IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8klzCUsmQMVYazLTWo6KoKU.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\OGKFocHES6dDgKTCWPSJdQR.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\ZeTvTkc8PqqpWi0gm5JPfdt.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_a2f39f18c7bab85a936641112cf4d8a65518de_de9be973_9436b2ab-098a-4a19-b205-1dc59dcf74a1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_a2f39f18c7bab85a936641112cf4d8a65518de_de9be973_94773830-acbf-49ed-a888-c6bd52737c00\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f72aa47e83387be13decffad958dd6df2948b_3ea92c58_dec5365b-211a-4509-a3ee-25eef0619427\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C00.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 12 10:03:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F9B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2019.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20C3.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 12 10:03:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER214F.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 12 10:03:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER21FC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER226A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER226B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER22B9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\19u7ECnptzzlWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\1_QlH4gDMSHgHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\66rslgkYekRJHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\B087runuAKfxWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\ByL8mAxGwSmaWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\JhTxiIG1NfyxHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\PJJYS_IpzF0mCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\azTbUSfG7fMXWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\ctu1BJdIHpHIWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\hxHjRwjYwPT3Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\mHC5xGA2ZDf7Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\otYgbid_VcgTLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\rMqqLrP0489yHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1kjtHrReFnXF\sYcixjslgY3sWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\BdOSr6ULfsrrHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\HK3i7VEtGMBbWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\ITZ0bicyJ58aHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\J0EAMZmTySltWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\JsdnoRPI_10LHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\SBUYXJCvH4fCWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\TRbMB5IbyYCfLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\_2Udgx0R4lC0Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\fp5Zfw4ryWNTWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\m78YdG3PG6psHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\rh5eReF6pk1JWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\v8KCsYORX8h7Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\x6iuAgWaPHROLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7qiYjWFiJkre\zByDc7TM5G4BCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\3vXQ9NJu865mWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\4mK_R6tOoPGgWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\C053a7OlzkOwHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\DPh3g7VanZ0uLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\IdCNLqBK5BIzWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\JRPAhKRZ9ZTqHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\M4EU2Y_AAhWdWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\STqIiTxIo5J7Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\ad9xHU1sHgxoWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\oUhaH1047Io5Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\opKyAgExHDMyCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\rakgGBowKZnMHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\sI5BW4MD5Iw7History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanr3JGE0E2FYa9\x7WOFKlgU8fPWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixy1kjtHrReFnXF\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy1kjtHrReFnXF\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy1kjtHrReFnXF\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy7qiYjWFiJkre\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy7qiYjWFiJkre\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy7qiYjWFiJkre\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyr3JGE0E2FYa9\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyr3JGE0E2FYa9\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyr3JGE0E2FYa9\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 72 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 2028
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1956
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 1908
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://db-ip.com/$
unknown
https://t.me/RiseProSUPPORTv
unknown
https://duckduckgo.com/ac/?q=
unknown
https://db-ip.com/demo/home.php?s=81.181.60.11G
unknown
https://t.j
unknown
https://ipinfo.io:443/widget/demo/81.181.60.11
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://db-ip.com/
unknown
http://5.42.96.7/cost/go.exe-Q
unknown
https://t.me/risepro_botlater60.11
unknown
https://t.me/risepro_botomaniaJ
unknown
http://5.42.96.7/cost/lenin.exe9
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://ipinfo.io/widget/demo/81.181.60.11m
unknown
https://db-ip.com/demo/home.php?s=81.181.60.11Z
unknown
http://5.42.96.7/cost/lenin.exe
unknown
https://db-ip.com:443/demo/home.php?s=81.181.60.11
unknown
https://t.me/risepro_bot(
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/widget/demo/81.181.60.11
34.117.186.192
https://t.me/risepro_bot6
unknown
https://db-ip.com/demo/home.php?s=81.181.60.11SRL
unknown
https://t.70
unknown
https://db-ip.com/O
unknown
https://t.me/RiseProSUPPORTB
unknown
https://t.me/risepro_botrisepro
unknown
https://t.me/RiseProSUPPORT9?
unknown
http://5.42.96.7/cost/go.exe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com:443/demo/home.php?s=81.181.60.11&OLa
unknown
http://5.42.96.7/cost/go.exeOw
unknown
http://147.45.47.102:57893/hera/amadka.exee
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://5.42.96.7/cost/go.exe68v
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://db-ip.com/demo/home.php?s=81.181.60.1196
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://t.=
unknown
https://t.me/risepro0.11
unknown
https://ipinfo.io/wv~1
unknown
https://ipinfo.io/widget/demo/81.181.60.11eG
unknown
https://t.me/risepro_botomania
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/:
unknown
https://t.me/risepro_botlater
unknown
https://db-ip.com/demo/home.php?s=81.181.60.111
unknown
https://ipinfo.io/
unknown
http://pki-ocsp.symauth.com0
unknown
https://ipinfo.io:443/widget/demo/81.181.60.11o
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://db-ip.com/demo/home.php?s=81.181.60.117
unknown
https://db-ip.com/demo/home.php?s=81.181.60.11
104.26.5.15
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/widget/demo/81.181.60.11P
unknown
http://5.42.96.7/cost/go.exec.vTK
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
147.45.47.126
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{b729e847-be83-7448-fa09-da167a8cd981}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F01000
unkown
page execute and read and write
malicious
8D7000
heap
page read and write
malicious
BB1000
unkown
page execute and read and write
malicious
ABF000
heap
page read and write
malicious
18FE000
heap
page read and write
malicious
9AD000
heap
page read and write
malicious
B81000
unkown
page execute and read and write
malicious
999000
heap
page read and write
malicious
F01000
unkown
page execute and read and write
malicious
B81000
unkown
page execute and read and write
malicious
857000
heap
page read and write
malicious
ABF000
heap
page read and write
malicious
18FE000
heap
page read and write
malicious
3878000
direct allocation
page execute and read and write
185B000
heap
page read and write
18E3000
heap
page read and write
A09000
heap
page read and write
A1B000
heap
page read and write
BB0000
unkown
page readonly
AB0000
heap
page read and write
1E23000
heap
page read and write
AD2000
heap
page read and write
AB4000
heap
page read and write
B25000
heap
page read and write
AD2000
heap
page read and write
708D000
stack
page read and write
36A0000
heap
page read and write
AB4000
heap
page read and write
1952000
heap
page read and write
3BCE000
stack
page read and write
AFB000
heap
page read and write
AE1000
heap
page read and write
99E000
stack
page read and write
9AB000
heap
page read and write
717E000
stack
page read and write
999000
heap
page read and write
194F000
heap
page read and write
4280000
remote allocation
page read and write
9AA000
heap
page read and write
945000
heap
page read and write
39B0000
direct allocation
page execute and read and write
72FE000
stack
page read and write
1988000
heap
page read and write
B05000
heap
page read and write
39A0000
remote allocation
page read and write
9AB000
heap
page read and write
194F000
heap
page read and write
3974000
direct allocation
page execute and read and write
993000
heap
page read and write
AFB000
heap
page read and write
A02000
heap
page read and write
7880000
trusted library allocation
page read and write
37B0000
heap
page read and write
9BA000
heap
page read and write
B13000
heap
page read and write
6C8D000
stack
page read and write
68BC000
stack
page read and write
964000
heap
page read and write
1904000
heap
page read and write
3500000
heap
page read and write
B7E000
stack
page read and write
8280000
trusted library allocation
page read and write
992000
heap
page read and write
B72000
heap
page read and write
AEC000
heap
page read and write
A68000
heap
page read and write
335D000
stack
page read and write
7180000
trusted library allocation
page read and write
B2D000
heap
page read and write
3BAE000
stack
page read and write
992000
heap
page read and write
71BF000
stack
page read and write
7980000
trusted library allocation
page read and write
B25000
heap
page read and write
F00000
unkown
page readonly
193A000
heap
page read and write
9A0000
heap
page read and write
AB4000
heap
page read and write
D51000
unkown
page readonly
B22000
heap
page read and write
33DE000
stack
page read and write
A09000
heap
page read and write
1222000
unkown
page execute and read and write
9BA000
heap
page read and write
3BE0000
remote allocation
page read and write
1D70000
direct allocation
page execute and read and write
EC0000
heap
page read and write
39B8000
direct allocation
page execute and read and write
1C7F000
stack
page read and write
184B000
unkown
page execute and read and write
1097000
unkown
page execute and read and write
43DF000
stack
page read and write
3C2E000
stack
page read and write
196E000
heap
page read and write
9B4000
heap
page read and write
1964000
heap
page read and write
1970000
heap
page read and write
A30000
heap
page read and write
6ABD000
stack
page read and write
1970000
heap
page read and write
F07000
unkown
page execute and read and write
D47000
unkown
page execute and write copy
734F000
stack
page read and write
3580000
direct allocation
page execute and read and write
AD2000
heap
page read and write
1988000
heap
page read and write
19C1000
heap
page read and write
42D0000
heap
page read and write
D21000
unkown
page readonly
B05000
heap
page read and write
1B0B000
heap
page read and write
37C0000
heap
page read and write
1904000
heap
page read and write
660D000
stack
page read and write
AFB000
heap
page read and write
1982000
heap
page read and write
1997000
heap
page read and write
992000
heap
page read and write
1988000
heap
page read and write
AEE000
heap
page read and write
B07000
heap
page read and write
B07000
heap
page read and write
AB4000
heap
page read and write
1AAA000
heap
page read and write
9D0000
heap
page read and write
39A4000
direct allocation
page execute and read and write
10A1000
unkown
page readonly
99E000
heap
page read and write
B33000
heap
page read and write
AEC000
heap
page read and write
184B000
unkown
page execute and write copy
1873000
heap
page read and write
8180000
heap
page read and write
768F000
stack
page read and write
B72000
heap
page read and write
AFB000
heap
page read and write
AEC000
heap
page read and write
63C1000
heap
page read and write
AEC000
heap
page read and write
1AA0000
heap
page read and write
B17000
heap
page read and write
B07000
heap
page read and write
B3E000
heap
page read and write
36B0000
heap
page read and write
9BA000
heap
page read and write
D05000
unkown
page execute and write copy
AFB000
heap
page read and write
9BC000
heap
page read and write
B3D000
heap
page read and write
B34000
heap
page read and write
1848000
unkown
page execute and write copy
3B3A000
heap
page read and write
9D7000
heap
page read and write
EED000
stack
page read and write
1848000
unkown
page execute and write copy
41D0000
heap
page read and write
1970000
heap
page read and write
894000
heap
page read and write
195D000
heap
page read and write
AFB000
heap
page read and write
B3F000
heap
page read and write
1085000
unkown
page execute and read and write
9AB000
heap
page read and write
963000
heap
page read and write
1E04000
heap
page read and write
1DE7000
heap
page read and write
98E000
heap
page read and write
193A000
heap
page read and write
1BFB000
stack
page read and write
B07000
heap
page read and write
1ADC000
heap
page read and write
B05000
heap
page read and write
9AA000
heap
page read and write
1990000
heap
page read and write
A09000
heap
page read and write
99C000
heap
page read and write
17F0000
heap
page read and write
7EE000
stack
page read and write
B44000
heap
page read and write
9D7000
heap
page read and write
1954000
heap
page read and write
17FA000
heap
page read and write
9BC000
heap
page read and write
38D0000
heap
page read and write
1900000
heap
page read and write
4A9F000
stack
page read and write
194F000
heap
page read and write
198E000
heap
page read and write
F00000
unkown
page readonly
1B1D000
heap
page read and write
BB000
stack
page read and write
B40000
heap
page read and write
ABF000
heap
page read and write
341E000
stack
page read and write
1097000
unkown
page execute and read and write
23AF000
stack
page read and write
3B00000
heap
page read and write
98E000
heap
page read and write
3C90000
remote allocation
page read and write
1990000
heap
page read and write
120000
heap
page read and write
9CE000
heap
page read and write
8A1000
heap
page read and write
B4C000
heap
page read and write
6A4D000
stack
page read and write
7880000
trusted library allocation
page read and write
9DC000
heap
page read and write
CDD000
unkown
page execute and write copy
19AD000
heap
page read and write
198E000
heap
page read and write
B40000
heap
page read and write
198E000
heap
page read and write
95B000
heap
page read and write
ABF000
heap
page read and write
3878000
direct allocation
page execute and read and write
1B25000
heap
page read and write
319B000
heap
page read and write
B2F000
heap
page read and write
1928000
heap
page read and write
98E000
heap
page read and write
6E0000
heap
page read and write
1976000
heap
page read and write
1960000
heap
page read and write
1085000
unkown
page execute and read and write
AEC000
heap
page read and write
193A000
heap
page read and write
1B08000
heap
page read and write
1952000
heap
page read and write
1954000
heap
page read and write
7180000
trusted library allocation
page read and write
1902000
heap
page read and write
1945000
heap
page read and write
3420000
heap
page read and write
6F0E000
stack
page read and write
1970000
heap
page read and write
19C9000
heap
page read and write
E6E000
stack
page read and write
19BD000
heap
page read and write
6CBD000
stack
page read and write
1287000
unkown
page execute and read and write
9CE000
heap
page read and write
9BE000
heap
page read and write
AFB000
heap
page read and write
38F0000
heap
page read and write
AEC000
heap
page read and write
9AB000
heap
page read and write
1963000
heap
page read and write
70BF000
stack
page read and write
7880000
trusted library allocation
page read and write
182B000
heap
page read and write
11DE000
unkown
page execute and read and write
1902000
heap
page read and write
197D000
heap
page read and write
14FB000
unkown
page execute and read and write
98C000
heap
page read and write
1970000
heap
page read and write
8BC000
heap
page read and write
9B6000
heap
page read and write
9F7000
heap
page read and write
1984000
heap
page read and write
105D000
unkown
page execute and write copy
A01000
heap
page read and write
B05000
heap
page read and write
D17000
unkown
page execute and read and write
1E52000
heap
page read and write
B07000
heap
page read and write
3DAE000
stack
page read and write
8C2000
heap
page read and write
425E000
stack
page read and write
E78000
unkown
page execute and read and write
AEC000
heap
page read and write
B52000
heap
page read and write
7980000
trusted library allocation
page read and write
66BE000
stack
page read and write
1097000
unkown
page execute and write copy
1790000
heap
page read and write
640000
heap
page read and write
B3D000
heap
page read and write
3864000
direct allocation
page execute and read and write
1928000
heap
page read and write
42CF000
stack
page read and write
35D0000
direct allocation
page execute and read and write
A30000
heap
page read and write
3974000
direct allocation
page execute and read and write
11F8000
unkown
page execute and read and write
8AC000
heap
page read and write
3830000
direct allocation
page execute and read and write
196E000
heap
page read and write
183F000
heap
page read and write
B19000
heap
page read and write
95C000
heap
page read and write
AD2000
heap
page read and write
B05000
heap
page read and write
1E0D000
heap
page read and write
AB4000
heap
page read and write
186D000
heap
page read and write
B16000
heap
page read and write
17EE000
stack
page read and write
10AE000
unkown
page execute and write copy
AFB000
heap
page read and write
7580000
trusted library allocation
page read and write
955000
heap
page read and write
1800000
heap
page read and write
C4F000
stack
page read and write
99D000
heap
page read and write
9BE000
heap
page read and write
7A7000
heap
page read and write
1962000
heap
page read and write
B07000
heap
page read and write
1945000
heap
page read and write
9CC000
heap
page read and write
7880000
trusted library allocation
page read and write
1969000
heap
page read and write
7580000
trusted library allocation
page read and write
9B9000
heap
page read and write
1780000
direct allocation
page execute and read and write
AD2000
heap
page read and write
ABF000
heap
page read and write
193A000
heap
page read and write
1963000
heap
page read and write
3853000
direct allocation
page execute and read and write
3864000
direct allocation
page execute and read and write
B25000
heap
page read and write
6AA5000
heap
page read and write
3690000
heap
page read and write
1902000
heap
page read and write
B16000
heap
page read and write
1DED000
heap
page read and write
9B4000
heap
page read and write
D5E000
unkown
page execute and read and write
B18000
heap
page read and write
7A5000
heap
page read and write
B2A000
heap
page read and write
B38000
heap
page read and write
1E2E000
heap
page read and write
7980000
trusted library allocation
page read and write
1990000
heap
page read and write
99F000
heap
page read and write
9FD000
heap
page read and write
193C000
heap
page read and write
1904000
heap
page read and write
3D00000
heap
page read and write
F01000
unkown
page execute and write copy
B38000
heap
page read and write
D21000
unkown
page readonly
6AFE000
stack
page read and write
B53000
heap
page read and write
40CF000
stack
page read and write
A48000
heap
page read and write
98E000
heap
page read and write
964000
heap
page read and write
A08000
heap
page read and write
AB4000
heap
page read and write
1DB8000
heap
page read and write
3F84000
direct allocation
page execute and read and write
188D000
heap
page read and write
33E0000
direct allocation
page execute and read and write
34F0000
heap
page read and write
69E000
stack
page read and write
1952000
heap
page read and write
983000
heap
page read and write
A01000
heap
page read and write
3650000
heap
page read and write
999000
heap
page read and write
5BB000
stack
page read and write
3590000
direct allocation
page execute and read and write
B38000
heap
page read and write
196E000
heap
page read and write
98F000
heap
page read and write
9AB000
heap
page read and write
B18000
heap
page read and write
ABF000
heap
page read and write
6ECF000
stack
page read and write
B38000
heap
page read and write
9EE000
heap
page read and write
1990000
heap
page read and write
AA5000
heap
page read and write
B13000
heap
page read and write
1097000
unkown
page execute and write copy
B26000
heap
page read and write
7880000
trusted library allocation
page read and write
44CF000
stack
page read and write
1988000
heap
page read and write
195B000
heap
page read and write
AFB000
heap
page read and write
6D3F000
stack
page read and write
6CCE000
stack
page read and write
AD2000
heap
page read and write
B25000
heap
page read and write
9CE000
heap
page read and write
B7E000
heap
page read and write
1976000
heap
page read and write
430000
heap
page read and write
88F000
heap
page read and write
9C3000
heap
page read and write
7980000
trusted library allocation
page read and write
B05000
heap
page read and write
3870000
direct allocation
page execute and read and write
9D9000
heap
page read and write
B05000
heap
page read and write
AD2000
heap
page read and write
AEC000
heap
page read and write
9AC000
heap
page read and write
9B4000
heap
page read and write
677C000
stack
page read and write
A4C000
heap
page read and write
190C000
heap
page read and write
339E000
stack
page read and write
1918000
heap
page read and write
35C4000
direct allocation
page execute and read and write
999000
heap
page read and write
9A5000
heap
page read and write
B33000
heap
page read and write
1E29000
heap
page read and write
1902000
heap
page read and write
36B0000
direct allocation
page execute and read and write
B7E000
heap
page read and write
AB4000
heap
page read and write
998000
heap
page read and write
2ABB000
heap
page read and write
9D6000
heap
page read and write
ABF000
heap
page read and write
D35000
unkown
page execute and read and write
B3F000
heap
page read and write
9BE000
heap
page read and write
3F7F000
stack
page read and write
283E000
stack
page read and write
7990000
heap
page read and write
B80000
unkown
page readonly
173B000
stack
page read and write
B05000
heap
page read and write
1952000
heap
page read and write
B1C000
heap
page read and write
9FD000
heap
page read and write
885000
heap
page read and write
3B20000
heap
page read and write
3130000
heap
page read and write
B2D000
heap
page read and write
B30000
heap
page read and write
AD2000
heap
page read and write
D17000
unkown
page execute and write copy
AC1000
heap
page read and write
3DB0000
heap
page read and write
1976000
heap
page read and write
21AE000
stack
page read and write
71FE000
stack
page read and write
9BA000
heap
page read and write
11DE000
unkown
page execute and read and write
3B34000
heap
page read and write
B4E000
stack
page read and write
D35000
unkown
page execute and write copy
194F000
heap
page read and write
4130000
heap
page read and write
9EE000
heap
page read and write
39A0000
direct allocation
page execute and read and write
199E000
heap
page read and write
1858000
heap
page read and write
AEC000
heap
page read and write
7880000
trusted library allocation
page read and write
94C000
heap
page read and write
B0A000
heap
page read and write
1967000
heap
page read and write
7980000
trusted library allocation
page read and write
7580000
heap
page read and write
1916000
heap
page read and write
7980000
trusted library allocation
page read and write
B25000
heap
page read and write
3BE0000
remote allocation
page read and write
9D0000
heap
page read and write
321E000
stack
page read and write
AFB000
heap
page read and write
3F80000
direct allocation
page execute and read and write
AC1000
heap
page read and write
98C000
heap
page read and write
939000
heap
page read and write
3864000
direct allocation
page execute and read and write
3190000
heap
page read and write
B2D000
heap
page read and write
B0E000
stack
page read and write
1DFE000
heap
page read and write
99E000
heap
page read and write
8BA000
heap
page read and write
89D000
heap
page read and write
AD2000
heap
page read and write
B6A000
heap
page read and write
B07000
heap
page read and write
3C90000
remote allocation
page read and write
B40000
heap
page read and write
17D5000
heap
page read and write
AD2000
heap
page read and write
1977000
heap
page read and write
ABF000
heap
page read and write
B1E000
heap
page read and write
1959000
heap
page read and write
9CE000
heap
page read and write
14C8000
unkown
page execute and write copy
9C9000
heap
page read and write
39D0000
heap
page read and write
194F000
heap
page read and write
B17000
heap
page read and write
88A000
stack
page read and write
1D4D000
stack
page read and write
627A000
heap
page read and write
B07000
heap
page read and write
198B000
heap
page read and write
9A1000
heap
page read and write
1969000
heap
page read and write
976000
heap
page read and write
9DE000
heap
page read and write
B07000
heap
page read and write
65C1000
heap
page read and write
7580000
trusted library allocation
page read and write
ABF000
heap
page read and write
B28000
heap
page read and write
34D0000
direct allocation
page execute and read and write
1969000
heap
page read and write
7180000
trusted library allocation
page read and write
36FE000
stack
page read and write
8A6000
heap
page read and write
D2E000
unkown
page execute and read and write
758E000
stack
page read and write
1853000
heap
page read and write
11F8000
unkown
page execute and read and write
9BE000
heap
page read and write
339F000
unkown
page read and write
19BD000
heap
page read and write
9CC000
heap
page read and write
35B3000
direct allocation
page execute and read and write
B3E000
heap
page read and write
3F40000
direct allocation
page execute and read and write
AEC000
heap
page read and write
E8E000
unkown
page execute and read and write
3930000
direct allocation
page execute and read and write
B43000
heap
page read and write
9C3000
heap
page read and write
1E02000
heap
page read and write
9EE000
heap
page read and write
D05000
unkown
page execute and write copy
8CF000
heap
page read and write
B2D000
heap
page read and write
AD2000
heap
page read and write
192B000
heap
page read and write
3974000
direct allocation
page execute and read and write
14F8000
unkown
page execute and write copy
3B8E000
stack
page read and write
14CB000
unkown
page execute and read and write
78CF000
stack
page read and write
B2D000
heap
page read and write
17F0000
heap
page read and write
AA5000
heap
page read and write
9BC000
heap
page read and write
8F0000
heap
page read and write
9BB000
heap
page read and write
AEC000
heap
page read and write
39A4000
direct allocation
page execute and read and write
E8E000
stack
page read and write
3180000
heap
page read and write
A65000
heap
page read and write
3B6D000
stack
page read and write
9BC000
heap
page read and write
34C0000
heap
page read and write
7980000
trusted library allocation
page read and write
196E000
heap
page read and write
992000
heap
page read and write
18FE000
heap
page read and write
3510000
heap
page read and write
7A0000
heap
page read and write
9EC000
heap
page read and write
35C4000
direct allocation
page execute and read and write
39B0000
heap
page read and write
7580000
trusted library allocation
page read and write
1AEF000
heap
page read and write
B07000
heap
page read and write
9C3000
heap
page read and write
15A2000
unkown
page execute and read and write
1997000
heap
page read and write
399D000
stack
page read and write
E5E000
unkown
page execute and read and write
10A1000
unkown
page readonly
63E5000
heap
page read and write
3CFE000
stack
page read and write
AC0000
heap
page read and write
AFB000
heap
page read and write
1E9E000
stack
page read and write
9C9000
heap
page read and write
B77000
heap
page read and write
B30000
heap
page read and write
1928000
heap
page read and write
41D3000
heap
page read and write
3994000
direct allocation
page execute and read and write
5FA000
stack
page read and write
BB1000
unkown
page execute and write copy
9F1000
heap
page read and write
D17000
unkown
page execute and write copy
7580000
trusted library allocation
page read and write
1989000
heap
page read and write
D05000
unkown
page execute and read and write
7880000
trusted library allocation
page read and write
3F84000
direct allocation
page execute and read and write
35D8000
direct allocation
page execute and read and write
1902000
heap
page read and write
1997000
heap
page read and write
A97000
heap
page read and write
3110000
heap
page read and write
95C000
heap
page read and write
3730000
heap
page read and write
B05000
heap
page read and write
39A0000
remote allocation
page read and write
1945000
heap
page read and write
1960000
heap
page read and write
3BE0000
remote allocation
page read and write
19C2000
heap
page read and write
5ED000
stack
page read and write
198E000
heap
page read and write
14CB000
unkown
page execute and write copy
B16000
heap
page read and write
D21000
unkown
page readonly
184B000
unkown
page execute and write copy
AEC000
heap
page read and write
B80000
unkown
page readonly
1954000
heap
page read and write
3963000
direct allocation
page execute and read and write
957000
heap
page read and write
AEC000
heap
page read and write
99D000
heap
page read and write
17FE000
heap
page read and write
9AB000
heap
page read and write
9C3000
heap
page read and write
1AEA000
heap
page read and write
39A4000
direct allocation
page execute and read and write
7980000
trusted library allocation
page read and write
9BF000
heap
page read and write
9BE000
heap
page read and write
63E000
stack
page read and write
382E000
stack
page read and write
700000
direct allocation
page execute and read and write
99D000
heap
page read and write
6B91000
heap
page read and write
AB4000
heap
page read and write
F01000
unkown
page execute and write copy
7880000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
76E000
stack
page read and write
983000
heap
page read and write
3DC0000
heap
page read and write
B13000
heap
page read and write
B76000
heap
page read and write
9CA000
heap
page read and write
3B23000
heap
page read and write
98E000
heap
page read and write
1970000
heap
page read and write
1945000
heap
page read and write
18FE000
heap
page read and write
3820000
direct allocation
page execute and read and write
1D0E000
stack
page read and write
418D000
stack
page read and write
3BED000
stack
page read and write
7880000
trusted library allocation
page read and write
B05000
heap
page read and write
ABE000
heap
page read and write
1954000
heap
page read and write
19C9000
heap
page read and write
3F98000
direct allocation
page execute and read and write
1928000
heap
page read and write
37A0000
heap
page read and write
489F000
stack
page read and write
1E07000
heap
page read and write
9C7000
heap
page read and write
73FF000
stack
page read and write
197F000
heap
page read and write
35D8000
direct allocation
page execute and read and write
AFB000
heap
page read and write
14FB000
unkown
page execute and write copy
3690000
heap
page read and write
194F000
heap
page read and write
7880000
trusted library allocation
page read and write
198E000
heap
page read and write
4280000
remote allocation
page read and write
F37000
unkown
page execute and read and write
99F000
heap
page read and write
3864000
direct allocation
page execute and read and write
618E000
heap
page read and write
D2E000
unkown
page execute and read and write
B4C000
heap
page read and write
39B8000
direct allocation
page execute and read and write
1952000
heap
page read and write
36B0000
heap
page read and write
1962000
heap
page read and write
B81000
unkown
page execute and write copy
B16000
heap
page read and write
1988000
heap
page read and write
B38000
heap
page read and write
AC1000
heap
page read and write
9CA000
heap
page read and write
9C4000
heap
page read and write
1222000
unkown
page execute and read and write
35C4000
direct allocation
page execute and read and write
9BE000
heap
page read and write
287E000
stack
page read and write
35B4000
direct allocation
page execute and read and write
9AA000
heap
page read and write
B3B000
heap
page read and write
1959000
heap
page read and write
184B000
unkown
page execute and read and write
9BF000
heap
page read and write
ABF000
heap
page read and write
193A000
heap
page read and write
9BC000
heap
page read and write
1955000
heap
page read and write
B2B000
heap
page read and write
3980000
direct allocation
page execute and read and write
1964000
heap
page read and write
6B7F000
stack
page read and write
A60000
heap
page read and write
9BC000
heap
page read and write
9C9000
heap
page read and write
B80000
unkown
page readonly
B26000
heap
page read and write
37B0000
direct allocation
page execute and read and write
1945000
heap
page read and write
3F98000
direct allocation
page execute and read and write
25D0000
heap
page read and write
37AE000
stack
page read and write
1928000
heap
page read and write
AEC000
heap
page read and write
6FBE000
stack
page read and write
193A000
heap
page read and write
1085000
unkown
page execute and write copy
39A4000
direct allocation
page execute and read and write
ABF000
heap
page read and write
1980000
heap
page read and write
1DF0000
heap
page read and write
10AE000
unkown
page execute and write copy
3843000
heap
page read and write
AFB000
heap
page read and write
A13000
heap
page read and write
AD2000
heap
page read and write
D5E000
unkown
page execute and write copy
B2F000
heap
page read and write
7581000
heap
page read and write
D05000
unkown
page execute and read and write
1906000
heap
page read and write
199F000
heap
page read and write
197B000
heap
page read and write
18F7000
heap
page read and write
B1E000
heap
page read and write
19A7000
heap
page read and write
1988000
heap
page read and write
18AE000
stack
page read and write
6EBF000
stack
page read and write
AB4000
heap
page read and write
19BD000
heap
page read and write
9BE000
heap
page read and write
258E000
unkown
page read and write
9AA000
heap
page read and write
B07000
heap
page read and write
7980000
trusted library allocation
page read and write
9BC000
heap
page read and write
33D0000
heap
page read and write
1904000
heap
page read and write
1E37000
heap
page read and write
ABF000
heap
page read and write
F07000
unkown
page execute and read and write
1970000
heap
page read and write
1999000
heap
page read and write
190C000
heap
page read and write
B1E000
heap
page read and write
99C000
heap
page read and write
9BC000
heap
page read and write
7A90000
trusted library allocation
page read and write
35C4000
direct allocation
page execute and read and write
BB0000
unkown
page readonly
B38000
heap
page read and write
9DC000
heap
page read and write
1957000
heap
page read and write
421E000
stack
page read and write
1B15000
heap
page read and write
1910000
heap
page read and write
CDD000
unkown
page execute and write copy
993000
heap
page read and write
B18000
heap
page read and write
3720000
direct allocation
page execute and read and write
1945000
heap
page read and write
1904000
heap
page read and write
184C000
heap
page read and write
38D0000
trusted library allocation
page read and write
B3F000
heap
page read and write
B07000
heap
page read and write
14CB000
unkown
page execute and read and write
3993000
direct allocation
page execute and read and write
4280000
remote allocation
page read and write
176E000
stack
page read and write
9CA000
heap
page read and write
1969000
heap
page read and write
18F5000
heap
page read and write
B22000
heap
page read and write
14CB000
unkown
page execute and write copy
B62000
heap
page read and write
D2E000
unkown
page execute and write copy
680E000
stack
page read and write
1970000
heap
page read and write
39A0000
remote allocation
page read and write
B7E000
heap
page read and write
3BE0000
heap
page read and write
714E000
stack
page read and write
3CA000
stack
page read and write
7580000
trusted library allocation
page read and write
1909000
heap
page read and write
1902000
heap
page read and write
657E000
stack
page read and write
1970000
heap
page read and write
1928000
heap
page read and write
F00000
unkown
page readonly
978000
heap
page read and write
1928000
heap
page read and write
B33000
heap
page read and write
68FD000
stack
page read and write
AB5000
heap
page read and write
6F0000
heap
page read and write
10AE000
unkown
page execute and read and write
B07000
heap
page read and write
3220000
direct allocation
page execute and read and write
710F000
stack
page read and write
30BA000
stack
page read and write
7980000
trusted library allocation
page read and write
AEC000
heap
page read and write
9C1000
heap
page read and write
19A6000
heap
page read and write
AB4000
heap
page read and write
3988000
direct allocation
page execute and read and write
194F000
heap
page read and write
1B17000
heap
page read and write
19C9000
heap
page read and write
AD2000
heap
page read and write
98E000
heap
page read and write
1970000
heap
page read and write
9FF000
heap
page read and write
9EC000
heap
page read and write
1904000
heap
page read and write
1AF9000
heap
page read and write
1DF9000
heap
page read and write
3E40000
direct allocation
page execute and read and write
17D0000
heap
page read and write
64D5000
heap
page read and write
997000
heap
page read and write
99C000
heap
page read and write
196E000
heap
page read and write
850000
heap
page read and write
9AA000
heap
page read and write
68B000
stack
page read and write
3F84000
direct allocation
page execute and read and write
2AB0000
heap
page read and write
85B000
stack
page read and write
1910000
heap
page read and write
193A000
heap
page read and write
1982000
heap
page read and write
39A4000
direct allocation
page execute and read and write
AEC000
heap
page read and write
7580000
trusted library allocation
page read and write
B3D000
heap
page read and write
6D7E000
stack
page read and write
1945000
heap
page read and write
AD2000
heap
page read and write
B05000
heap
page read and write
1974000
heap
page read and write
738E000
stack
page read and write
10AE000
unkown
page execute and read and write
15A2000
unkown
page execute and read and write
3988000
direct allocation
page execute and read and write
7F610000
direct allocation
page execute and read and write
3F84000
direct allocation
page execute and read and write
193A000
heap
page read and write
87D000
stack
page read and write
B15000
heap
page read and write
209E000
stack
page read and write
B4C000
heap
page read and write
18E0000
heap
page read and write
9B4000
heap
page read and write
9AB000
heap
page read and write
B33000
heap
page read and write
1B02000
heap
page read and write
9BC000
heap
page read and write
D51000
unkown
page readonly
1B5F000
heap
page read and write
B53000
heap
page read and write
B29000
heap
page read and write
B29000
heap
page read and write
1970000
heap
page read and write
684E000
stack
page read and write
1878000
heap
page read and write
7880000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
B05000
heap
page read and write
7580000
trusted library allocation
page read and write
38D000
stack
page read and write
1905000
heap
page read and write
B72000
heap
page read and write
39A4000
direct allocation
page execute and read and write
3864000
direct allocation
page execute and read and write
AEE000
heap
page read and write
ED0000
direct allocation
page execute and read and write
196F000
heap
page read and write
B3D000
heap
page read and write
B13000
heap
page read and write
9AA000
heap
page read and write
98E000
heap
page read and write
3860000
direct allocation
page execute and read and write
1945000
heap
page read and write
E5E000
unkown
page execute and read and write
1830000
heap
page read and write
1848000
heap
page read and write
317E000
unkown
page read and write
B07000
heap
page read and write
AA2000
heap
page read and write
B30000
heap
page read and write
EA8000
unkown
page execute and read and write
9BC000
heap
page read and write
1928000
heap
page read and write
B45000
heap
page read and write
1945000
heap
page read and write
B80000
unkown
page readonly
1860000
heap
page read and write
193A000
heap
page read and write
19C2000
heap
page read and write
39D3000
heap
page read and write
B05000
heap
page read and write
194F000
heap
page read and write
3864000
direct allocation
page execute and read and write
1989000
heap
page read and write
1252000
unkown
page execute and read and write
39A4000
direct allocation
page execute and read and write
A23000
heap
page read and write
1996000
heap
page read and write
18F4000
heap
page read and write
B17000
heap
page read and write
196E000
heap
page read and write
D0D000
unkown
page execute and write copy
7180000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
19AE000
heap
page read and write
7EE10000
direct allocation
page execute and read and write
1DB0000
heap
page read and write
3F84000
direct allocation
page execute and read and write
38E0000
heap
page read and write
AFB000
heap
page read and write
B15000
heap
page read and write
1928000
heap
page read and write
7980000
trusted library allocation
page read and write
1986000
heap
page read and write
8181000
heap
page read and write
3F84000
direct allocation
page execute and read and write
72BF000
stack
page read and write
B4C000
heap
page read and write
3F84000
direct allocation
page execute and read and write
9BE000
heap
page read and write
1984000
heap
page read and write
25CF000
unkown
page read and write
B07000
heap
page read and write
3C90000
remote allocation
page read and write
33B0000
remote allocation
page read and write
18C4000
heap
page read and write
998000
heap
page read and write
B3E000
heap
page read and write
186F000
heap
page read and write
AD2000
heap
page read and write
B05000
heap
page read and write
B32000
heap
page read and write
B63000
heap
page read and write
9AA000
heap
page read and write
193A000
heap
page read and write
99C000
heap
page read and write
41DF000
stack
page read and write
1E42000
heap
page read and write
748F000
stack
page read and write
B19000
heap
page read and write
105D000
unkown
page execute and write copy
9D7000
heap
page read and write
196E000
heap
page read and write
3F73000
direct allocation
page execute and read and write
982000
heap
page read and write
9A1000
heap
page read and write
1999000
heap
page read and write
1AAE000
heap
page read and write
882000
heap
page read and write
6A8D000
stack
page read and write
1880000
heap
page read and write
7980000
trusted library allocation
page read and write
997000
heap
page read and write
197F000
heap
page read and write
697E000
stack
page read and write
1928000
heap
page read and write
B05000
heap
page read and write
B16000
heap
page read and write
A15000
heap
page read and write
9FD000
heap
page read and write
35C4000
direct allocation
page execute and read and write
1E19000
heap
page read and write
B52000
heap
page read and write
AB4000
heap
page read and write
7980000
trusted library allocation
page read and write
1DF5000
heap
page read and write
993000
heap
page read and write
9C3000
heap
page read and write
B07000
heap
page read and write
B3E000
heap
page read and write
7F890000
direct allocation
page execute and read and write
1975000
heap
page read and write
7880000
trusted library allocation
page read and write
9AA000
heap
page read and write
7991000
heap
page read and write
194F000
heap
page read and write
9E9000
heap
page read and write
3960000
direct allocation
page execute and read and write
1770000
heap
page read and write
A02000
heap
page read and write
B13000
heap
page read and write
1B3B000
heap
page read and write
6D7F000
stack
page read and write
1997000
heap
page read and write
3C6E000
stack
page read and write
AD2000
heap
page read and write
99F000
heap
page read and write
9CC000
heap
page read and write
9CC000
heap
page read and write
B19000
heap
page read and write
1928000
heap
page read and write
728D000
stack
page read and write
AFB000
heap
page read and write
8C9000
heap
page read and write
1810000
direct allocation
page execute and read and write
B15000
heap
page read and write
1B32000
heap
page read and write
9ED000
stack
page read and write
98C000
heap
page read and write
E90000
heap
page read and write
B3D000
heap
page read and write
1977000
heap
page read and write
3840000
heap
page read and write
194F000
heap
page read and write
6F7F000
stack
page read and write
184E000
heap
page read and write
7980000
trusted library allocation
page read and write
345E000
stack
page read and write
D17000
unkown
page execute and read and write
9D0000
heap
page read and write
349E000
stack
page read and write
1D60000
heap
page read and write
35C4000
direct allocation
page execute and read and write
B34000
heap
page read and write
33B0000
remote allocation
page read and write
189A000
heap
page read and write
9A0000
heap
page read and write
B68000
heap
page read and write
1945000
heap
page read and write
7EF10000
direct allocation
page execute and read and write
94D000
stack
page read and write
3974000
direct allocation
page execute and read and write
B29000
heap
page read and write
10A1000
unkown
page readonly
3B8E000
stack
page read and write
B81000
unkown
page execute and write copy
B33000
heap
page read and write
19A6000
heap
page read and write
6B3E000
stack
page read and write
183A000
heap
page read and write
1954000
heap
page read and write
9DE000
heap
page read and write
1287000
unkown
page execute and read and write
14C8000
unkown
page execute and write copy
42CF000
stack
page read and write
B22000
heap
page read and write
9D0000
heap
page read and write
3C40000
heap
page read and write
1970000
heap
page read and write
AC3000
heap
page read and write
62D5000
heap
page read and write
976000
heap
page read and write
3F90000
direct allocation
page execute and read and write
3864000
direct allocation
page execute and read and write
18F1000
heap
page read and write
1840000
heap
page read and write
37EE000
stack
page read and write
7F0C0000
direct allocation
page execute and read and write
3974000
direct allocation
page execute and read and write
7880000
trusted library allocation
page read and write
9FA000
stack
page read and write
1E09000
heap
page read and write
B62000
heap
page read and write
AC1000
heap
page read and write
9CA000
heap
page read and write
D2E000
unkown
page execute and write copy
1976000
heap
page read and write
9D5000
heap
page read and write
1902000
heap
page read and write
6F7F000
stack
page read and write
1BEF000
stack
page read and write
1DEF000
stack
page read and write
A5C000
stack
page read and write
6E8E000
stack
page read and write
98E000
heap
page read and write
1085000
unkown
page execute and write copy
76CE000
stack
page read and write
AC1000
heap
page read and write
395E000
stack
page read and write
3974000
direct allocation
page execute and read and write
41CD000
stack
page read and write
9D7000
heap
page read and write
193A000
heap
page read and write
34A0000
heap
page read and write
1842000
heap
page read and write
B13000
heap
page read and write
A68000
heap
page read and write
9AA000
heap
page read and write
B52000
heap
page read and write
1B00000
heap
page read and write
AC0000
heap
page read and write
946000
heap
page read and write
9DE000
heap
page read and write
9D7000
heap
page read and write
999000
heap
page read and write
68BE000
stack
page read and write
417F000
stack
page read and write
B07000
heap
page read and write
A1D000
heap
page read and write
9A1000
heap
page read and write
1945000
heap
page read and write
AD2000
heap
page read and write
950000
heap
page read and write
3854000
direct allocation
page execute and read and write
194F000
heap
page read and write
931000
heap
page read and write
10A1000
unkown
page readonly
64D1000
heap
page read and write
19AE000
heap
page read and write
B2D000
heap
page read and write
7880000
trusted library allocation
page read and write
98E000
heap
page read and write
9AA000
heap
page read and write
18F0000
heap
page read and write
74FF000
stack
page read and write
9BC000
heap
page read and write
2940000
heap
page read and write
E78000
unkown
page execute and read and write
98E000
heap
page read and write
191F000
heap
page read and write
3970000
direct allocation
page execute and read and write
199D000
heap
page read and write
D21000
unkown
page readonly
A20000
heap
page read and write
9AC000
heap
page read and write
9D3000
heap
page read and write
3974000
direct allocation
page execute and read and write
3C10000
heap
page read and write
3F74000
direct allocation
page execute and read and write
AD2000
heap
page read and write
1964000
heap
page read and write
7980000
trusted library allocation
page read and write
1976000
heap
page read and write
D47000
unkown
page execute and read and write
9AB000
heap
page read and write
900000
heap
page read and write
28B0000
heap
page read and write
F00000
unkown
page readonly
35C4000
direct allocation
page execute and read and write
B76000
heap
page read and write
B45000
heap
page read and write
199D000
heap
page read and write
33B0000
remote allocation
page read and write
1963000
heap
page read and write
9DD000
heap
page read and write
3DD0000
heap
page read and write
9B2000
heap
page read and write
1999000
heap
page read and write
3C50000
direct allocation
page execute and read and write
3964000
direct allocation
page execute and read and write
8A8000
heap
page read and write
35C0000
direct allocation
page execute and read and write
99C000
heap
page read and write
997000
heap
page read and write
88A000
heap
page read and write
17A0000
heap
page read and write
190D000
heap
page read and write
307D000
stack
page read and write
A68000
heap
page read and write
There are 1175 hidden memdumps, click here to show them.