read and write
1AAB000
heap
page read and write
1A63000
heap
page read and write
174A000
heap
page read and write
73BE000
stack
page read and write
6260000
heap
page read and write
1BEE000
heap
page read and write
3C83000
direct allocation
page execute and read and write
1A66000
heap
page read and write
1A7C000
heap
page read and write
15FA000
stack
page read and write
1A42000
heap
page read and write
36E3000
direct allocation
page execute and read and write
3DF0000
heap
page read and write
37F3000
heap
page read and write
1D65000
heap
page read and write
7911000
heap
page read and write
187D000
heap
page read and write
1A81000
heap
page read and write
1A61000
heap
page read and write
1D73000
heap
page read and write
1D43000
heap
page read and write
7A7000
unkown
page execute and write copy
1AE4000
heap
page read and write
1A98000
heap
page read and write
1D5C000
heap
page read and write
3AC4000
direct allocation
page execute and read and write
18C4000
heap
page read and write
1D55000
heap
page read and write
3AC3000
direct allocation
page execute and read and write
1904000
heap
page read and write
18FE000
heap
page read and write
1AAC000
heap
page read and write
6D6F000
stack
page read and write
1A77000
heap
page read and write
1A3F000
stack
page read and write
1D5A000
heap
page read and write
1884000
heap
page read and write
1D30000
heap
page read and write
188E000
heap
page read and write
1A63000
heap
page read and write
1A55000
heap
page read and write
1AA4000
heap
page read and write
1D54000
heap
page read and write
1A94000
heap
page read and write
1A8B000
heap
page read and write
1AEE000
heap
page read and write
1ABA000
heap
page read and write
15A0000
heap
page read and write
1A64000
heap
page read and write
1D53000
heap
page read and write
1ABE000
heap
page read and write
7BE000
unkown
page execute and read and write
1A64000
heap
page read and write
1A92000
heap
page read and write
F50000
unkown
page execute and read and write
1A4F000
heap
page read and write
74E0000
trusted library allocation
page read and write
437F000
stack
page read and write
1D82000
heap
page read and write
997000
unkown
page execute and read and write
37FD000
stack
page read and write
1D5B000
heap
page read and write
18C4000
heap
page read and write
17E8000
heap
page read and write
1C54000
heap
page read and write
1D30000
heap
page read and write
18BF000
heap
page read and write
1A81000
heap
page read and write
1ADA000
heap
page read and write
1857000
heap
page read and write
1ABB000
heap
page read and write
18A1000
heap
page read and write
481000
unkown
page readonly
13ED000
stack
page read and write
3AD4000
direct allocation
page execute and read and write
1AF6000
heap
page read and write
1DA4000
heap
page read and write
1ABC000
heap
page read and write
7BE000
unkown
page execute and write copy
1A7F000
heap
page read and write
1A77000
heap
page read and write
1D63000
heap
page read and write
1D70000
heap
page read and write
F60000
heap
page read and write
1A7F000
heap
page read and write
1A63000
heap
page read and write
18BF000
heap
page read and write
481000
unkown
page readonly
3A90000
direct allocation
page execute and read and write
1A81000
heap
page read and write
1D5F000
heap
page read and write
7A40000
trusted library allocation
page read and write
1A4F000
heap
page read and write
1A42000
heap
page read and write
CAC000
unkown
page execute and read and write
1D94000
heap
page read and write
1987000
heap
page read and write
1A02000
heap
page read and write
3AE8000
direct allocation
page execute and read and write
1A6F000
heap
page read and write
21DF000
stack
page read and write
18A9000
heap
page read and write
1D53000
heap
page read and write
1A7C000
heap
page read and write
7110000
remote allocation
page read and write
1A61000
heap
page read and write
18AD000
heap
page read and write
1A96000
heap
page read and write
1400000
heap
page read and write
1D2F000
stack
page read and write
1660000
heap
page read and write
3AD4000
direct allocation
page execute and read and write
1A63000
heap
page read and write
1D57000
heap
page read and write
1A42000
heap
page read and write
1D57000
heap
page read and write
68B5000
heap
page read and write
18DE000
heap
page read and write
1D58000
heap
page read and write
1D42000
heap
page read and write
160C000
unkown
page execute and read and write
EC5000
heap
page read and write
997000
unkown
page execute and read and write
169C000
heap
page read and write
1A55000
heap
page read and write
3F18000
heap
page read and write
18B5000
heap
page read and write
35E0000
heap
page read and write
1A46000
heap
page read and write
18BB000
heap
page read and write
18C4000
heap
page read and write
18A3000
heap
page read and write
78F1000
heap
page read and write
1D57000
heap
page read and write
17D1000
heap
page read and write
74E0000
trusted library allocation
page read and write
65FE000
stack
page read and write
1A90000
heap
page read and write
1D66000
heap
page read and write
197C000
heap
page read and write
3AD4000
direct allocation
page execute and read and write
1884000
heap
page read and write
1A55000
heap
page read and write
13FA000
stack
page read and write
17D0000
heap
page read and write
1A92000
heap
page read and write
3670000
direct allocation
page execute and read and write
1A61000
heap
page read and write
1AAD000
heap
page read and write
1A61000
heap
page read and write
183B000
heap
page read and write
18A7000
heap
page read and write
7D70000
trusted library allocation
page read and write
1A45000
heap
page read and write
E30000
heap
page read and write
384E000
stack
page read and write
1D3A000
heap
page read and write
1AA0000
heap
page read and write
1D3A000
heap
page read and write
189A000
heap
page read and write
1C36000
heap
page read and write
39BE000
stack
page read and write
1D3A000
heap
page read and write
1A8B000
heap
page read and write
1963000
heap
page read and write
1D76000
heap
page read and write
48E000
unkown
page execute and write copy
3970000
heap
page read and write
18B9000
heap
page read and write
1A8B000
heap
page read and write
1C30000
heap
page read and write
1268000
unkown
page execute and read and write
1D03000
heap
page read and write
1D49000
heap
page read and write
1A55000
heap
page read and write
1D30000
heap
page read and write
18DA000
heap
page read and write
1A65000
heap
page read and write
18A2000
heap
page read and write
E7E000
stack
page read and write
18BE000
stack
page read and write
1A36000
heap
page read and write
1A27000
heap
page read and write
78E0000
trusted library allocation
page read and write
667000
unkown
page execute and read and write
18D6000
heap
page read and write
F50000
unkown
page execute and read and write
1460000
heap
page read and write
1A64000
heap
page read and write
652E000
stack
page read and write
1869000
heap
page read and write
1D42000
heap
page read and write
1A46000
heap
page read and write
1993000
heap
page read and write
1876000
heap
page read and write
17DE000
heap
page read and write
1A13000
heap
page read and write
1884000
heap
page read and write
1D30000
heap
page read and write
1AB4000
heap
page read and write
1A55000
heap
page read and write
1884000
heap
page read and write
1D1E000
heap
page read and write
1D5F000
heap
page read and write
648D000
stack
page read and write
795000
unkown
page execute and write copy
1AEA000
heap
page read and write
1ACA000
heap
page read and write
465000
unkown
page execute and read and write
7D70000
trusted library allocation
page read and write
1A63000
heap
page read and write
11FB000
stack
page read and write
1A42000
heap
page read and write
6C7E000
stack
page read and write
1A75000
heap
page read and write
67FE000
stack
page read and write
1A6C000
heap
page read and write
18C8000
heap
page read and write
1871000
heap
page read and write
1A5F000
heap
page read and write
1A81000
heap
page read and write
1833000
heap
page read and write
18FE000
stack
page read and write
37E0000
heap
page read and write
F71000
unkown
page execute and write copy
18A9000
heap
page read and write
1ABC000
heap
page read and write
1D53000
heap
page read and write
76AF000
stack
page read and write
1A0F000
heap
page read and write
3580000
direct allocation
page execute and read and write
18FE000
heap
page read and write
1D16000
heap
page read and write
1A90000
heap
page read and write
187D000
heap
page read and write
3AE8000
direct allocation
page execute and read and write
1A7F000
heap
page read and write
1D3A000
heap
page read and write
1D6C000
heap
page read and write
76D000
unkown
page execute and write copy
F20000
heap
page read and write
1873000
heap
page read and write
1A79000
heap
page read and write
1D94000
heap
page read and write
1A88000
heap
page read and write
1D42000
heap
page read and write
1D84000
heap
page read and write
1C7E000
heap
page read and write
186B000
heap
page read and write
1A98000
heap
page read and write
1910000
heap
page read and write
1A6C000
heap
page read and write
1D30000
heap
page read and write
76D0000
trusted library allocation
page read and write
F70000
unkown
page readonly
1A59000
heap
page read and write
26E000
stack
page read and write
1ACA000
heap
page read and write
1D23000
heap
page read and write
1A6C000
heap
page read and write
18B7000
heap
page read and write
1AB0000
heap
page read and write
18BF000
heap
page read and write
1A8C000
heap
page read and write
6FFE000
stack
page read and write
1876000
heap
page read and write
1D42000
heap
page read and write
37F0000
heap
page read and write
48E000
unkown
page execute and read and write
195B000
heap
page read and write
7914000
heap
page read and write
1D3A000
heap
page read and write
71FF000
stack
page read and write
3CA0000
direct allocation
page execute and read and write
18DF000
heap
page read and write
1838000
heap
page read and write
74E0000
trusted library allocation
page read and write
1D42000
heap
page read and write
1D95000
heap
page read and write
1A93000
heap
page read and write
1D43000
heap
page read and write
1D21000
heap
page read and write
1A88000
heap
page read and write
1A4F000
heap
page read and write
1A61000
heap
page read and write
1D5E000
heap
page read and write
10CD000
unkown
page execute and write copy
1AB7000
heap
page read and write
1A98000
heap
page read and write
1BEA000
heap
page read and write
1A78000
heap
page read and write
1A55000
heap
page read and write
1D21000
heap
page read and write
18A9000
heap
page read and write
745F000
stack
page read and write
198C000
heap
page read and write
18CF000
heap
page read and write
18C4000
heap
page read and write
1D62000
heap
page read and write
18A9000
heap
page read and write
1A42000
heap
page read and write
1D63000
heap
page read and write
17F0000
direct allocation
page execute and read and write
18CC000
heap
page read and write
1D6E000
heap
page read and write
194F000
heap
page read and write
1ACB000
heap
page read and write
7916000
heap
page read and write
1A6E000
heap
page read and write
1D42000
heap
page read and write
1AA4000
heap
page read and write
1D30000
heap
page read and write
18B3000
heap
page read and write
1A94000
heap
page read and write
1A42000
heap
page read and write
36A4000
direct allocation
page execute and read and write
1ADB000
heap
page read and write
7D70000
trusted library allocation
page read and write
1A41000
heap
page read and write
1AF6000
heap
page read and write
1A90000
heap
page read and write
1D42000
heap
page read and write
7B1000
unkown
page readonly
1D16000
heap
page read and write
1B3E000
stack
page read and write
3CA8000
direct allocation
page execute and read and write
36B4000
direct allocation
page execute and read and write
6BBE000
stack
page read and write
43D000
unkown
page execute and write copy
611000
unkown
page execute and write copy
189C000
heap
page read and write
1D42000
heap
page read and write
189C000
heap
page read and write
1AEA000
heap
page read and write
1D21000
heap
page read and write
1CEB000
heap
page read and write
1A84000
heap
page read and write
7731000
heap
page read and write
71FD000
stack
page read and write
6179000
heap
page read and write
1DA4000
heap
page read and write
1D1F000
heap
page read and write
3C94000
direct allocation
page execute and read and write
1A6C000
heap
page read and write
F50000
unkown
page execute and write copy
1ADC000
heap
page read and write
1580000
heap
page read and write
75BF000
stack
page read and write
17B7000
heap
page read and write
1A61000
heap
page read and write
7D70000
trusted library allocation
page read and write
1D57000
heap
page read and write
1D70000
heap
page read and write
7D70000
trusted library allocation
page read and write
908000
unkown
page execute and read and write
1AAB000
heap
page read and write
1A42000
heap
page read and write
1A78000
heap
page read and write
187C000
heap
page read and write
189A000
heap
page read and write
1600000
direct allocation
page execute and read and write
1D80000
heap
page read and write
36B4000
direct allocation
page execute and read and write
1A2C000
heap
page read and write
1A7F000
heap
page read and write
1D45000
heap
page read and write
1A55000
heap
page read and write
1A77000
heap
page read and write
1D95000
heap
page read and write
1A63000
heap
page read and write
6FB0000
remote allocation
page read and write
1857000
heap
page read and write
1D16000
heap
page read and write
1747000
heap
page read and write
37EE000
stack
page read and write
189A000
heap
page read and write
14AE000
stack
page read and write
1A76000
heap
page read and write
1725000
heap
page read and write
6B0E000
stack
page read and write
1985000
heap
page read and write
1876000
heap
page read and write
1D57000
heap
page read and write
6BEE000
stack
page read and write
481000
unkown
page readonly
E20000
heap
page read and write
1A9D000
heap
page read and write
F40000
heap
page read and write
1A76000
heap
page read and write
1D42000
heap
page read and write
1D30000
heap
page read and write
1A77000
heap
page read and write
35D0000
direct allocation
page execute and read and write
1A92000
heap
page read and write
7A40000
trusted library allocation
page read and write
1A63000
heap
page read and write
1A9B000
heap
page read and write
18D8000
heap
page read and write
1D3A000
heap
page read and write
7D80000
heap
page read and write
1A45000
heap
page read and write
1A6C000
heap
page read and write
1D6F000
heap
page read and write
1D42000
heap
page read and write
1A7F000
heap
page read and write
18A1000
heap
page read and write
1BDE000
stack
page read and write
1AA5000
heap
page read and write
18FE000
heap
page read and write
7EDE0000
direct allocation
page execute and read and write
2E1000
unkown
page execute and read and write
3AD4000
direct allocation
page execute and read and write
17DE000
heap
page read and write
18D2000
heap
page read and write
1A92000
heap
page read and write
1884000
heap
page read and write
1A76000
heap
page read and write
2E1000
unkown
page execute and write copy
1D04000
heap
page read and write
1A63000
heap
page read and write
1A2E000
heap
page read and write
1A6C000
heap
page read and write
1AC6000
heap
page read and write
76D000
unkown
page execute and write copy
1A97000
heap
page read and write
37AE000
stack
page read and write
1903000
heap
page read and write
6F8F000
stack
page read and write
1884000
heap
page read and write
1D17000
heap
page read and write
1D42000
heap
page read and write
189C000
heap
page read and write
1A8C000
heap
page read and write
1D74000
heap
page read and write
191A000
heap
page read and write
78E0000
trusted library allocation
page read and write
7A7000
unkown
page execute and read and write
417F000
stack
page read and write
3BB0000
heap
page read and write
1D5F000
heap
page read and write
7D70000
trusted library allocation
page read and write
1A92000
heap
page read and write
1A57000
heap
page read and write
2E0000
unkown
page readonly
1A4F000
heap
page read and write
1A92000
heap
page read and write
1A6F000
heap
page read and write
1D53000
heap
page read and write
1A7F000
heap
page read and write
1A7F000
heap
page read and write
1840000
direct allocation
page execute and read and write
35C4000
direct allocation
page execute and read and write
53B000
stack
page read and write
1A3F000
heap
page read and write
17E8000
heap
page read and write
177B000
heap
page read and write
189C000
heap
page read and write
7916000
heap
page read and write
5BE000
unkown
page execute and read and write
1870000
heap
page read and write
1D65000
heap
page read and write
1A86000
heap
page read and write
39FE000
stack
page read and write
1D70000
heap
page read and write
1A74000
heap
page read and write
1ABB000
heap
page read and write
3708000
direct allocation
page execute and read and write
1D90000
heap
page read and write
1D51000
heap
page read and write
7A40000
trusted library allocation
page read and write
18A7000
heap
page read and write
1A69000
heap
page read and write
1D43000
heap
page read and write
2E1000
unkown
page execute and write copy
1A08000
heap
page read and write
1ADD000
heap
page read and write
1D30000
heap
page read and write
668E000
stack
page read and write
1ACD000
heap
page read and write
7440000
remote allocation
page read and write
1ABA000
heap
page read and write
1AC3000
heap
page read and write
1A4F000
heap
page read and write
68CD000
stack
page read and write
1A7C000
heap
page read and write
1D84000
heap
page read and write
1DB0000
heap
page read and write
18E7000
heap
page read and write
1D30000
heap
page read and write
18D8000
heap
page read and write
3DF3000
heap
page read and write
1D7E000
heap
page read and write
2E0000
unkown
page readonly
EB000
stack
page read and write
1A81000
heap
page read and write
1D3A000
heap
page read and write
1A4F000
heap
page read and write
1A46000
heap
page read and write
5BE000
unkown
page execute and read and write
1A88000
heap
page read and write
1A9D000
heap
page read and write
18D0000
heap
page read and write
1A69000
heap
page read and write
187B000
heap
page read and write
1A55000
heap
page read and write
1A90000
heap
page read and write
1D75000
heap
page read and write
1873000
heap
page read and write
18CB000
heap
page read and write
1A95000
heap
page read and write
1D62000
heap
page read and write
5D8000
unkown
page execute and read and write
1A19000
heap
page read and write
1107000
unkown
page execute and read and write
1D62000
heap
page read and write
FE0000
heap
page read and write
1D49000
heap
page read and write
1A6C000
heap
page read and write
1D84000
heap
page read and write
1A77000
heap
page read and write
189E000
heap
page read and write
1976000
heap
page read and write
2E0000
unkown
page readonly
1A2D000
heap
page read and write
795000
unkown
page execute and read and write
1ADA000
heap
page read and write
1A13000
heap
page read and write
1A4F000
heap
page read and write
1A42000
heap
page read and write
15F5000
heap
page read and write
18A9000
heap
page read and write
1C71000
heap
page read and write
3600000
heap
page read and write
7D70000
trusted library allocation
page read and write
1A61000
heap
page read and write
19A2000
heap
page read and write
1D42000
heap
page read and write
1A8C000
heap
page read and write
1A55000
heap
page read and write
15E0000
heap
page read and write
1A55000
heap
page read and write
78E0000
trusted library allocation
page read and write
1A8B000
heap
page read and write
1F2E000
stack
page read and write
270000
heap
page read and write
1A75000
heap
page read and write
15F7000
heap
page read and write
1AC0000
heap
page read and write
15ED000
stack
page read and write
1AAA000
heap
page read and write
198F000
heap
page read and write
78E0000
trusted library allocation
page read and write
35C4000
direct allocation
page execute and read and write
1A63000
heap
page read and write
1A7F000
heap
page read and write
1884000
heap
page read and write
7BE000
unkown
page execute and write copy
1D5F000
heap
page read and write
7A40000
trusted library allocation
page read and write
33D0000
remote allocation
page read and write
1A81000
heap
page read and write
1D3A000
heap
page read and write
7A40000
trusted library allocation
page read and write
7A7000
unkown
page execute and read and write
1D67000
heap
page read and write
1C41000
heap
page read and write
1DA9000
heap
page read and write
1837000
heap
page read and write
74E0000
trusted library allocation
page read and write
1D1F000
heap
page read and write
EC7000
heap
page read and write
1D57000
heap
page read and write
C20000
unkown
page execute and read and write
1972000
heap
page read and write
6EBE000
stack
page read and write
716F000
stack
page read and write
1A7F000
heap
page read and write
1876000
heap
page read and write
1A92000
heap
page read and write
1500000
heap
page read and write
1A34000
heap
page read and write
178A000
heap
page read and write
465000
unkown
page execute and read and write
1ACA000
heap
page read and write
1D68000
heap
page read and write
1A4F000
heap
page read and write
14EE000
stack
page read and write
1A2C000
heap
page read and write
1AA3000
heap
page read and write
1A13000
heap
page read and write
17D0000
heap
page read and write
1D30000
heap
page read and write
1A9D000
heap
page read and write
36F0000
direct allocation
page execute and read and write
18CB000
heap
page read and write
1A81000
heap
page read and write
3C94000
direct allocation
page execute and read and write
1A45000
heap
page read and write
189C000
heap
page read and write
111E000
unkown
page execute and write copy
1D93000
heap
page read and write
7A40000
trusted library allocation
page read and write
1A42000
heap
page read and write
1A90000
heap
page read and write
6D4F000
stack
page read and write
1A5F000
heap
page read and write
1DA8000
heap
page read and write
189E000
heap
page read and write
1884000
heap
page read and write
1D65000
heap
page read and write
1A5F000
heap
page read and write
3880000
heap
page read and write
477000
unkown
page execute and read and write
1A4F000
heap
page read and write
78E0000
trusted library allocation
page read and write
1A78000
heap
page read and write
1684000
heap
page read and write
1ACB000
heap
page read and write
18C0000
heap
page read and write
5B0000
heap
page read and write
7110000
remote allocation
page read and write
1A76000
heap
page read and write
1D6B000
heap
page read and write
696F000
stack
page read and write
338E000
stack
page read and write
1A90000
heap
page read and write
1873000
heap
page read and write
465000
unkown
page execute and write copy
F4D000
unkown
page execute and write copy
3AC0000
heap
page read and write
1A84000
heap
page read and write
690D000
stack
page read and write
1AB0000
heap
page read and write
15FA000
stack
page read and write
1AA4000
heap
page read and write
1AA3000
heap
page read and write
1A76000
heap
page read and write
1A8B000
heap
page read and write
111E000
unkown
page execute and read and write
1D5A000
heap
page read and write
1C1B000
heap
page read and write
1AA4000
heap
page read and write
1D6A000
heap
page read and write
35C4000
direct allocation
page execute and read and write
1A2C000
heap
page read and write
1ACF000
heap
page read and write
12F7000
unkown
page execute and read and write
C20000
unkown
page execute and write copy
1C49000
heap
page read and write
1A42000
heap
page read and write
1AEF000
heap
page read and write
1D6D000
heap
page read and write
7730000
heap
page read and write
1876000
heap
page read and write
1A12000
heap
page read and write
47BF000
stack
page read and write
1A63000
heap
page read and write
18F0000
direct allocation
page execute and read and write
78E0000
trusted library allocation
page read and write
11AE000
stack
page read and write
1AA4000
heap
page read and write
1A90000
heap
page read and write
37F0000
heap
page read and write
696D000
stack
page read and write
1D42000
heap
page read and write
74E0000
trusted library allocation
page read and write
1A96000
heap
page read and write
74E0000
trusted library allocation
page read and write
1D1E000
heap
page read and write
1A90000
heap
page read and write
1D7F000
heap
page read and write
7460000
trusted library allocation
page read and write
18A7000
heap
page read and write
1A7F000
heap
page read and write
3B90000
heap
page read and write
11D0000
heap
page read and write
78F0000
heap
page read and write
1A92000
heap
page read and write
795000
unkown
page execute and write copy
1D43000
heap
page read and write
189C000
heap
page read and write
37C0000
heap
page read and write
1884000
heap
page read and write
1AD6000
heap
page read and write
1AAB000
heap
page read and write
1A6F000
heap
page read and write
324F000
stack
page read and write
1D73000
heap
page read and write
1D61000
heap
page read and write
18A3000
heap
page read and write
1D6A000
heap
page read and write
1A90000
heap
page read and write
6A3D000
stack
page read and write
1A5F000
heap
page read and write
3AD0000
direct allocation
page execute and read and write
708A000
heap
page read and write
1CDC000
heap
page read and write
1A81000
heap
page read and write
1A87000
heap
page read and write
150000
heap
page read and write
18A7000
heap
page read and write
6D8E000
stack
page read and write
F71000
unkown
page execute and read and write
1CE4000
heap
page read and write
1D6C000
heap
page read and write
18B9000
heap
page read and write
1ACA000
heap
page read and write
1D7B000
heap
page read and write
1A76000
heap
page read and write
1A4F000
heap
page read and write
1A88000
heap
page read and write
19B7000
heap
page read and write
35F0000
heap
page read and write
15D0000
heap
page read and write
1979000
heap
page read and write
1ABA000
heap
page read and write
1857000
heap
page read and write
36F4000
direct allocation
page execute and read and write
1857000
heap
page read and write
18B9000
heap
page read and write
18DF000
heap
page read and write
1A96000
heap
page read and write
1AC5000
heap
page read and write
1AAA000
heap
page read and write
36B4000
direct allocation
page execute and read and write
EBE000
stack
page read and write
3960000
remote allocation
page read and write
1D1E000
heap
page read and write
1D70000
heap
page read and write
1D78000
heap
page read and write
1C3C000
heap
page read and write
3F8D000
stack
page read and write
78E0000
trusted library allocation
page read and write
1A65000
heap
page read and write
1A6E000
heap
page read and write
1884000
heap
page read and write
17E7000
heap
page read and write
1A75000
heap
page read and write
7B1000
unkown
page readonly
743F000
stack
page read and write
189A000
heap
page read and write
667000
unkown
page execute and read and write
1D5C000
heap
page read and write
18CA000
heap
page read and write
187B000
heap
page read and write
1ABB000
heap
page read and write
1D1F000
heap
page read and write
36C0000
direct allocation
page execute and read and write
737F000
stack
page read and write
1A97000
heap
page read and write
416F000
stack
page read and write
6F6E000
stack
page read and write
1AAF000
heap
page read and write
C20000
unkown
page execute and write copy
1AB4000
heap
page read and write
1884000
heap
page read and write
1842000
heap
page read and write
1ACE000
heap
page read and write
168D000
heap
page read and write
18C5000
heap
page read and write
1A42000
heap
page read and write
189C000
heap
page read and write
1520000
heap
page read and write
3800000
heap
page read and write
1A96000
heap
page read and write
36F4000
direct allocation
page execute and read and write
1A76000
heap
page read and write
1A4F000
heap
page read and write
36E4000
direct allocation
page execute and read and write
7A40000
trusted library allocation
page read and write
1A92000
heap
page read and write
1857000
heap
page read and write
1A96000
heap
page read and write
18D0000
heap
page read and write
1AC3000
heap
page read and write
17CD000
stack
page read and write
723E000
stack
page read and write
There are 1520 hidden memdumps, click here to show them.