IOC Report
D44CPdpkNk.exe

loading gif

Files

File Path
Type
Category
Malicious
D44CPdpkNk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_D44CPdpkNk.exe_ca452f225a5bfbfa4899462b03597b9e382c87a_da5453f1_eb289314-d05a-4b54-8b62-645a63860303\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\O2ikhRyQ71SvrRUjZ9MvGf7.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\Sfn1YyGgu6CGTeBtRcADBVG.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\UWUWkzI6iEQD6XYchYfKNkl.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\hOyPUaIJ5lfWhg1CogD2H0Y.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_2699415f5fdb1b8726d39a1517f1ac2e93897fae_f4fd270f_91cbe5a9-858b-41b9-933d-561fbdab6283\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_2699415f5fdb1b8726d39a1517f1ac2e93897fae_f4fd270f_cbd5ed6f-f1b1-46e2-ae61-8477867d2156\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_7c9841f9f13651f5ded4f2d68b2cd516a5a13a6c_2a26eb84_b7177fe9-08e6-4125-bc00-27f903d61e18\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER494.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 08:18:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER541.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8A0.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 08:18:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE97A.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 08:18:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREAE2.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 08:18:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB9E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREBAE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED16.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF052.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1C8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF2D3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\8K3NvYKoF0DKWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\AYzHdFopxO75Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\EqhKO9P2ECIWHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\FpFVBgo7dSgCHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\J7Touhh5YhR_History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\JiGBQplW34HlWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\Lchq51g992ItWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\QmUB95Fj8NtJLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\UKIb9BrpbElGCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\ZKqDW00W89j6Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\aSLZ4Feg28S4History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\alNN5XcPfXotWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\qSDPuLBbQcS_Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span3x9gJBcQfMeS\r2pCRkIRP3etWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\5QPDGmo5G4k0History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\Aefi8eaYARX2Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\B1BYGVK1v4aYWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\NR3m_g5fQLPvWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\Qwkc0_mnr5I_Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\RQPZpHTwFV2JWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\X4w8fLfloerdWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\_1TNl_23bSjIHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\_cSHk0g_fG60Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\b5K2F8rC2qaQLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\j9CgRYxfLi1HHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\owf9GshuzJ25Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\qZ4vtdSQrsMXWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span6Nuw1ORO26gR\ziYYSl1GQLDDHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\9CGOzYIsW4fKLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\CW09Q1VnvrXtWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\H1q59R1WsqBZLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\MqnEX1xeniHjHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\P6vnPkfjmSpEWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\TGgMbIm7Fwe7Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\XA9cbBY_htD9History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\bpSr9MYCACnDWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\fYwqiU7DWIRUCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\iAtg3fYFpooiWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\kAef6Yh1mDgwWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\lsAFEDVzYJlMHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\qUtwXB6UhnVfLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanJkYygiW7iXux\v9460BEWAmo6History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\5T3tgwNhpORwLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\6SFuLgzL4qkfHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\8cbHFLCQ6whQHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\9t19K0e5OKG7Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\JiEe34kl27_ALogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\O9ahXmBQyGuqHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\Xv5tHsOHXMC8Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\dfNgOBp6eddkWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\ewz6Vx4jFnkiWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\rQNWv9vcSm3gHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\t1K7aC5iYP_kWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\u1bz9SOgrSepWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\vNEEDJhgXMN9Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanglx2UtLzqYTr\z4FoeE1bFFHiWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixy3x9gJBcQfMeS\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy3x9gJBcQfMeS\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy3x9gJBcQfMeS\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy6Nuw1ORO26gR\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy6Nuw1ORO26gR\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy6Nuw1ORO26gR\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyJkYygiW7iXux\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyJkYygiW7iXux\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyJkYygiW7iXux\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyglx2UtLzqYTr\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyglx2UtLzqYTr\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyglx2UtLzqYTr\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 97 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\D44CPdpkNk.exe
"C:\Users\user\Desktop\D44CPdpkNk.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7344 -s 632
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 1896
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 1920
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7600 -s 1900
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
unknown
http://77.91.77.81/mine/amadka.exero
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.81/cost/lenin.exein
unknown
https://db-ip.com/
unknown
https://ipinfo.io/widget/demo/8.46.123.33d-
unknown
https://t.p
unknown
https://t.me/RiseProSUPPORTVgpSODDpgWGzlwXVCLTXRkn.exe
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33X
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33L
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016zy
unknown
https://t.z
unknown
https://t.me/risepro
unknown
https://support.microsoft..
unknown
https://db-ip.com/e8RH(
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
http://77.91.77.81/cost/go.exeO
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/widget/demo/8.46.123.33o5
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
https://t.me/risepro_botisepro_bot
unknown
https://t.me/risepro_bot;
unknown
http://77.91.77.81/mine/amadka.exeA
unknown
https://db-ip.com/Q
unknown
http://77.91.77.81/cost/go.exe?~
unknown
https://db-ip.com/;8H
unknown
https://t.me/risepro_bot.46.123.33
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17oinR6
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33dJ6
unknown
https://t.me/risepro_botlaterH
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.microsoft.
unknown
http://77.91.77.81/cost/lenin.exeisepro_bot
unknown
https://db-ip.com/Kht
unknown
https://ipinfo.io/S
unknown
http://77.91.77.81/cost/go.exes
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://ipinfo.io/N
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
34.117.186.192
https://t.me/RiseProSUPPORTx&$
unknown
http://77.91.77.81/mine/amadka.exe0.1
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://t.me/risepro_botcAw
unknown
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io/)
unknown
http://77.91.77.81/cost/lenin.exectrum
unknown
http://77.91.77.81/mine/amadka.exes.binr
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://77.91.77.81/cost/lenin.exec176af
unknown
http://77.91.77.81/cost/lenin.exem
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33p3
unknown
https://t.me/risepro_bots
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
104.26.4.15
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.81/cost/lenin.exe
unknown
There are 62 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
ProgramId
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
FileId
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
LowerCaseLongPath
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
LongPathHash
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
Name
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
OriginalFileName
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
Publisher
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
Version
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
BinFileVersion
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
BinaryType
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
ProductName
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
ProductVersion
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
LinkDate
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
BinProductVersion
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
AppxPackageFullName
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
AppxPackageRelativeId
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
Size
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
Language
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\d44cpdpknk.exe|2d62eeb227a79981
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{25c0a697-2d09-b959-fd55-b2cc356af97c}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 36 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5660000
heap
page read and write
malicious
57A8000
heap
page read and write
malicious
57AA000
heap
page read and write
malicious
5760000
heap
page read and write
malicious
57B1000
heap
page read and write
malicious
CBE000
heap
page read and write
malicious
5621000
heap
page read and write
malicious
57A8000
heap
page read and write
malicious
D4B000
heap
page read and write
malicious
57C4000
heap
page read and write
malicious
5624000
heap
page read and write
malicious
57A8000
heap
page read and write
malicious
57B1000
heap
page read and write
malicious
5660000
heap
page read and write
malicious
CB9000
heap
page read and write
DA0000
heap
page read and write
56AE000
heap
page read and write
57BA000
heap
page read and write
57D2000
heap
page read and write
57BE000
heap
page read and write
E77000
heap
page read and write
57AA000
heap
page read and write
5671000
heap
page read and write
589E000
stack
page read and write
56DD000
heap
page read and write
CA1000
heap
page read and write
585000
unkown
page read and write
D2B000
heap
page read and write
56A3000
heap
page read and write
D80000
heap
page read and write
551E000
stack
page read and write
56BE000
heap
page read and write
57B3000
heap
page read and write
57F8000
heap
page read and write
5685000
heap
page read and write
57B0000
heap
page read and write
759000
unkown
page execute and read and write
59B0000
trusted library allocation
page read and write
56A3000
heap
page read and write
57D6000
heap
page read and write
731000
unkown
page execute and read and write
D49000
heap
page read and write
2A20000
heap
page read and write
57BC000
heap
page read and write
57C6000
heap
page read and write
564C000
heap
page read and write
57C1000
heap
page read and write
56EA000
heap
page read and write
5170000
remote allocation
page read and write
57B3000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5629000
heap
page read and write
5170000
remote allocation
page read and write
C00000
heap
page read and write
576E000
heap
page read and write
5629000
heap
page read and write
5657000
heap
page read and write
57B6000
heap
page read and write
59B1000
heap
page read and write
57CC000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5797000
heap
page read and write
579C000
heap
page read and write
5673000
heap
page read and write
566A000
heap
page read and write
4F4D000
stack
page read and write
56D7000
heap
page read and write
E8D000
heap
page read and write
5660000
heap
page read and write
579C000
heap
page read and write
56B1000
heap
page read and write
57E8000
heap
page read and write
DC0000
direct allocation
page read and write
57B8000
heap
page read and write
57B1000
heap
page read and write
5673000
heap
page read and write
D3C000
heap
page read and write
EA8000
heap
page read and write
D49000
heap
page read and write
57A3000
heap
page read and write
56A3000
heap
page read and write
CD6000
heap
page read and write
5672000
heap
page read and write
56EA000
heap
page read and write
1E5000
heap
page read and write
57C6000
heap
page read and write
F30000
heap
page read and write
731000
unkown
page execute and read and write
296E000
stack
page read and write
59B0000
trusted library allocation
page read and write
57B2000
heap
page read and write
5671000
heap
page read and write
D35000
heap
page read and write
5796000
heap
page read and write
57AB000
heap
page read and write
58A000
unkown
page readonly
57A3000
heap
page read and write
5675000
heap
page read and write
575E000
stack
page read and write
5674000
heap
page read and write
5690000
heap
page read and write
56E6000
heap
page read and write
577C000
heap
page read and write
589E000
stack
page read and write
5691000
heap
page read and write
5691000
heap
page read and write
59B0000
trusted library allocation
page read and write
57F0000
heap
page read and write
596000
unkown
page write copy
5647000
heap
page read and write
57CC000
heap
page read and write
E86000
heap
page read and write
5660000
heap
page read and write
57B1000
heap
page read and write
59B0000
trusted library allocation
page read and write
56C2000
heap
page read and write
CFF000
heap
page read and write
57B5000
heap
page read and write
568E000
heap
page read and write
5669000
heap
page read and write
599F000
stack
page read and write
57A8000
heap
page read and write
D2C000
heap
page read and write
4B5B000
heap
page read and write
F3A000
heap
page read and write
CA5000
heap
page read and write
577B000
heap
page read and write
5660000
heap
page read and write
57E6000
heap
page read and write
5682000
heap
page read and write
5696000
heap
page read and write
5AF0000
trusted library allocation
page read and write
19A000
stack
page read and write
585F000
stack
page read and write
5687000
heap
page read and write
56BF000
heap
page read and write
29AE000
stack
page read and write
5E00000
trusted library allocation
page read and write
57B6000
heap
page read and write
577A000
heap
page read and write
56D8000
heap
page read and write
57D2000
heap
page read and write
5672000
heap
page read and write
5E00000
trusted library allocation
page read and write
D49000
heap
page read and write
5656000
heap
page read and write
599F000
stack
page read and write
578C000
heap
page read and write
18E000
stack
page read and write
CA4000
heap
page read and write
4EED000
stack
page read and write
5779000
heap
page read and write
292E000
stack
page read and write
5673000
heap
page read and write
5673000
heap
page read and write
5777000
heap
page read and write
579E000
heap
page read and write
5761000
heap
page read and write
57E8000
heap
page read and write
564E000
heap
page read and write
575E000
stack
page read and write
57DA000
heap
page read and write
29F0000
heap
page read and write
C8D000
heap
page read and write
CE4000
heap
page read and write
56AA000
heap
page read and write
BF0000
heap
page read and write
599F000
stack
page read and write
5814000
heap
page read and write
57D0000
heap
page read and write
5657000
heap
page read and write
579E000
heap
page read and write
EA2000
heap
page read and write
569A000
heap
page read and write
57E0000
heap
page read and write
57AB000
heap
page read and write
5683000
heap
page read and write
D2C000
heap
page read and write
C8A000
heap
page read and write
D49000
heap
page read and write
578C000
heap
page read and write
73D000
unkown
page execute and read and write
57DE000
heap
page read and write
F3E000
heap
page read and write
569F000
heap
page read and write
DAC000
heap
page read and write
5674000
heap
page read and write
CB0000
heap
page read and write
579C000
heap
page read and write
400000
unkown
page readonly
5AF0000
trusted library allocation
page read and write
296E000
stack
page read and write
5760000
heap
page read and write
BF0000
heap
page read and write
D3E000
heap
page read and write
5669000
heap
page read and write
5673000
heap
page read and write
5B00000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5693000
heap
page read and write
57B3000
heap
page read and write
400000
unkown
page readonly
579D000
heap
page read and write
57CF000
heap
page read and write
57A8000
heap
page read and write
29AE000
stack
page read and write
4B6C000
heap
page read and write
57D6000
heap
page read and write
57F0000
heap
page read and write
566A000
heap
page read and write
5C3A000
heap
page read and write
5656000
heap
page read and write
56A8000
heap
page read and write
5821000
heap
page read and write
57AD000
heap
page read and write
57D8000
heap
page read and write
563A000
heap
page read and write
400000
unkown
page readonly
55D000
unkown
page readonly
57AB000
heap
page read and write
575A000
heap
page read and write
57B1000
heap
page read and write
5797000
heap
page read and write
57BA000
heap
page read and write
980000
unkown
page execute read
569A000
heap
page read and write
565C000
heap
page read and write
5673000
heap
page read and write
56B2000
heap
page read and write
57BA000
heap
page read and write
56CE000
heap
page read and write
5620000
heap
page read and write
56B9000
heap
page read and write
5810000
heap
page read and write
F3C000
heap
page read and write
5669000
heap
page read and write
57B3000
heap
page read and write
73F000
unkown
page execute and read and write
57C6000
heap
page read and write
57B8000
heap
page read and write
578C000
heap
page read and write
56AE000
heap
page read and write
59B0000
trusted library allocation
page read and write
D54000
heap
page read and write
5787000
heap
page read and write
D2C000
heap
page read and write
5656000
heap
page read and write
5815000
heap
page read and write
580B000
heap
page read and write
56EA000
heap
page read and write
5804000
heap
page read and write
EDE000
heap
page read and write
5793000
heap
page read and write
57D6000
heap
page read and write
2ABE000
stack
page read and write
5681000
heap
page read and write
579E000
heap
page read and write
C60000
heap
page read and write
57BA000
heap
page read and write
C3A000
heap
page read and write
57AA000
heap
page read and write
59B0000
trusted library allocation
page read and write
563A000
heap
page read and write
C80000
direct allocation
page read and write
576F000
heap
page read and write
567E000
heap
page read and write
56A3000
heap
page read and write
57B1000
heap
page read and write
57E1000
heap
page read and write
57E5000
heap
page read and write
59B0000
trusted library allocation
page read and write
57C5000
heap
page read and write
C9C000
heap
page read and write
5673000
heap
page read and write
5645000
heap
page read and write
57AA000
heap
page read and write
401000
unkown
page execute read
57D2000
heap
page read and write
747000
unkown
page execute and read and write
57BA000
heap
page read and write
57C6000
heap
page read and write
568C000
heap
page read and write
5657000
heap
page read and write
980000
unkown
page execute read
5805000
heap
page read and write
578C000
heap
page read and write
580E000
heap
page read and write
1E0000
heap
page read and write
57AB000
heap
page read and write
57A9000
heap
page read and write
CED000
heap
page read and write
579F000
heap
page read and write
59B0000
trusted library allocation
page read and write
57B6000
heap
page read and write
567E000
heap
page read and write
727000
unkown
page execute and read and write
588E000
stack
page read and write
7BA000
unkown
page execute and read and write
57D7000
heap
page read and write
59B0000
trusted library allocation
page read and write
57D6000
heap
page read and write
2880000
direct allocation
page read and write
580C000
heap
page read and write
401000
unkown
page execute read
579F000
heap
page read and write
577A000
heap
page read and write
57B3000
heap
page read and write
562C000
heap
page read and write
5656000
heap
page read and write
5170000
remote allocation
page read and write
569B000
heap
page read and write
D26000
heap
page read and write
56BD000
heap
page read and write
57B8000
heap
page read and write
EC8000
heap
page read and write
57DC000
heap
page read and write
400000
unkown
page readonly
5815000
heap
page read and write
57E1000
heap
page read and write
57A9000
heap
page read and write
57BB000
heap
page read and write
401000
unkown
page execute read
567E000
heap
page read and write
577B000
heap
page read and write
D3E000
heap
page read and write
596000
unkown
page read and write
CBA000
heap
page read and write
5691000
heap
page read and write
5669000
heap
page read and write
585F000
stack
page read and write
57C2000
heap
page read and write
5662000
heap
page read and write
5AFE000
stack
page read and write
563A000
heap
page read and write
73D000
unkown
page execute and read and write
5814000
heap
page read and write
7BA000
unkown
page execute and read and write
57AB000
heap
page read and write
57B1000
heap
page read and write
57BA000
heap
page read and write
57E8000
heap
page read and write
57C8000
heap
page read and write
5669000
heap
page read and write
576A000
heap
page read and write
55D000
unkown
page readonly
F2E000
heap
page read and write
2840000
direct allocation
page read and write
F36000
heap
page read and write
5761000
heap
page read and write
5799000
heap
page read and write
579B000
heap
page read and write
57D9000
heap
page read and write
5691000
heap
page read and write
5750000
heap
page read and write
564E000
stack
page read and write
59B0000
trusted library allocation
page read and write
56BF000
heap
page read and write
57B1000
heap
page read and write
5800000
heap
page read and write
564C000
heap
page read and write
2A0E000
stack
page read and write
CA7000
heap
page read and write
589E000
stack
page read and write
577B000
heap
page read and write
CE4000
heap
page read and write
59B0000
trusted library allocation
page read and write
C40000
heap
page read and write
5AF0000
trusted library allocation
page read and write
55D000
unkown
page readonly
5685000
heap
page read and write
7BA000
unkown
page execute and read and write
57BB000
heap
page read and write
585000
unkown
page read and write
57CD000
heap
page read and write
5685000
heap
page read and write
576F000
heap
page read and write
CF1000
heap
page read and write
56A3000
heap
page read and write
57A9000
heap
page read and write
5694000
heap
page read and write
57E3000
heap
page read and write
56A3000
heap
page read and write
561F000
stack
page read and write
CD0000
heap
page read and write
563A000
heap
page read and write
D19000
heap
page read and write
596000
unkown
page write copy
5829000
heap
page read and write
57C5000
heap
page read and write
5683000
heap
page read and write
19A000
stack
page read and write
747000
unkown
page execute and read and write
57B8000
heap
page read and write
56A7000
heap
page read and write
F33000
heap
page read and write
5680000
heap
page read and write
5658000
heap
page read and write
4CFE000
stack
page read and write
57F9000
heap
page read and write
73D000
unkown
page execute and read and write
5814000
heap
page read and write
5804000
heap
page read and write
579E000
heap
page read and write
5677000
heap
page read and write
569D000
heap
page read and write
57B9000
heap
page read and write
5795000
heap
page read and write
57D4000
heap
page read and write
59B0000
trusted library allocation
page read and write
57CF000
heap
page read and write
59B0000
trusted library allocation
page read and write
563A000
heap
page read and write
5806000
heap
page read and write
57D2000
heap
page read and write
57B3000
heap
page read and write
56B2000
heap
page read and write
578C000
heap
page read and write
580C000
heap
page read and write
5790000
heap
page read and write
57D2000
heap
page read and write
568C000
heap
page read and write
57D2000
heap
page read and write
D01000
heap
page read and write
57A1000
heap
page read and write
2A30000
direct allocation
page read and write
5828000
heap
page read and write
56BB000
heap
page read and write
575F000
stack
page read and write
5656000
heap
page read and write
D0B000
heap
page read and write
D30000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5660000
heap
page read and write
CEF000
heap
page read and write
5770000
heap
page read and write
569B000
heap
page read and write
57F8000
heap
page read and write
579F000
heap
page read and write
5808000
heap
page read and write
980000
unkown
page execute read
57A9000
heap
page read and write
57C5000
heap
page read and write
57D9000
heap
page read and write
577B000
heap
page read and write
569A000
heap
page read and write
5656000
heap
page read and write
56DF000
heap
page read and write
566A000
heap
page read and write
5621000
heap
page read and write
5671000
heap
page read and write
57B5000
heap
page read and write
57AA000
heap
page read and write
7B0000
unkown
page execute and read and write
5672000
heap
page read and write
58A000
unkown
page readonly
57AA000
heap
page read and write
CB7000
heap
page read and write
56E0000
heap
page read and write
C71000
heap
page read and write
5824000
heap
page read and write
18E000
stack
page read and write
57B6000
heap
page read and write
566A000
heap
page read and write
516F000
stack
page read and write
57B1000
heap
page read and write
5620000
heap
page read and write
5685000
heap
page read and write
D2E000
heap
page read and write
D43000
heap
page read and write
5682000
heap
page read and write
5824000
heap
page read and write
56D8000
heap
page read and write
5797000
heap
page read and write
2960000
direct allocation
page read and write
57C4000
heap
page read and write
57B8000
heap
page read and write
57D2000
heap
page read and write
56EA000
heap
page read and write
57E3000
heap
page read and write
57B5000
heap
page read and write
D1F000
heap
page read and write
C57000
heap
page read and write
C5A000
heap
page read and write
560F000
stack
page read and write
7B0000
unkown
page execute and read and write
577B000
heap
page read and write
57BA000
heap
page read and write
5633000
heap
page read and write
EDB000
heap
page read and write
2950000
heap
page read and write
5673000
heap
page read and write
ED9000
heap
page read and write
D54000
heap
page read and write
5770000
heap
page read and write
5AE0000
trusted library allocation
page read and write
57D6000
heap
page read and write
578F000
heap
page read and write
5656000
heap
page read and write
5669000
heap
page read and write
58A000
unkown
page readonly
59B0000
trusted library allocation
page read and write
57CA000
heap
page read and write
5660000
heap
page read and write
57B8000
heap
page read and write
574F000
stack
page read and write
5672000
heap
page read and write
57BA000
heap
page read and write
5796000
heap
page read and write
DA0000
direct allocation
page read and write
9B000
stack
page read and write
57B3000
heap
page read and write
56AB000
heap
page read and write
D1C000
heap
page read and write
ED6000
heap
page read and write
D0E000
heap
page read and write
2AE0000
heap
page read and write
5AE0000
trusted library allocation
page read and write
D5A000
heap
page read and write
D2E000
heap
page read and write
4AFA000
heap
page read and write
5AF0000
trusted library allocation
page read and write
C7F000
heap
page read and write
57BA000
heap
page read and write
5675000
heap
page read and write
57C1000
heap
page read and write
57EF000
heap
page read and write
D21000
heap
page read and write
5660000
heap
page read and write
DA0000
direct allocation
page read and write
400000
unkown
page readonly
56E6000
heap
page read and write
D32000
heap
page read and write
5675000
heap
page read and write
5660000
heap
page read and write
5797000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5787000
heap
page read and write
5671000
heap
page read and write
5170000
remote allocation
page read and write
563E000
heap
page read and write
596000
unkown
page read and write
562D000
heap
page read and write
DC2000
heap
page read and write
57D6000
heap
page read and write
729000
unkown
page execute and read and write
5771000
heap
page read and write
57B8000
heap
page read and write
56EA000
heap
page read and write
5AE0000
trusted library allocation
page read and write
57AD000
heap
page read and write
7B0000
unkown
page execute and read and write
57C5000
heap
page read and write
57AB000
heap
page read and write
C95000
heap
page read and write
57BA000
heap
page read and write
578C000
heap
page read and write
5685000
heap
page read and write
EB3000
heap
page read and write
C10000
heap
page read and write
5656000
heap
page read and write
56BD000
heap
page read and write
57A9000
heap
page read and write
5AF1000
heap
page read and write
58A000
unkown
page readonly
5629000
heap
page read and write
56E1000
heap
page read and write
57A3000
heap
page read and write
57B8000
heap
page read and write
56B3000
heap
page read and write
57B6000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5761000
heap
page read and write
57C6000
heap
page read and write
F36000
heap
page read and write
E90000
heap
page read and write
57E6000
heap
page read and write
57FA000
heap
page read and write
5623000
heap
page read and write
585000
unkown
page write copy
5C01000
heap
page read and write
57A8000
heap
page read and write
56B5000
heap
page read and write
73F000
unkown
page execute and read and write
577B000
heap
page read and write
577A000
heap
page read and write
57B4000
heap
page read and write
5797000
heap
page read and write
56A6000
heap
page read and write
C91000
heap
page read and write
57C5000
heap
page read and write
57BA000
heap
page read and write
D3D000
heap
page read and write
D06000
heap
page read and write
2860000
direct allocation
page read and write
568B000
heap
page read and write
59B0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
5685000
heap
page read and write
5685000
heap
page read and write
57D6000
heap
page read and write
579F000
heap
page read and write
ED6000
heap
page read and write
56CB000
heap
page read and write
5693000
heap
page read and write
56DD000
heap
page read and write
55D000
unkown
page readonly
578C000
heap
page read and write
5808000
heap
page read and write
5622000
heap
page read and write
5660000
heap
page read and write
58A000
unkown
page readonly
5669000
heap
page read and write
401000
unkown
page execute read
D01000
heap
page read and write
501F000
stack
page read and write
57B4000
heap
page read and write
579B000
heap
page read and write
F3C000
heap
page read and write
400000
unkown
page readonly
580B000
heap
page read and write
57DC000
heap
page read and write
59DE000
stack
page read and write
57C6000
heap
page read and write
5AE0000
trusted library allocation
page read and write
56EA000
heap
page read and write
57BB000
heap
page read and write
5795000
heap
page read and write
563A000
heap
page read and write
59B0000
trusted library allocation
page read and write
400000
unkown
page readonly
57B8000
heap
page read and write
5691000
heap
page read and write
56EA000
heap
page read and write
5830000
heap
page read and write
57BF000
heap
page read and write
2A7E000
stack
page read and write
5685000
heap
page read and write
CFB000
heap
page read and write
57B8000
heap
page read and write
73F000
unkown
page execute and read and write
29E0000
remote allocation
page read and write
5782000
heap
page read and write
57B3000
heap
page read and write
5800000
heap
page read and write
29C0000
heap
page read and write
5E00000
trusted library allocation
page read and write
57D7000
heap
page read and write
562D000
heap
page read and write
57E8000
heap
page read and write
56AC000
heap
page read and write
57D4000
heap
page read and write
57C0000
heap
page read and write
980000
unkown
page execute read
57B6000
heap
page read and write
56CB000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5796000
heap
page read and write
2B3E000
stack
page read and write
5669000
heap
page read and write
503D000
stack
page read and write
57AA000
heap
page read and write
577B000
heap
page read and write
57B6000
heap
page read and write
57BA000
heap
page read and write
58A000
unkown
page readonly
5696000
heap
page read and write
18E000
stack
page read and write
57AB000
heap
page read and write
501F000
stack
page read and write
57B6000
heap
page read and write
596000
unkown
page read and write
5AF0000
heap
page read and write
CA8000
heap
page read and write
596000
unkown
page write copy
5AE0000
trusted library allocation
page read and write
5669000
heap
page read and write
57E3000
heap
page read and write
5815000
heap
page read and write
5755000
heap
page read and write
577C000
heap
page read and write
585000
unkown
page write copy
5686000
heap
page read and write
727000
unkown
page execute and read and write
5625000
heap
page read and write
57BF000
heap
page read and write
5683000
heap
page read and write
E88000
heap
page read and write
D1E000
heap
page read and write
293E000
stack
page read and write
57D2000
heap
page read and write
515F000
stack
page read and write
7B0000
unkown
page execute and read and write
568E000
heap
page read and write
EDE000
heap
page read and write
C00000
heap
page read and write
56EA000
heap
page read and write
2880000
direct allocation
page read and write
57B3000
heap
page read and write
DA0000
direct allocation
page read and write
980000
unkown
page execute read
579B000
heap
page read and write
5633000
heap
page read and write
2840000
direct allocation
page read and write
569A000
heap
page read and write
5671000
heap
page read and write
5674000
heap
page read and write
5660000
heap
page read and write
5669000
heap
page read and write
5692000
heap
page read and write
5694000
heap
page read and write
57B8000
heap
page read and write
563A000
heap
page read and write
DC2000
heap
page read and write
D1A000
heap
page read and write
759000
unkown
page execute and read and write
57E7000
heap
page read and write
57CD000
heap
page read and write
731000
unkown
page execute and read and write
57E6000
heap
page read and write
57B1000
heap
page read and write
568E000
heap
page read and write
D38000
heap
page read and write
5771000
heap
page read and write
57C9000
heap
page read and write
4DED000
stack
page read and write
576F000
heap
page read and write
551E000
stack
page read and write
D2C000
heap
page read and write
57C1000
heap
page read and write
7BA000
unkown
page execute and read and write
4DFE000
stack
page read and write
565E000
stack
page read and write
4E4E000
stack
page read and write
729000
unkown
page execute and read and write
57D6000
heap
page read and write
579F000
heap
page read and write
59B0000
trusted library allocation
page read and write
57C4000
heap
page read and write
57F0000
heap
page read and write
57A7000
heap
page read and write
CA0000
heap
page read and write
5660000
heap
page read and write
5672000
heap
page read and write
F36000
heap
page read and write
73D000
unkown
page execute and read and write
5797000
heap
page read and write
57A8000
heap
page read and write
57D9000
heap
page read and write
57D6000
heap
page read and write
576C000
heap
page read and write
56AB000
heap
page read and write
5797000
heap
page read and write
56CD000
heap
page read and write
6001000
heap
page read and write
57D6000
heap
page read and write
57D1000
heap
page read and write
57F5000
heap
page read and write
57C2000
heap
page read and write
56D8000
heap
page read and write
2820000
heap
page read and write
57B3000
heap
page read and write
57CF000
heap
page read and write
59B0000
trusted library allocation
page read and write
5672000
heap
page read and write
57D6000
heap
page read and write
4EDD000
stack
page read and write
D3D000
heap
page read and write
5685000
heap
page read and write
DAB000
heap
page read and write
980000
unkown
page execute read
57CF000
heap
page read and write
5660000
heap
page read and write
580C000
heap
page read and write
5170000
remote allocation
page read and write
5675000
heap
page read and write
59B0000
trusted library allocation
page read and write
D2E000
heap
page read and write
563D000
heap
page read and write
759000
unkown
page execute and read and write
5674000
heap
page read and write
59B0000
trusted library allocation
page read and write
5694000
heap
page read and write
57D6000
heap
page read and write
57DE000
heap
page read and write
5694000
heap
page read and write
5691000
heap
page read and write
57A9000
heap
page read and write
5675000
heap
page read and write
580B000
heap
page read and write
57A0000
heap
page read and write
57F5000
heap
page read and write
4968000
heap
page read and write
57BB000
heap
page read and write
57D9000
heap
page read and write
598000
unkown
page execute and read and write
D5A000
heap
page read and write
569D000
heap
page read and write
EC8000
heap
page read and write
5660000
heap
page read and write
57B1000
heap
page read and write
57C1000
heap
page read and write
57C6000
heap
page read and write
57CA000
heap
page read and write
596000
unkown
page read and write
F3A000
heap
page read and write
56E9000
heap
page read and write
F3B000
heap
page read and write
1E5000
heap
page read and write
585000
unkown
page write copy
579C000
heap
page read and write
18E000
stack
page read and write
C8A000
heap
page read and write
56AB000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5ADF000
stack
page read and write
401000
unkown
page execute read
57B8000
heap
page read and write
5662000
heap
page read and write
579C000
heap
page read and write
5679000
heap
page read and write
C30000
heap
page read and write
5AF0000
trusted library allocation
page read and write
57D2000
heap
page read and write
56A8000
heap
page read and write
F3A000
heap
page read and write
505E000
stack
page read and write
57F5000
heap
page read and write
567B000
heap
page read and write
D22000
heap
page read and write
57AA000
heap
page read and write
C50000
remote allocation
page read and write
401000
unkown
page execute read
55D000
unkown
page readonly
29CE000
stack
page read and write
57C0000
heap
page read and write
57DB000
heap
page read and write
5685000
heap
page read and write
DE7000
heap
page read and write
C6B000
heap
page read and write
580B000
heap
page read and write
56AA000
heap
page read and write
57C6000
heap
page read and write
73D000
unkown
page execute and read and write
9B000
stack
page read and write
57B3000
heap
page read and write
5660000
heap
page read and write
56EA000
heap
page read and write
57B8000
heap
page read and write
57BA000
heap
page read and write
29B0000
heap
page read and write
57B4000
heap
page read and write
57BA000
heap
page read and write
56AC000
heap
page read and write
5689000
heap
page read and write
579D000
heap
page read and write
5660000
heap
page read and write
DA9000
heap
page read and write
5685000
heap
page read and write
C00000
trusted library allocation
page read and write
57B6000
heap
page read and write
55D000
unkown
page readonly
19A000
stack
page read and write
5791000
heap
page read and write
57C6000
heap
page read and write
57FA000
heap
page read and write
56DA000
heap
page read and write
BF0000
heap
page read and write
57B5000
heap
page read and write
563D000
heap
page read and write
C3D000
heap
page read and write
5B01000
heap
page read and write
5160000
remote allocation
page read and write
5815000
heap
page read and write
C86000
heap
page read and write
5691000
heap
page read and write
57CF000
heap
page read and write
56E6000
heap
page read and write
561F000
stack
page read and write
56A8000
heap
page read and write
5ADF000
stack
page read and write
579F000
heap
page read and write
D52000
heap
page read and write
57A9000
heap
page read and write
57B8000
heap
page read and write
5AE0000
trusted library allocation
page read and write
56A7000
heap
page read and write
5695000
heap
page read and write
57D3000
heap
page read and write
C7B000
heap
page read and write
57D9000
heap
page read and write
5673000
heap
page read and write
599F000
stack
page read and write
5764000
heap
page read and write
56D8000
heap
page read and write
D15000
heap
page read and write
585000
unkown
page read and write
57AA000
heap
page read and write
55D000
unkown
page readonly
579E000
heap
page read and write
566A000
heap
page read and write
517F000
stack
page read and write
56AA000
heap
page read and write
5815000
heap
page read and write
562C000
heap
page read and write
56EA000
heap
page read and write
57B3000
heap
page read and write
5660000
heap
page read and write
57D2000
heap
page read and write
568C000
heap
page read and write
CBB000
heap
page read and write
57DC000
heap
page read and write
5669000
heap
page read and write
2820000
heap
page read and write
D49000
heap
page read and write
579E000
heap
page read and write
727000
unkown
page execute and read and write
579B000
heap
page read and write
57A3000
heap
page read and write
578E000
heap
page read and write
729000
unkown
page execute and read and write
57AB000
heap
page read and write
CD6000
heap
page read and write
CCA000
heap
page read and write
579B000
heap
page read and write
5673000
heap
page read and write
57D6000
heap
page read and write
5772000
heap
page read and write
5675000
heap
page read and write
747000
unkown
page execute and read and write
56A3000
heap
page read and write
57D6000
heap
page read and write
F37000
heap
page read and write
579F000
heap
page read and write
5675000
heap
page read and write
D0D000
heap
page read and write
55D000
unkown
page readonly
C98000
heap
page read and write
5698000
heap
page read and write
57AA000
heap
page read and write
56EA000
heap
page read and write
57D4000
heap
page read and write
CA2000
heap
page read and write
56C2000
heap
page read and write
5170000
remote allocation
page read and write
F36000
heap
page read and write
DA0000
direct allocation
page read and write
C10000
trusted library allocation
page read and write
DC2000
heap
page read and write
C9B000
heap
page read and write
579B000
heap
page read and write
56AC000
heap
page read and write
57C7000
heap
page read and write
57BA000
heap
page read and write
5669000
heap
page read and write
505E000
stack
page read and write
57FE000
heap
page read and write
579C000
heap
page read and write
57C6000
heap
page read and write
57B3000
heap
page read and write
CB5000
heap
page read and write
5796000
heap
page read and write
59B0000
trusted library allocation
page read and write
5696000
heap
page read and write
5671000
heap
page read and write
CB0000
heap
page read and write
2840000
direct allocation
page read and write
59B1000
heap
page read and write
980000
unkown
page execute read
2880000
direct allocation
page read and write
5660000
heap
page read and write
57B8000
heap
page read and write
D13000
heap
page read and write
596000
unkown
page read and write
563A000
heap
page read and write
57BA000
heap
page read and write
576A000
heap
page read and write
EC0000
heap
page read and write
57C2000
heap
page read and write
5683000
heap
page read and write
57B1000
heap
page read and write
5771000
heap
page read and write
D24000
heap
page read and write
57BA000
heap
page read and write
5E00000
trusted library allocation
page read and write
57B0000
heap
page read and write
577B000
heap
page read and write
57D6000
heap
page read and write
57A1000
heap
page read and write
5660000
heap
page read and write
F3A000
heap
page read and write
57AA000
heap
page read and write
5774000
heap
page read and write
9B000
stack
page read and write
58A000
unkown
page readonly
564C000
heap
page read and write
596000
unkown
page write copy
57B3000
heap
page read and write
59B0000
trusted library allocation
page read and write
D2A000
heap
page read and write
759000
unkown
page execute and read and write
566A000
heap
page read and write
4A35000
heap
page read and write
57E0000
heap
page read and write
59B0000
trusted library allocation
page read and write
F36000
heap
page read and write
56B5000
heap
page read and write
D21000
heap
page read and write
569D000
heap
page read and write
731000
unkown
page execute and read and write
59B0000
trusted library allocation
page read and write
57C9000
heap
page read and write
57AC000
heap
page read and write
56C9000
heap
page read and write
D27000
heap
page read and write
57B5000
heap
page read and write
57AB000
heap
page read and write
F40000
trusted library allocation
page read and write
56D5000
heap
page read and write
575C000
heap
page read and write
5693000
heap
page read and write
563A000
heap
page read and write
569E000
heap
page read and write
28D0000
heap
page read and write
D12000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5828000
heap
page read and write
57BC000
heap
page read and write
56AA000
heap
page read and write
57AB000
heap
page read and write
E40000
heap
page read and write
DA8000
heap
page read and write
5695000
heap
page read and write
57AB000
heap
page read and write
D3D000
heap
page read and write
57DD000
heap
page read and write
57AB000
heap
page read and write
5673000
heap
page read and write
563A000
heap
page read and write
57D6000
heap
page read and write
567E000
heap
page read and write
57D2000
heap
page read and write
56EA000
heap
page read and write
57B5000
heap
page read and write
579B000
heap
page read and write
564C000
heap
page read and write
580D000
heap
page read and write
5660000
heap
page read and write
58A000
unkown
page readonly
57C5000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5685000
heap
page read and write
57D3000
heap
page read and write
57D3000
heap
page read and write
2840000
direct allocation
page read and write
DE0000
heap
page read and write
C40000
heap
page read and write
73F000
unkown
page execute and read and write
401000
unkown
page execute read
DC3000
heap
page read and write
566A000
heap
page read and write
401000
unkown
page execute read
57D6000
heap
page read and write
56A8000
heap
page read and write
980000
unkown
page execute read
5685000
heap
page read and write
D2C000
heap
page read and write
576F000
heap
page read and write
4A0B000
heap
page read and write
5650000
heap
page read and write
56E9000
heap
page read and write
57A9000
heap
page read and write
5755000
heap
page read and write
EBB000
heap
page read and write
579B000
heap
page read and write
57C5000
heap
page read and write
507E000
stack
page read and write
5C3A000
heap
page read and write
56AB000
heap
page read and write
57A1000
heap
page read and write
56CC000
heap
page read and write
579C000
heap
page read and write
5647000
heap
page read and write
2840000
direct allocation
page read and write
57B3000
heap
page read and write
564C000
heap
page read and write
2ABE000
stack
page read and write
57B3000
heap
page read and write
569D000
heap
page read and write
561F000
stack
page read and write
561F000
stack
page read and write
5AF0000
trusted library allocation
page read and write
504F000
stack
page read and write
5E00000
trusted library allocation
page read and write
5797000
heap
page read and write
59B0000
trusted library allocation
page read and write
57EF000
heap
page read and write
9B000
stack
page read and write
569D000
heap
page read and write
5659000
heap
page read and write
5683000
heap
page read and write
5673000
heap
page read and write
5681000
heap
page read and write
579F000
heap
page read and write
5692000
heap
page read and write
CD7000
heap
page read and write
56D5000
heap
page read and write
5669000
heap
page read and write
57B1000
heap
page read and write
568F000
heap
page read and write
5800000
heap
page read and write
585000
unkown
page read and write
57F5000
heap
page read and write
5673000
heap
page read and write
566A000
heap
page read and write
56DA000
heap
page read and write
5656000
heap
page read and write
57BC000
heap
page read and write
5170000
remote allocation
page read and write
57B4000
heap
page read and write
57A3000
heap
page read and write
5808000
heap
page read and write
5685000
heap
page read and write
292E000
stack
page read and write
5642000
heap
page read and write
2820000
direct allocation
page read and write
2840000
direct allocation
page read and write
57C5000
heap
page read and write
4D1E000
stack
page read and write
C77000
heap
page read and write
514F000
stack
page read and write
57CF000
heap
page read and write
57B8000
heap
page read and write
565D000
heap
page read and write
57B0000
heap
page read and write
5691000
heap
page read and write
5679000
heap
page read and write
579E000
heap
page read and write
57D6000
heap
page read and write
57B0000
heap
page read and write
5660000
heap
page read and write
5660000
heap
page read and write
59DE000
stack
page read and write
577B000
heap
page read and write
568C000
heap
page read and write
598000
unkown
page execute and read and write
4E1D000
stack
page read and write
59B0000
trusted library allocation
page read and write
57CF000
heap
page read and write
581A000
heap
page read and write
5671000
heap
page read and write
5170000
remote allocation
page read and write
5791000
heap
page read and write
D3D000
heap
page read and write
19A000
stack
page read and write
5624000
heap
page read and write
F3A000
heap
page read and write
57C6000
heap
page read and write
D0F000
heap
page read and write
57D2000
heap
page read and write
5647000
heap
page read and write
401000
unkown
page execute read
73F000
unkown
page execute and read and write
C60000
trusted library allocation
page read and write
563A000
heap
page read and write
57FE000
heap
page read and write
4F3E000
stack
page read and write
E72000
heap
page read and write
293E000
stack
page read and write
5804000
heap
page read and write
D43000
heap
page read and write
59B0000
trusted library allocation
page read and write
DB8000
heap
page read and write
598000
unkown
page execute and read and write
5671000
heap
page read and write
4F1E000
stack
page read and write
57B3000
heap
page read and write
57BA000
heap
page read and write
F31000
heap
page read and write
579B000
heap
page read and write
5660000
heap
page read and write
5798000
heap
page read and write
DAC000
heap
page read and write
56A8000
heap
page read and write
5672000
heap
page read and write
57BB000
heap
page read and write
729000
unkown
page execute and read and write
DE5000
heap
page read and write
D52000
heap
page read and write
400000
unkown
page readonly
5797000
heap
page read and write
19A000
stack
page read and write
D20000
heap
page read and write
57B8000
heap
page read and write
564C000
heap
page read and write
57CD000
heap
page read and write
57B3000
heap
page read and write
56A8000
heap
page read and write
562C000
heap
page read and write
578C000
heap
page read and write
5E00000
trusted library allocation
page read and write
57CA000
heap
page read and write
5660000
heap
page read and write
F36000
heap
page read and write
57B0000
heap
page read and write
2840000
direct allocation
page read and write
C60000
direct allocation
page read and write
2840000
direct allocation
page read and write
5795000
heap
page read and write
5B01000
heap
page read and write
569A000
heap
page read and write
57B2000
heap
page read and write
18E000
stack
page read and write
57CF000
heap
page read and write
57BD000
heap
page read and write
56A8000
heap
page read and write
581A000
heap
page read and write
DC2000
heap
page read and write
551E000
stack
page read and write
727000
unkown
page execute and read and write
CAB000
heap
page read and write
2AFE000
stack
page read and write
D3D000
heap
page read and write
563D000
heap
page read and write
D2E000
heap
page read and write
564C000
heap
page read and write
56EA000
heap
page read and write
59B0000
trusted library allocation
page read and write
C50000
heap
page read and write
5621000
heap
page read and write
56E9000
heap
page read and write
506E000
stack
page read and write
56A3000
heap
page read and write
5685000
heap
page read and write
5675000
heap
page read and write
CCD000
heap
page read and write
747000
unkown
page execute and read and write
57D5000
heap
page read and write
29E0000
remote allocation
page read and write
56A5000
heap
page read and write
57AB000
heap
page read and write
5691000
heap
page read and write
980000
unkown
page execute read
57AB000
heap
page read and write
D2B000
heap
page read and write
CA6000
heap
page read and write
4C5E000
stack
page read and write
C9F000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5790000
heap
page read and write
F3A000
heap
page read and write
59B0000
trusted library allocation
page read and write
562D000
heap
page read and write
980000
unkown
page execute read
56DE000
heap
page read and write
57AB000
heap
page read and write
57B3000
heap
page read and write
5AF0000
trusted library allocation
page read and write
564C000
heap
page read and write
564C000
heap
page read and write
C10000
heap
page read and write
2B40000
heap
page read and write
57A8000
heap
page read and write
EC1000
heap
page read and write
562C000
heap
page read and write
5796000
heap
page read and write
564C000
heap
page read and write
1E7000
heap
page read and write
57B1000
heap
page read and write
57C2000
heap
page read and write
57EE000
heap
page read and write
731000
unkown
page execute and read and write
57CC000
heap
page read and write
579E000
heap
page read and write
5692000
heap
page read and write
579B000
heap
page read and write
5810000
heap
page read and write
5696000
heap
page read and write
CC1000
heap
page read and write
57AA000
heap
page read and write
5673000
heap
page read and write
57D2000
heap
page read and write
59B0000
trusted library allocation
page read and write
57D1000
heap
page read and write
551E000
stack
page read and write
5AF1000
heap
page read and write
57CF000
heap
page read and write
5AE0000
trusted library allocation
page read and write
E47000
heap
page read and write
EA0000
heap
page read and write
C90000
heap
page read and write
57CD000
heap
page read and write
562C000
heap
page read and write
C84000
heap
page read and write
D35000
heap
page read and write
577D000
heap
page read and write
579F000
heap
page read and write
56C2000
heap
page read and write
DC0000
direct allocation
page read and write
5768000
heap
page read and write
5BFF000
stack
page read and write
D1B000
heap
page read and write
57C2000
heap
page read and write
57AB000
heap
page read and write
589E000
stack
page read and write
57BA000
heap
page read and write
5AF0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
5682000
heap
page read and write
57D2000
heap
page read and write
F39000
heap
page read and write
57F1000
heap
page read and write
5764000
heap
page read and write
562D000
heap
page read and write
578F000
heap
page read and write
5691000
heap
page read and write
578C000
heap
page read and write
4F1E000
stack
page read and write
57D6000
heap
page read and write
5672000
heap
page read and write
56AC000
heap
page read and write
C9A000
heap
page read and write
57B0000
heap
page read and write
57B6000
heap
page read and write
4D9D000
stack
page read and write
5815000
heap
page read and write
57C8000
heap
page read and write
DC0000
direct allocation
page read and write
5683000
heap
page read and write
576A000
heap
page read and write
5671000
heap
page read and write
57A9000
heap
page read and write
7BA000
unkown
page execute and read and write
F29000
heap
page read and write
550E000
stack
page read and write
59B0000
trusted library allocation
page read and write
56BA000
heap
page read and write
57BC000
heap
page read and write
5799000
heap
page read and write
DA2000
heap
page read and write
5791000
heap
page read and write
5E00000
trusted library allocation
page read and write
2840000
direct allocation
page read and write
57BA000
heap
page read and write
565E000
stack
page read and write
598F000
stack
page read and write
57E8000
heap
page read and write
566A000
heap
page read and write
57E5000
heap
page read and write
5691000
heap
page read and write
D3D000
heap
page read and write
56BE000
heap
page read and write
57D1000
heap
page read and write
58A000
unkown
page readonly
5671000
heap
page read and write
D28000
heap
page read and write
F3A000
heap
page read and write
56A7000
heap
page read and write
57D6000
heap
page read and write
5AE0000
trusted library allocation
page read and write
57A8000
heap
page read and write
57F0000
heap
page read and write
5693000
heap
page read and write
578C000
heap
page read and write
56E2000
heap
page read and write
401000
unkown
page execute read
57C6000
heap
page read and write
7B0000
unkown
page execute and read and write
55D000
unkown
page readonly
562E000
heap
page read and write
DA0000
direct allocation
page read and write
56E1000
heap
page read and write
400000
unkown
page readonly
5660000
heap
page read and write
5639000
heap
page read and write
57B3000
heap
page read and write
D3F000
heap
page read and write
747000
unkown
page execute and read and write
59B0000
heap
page read and write
57E6000
heap
page read and write
CF5000
heap
page read and write
567E000
heap
page read and write
57E1000
heap
page read and write
D2B000
heap
page read and write
578F000
heap
page read and write
57B6000
heap
page read and write
57BA000
heap
page read and write
1E7000
heap
page read and write
57AA000
heap
page read and write
579E000
heap
page read and write
57CC000
heap
page read and write
598000
unkown
page execute and read and write
57B8000
heap
page read and write
57AA000
heap
page read and write
57F4000
heap
page read and write
4C9E000
stack
page read and write
57B8000
heap
page read and write
5685000
heap
page read and write
5689000
heap
page read and write
577B000
heap
page read and write
F33000
heap
page read and write
59B0000
trusted library allocation
page read and write
5693000
heap
page read and write
57AE000
heap
page read and write
5815000
heap
page read and write
5693000
heap
page read and write
57D2000
heap
page read and write
5770000
heap
page read and write
57B3000
heap
page read and write
515F000
stack
page read and write
564C000
heap
page read and write
57BA000
heap
page read and write
596000
unkown
page write copy
D2B000
heap
page read and write
56A3000
heap
page read and write
57BF000
heap
page read and write
57B0000
heap
page read and write
D49000
heap
page read and write
2980000
heap
page read and write
562C000
heap
page read and write
57D2000
heap
page read and write
567E000
heap
page read and write
5791000
heap
page read and write
D06000
heap
page read and write
5797000
heap
page read and write
4F2E000
stack
page read and write
5804000
heap
page read and write
2820000
direct allocation
page read and write
57F9000
heap
page read and write
5685000
heap
page read and write
D80000
direct allocation
page read and write
E80000
heap
page read and write
580E000
heap
page read and write
4EFF000
stack
page read and write
296E000
stack
page read and write
57D2000
heap
page read and write
C78000
heap
page read and write
57C5000
heap
page read and write
5673000
heap
page read and write
57AA000
heap
page read and write
59B0000
trusted library allocation
page read and write
4DDE000
stack
page read and write
59B0000
trusted library allocation
page read and write
5683000
heap
page read and write
57EE000
heap
page read and write
585000
unkown
page write copy
56BA000
heap
page read and write
759000
unkown
page execute and read and write
57CA000
heap
page read and write
D2E000
heap
page read and write
5160000
remote allocation
page read and write
580C000
heap
page read and write
5673000
heap
page read and write
5806000
heap
page read and write
57AB000
heap
page read and write
579D000
heap
page read and write
F3B000
heap
page read and write
578C000
heap
page read and write
56BF000
heap
page read and write
57C1000
heap
page read and write
565B000
heap
page read and write
57E5000
heap
page read and write
5771000
heap
page read and write
569B000
heap
page read and write
5AF0000
trusted library allocation
page read and write
57E5000
heap
page read and write
56CD000
heap
page read and write
58A000
unkown
page readonly
D57000
heap
page read and write
57EF000
heap
page read and write
56D8000
heap
page read and write
5814000
heap
page read and write
57E6000
heap
page read and write
56BB000
heap
page read and write
C00000
heap
page read and write
5685000
heap
page read and write
5687000
heap
page read and write
57BA000
heap
page read and write
5AE0000
trusted library allocation
page read and write
57C1000
heap
page read and write
5804000
heap
page read and write
C5E000
heap
page read and write
57AE000
heap
page read and write
F3A000
heap
page read and write
D29000
heap
page read and write
57B3000
heap
page read and write
4B6A000
heap
page read and write
5699000
heap
page read and write
56AE000
heap
page read and write
F36000
heap
page read and write
5770000
heap
page read and write
C80000
direct allocation
page read and write
57D1000
heap
page read and write
564C000
heap
page read and write
57BA000
heap
page read and write
57B5000
heap
page read and write
57BB000
heap
page read and write
57AB000
heap
page read and write
5AE0000
trusted library allocation
page read and write
56EA000
heap
page read and write
CB7000
heap
page read and write
563A000
heap
page read and write
577B000
heap
page read and write
729000
unkown
page execute and read and write
D2B000
heap
page read and write
59B0000
trusted library allocation
page read and write
57C8000
heap
page read and write
569A000
heap
page read and write
57B1000
heap
page read and write
56EA000
heap
page read and write
E5C000
heap
page read and write
562C000
heap
page read and write
5797000
heap
page read and write
577B000
heap
page read and write
57A9000
heap
page read and write
5820000
heap
page read and write
57B8000
heap
page read and write
56DA000
heap
page read and write
5659000
heap
page read and write
D28000
heap
page read and write
5692000
heap
page read and write
29E0000
remote allocation
page read and write
D48000
heap
page read and write
57C2000
heap
page read and write
5673000
heap
page read and write
57A3000
heap
page read and write
5657000
heap
page read and write
5824000
heap
page read and write
727000
unkown
page execute and read and write
502F000
stack
page read and write
5656000
heap
page read and write
56AA000
heap
page read and write
5669000
heap
page read and write
9B000
stack
page read and write
57CC000
heap
page read and write
5830000
heap
page read and write
579A000
heap
page read and write
6000000
heap
page read and write
5764000
heap
page read and write
56D8000
heap
page read and write
292E000
stack
page read and write
2A3E000
stack
page read and write
5672000
heap
page read and write
5672000
heap
page read and write
56BA000
heap
page read and write
57A1000
heap
page read and write
5675000
heap
page read and write
5C00000
heap
page read and write
5170000
remote allocation
page read and write
5830000
heap
page read and write
585000
unkown
page read and write
5814000
heap
page read and write
EB0000
heap
page read and write
5660000
heap
page read and write
5806000
heap
page read and write
566A000
heap
page read and write
CF1000
heap
page read and write
580C000
heap
page read and write
5160000
remote allocation
page read and write
566A000
heap
page read and write
56A3000
heap
page read and write
CB5000
heap
page read and write
575E000
stack
page read and write
57B6000
heap
page read and write
2840000
direct allocation
page read and write
57B8000
heap
page read and write
59B0000
trusted library allocation
page read and write
5693000
heap
page read and write
56EA000
heap
page read and write
56DD000
heap
page read and write
598000
unkown
page execute and read and write
585000
unkown
page write copy
59B0000
trusted library allocation
page read and write
1E0000
heap
page read and write
57A9000
heap
page read and write
55D000
unkown
page readonly
400000
unkown
page readonly
F33000
heap
page read and write
576D000
heap
page read and write
EBB000
heap
page read and write
57BB000
heap
page read and write
5656000
heap
page read and write
5693000
heap
page read and write
5673000
heap
page read and write
5689000
heap
page read and write
There are 1574 hidden memdumps, click here to show them.