Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
YnsEArPlqx.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
|
ASCII text, with no line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\YnsEArPlqx.exe
|
"C:\Users\user\Desktop\YnsEArPlqx.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://77.91.77.81/mine/amadka.exe
|
unknown
|
||
http://77.91.77.81/mine/amadka.exeisepro_bot
|
unknown
|
||
https://ipinfo.io:443/widget/demo/8.46.123.33
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=8.46.123.33M
|
unknown
|
||
https://t.me/RiseProSUPPORTv
|
unknown
|
||
http://77.91.77.81/cost/go.exe
|
unknown
|
||
https://t.me/RiseProSUPPORTt
|
unknown
|
||
http://77.91.77.81/mine/amadka.exe.1
|
unknown
|
||
http://77.91.77.81/mine/amadka.exe3377b
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=8.46.123.33H
|
unknown
|
||
https://db-ip.com/
|
unknown
|
||
https://db-ip.com/oV
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33NA
|
unknown
|
||
https://t.me/RiseProSUPPORTf
|
unknown
|
||
http://77.91.77.81/cost/lenin.exe0.1
|
unknown
|
||
https://t.me/risepro
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33P.tmp
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33
|
34.117.186.192
|
||
https://ipinfo.io/s
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.33f7
|
unknown
|
||
http://77.91.77.81/cost/lenin.e
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=8.46.123.33
|
unknown
|
||
http://77.91.77.81/mine/amadka.exeB
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.333
|
unknown
|
||
https://t.me/risepro_bot8
|
unknown
|
||
https://db-ip.com/L
|
unknown
|
||
http://77.91.77.81/mine/amadka.exeisepro_botA%
|
unknown
|
||
http://77.91.77.81/cost/go.exeT3EU
|
unknown
|
||
https://t.me/risepro_botrisep
|
unknown
|
||
https://db-ip.com/V
|
unknown
|
||
https://t.me/risepro_botClyf(U3
|
unknown
|
||
https://t.me/risepro_bot~
|
unknown
|
||
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
https://t.me/risepro_botK:
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
https://t.me/risepro_bot3ABbfQUY
|
unknown
|
||
http://77.91.77.81/cost/lenin.exek.com
|
unknown
|
||
https://ipinfo.io/Mozilla/5.0
|
unknown
|
||
http://77.91.77.81/cost/go.exew9u
|
unknown
|
||
http://77.91.77.81/cost/lenin.exe/risepro
|
unknown
|
||
https://db-ip.com/h
|
unknown
|
||
https://t.me/risepro_bot
|
unknown
|
||
https://t.me/risepro_botlater
|
unknown
|
||
https://ipinfo.io/
|
34.117.186.192
|
||
https://t.%9
|
unknown
|
||
http://77.91.77.81/mine/amadka.exe0.1
|
unknown
|
||
https://www.maxmind.com/en/locate-my-ip-address
|
unknown
|
||
http://77.91.77.81/cost/go.exeOP
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.33w
|
unknown
|
||
https://t.h
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.33k
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.33
|
172.67.75.166
|
||
http://77.91.77.81/cost/lenin.exe
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=8.46.123.338
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ipinfo.io
|
34.117.186.192
|
||
db-ip.com
|
172.67.75.166
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.91.77.66
|
unknown
|
Russian Federation
|
||
34.117.186.192
|
ipinfo.io
|
United States
|
||
172.67.75.166
|
db-ip.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RageMP131
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C91000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
753000
|
unkown
|
page execute and read and write
|
||
C91000
|
heap
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
D12000
|
heap
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
76A000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
E16000
|
heap
|
page read and write
|
||
2820000
|
direct allocation
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
585000
|
unkown
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
D52000
|
heap
|
page read and write
|
||
4B28000
|
heap
|
page read and write
|
||
598000
|
unkown
|
page execute and read and write
|
||
782000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
BFA000
|
heap
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
2740000
|
direct allocation
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
759000
|
unkown
|
page execute and read and write
|
||
CEE000
|
heap
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
2980000
|
direct allocation
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
776000
|
unkown
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
2740000
|
direct allocation
|
page read and write
|
||
776000
|
unkown
|
page execute and read and write
|
||
757000
|
unkown
|
page execute and read and write
|
||
55D000
|
unkown
|
page readonly
|
||
76C000
|
unkown
|
page execute and read and write
|
||
5768000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2920000
|
direct allocation
|
page read and write
|
||
2980000
|
direct allocation
|
page read and write
|
||
2980000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
D6D000
|
heap
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
F59000
|
heap
|
page read and write
|
||
596000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
757000
|
unkown
|
page execute and read and write
|
||
770000
|
unkown
|
page execute and read and write
|
||
EE9000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
74D000
|
unkown
|
page execute and read and write
|
||
500F000
|
stack
|
page read and write
|
||
596000
|
unkown
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
C43000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page write copy
|
||
2840000
|
direct allocation
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
2B10000
|
heap
|
page read and write
|
||
759000
|
unkown
|
page execute and read and write
|
||
EBD000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
4952000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
9B000
|
stack
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
C6E000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
782000
|
unkown
|
page execute and read and write
|
||
CAF000
|
heap
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page read and write
|
||
577E000
|
heap
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
C8D000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
774000
|
unkown
|
page execute and read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
19C000
|
stack
|
page read and write
|
||
5170000
|
remote allocation
|
page read and write
|
||
5762000
|
heap
|
page read and write
|
||
772000
|
unkown
|
page execute and read and write
|
||
2A52000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
768000
|
unkown
|
page execute and read and write
|
||
EAA000
|
heap
|
page read and write
|
||
575F000
|
stack
|
page read and write
|
||
759000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
7AE000
|
unkown
|
page execute and read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
5765000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
776000
|
unkown
|
page execute and read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
598000
|
unkown
|
page execute and read and write
|
||
766000
|
unkown
|
page execute and read and write
|
||
9B000
|
stack
|
page read and write
|
||
772000
|
unkown
|
page execute and read and write
|
||
1D0000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
C76000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
5160000
|
remote allocation
|
page read and write
|
||
76C000
|
unkown
|
page execute and read and write
|
||
E31000
|
heap
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
766000
|
unkown
|
page execute and read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
29DE000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page write copy
|
||
C35000
|
heap
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
19C000
|
stack
|
page read and write
|
||
F4C000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page execute and read and write
|
||
28D0000
|
direct allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
550E000
|
stack
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
C41000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page execute and read and write
|
||
2820000
|
heap
|
page read and write
|
||
CBF000
|
heap
|
page read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
5760000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
DA0000
|
direct allocation
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
759000
|
unkown
|
page execute and read and write
|
||
CDF000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page execute and read and write
|
||
EAB000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
589E000
|
stack
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
751000
|
unkown
|
page execute and read and write
|
||
58A000
|
unkown
|
page readonly
|
||
782000
|
unkown
|
page execute and read and write
|
||
7B3000
|
unkown
|
page execute and read and write
|
||
D22000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
757000
|
unkown
|
page execute and read and write
|
||
5769000
|
heap
|
page read and write
|
||
4914000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
759000
|
unkown
|
page execute and read and write
|
||
980000
|
unkown
|
page execute read
|
||
774000
|
unkown
|
page execute and read and write
|
||
C68000
|
heap
|
page read and write
|
||
4F1D000
|
stack
|
page read and write
|
||
751000
|
unkown
|
page execute and read and write
|
||
768000
|
unkown
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
74D000
|
unkown
|
page execute and read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
776000
|
unkown
|
page execute and read and write
|
||
574E000
|
stack
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
596000
|
unkown
|
page write copy
|
||
C6D000
|
heap
|
page read and write
|
||
596000
|
unkown
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
DFB000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
980000
|
unkown
|
page execute read
|
||
9B000
|
stack
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
760000
|
unkown
|
page execute and read and write
|
||
980000
|
unkown
|
page execute read
|
||
C60000
|
heap
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page execute and read and write
|
||
7AE000
|
unkown
|
page execute and read and write
|
||
4EBD000
|
stack
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
76C000
|
unkown
|
page execute and read and write
|
||
D6E000
|
heap
|
page read and write
|
||
751000
|
unkown
|
page execute and read and write
|
||
C32000
|
heap
|
page read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
575F000
|
stack
|
page read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E92000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
C7E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
585000
|
unkown
|
page write copy
|
||
585000
|
unkown
|
page write copy
|
||
DC5000
|
heap
|
page read and write
|
||
751000
|
unkown
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
776000
|
unkown
|
page execute and read and write
|
||
516F000
|
stack
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
C8D000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4C3E000
|
stack
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
7AE000
|
unkown
|
page execute and read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
76A000
|
unkown
|
page execute and read and write
|
||
770000
|
unkown
|
page execute and read and write
|
||
513F000
|
stack
|
page read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
585000
|
unkown
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
760000
|
unkown
|
page execute and read and write
|
||
2740000
|
direct allocation
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page write copy
|
||
D44000
|
heap
|
page read and write
|
||
596000
|
unkown
|
page write copy
|
||
596000
|
unkown
|
page write copy
|
||
D27000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
768000
|
unkown
|
page execute and read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4ECD000
|
stack
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
2A59000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
E01000
|
heap
|
page read and write
|
||
598000
|
unkown
|
page execute and read and write
|
||
C95000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page execute and read and write
|
||
564E000
|
stack
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
76C000
|
unkown
|
page execute and read and write
|
||
58A000
|
unkown
|
page readonly
|
||
76A000
|
unkown
|
page execute and read and write
|
||
519E000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
768000
|
unkown
|
page execute and read and write
|
||
D1C000
|
heap
|
page read and write
|
||
596000
|
unkown
|
page write copy
|
||
5170000
|
remote allocation
|
page read and write
|
||
766000
|
unkown
|
page execute and read and write
|
||
574F000
|
stack
|
page read and write
|
||
753000
|
unkown
|
page execute and read and write
|
||
E0F000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
293E000
|
stack
|
page read and write
|
||
7B3000
|
unkown
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
576E000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
598000
|
unkown
|
page execute and read and write
|
||
599F000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
EF3000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
5160000
|
remote allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
772000
|
unkown
|
page execute and read and write
|
||
EA4000
|
heap
|
page read and write
|
||
753000
|
unkown
|
page execute and read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
2820000
|
direct allocation
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
7AE000
|
unkown
|
page execute and read and write
|
||
C3C000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
58A000
|
unkown
|
page readonly
|
||
2ACE000
|
stack
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
5764000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page execute and read and write
|
||
551E000
|
stack
|
page read and write
|
||
74D000
|
unkown
|
page execute and read and write
|
||
5170000
|
remote allocation
|
page read and write
|
||
768000
|
unkown
|
page execute and read and write
|
||
598000
|
unkown
|
page execute and read and write
|
||
760000
|
unkown
|
page execute and read and write
|
||
E7C000
|
heap
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
596000
|
unkown
|
page write copy
|
||
5765000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
760000
|
unkown
|
page execute and read and write
|
||
9B000
|
stack
|
page read and write
|
||
D6B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
757000
|
unkown
|
page execute and read and write
|
||
D58000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
529F000
|
stack
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
753000
|
unkown
|
page execute and read and write
|
||
78A000
|
unkown
|
page execute and read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
76A000
|
unkown
|
page execute and read and write
|
||
75E000
|
unkown
|
page execute and read and write
|
||
766000
|
unkown
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
28B0000
|
heap
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
766000
|
unkown
|
page execute and read and write
|
||
C4B000
|
heap
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
596000
|
unkown
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
BF0000
|
heap
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2980000
|
direct allocation
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
596000
|
unkown
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
4D8D000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page execute and read and write
|
||
D39000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
76A000
|
unkown
|
page execute and read and write
|
||
E14000
|
heap
|
page read and write
|
||
EDC000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
772000
|
unkown
|
page execute and read and write
|
||
757000
|
unkown
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
DA0000
|
direct allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
49F7000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2900000
|
direct allocation
|
page read and write
|
||
585000
|
unkown
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
74D000
|
unkown
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
76C000
|
unkown
|
page execute and read and write
|
||
772000
|
unkown
|
page execute and read and write
|
||
CD0000
|
heap
|
page read and write
|
||
561F000
|
stack
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
5760000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
751000
|
unkown
|
page execute and read and write
|
||
4D7D000
|
stack
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
55D000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page execute and read and write
|
||
2980000
|
direct allocation
|
page read and write
|
||
74D000
|
unkown
|
page execute and read and write
|
||
293E000
|
stack
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
2860000
|
direct allocation
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
F4E000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page execute read
|
||
2810000
|
heap
|
page read and write
|
||
58A000
|
unkown
|
page readonly
|
||
EB1000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
7AE000
|
unkown
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
C87000
|
heap
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
753000
|
unkown
|
page execute and read and write
|
||
501E000
|
stack
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page execute and read and write
|
||
C87000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
2740000
|
direct allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
There are 480 hidden memdumps, click here to show them.