IOC Report
bUHMq54m6Q.exe

loading gif

Files

File Path
Type
Category
Malicious
bUHMq54m6Q.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\NoSoV6eJxRbhlNXMC2XnYgm.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\eK26yDxmyAbMrjg7CdmfOmj.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_5ae7e4c267f7e8254d33e44a3aef75514fc3925e_0010bad0_310ee076-0e1e-4dc2-a821-22b2cb294147\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bUHMq54m6Q.exe_7f5678ff3d44ce164b9187a831663245298324_7fe652d7_b9d6888b-1509-4a56-aeb6-1b74ada72881\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FC2.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 6 23:32:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3215.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3245.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C94.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 6 23:32:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER461A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER463A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\8aQjHf7utHnSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\9V16nhm0bFZXWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\EvDoFjSc27w4History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\FQEh_xU7vRTGWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\JEr8lVONTEQKLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\LmI4gt7uNt6lWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\P8T1BgZgt5t1Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\RVFvq_w1ZQYbWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\dn59MYeqcUJmWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\lKkvrLBG06UiLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\nQVbv3R1YjF8Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\oVix2UaWI8VCHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\q58jgT3UDnoOWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\w07ebxHrMjWrHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanlgSFE9XfRUKm\wib805ADjjQsLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\1oBLao5WFReeLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\Bs1Rik95T3UPWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\F27iDkUSbUX4History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\GoTBCXWsNltoCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\IuMVYmRLxIIELogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\KsIfLLPbfavZWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\SrMOR5IqDZZTCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\TQL0dLOETHSsHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\W4StvYRvRm8RLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\djGL4gOVacKhHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\e0WJiscSE76mWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\uH4Klb1syK8iWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\uyAd3P89yfWTHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\vCcKyxUjjGyAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanuNssG0kGarHs\z81g9YDMLrJHWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\trixylgSFE9XfRUKm\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixylgSFE9XfRUKm\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixylgSFE9XfRUKm\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuNssG0kGarHs\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuNssG0kGarHs\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyuNssG0kGarHs\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bUHMq54m6Q.exe
"C:\Users\user\Desktop\bUHMq54m6Q.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 1888
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 1148
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://193.233.132.56/cost/go.exe207
unknown
https://db-ip.com/demo/home.php?s=156.146.37.102D
unknown
https://ipinfo.io/widget/demo/156.146.37.102p
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
https://db-ip.com/
unknown
https://t.me/RiseProSUPPORTBB~
unknown
https://t.me/RiseProSUPPORTf
unknown
http://147.45.47.102:57893/hera/amadka.exe68.0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://t.me/risepro_bot7.102
unknown
https://t.me/RiseProSUPPORTq3i
unknown
https://t.me/risepro_botr5
unknown
https://ipinfo.io/widget/demo/156.146.37.102d
unknown
https://ipinfo.io/x
unknown
http://193.233.132.56/cost/go.exe
unknown
https://db-ip.com/demo/home.php?s=156.146.37.102_i
unknown
https://ipinfo.io/e7
unknown
https://ipinfo.io/o
unknown
https://t.me/RiseProSUPPORTP
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/t
unknown
https://t.me/RiseProSUPPORTPROCESSOR_LEVEL=6PROCES
unknown
https://t.me/risepro_botisepro_bot_Aj
unknown
https://t.me/risepro_botrisepro
unknown
http://193.233.132.56/cost/go.exeTerracoin=
unknown
https://db-ip.com/demo/home.php?s=156.146.37.102LS
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/widget/demo/156.146.37.102=
unknown
https://t.me/RiseProSUPPORT2
unknown
https://t.me/risepro_botPrim
unknown
https://t.me/risepro_botrisep
unknown
https://t.me/RiseProSUPPORT=L
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://db-ip.com/demo/home.php?s=156.146.37.102
104.26.4.15
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io:443/widget/demo/156.146.37.102
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://193.233.132.56/cost/go.exeServer
unknown
http://147.45.47.102:57893/hera/amadka.exe)=
unknown
https://db-ip.com:443/demo/home.php?s=156.146.37.102A
unknown
http://193.233.132.56/cost/go.exeWOUl-
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
http://147.45.47.102:57893/hera/amadka.exeaO
unknown
http://193.23
unknown
http://crl.micro
unknown
https://ipinfo.io/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://t.me/risepro_botz
unknown
http://193.233.132.56/cost/lenin.exe
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://t.me/risepro_botrisepro;O
unknown
https://db-ip.com:443/demo/home.php?s=156.146.37.102
unknown
https://ipinfo.io/$E
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/widget/demo/156.146.37.102
34.117.186.192
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
147.45.47.126
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
ProgramId
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
FileId
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
LowerCaseLongPath
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
LongPathHash
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
Name
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
OriginalFileName
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
Publisher
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
Version
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
BinFileVersion
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
BinaryType
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
ProductName
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
ProductVersion
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
LinkDate
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
BinProductVersion
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
AppxPackageFullName
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
AppxPackageRelativeId
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
Size
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
Language
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\buhmq54m6q.exe|70e6e340fd2972c6
Usn
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{7a21671c-f791-3356-50ce-d1aaf83f4249}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5C56000
heap
page read and write
malicious
122E000
heap
page read and write
malicious
5C5F000
heap
page read and write
malicious
5C30000
heap
page read and write
malicious
5A70000
heap
page read and write
malicious
34FE000
stack
page read and write
5F48000
heap
page read and write
6B8000
unkown
page execute and read and write
831000
unkown
page execute and read and write
540D000
stack
page read and write
507000
unkown
page readonly
6C0000
unkown
page execute and read and write
5C66000
heap
page read and write
C3E000
stack
page read and write
5ED1000
heap
page read and write
1279000
heap
page read and write
5C6D000
heap
page read and write
12BC000
heap
page read and write
1229000
unkown
page execute and read and write
5EE4000
heap
page read and write
5E00000
trusted library allocation
page read and write
5C58000
heap
page read and write
D02000
heap
page read and write
1AA0000
heap
page read and write
1177000
heap
page read and write
1050000
direct allocation
page read and write
5E7F000
stack
page read and write
6C6000
unkown
page execute and read and write
5F0E000
heap
page read and write
5F47000
heap
page read and write
5F49000
heap
page read and write
67B000
unkown
page execute and read and write
3570000
heap
page read and write
2E9E000
stack
page read and write
D0A000
heap
page read and write
62FF000
stack
page read and write
5F34000
heap
page read and write
511000
unkown
page execute read
5FC0000
trusted library allocation
page read and write
5F48000
heap
page read and write
5F39000
heap
page read and write
6680000
trusted library allocation
page read and write
D1B000
heap
page read and write
5C71000
heap
page read and write
5C55000
heap
page read and write
5F33000
heap
page read and write
5C62000
heap
page read and write
5F0E000
heap
page read and write
520F000
stack
page read and write
5C74000
heap
page read and write
5F0E000
heap
page read and write
C50000
direct allocation
page read and write
5ED1000
heap
page read and write
61FE000
stack
page read and write
5F0C000
heap
page read and write
5C73000
heap
page read and write
66D000
unkown
page readonly
5F34000
heap
page read and write
687000
unkown
page execute and read and write
F00000
unkown
page readonly
5FC0000
trusted library allocation
page read and write
CBA000
heap
page read and write
11BC000
heap
page read and write
5C3A000
heap
page read and write
5F48000
heap
page read and write
103E000
stack
page read and write
126C000
unkown
page execute and read and write
5EDB000
heap
page read and write
5C88000
heap
page read and write
1A50000
direct allocation
page read and write
5C6B000
heap
page read and write
5C61000
heap
page read and write
5F0E000
heap
page read and write
5F49000
heap
page read and write
5C64000
heap
page read and write
19D0000
heap
page read and write
5CA7000
heap
page read and write
11A1000
heap
page read and write
1268000
unkown
page execute and read and write
161E000
stack
page read and write
866000
unkown
page execute read
1060000
heap
page read and write
5EE8000
heap
page read and write
5F00000
heap
page read and write
5C6A000
heap
page read and write
DA1000
heap
page read and write
1256000
unkown
page execute and read and write
5C7C000
heap
page read and write
4FAE000
heap
page read and write
5A83000
heap
page read and write
DE0000
heap
page read and write
5EE4000
heap
page read and write
5C73000
heap
page read and write
5F27000
heap
page read and write
1C7E000
heap
page read and write
6311000
heap
page read and write
6301000
heap
page read and write
5F12000
heap
page read and write
5EE3000
heap
page read and write
1294000
heap
page read and write
D9D000
heap
page read and write
5EF8000
heap
page read and write
1120000
direct allocation
page read and write
67F000
unkown
page execute and read and write
6B8000
unkown
page execute and read and write
117E000
stack
page read and write
5F34000
heap
page read and write
F39000
stack
page read and write
5C7C000
heap
page read and write
5EFC000
heap
page read and write
4E5000
unkown
page write copy
5C7C000
heap
page read and write
5C92000
heap
page read and write
1040000
direct allocation
page read and write
5C86000
heap
page read and write
4FC3000
heap
page read and write
5F4A000
heap
page read and write
5C80000
heap
page read and write
2CC0000
heap
page read and write
5EE6000
heap
page read and write
5F4A000
heap
page read and write
505000
unkown
page write copy
5C81000
heap
page read and write
1A30000
direct allocation
page read and write
6680000
trusted library allocation
page read and write
AB7000
heap
page read and write
10C4000
heap
page read and write
5C8F000
heap
page read and write
108A000
unkown
page readonly
5F12000
heap
page read and write
F01000
unkown
page execute read
5C8C000
heap
page read and write
86C000
unkown
page execute and read and write
5C4D000
heap
page read and write
1110000
direct allocation
page read and write
5C60000
heap
page read and write
5C7C000
heap
page read and write
D98000
heap
page read and write
5B2E000
stack
page read and write
6539000
stack
page read and write
6B5000
unkown
page read and write
5F48000
heap
page read and write
1260000
unkown
page execute and read and write
10A4000
heap
page read and write
5C7E000
heap
page read and write
6F1000
unkown
page execute and read and write
530E000
stack
page read and write
6328000
heap
page read and write
1303000
heap
page read and write
5F0E000
heap
page read and write
5EEE000
heap
page read and write
EE0000
direct allocation
page read and write
1120000
direct allocation
page read and write
129D000
unkown
page execute and read and write
2E70000
heap
page read and write
5EEB000
heap
page read and write
1288000
heap
page read and write
108E000
heap
page read and write
5F4E000
heap
page read and write
36BE000
stack
page read and write
5FC0000
trusted library allocation
page read and write
511000
unkown
page execute read
554E000
stack
page read and write
5F1F000
heap
page read and write
5F1F000
heap
page read and write
5FC0000
trusted library allocation
page read and write
1D1A000
heap
page read and write
5C8F000
heap
page read and write
6C4000
unkown
page execute and read and write
5F0E000
heap
page read and write
5C4E000
heap
page read and write
534F000
stack
page read and write
1130000
heap
page read and write
5EEE000
heap
page read and write
6FD000
unkown
page execute and read and write
5FC0000
trusted library allocation
page read and write
5F48000
heap
page read and write
5ED1000
heap
page read and write
10F0000
heap
page read and write
6CC000
unkown
page execute and read and write
5C7A000
heap
page read and write
10A1000
unkown
page write copy
5C8A000
heap
page read and write
5C4E000
heap
page read and write
5F48000
heap
page read and write
5C55000
heap
page read and write
501000
unkown
page read and write
151E000
stack
page read and write
5C92000
heap
page read and write
5F47000
heap
page read and write
6BA000
unkown
page execute and read and write
5C38000
heap
page read and write
105A000
heap
page read and write
5F12000
heap
page read and write
5F49000
heap
page read and write
10A7000
unkown
page readonly
5C9B000
heap
page read and write
5C7B000
heap
page read and write
5C81000
heap
page read and write
1050000
heap
page read and write
5C7E000
heap
page read and write
2EDD000
stack
page read and write
1140000
heap
page read and write
5EE9000
heap
page read and write
121F000
heap
page read and write
5C55000
heap
page read and write
FEE000
stack
page read and write
5C6A000
heap
page read and write
5ED8000
heap
page read and write
5F0E000
heap
page read and write
5EEE000
heap
page read and write
6680000
trusted library allocation
page read and write
866000
unkown
page execute read
1291000
unkown
page execute and read and write
5F4E000
heap
page read and write
5EE2000
heap
page read and write
5C74000
heap
page read and write
1CF8000
heap
page read and write
1CA7000
heap
page read and write
5C6B000
heap
page read and write
5F49000
heap
page read and write
5C5D000
heap
page read and write
5F0C000
heap
page read and write
667A000
stack
page read and write
5D41000
heap
page read and write
5C8D000
heap
page read and write
5C6D000
heap
page read and write
5C61000
heap
page read and write
54BE000
stack
page read and write
5F4E000
heap
page read and write
1085000
unkown
page write copy
EAE000
stack
page read and write
58CE000
stack
page read and write
5C7C000
heap
page read and write
5C66000
heap
page read and write
10A5000
unkown
page write copy
5A71000
heap
page read and write
5F1F000
heap
page read and write
CEA000
heap
page read and write
5C6B000
heap
page read and write
5A83000
heap
page read and write
5C58000
heap
page read and write
6680000
trusted library allocation
page read and write
F00000
unkown
page readonly
5EF0000
heap
page read and write
1180000
direct allocation
page read and write
1225000
unkown
page execute and read and write
118D000
heap
page read and write
5F0E000
heap
page read and write
5C3A000
heap
page read and write
2DE6000
heap
page read and write
5F50000
heap
page read and write
5A84000
heap
page read and write
5C2F000
stack
page read and write
5FC0000
trusted library allocation
page read and write
5C80000
heap
page read and write
EBB000
stack
page read and write
121F000
unkown
page execute and read and write
5F34000
heap
page read and write
5EEA000
heap
page read and write
122A000
heap
page read and write
2F1E000
stack
page read and write
5CA1000
heap
page read and write
6314000
heap
page read and write
6320000
heap
page read and write
5360000
remote allocation
page read and write
5AB3000
heap
page read and write
82B000
unkown
page execute and read and write
121B000
unkown
page execute and read and write
5EE5000
heap
page read and write
5F51000
heap
page read and write
959000
stack
page read and write
5C69000
heap
page read and write
5C80000
heap
page read and write
2E70000
remote allocation
page read and write
10B4000
unkown
page execute and read and write
FF0000
heap
page read and write
10C3000
heap
page read and write
5C61000
heap
page read and write
5CAE000
heap
page read and write
4BD000
unkown
page readonly
CD7000
heap
page read and write
108A000
unkown
page readonly
5F49000
heap
page read and write
67D000
unkown
page execute and read and write
CBE000
heap
page read and write
1A60000
direct allocation
page read and write
5F0E000
heap
page read and write
108A000
unkown
page readonly
5EDB000
heap
page read and write
870000
unkown
page execute and read and write
501000
unkown
page write copy
1312000
heap
page read and write
1D10000
heap
page read and write
5C7A000
heap
page read and write
5C3A000
heap
page read and write
103F000
stack
page read and write
5EFC000
heap
page read and write
1110000
direct allocation
page read and write
5F22000
heap
page read and write
866000
unkown
page execute read
1406000
unkown
page execute read
5C73000
heap
page read and write
5C7A000
heap
page read and write
1180000
heap
page read and write
6C2000
unkown
page execute and read and write
D16000
heap
page read and write
5C6B000
heap
page read and write
6680000
trusted library allocation
page read and write
1258000
unkown
page execute and read and write
D07000
heap
page read and write
5C58000
heap
page read and write
5F49000
heap
page read and write
5ED1000
heap
page read and write
122B000
unkown
page execute and read and write
5F31000
heap
page read and write
5C71000
heap
page read and write
5EE0000
heap
page read and write
5EDF000
heap
page read and write
1406000
unkown
page execute read
5C55000
heap
page read and write
5C76000
heap
page read and write
36FE000
stack
page read and write
5EF1000
heap
page read and write
1110000
direct allocation
page read and write
689000
unkown
page execute and read and write
5ED1000
heap
page read and write
5EE4000
heap
page read and write
878000
unkown
page execute and read and write
5C68000
heap
page read and write
2F10000
heap
page read and write
2ECE000
stack
page read and write
5C56000
heap
page read and write
D95000
heap
page read and write
5EE8000
heap
page read and write
5EF0000
heap
page read and write
5F0E000
heap
page read and write
5E00000
trusted library allocation
page read and write
2E5E000
stack
page read and write
580F000
stack
page read and write
2D80000
remote allocation
page read and write
523D000
stack
page read and write
5F43000
heap
page read and write
1050000
direct allocation
page read and write
10B8000
heap
page read and write
5F34000
heap
page read and write
C60000
direct allocation
page read and write
6326000
heap
page read and write
5A6F000
stack
page read and write
DA7000
heap
page read and write
507000
unkown
page readonly
5F0E000
heap
page read and write
5F0E000
heap
page read and write
5C73000
heap
page read and write
5F49000
heap
page read and write
1268000
heap
page read and write
5EFD000
heap
page read and write
5F0E000
heap
page read and write
EE0000
direct allocation
page read and write
5C9B000
heap
page read and write
6BA000
unkown
page execute and read and write
689000
unkown
page execute and read and write
10A1000
unkown
page read and write
1A50000
direct allocation
page read and write
5C92000
heap
page read and write
5C3D000
stack
page read and write
1225000
unkown
page execute and read and write
5F39000
heap
page read and write
5C7E000
heap
page read and write
5C58000
heap
page read and write
4BD000
unkown
page readonly
1190000
heap
page read and write
5AEF000
stack
page read and write
5C31000
heap
page read and write
5F12000
heap
page read and write
5F1D000
heap
page read and write
5C31000
heap
page read and write
10A1000
unkown
page read and write
5C6B000
heap
page read and write
125E000
unkown
page execute and read and write
872000
unkown
page execute and read and write
3680000
direct allocation
page read and write
6C4000
unkown
page execute and read and write
1168000
heap
page read and write
5ED0000
heap
page read and write
685000
unkown
page execute and read and write
5C86000
heap
page read and write
510E000
stack
page read and write
1A60000
direct allocation
page read and write
2BE0000
direct allocation
page read and write
1292000
heap
page read and write
5EE5000
heap
page read and write
15B0000
heap
page read and write
5F34000
heap
page read and write
105E000
heap
page read and write
6CA000
unkown
page execute and read and write
5E40000
trusted library allocation
page read and write
5F0E000
heap
page read and write
1D05000
heap
page read and write
5C7C000
heap
page read and write
5C86000
heap
page read and write
5EE8000
heap
page read and write
6C6000
unkown
page execute and read and write
5C58000
heap
page read and write
121D000
unkown
page execute and read and write
5EE7000
heap
page read and write
5F34000
heap
page read and write
1223000
unkown
page execute and read and write
5C76000
heap
page read and write
5C3A000
heap
page read and write
1188000
heap
page read and write
353E000
stack
page read and write
5F39000
heap
page read and write
5EDB000
heap
page read and write
5F4D000
heap
page read and write
6680000
trusted library allocation
page read and write
5F47000
heap
page read and write
6C0000
unkown
page execute and read and write
5B70000
trusted library allocation
page read and write
1315000
heap
page read and write
5C94000
heap
page read and write
5F22000
heap
page read and write
105D000
unkown
page readonly
5B70000
trusted library allocation
page read and write
1085000
unkown
page write copy
5C86000
heap
page read and write
113E000
heap
page read and write
129D000
unkown
page execute and read and write
4FCE000
stack
page read and write
5A83000
heap
page read and write
5E00000
trusted library allocation
page read and write
10FE000
stack
page read and write
5C3A000
heap
page read and write
5EFA000
heap
page read and write
5F0E000
heap
page read and write
4E5000
unkown
page write copy
5C79000
heap
page read and write
5F4C000
heap
page read and write
55BF000
stack
page read and write
83B000
unkown
page execute and read and write
1266000
unkown
page execute and read and write
121F000
unkown
page execute and read and write
5C3A000
heap
page read and write
5F0E000
heap
page read and write
1144000
heap
page read and write
596E000
stack
page read and write
5ED7000
heap
page read and write
5F37000
heap
page read and write
D98000
heap
page read and write
5C3A000
heap
page read and write
55C0000
remote allocation
page read and write
5C56000
heap
page read and write
C80000
direct allocation
page read and write
1C74000
heap
page read and write
6FD000
unkown
page execute and read and write
360000
unkown
page readonly
1186000
heap
page read and write
6320000
heap
page read and write
1229000
unkown
page execute and read and write
2EB0000
heap
page read and write
5E00000
trusted library allocation
page read and write
5C64000
heap
page read and write
5F29000
heap
page read and write
5C6F000
heap
page read and write
5EF3000
heap
page read and write
AFE000
stack
page read and write
5F48000
heap
page read and write
5C7C000
heap
page read and write
2BE0000
direct allocation
page read and write
5F4C000
heap
page read and write
3550000
remote allocation
page read and write
5EFA000
heap
page read and write
EE0000
direct allocation
page read and write
1040000
direct allocation
page read and write
5F34000
heap
page read and write
1A60000
direct allocation
page read and write
5F0E000
heap
page read and write
1093000
heap
page read and write
5EF8000
heap
page read and write
510000
unkown
page readonly
5EFA000
heap
page read and write
4F7000
unkown
page readonly
D00000
heap
page read and write
5F48000
heap
page read and write
5ED1000
heap
page read and write
2DE7000
heap
page read and write
5ED1000
heap
page read and write
10A7000
heap
page read and write
5C55000
heap
page read and write
5F0E000
heap
page read and write
9C0000
heap
page read and write
5F0E000
heap
page read and write
2BE0000
direct allocation
page read and write
5F0D000
heap
page read and write
505000
unkown
page read and write
5CBF000
heap
page read and write
5F1F000
heap
page read and write
4F26000
heap
page read and write
5EF0000
heap
page read and write
EE0000
direct allocation
page read and write
5C84000
heap
page read and write
5E00000
trusted library allocation
page read and write
5C7E000
heap
page read and write
1050000
direct allocation
page read and write
AB0000
heap
page read and write
6680000
trusted library allocation
page read and write
5EE6000
heap
page read and write
5C98000
heap
page read and write
6750000
trusted library allocation
page read and write
87C000
unkown
page execute and read and write
10AC000
heap
page read and write
C60000
direct allocation
page read and write
6680000
trusted library allocation
page read and write
5C55000
heap
page read and write
5F22000
heap
page read and write
5EE4000
heap
page read and write
5C71000
heap
page read and write
5C9B000
heap
page read and write
1085000
unkown
page read and write
5C61000
heap
page read and write
5C73000
heap
page read and write
4AF9000
heap
page read and write
5A85000
heap
page read and write
4B96000
heap
page read and write
57E8000
heap
page read and write
5C86000
heap
page read and write
55C0000
remote allocation
page read and write
6C8000
unkown
page execute and read and write
5C55000
heap
page read and write
10E2000
heap
page read and write
866000
unkown
page execute read
5C7A000
heap
page read and write
5F45000
heap
page read and write
5C3A000
heap
page read and write
5F24000
heap
page read and write
510000
unkown
page readonly
5C73000
heap
page read and write
2DC0000
heap
page read and write
679000
unkown
page execute and read and write
6330000
heap
page read and write
5C73000
heap
page read and write
5F0E000
heap
page read and write
1406000
unkown
page execute read
360000
unkown
page readonly
CB0000
heap
page read and write
5EFB000
heap
page read and write
5EE7000
heap
page read and write
5C9C000
heap
page read and write
5EF4000
heap
page read and write
AB7000
heap
page read and write
6C8000
unkown
page execute and read and write
5F22000
heap
page read and write
5EE4000
heap
page read and write
5EE2000
heap
page read and write
5C7A000
heap
page read and write
D9D000
heap
page read and write
292E000
stack
page read and write
4EA000
unkown
page readonly
DA1000
heap
page read and write
5EF7000
heap
page read and write
5F49000
heap
page read and write
10A5000
unkown
page read and write
2D80000
remote allocation
page read and write
1268000
unkown
page execute and read and write
5F34000
heap
page read and write
5F51000
heap
page read and write
6300000
heap
page read and write
4E5000
unkown
page read and write
5CBF000
heap
page read and write
685000
unkown
page execute and read and write
5C55000
heap
page read and write
1A80000
direct allocation
page read and write
1264000
unkown
page execute and read and write
2E1E000
stack
page read and write
5F0C000
heap
page read and write
6B7000
unkown
page readonly
6680000
trusted library allocation
page read and write
1050000
direct allocation
page read and write
868000
unkown
page execute and read and write
507000
unkown
page readonly
2CBD000
stack
page read and write
1C94000
heap
page read and write
5F48000
heap
page read and write
5EE0000
heap
page read and write
5C6D000
heap
page read and write
5F0E000
heap
page read and write
1CFE000
heap
page read and write
129C000
heap
page read and write
5F49000
heap
page read and write
5C76000
heap
page read and write
5EE4000
heap
page read and write
5F37000
heap
page read and write
5C6F000
heap
page read and write
5D7E000
stack
page read and write
5F4B000
heap
page read and write
11A9000
heap
page read and write
5EFA000
heap
page read and write
6320000
heap
page read and write
5C82000
heap
page read and write
1AA5000
heap
page read and write
10BC000
heap
page read and write
5C73000
heap
page read and write
5F47000
heap
page read and write
5EEE000
heap
page read and write
128A000
heap
page read and write
5E00000
trusted library allocation
page read and write
86A000
unkown
page execute and read and write
5F34000
heap
page read and write
5CA7000
heap
page read and write
60D1000
heap
page read and write
C50000
direct allocation
page read and write
2D90000
heap
page read and write
2E70000
remote allocation
page read and write
C50000
direct allocation
page read and write
6680000
trusted library allocation
page read and write
839000
unkown
page execute and read and write
5F12000
heap
page read and write
D7C000
stack
page read and write
5EF0000
heap
page read and write
5EE6000
heap
page read and write
DA0000
heap
page read and write
105D000
unkown
page readonly
5EF7000
heap
page read and write
C50000
direct allocation
page read and write
6A7000
unkown
page readonly
D9D000
heap
page read and write
2A30000
direct allocation
page read and write
5F4B000
heap
page read and write
2F0E000
stack
page read and write
10B4000
unkown
page execute and read and write
5CC7000
heap
page read and write
5F00000
heap
page read and write
6B1000
unkown
page read and write
5ED1000
heap
page read and write
5F0E000
heap
page read and write
4EA000
unkown
page readonly
5F39000
heap
page read and write
4E2E000
stack
page read and write
1272000
heap
page read and write
5C41000
heap
page read and write
5C55000
heap
page read and write
5F0E000
heap
page read and write
5C4E000
heap
page read and write
C50000
direct allocation
page read and write
1C6F000
heap
page read and write
835000
unkown
page execute and read and write
C50000
direct allocation
page read and write
5ED1000
heap
page read and write
5CAF000
heap
page read and write
1C80000
heap
page read and write
5F0E000
heap
page read and write
5C9B000
heap
page read and write
68B000
unkown
page execute and read and write
533F000
stack
page read and write
5EDB000
heap
page read and write
360000
unkown
page readonly
6680000
trusted library allocation
page read and write
5F51000
heap
page read and write
520E000
stack
page read and write
5CC7000
heap
page read and write
1406000
unkown
page execute read
67F000
unkown
page execute and read and write
5F00000
heap
page read and write
5C6B000
heap
page read and write
5C62000
heap
page read and write
5F14000
heap
page read and write
5F34000
heap
page read and write
AB7000
heap
page read and write
5EE9000
heap
page read and write
1262000
heap
page read and write
5C6A000
heap
page read and write
361000
unkown
page execute read
FA0000
heap
page read and write
5F39000
heap
page read and write
574B000
heap
page read and write
F3E000
stack
page read and write
5F0E000
heap
page read and write
5F45000
heap
page read and write
125C000
unkown
page execute and read and write
D19000
heap
page read and write
2E80000
heap
page read and write
15FE000
stack
page read and write
5ED1000
heap
page read and write
5C6B000
heap
page read and write
5F47000
heap
page read and write
5C6E000
heap
page read and write
5ED1000
heap
page read and write
5C6A000
heap
page read and write
5B70000
trusted library allocation
page read and write
125A000
unkown
page execute and read and write
10A7000
unkown
page readonly
60D0000
heap
page read and write
5C8A000
heap
page read and write
F00000
unkown
page readonly
5B3E000
stack
page read and write
5F39000
heap
page read and write
5F48000
heap
page read and write
501000
unkown
page write copy
5C55000
heap
page read and write
5C76000
heap
page read and write
5EE4000
heap
page read and write
1D0D000
heap
page read and write
1097000
unkown
page readonly
2AF0000
direct allocation
page read and write
5C6B000
heap
page read and write
4E5000
unkown
page read and write
5CA4000
heap
page read and write
5F48000
heap
page read and write
59EE000
stack
page read and write
1C51000
heap
page read and write
E3B000
stack
page read and write
1A50000
direct allocation
page read and write
5E00000
trusted library allocation
page read and write
F00000
unkown
page readonly
125C000
unkown
page execute and read and write
11A3000
heap
page read and write
5C55000
heap
page read and write
5F0E000
heap
page read and write
5F2C000
heap
page read and write
1070000
heap
page read and write
5C38000
heap
page read and write
5C81000
heap
page read and write
866000
unkown
page execute and read and write
94D000
stack
page read and write
5F0E000
heap
page read and write
5F12000
heap
page read and write
6B7000
unkown
page readonly
5FC0000
trusted library allocation
page read and write
5A82000
heap
page read and write
5D40000
heap
page read and write
5ED1000
heap
page read and write
4E30000
heap
page read and write
5EDD000
heap
page read and write
5B70000
trusted library allocation
page read and write
5F39000
heap
page read and write
564F000
stack
page read and write
5ED1000
heap
page read and write
5C7B000
heap
page read and write
5E00000
trusted library allocation
page read and write
5C9A000
heap
page read and write
5A0E000
stack
page read and write
5EF1000
heap
page read and write
361000
unkown
page execute read
C50000
direct allocation
page read and write
5F4A000
heap
page read and write
10A5000
unkown
page read and write
5CBB000
heap
page read and write
5C86000
heap
page read and write
5C61000
heap
page read and write
5C6A000
heap
page read and write
F2D000
stack
page read and write
1CFF000
heap
page read and write
5F49000
heap
page read and write
874000
unkown
page execute and read and write
10BA000
heap
page read and write
5F0E000
heap
page read and write
2D1D000
stack
page read and write
5C63000
heap
page read and write
117B000
heap
page read and write
5ED1000
heap
page read and write
537E000
stack
page read and write
5EE4000
heap
page read and write
5EFD000
heap
page read and write
51FC000
stack
page read and write
1C63000
heap
page read and write
2BE0000
direct allocation
page read and write
5FC0000
trusted library allocation
page read and write
8A1000
unkown
page execute and read and write
1C5F000
heap
page read and write
5C58000
heap
page read and write
361000
unkown
page execute read
133F000
stack
page read and write
5EE6000
heap
page read and write
D8E000
heap
page read and write
5360000
remote allocation
page read and write
2A2E000
stack
page read and write
1BAF000
stack
page read and write
570E000
stack
page read and write
1291000
unkown
page execute and read and write
5A3E000
stack
page read and write
5C38000
heap
page read and write
681000
unkown
page execute and read and write
1137000
heap
page read and write
10C2000
heap
page read and write
5EE0000
heap
page read and write
5FC0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
683000
unkown
page execute and read and write
87A000
unkown
page execute and read and write
2F00000
heap
page read and write
5C9C000
heap
page read and write
5F0E000
heap
page read and write
5F0E000
heap
page read and write
5F47000
heap
page read and write
5F12000
heap
page read and write
5C80000
heap
page read and write
6BC000
unkown
page execute and read and write
5EE5000
heap
page read and write
360000
unkown
page readonly
5F0E000
heap
page read and write
5F0E000
heap
page read and write
5C56000
heap
page read and write
5F0E000
heap
page read and write
5F34000
heap
page read and write
5FC0000
trusted library allocation
page read and write
6CA000
unkown
page execute and read and write
5ED8000
heap
page read and write
5F24000
heap
page read and write
1264000
unkown
page execute and read and write
5F34000
heap
page read and write
116E000
heap
page read and write
679000
unkown
page execute and read and write
125A000
unkown
page execute and read and write
553F000
stack
page read and write
5C93000
heap
page read and write
1097000
unkown
page readonly
12A7000
heap
page read and write
1C86000
heap
page read and write
2F30000
heap
page read and write
126A000
unkown
page execute and read and write
5D3F000
stack
page read and write
6680000
trusted library allocation
page read and write
4F11000
heap
page read and write
AA0000
heap
page read and write
5C38000
heap
page read and write
5ED1000
heap
page read and write
5F12000
heap
page read and write
5C56000
heap
page read and write
1315000
heap
page read and write
1110000
direct allocation
page read and write
5F47000
heap
page read and write
5F0E000
heap
page read and write
5ED1000
heap
page read and write
6B5000
unkown
page write copy
5F0E000
heap
page read and write
5C74000
heap
page read and write
5CBA000
heap
page read and write
6C4000
unkown
page execute and read and write
5C3B000
heap
page read and write
514000
unkown
page execute and read and write
5F1F000
heap
page read and write
5EEA000
heap
page read and write
1110000
direct allocation
page read and write
5F0C000
heap
page read and write
1255000
heap
page read and write
10A9000
heap
page read and write
D36000
heap
page read and write
82F000
unkown
page execute and read and write
5EE4000
heap
page read and write
5F12000
heap
page read and write
5F51000
heap
page read and write
5F0E000
heap
page read and write
1120000
direct allocation
page read and write
6B6000
unkown
page execute and read and write
4FE7000
heap
page read and write
10A2000
heap
page read and write
11B1000
heap
page read and write
10A1000
unkown
page write copy
5EE9000
heap
page read and write
5F0E000
heap
page read and write
67B000
unkown
page execute and read and write
584E000
stack
page read and write
5EE1000
heap
page read and write
5F24000
heap
page read and write
5C6B000
heap
page read and write
5F0E000
heap
page read and write
681000
unkown
page execute and read and write
5F49000
heap
page read and write
125E000
unkown
page execute and read and write
5ED8000
heap
page read and write
D99000
heap
page read and write
1D1A000
heap
page read and write
1219000
unkown
page execute and read and write
5F47000
heap
page read and write
5F4E000
heap
page read and write
60D1000
heap
page read and write
5F22000
heap
page read and write
F01000
unkown
page execute read
4D2D000
stack
page read and write
361000
unkown
page execute read
5B33000
heap
page read and write
5C8B000
heap
page read and write
5C79000
heap
page read and write
5F48000
heap
page read and write
CFB000
heap
page read and write
5C7C000
heap
page read and write
5C6E000
heap
page read and write
1110000
direct allocation
page read and write
5FC0000
trusted library allocation
page read and write
1215000
heap
page read and write
5F51000
heap
page read and write
507000
unkown
page readonly
5FC0000
trusted library allocation
page read and write
AB5000
heap
page read and write
50CE000
stack
page read and write
5C58000
heap
page read and write
5EF8000
heap
page read and write
109D000
heap
page read and write
5EE4000
heap
page read and write
1C67000
heap
page read and write
6680000
trusted library allocation
page read and write
4E8D000
stack
page read and write
5CAF000
heap
page read and write
143E000
stack
page read and write
5F0B000
heap
page read and write
5F14000
heap
page read and write
5C56000
heap
page read and write
543E000
stack
page read and write
1223000
unkown
page execute and read and write
126C000
unkown
page execute and read and write
5EE9000
heap
page read and write
5C61000
heap
page read and write
5C55000
heap
page read and write
550F000
stack
page read and write
5B70000
trusted library allocation
page read and write
68B000
unkown
page execute and read and write
5C7C000
heap
page read and write
5C8A000
heap
page read and write
1172000
heap
page read and write
2F20000
direct allocation
page read and write
5C92000
heap
page read and write
108A000
unkown
page readonly
66D000
unkown
page readonly
5360000
remote allocation
page read and write
5CAB000
heap
page read and write
5F50000
heap
page read and write
E3B000
stack
page read and write
5C7A000
heap
page read and write
C60000
direct allocation
page read and write
5F47000
heap
page read and write
2D5E000
stack
page read and write
1A50000
direct allocation
page read and write
5FC0000
trusted library allocation
page read and write
69A000
unkown
page readonly
1D17000
heap
page read and write
3550000
remote allocation
page read and write
5EDB000
heap
page read and write
1065000
heap
page read and write
1050000
direct allocation
page read and write
8AD000
unkown
page execute and read and write
5C58000
heap
page read and write
1135000
heap
page read and write
4F8D000
stack
page read and write
5F0E000
heap
page read and write
2EFE000
stack
page read and write
5E00000
trusted library allocation
page read and write
BFF000
stack
page read and write
5C31000
heap
page read and write
833000
unkown
page execute and read and write
5C58000
heap
page read and write
5B44000
heap
page read and write
2D30000
direct allocation
page read and write
5C81000
heap
page read and write
4F7000
unkown
page readonly
837000
unkown
page execute and read and write
5C98000
heap
page read and write
5EDF000
heap
page read and write
122B000
unkown
page execute and read and write
1C27000
heap
page read and write
1085000
unkown
page read and write
C7B000
stack
page read and write
5F3E000
heap
page read and write
5CC7000
heap
page read and write
6F1000
unkown
page execute and read and write
5F0E000
heap
page read and write
5A71000
heap
page read and write
5F34000
heap
page read and write
5C58000
heap
page read and write
5EE3000
heap
page read and write
2AD0000
heap
page read and write
5C86000
heap
page read and write
EF5000
heap
page read and write
5F00000
heap
page read and write
A16000
unkown
page execute read
4BD000
unkown
page readonly
86E000
unkown
page execute and read and write
501000
unkown
page read and write
EF0000
heap
page read and write
5ED1000
heap
page read and write
5F24000
heap
page read and write
F01000
unkown
page execute read
1110000
direct allocation
page read and write
EE0000
direct allocation
page read and write
533D000
stack
page read and write
5C7A000
heap
page read and write
F3C000
stack
page read and write
1219000
unkown
page execute and read and write
5C31000
heap
page read and write
5CBB000
heap
page read and write
1227000
unkown
page execute and read and write
5F49000
heap
page read and write
126A000
unkown
page execute and read and write
514000
unkown
page execute and read and write
1C6C000
heap
page read and write
5EE0000
heap
page read and write
1274000
heap
page read and write
5F1F000
heap
page read and write
128C000
heap
page read and write
5F51000
heap
page read and write
59CF000
stack
page read and write
141E000
stack
page read and write
2BE0000
direct allocation
page read and write
F90000
heap
page read and write
5F48000
heap
page read and write
5C7E000
heap
page read and write
105D000
unkown
page readonly
6680000
trusted library allocation
page read and write
5EE4000
heap
page read and write
1A2E000
stack
page read and write
121B000
unkown
page execute and read and write
60D1000
heap
page read and write
5EEC000
heap
page read and write
1C8E000
heap
page read and write
5EF5000
heap
page read and write
5A82000
heap
page read and write
67D000
unkown
page execute and read and write
5F47000
heap
page read and write
505000
unkown
page read and write
5ED1000
heap
page read and write
1040000
direct allocation
page read and write
D2A000
heap
page read and write
2E70000
remote allocation
page read and write
69A000
unkown
page readonly
1262000
unkown
page execute and read and write
5EE5000
heap
page read and write
10A7000
unkown
page readonly
5F0E000
heap
page read and write
10D6000
heap
page read and write
6B1000
unkown
page write copy
5C6D000
heap
page read and write
5C3A000
heap
page read and write
5B70000
trusted library allocation
page read and write
4EA000
unkown
page readonly
D21000
heap
page read and write
D0E000
heap
page read and write
5FC0000
trusted library allocation
page read and write
5CBB000
heap
page read and write
695000
unkown
page write copy
5F1F000
heap
page read and write
EE0000
direct allocation
page read and write
5C46000
heap
page read and write
5CBA000
heap
page read and write
5B0F000
stack
page read and write
A16000
unkown
page execute read
5C86000
heap
page read and write
85B000
stack
page read and write
1A50000
direct allocation
page read and write
5C6A000
heap
page read and write
5A82000
heap
page read and write
1227000
unkown
page execute and read and write
876000
unkown
page execute and read and write
5C58000
heap
page read and write
5EF4000
heap
page read and write
1262000
unkown
page execute and read and write
5F0E000
heap
page read and write
5A71000
heap
page read and write
547F000
stack
page read and write
5F0C000
heap
page read and write
1316000
heap
page read and write
18FB000
stack
page read and write
10A7000
unkown
page readonly
5F47000
heap
page read and write
5ED1000
heap
page read and write
4BD000
unkown
page readonly
5C86000
heap
page read and write
D9E000
heap
page read and write
5C36000
heap
page read and write
5F0E000
heap
page read and write
5EE4000
heap
page read and write
2BE0000
direct allocation
page read and write
5EE4000
heap
page read and write
127C000
heap
page read and write
1256000
unkown
page execute and read and write
5C7C000
heap
page read and write
126C000
heap
page read and write
1C9B000
heap
page read and write
121D000
unkown
page execute and read and write
683000
unkown
page execute and read and write
5C3A000
heap
page read and write
10A5000
unkown
page write copy
1C20000
heap
page read and write
5C76000
heap
page read and write
5C6B000
heap
page read and write
1266000
unkown
page execute and read and write
5F0E000
heap
page read and write
5C7C000
heap
page read and write
5C6D000
heap
page read and write
1A50000
direct allocation
page read and write
5F50000
heap
page read and write
5A83000
heap
page read and write
1C55000
heap
page read and write
1258000
unkown
page execute and read and write
EC0000
heap
page read and write
55C0000
remote allocation
page read and write
1C65000
heap
page read and write
5C85000
heap
page read and write
643E000
stack
page read and write
105D000
unkown
page readonly
6BC000
unkown
page execute and read and write
5F0E000
heap
page read and write
5F0C000
heap
page read and write
82D000
unkown
page execute and read and write
5B04000
heap
page read and write
1220000
heap
page read and write
5CA7000
heap
page read and write
5F0E000
heap
page read and write
695000
unkown
page read and write
5F4E000
heap
page read and write
1221000
unkown
page execute and read and write
5ED1000
heap
page read and write
5A82000
heap
page read and write
6B6000
unkown
page execute and read and write
3550000
remote allocation
page read and write
5F47000
heap
page read and write
4F4A000
heap
page read and write
6303000
heap
page read and write
5C7E000
heap
page read and write
5EFB000
heap
page read and write
5EE4000
heap
page read and write
6BE000
unkown
page execute and read and write
5C9B000
heap
page read and write
5EE4000
heap
page read and write
5F1F000
heap
page read and write
594E000
stack
page read and write
6310000
heap
page read and write
3730000
heap
page read and write
2E6E000
stack
page read and write
505000
unkown
page write copy
5F12000
heap
page read and write
1A30000
heap
page read and write
6BE000
unkown
page execute and read and write
5EFE000
heap
page read and write
5C64000
heap
page read and write
5ED1000
heap
page read and write
5F1D000
heap
page read and write
1D1A000
heap
page read and write
5EFC000
heap
page read and write
5C82000
heap
page read and write
5F35000
heap
page read and write
5FC0000
trusted library allocation
page read and write
2D80000
remote allocation
page read and write
5ED1000
heap
page read and write
11A9000
heap
page read and write
5EFC000
heap
page read and write
2D6D000
stack
page read and write
1D00000
heap
page read and write
524E000
stack
page read and write
5C6D000
heap
page read and write
5EE1000
heap
page read and write
5C73000
heap
page read and write
5C7E000
heap
page read and write
2AE0000
heap
page read and write
5C9B000
heap
page read and write
5C7C000
heap
page read and write
5C6B000
heap
page read and write
5C93000
heap
page read and write
5C7A000
heap
page read and write
5F49000
heap
page read and write
5C91000
heap
page read and write
367F000
stack
page read and write
1050000
direct allocation
page read and write
5F48000
heap
page read and write
10A0000
heap
page read and write
5C7C000
heap
page read and write
5F0C000
heap
page read and write
5C58000
heap
page read and write
4EA000
unkown
page readonly
5C56000
heap
page read and write
829000
unkown
page execute and read and write
6C2000
unkown
page execute and read and write
5EE5000
heap
page read and write
6CC000
unkown
page execute and read and write
687000
unkown
page execute and read and write
5F45000
heap
page read and write
5F1D000
heap
page read and write
2A30000
direct allocation
page read and write
5C55000
heap
page read and write
1147000
heap
page read and write
5F0E000
heap
page read and write
F01000
unkown
page execute read
5C58000
heap
page read and write
5F0E000
heap
page read and write
657E000
stack
page read and write
1260000
unkown
page execute and read and write
5EE2000
heap
page read and write
523D000
stack
page read and write
CF1000
heap
page read and write
10BE000
stack
page read and write
125E000
heap
page read and write
1221000
unkown
page execute and read and write
1096000
heap
page read and write
5C61000
heap
page read and write
5C6A000
heap
page read and write
5F3A000
heap
page read and write
5F51000
heap
page read and write
5C92000
heap
page read and write
There are 1186 hidden memdumps, click here to show them.