IOC Report
PNO3otPYOa.exe

loading gif

Files

File Path
Type
Category
Malicious
PNO3otPYOa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PNO3otPYOa.exe_753a15f1ea62c0c59fa48519710a05b67383851_9279f546_e70db0a5-c068-42dc-be37-7da446311566\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\J7z8s88sXcCE6j1G9cCUUTi.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\r_sRxMygZ5JYHZAcFpnL_Yd.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_ed5e56292ec6c414881791c33eaf25174464651_f4fd270f_3ab4cce7-7f94-442c-b525-21cdd011f3a8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_ed5e56292ec6c414881791c33eaf25174464651_f4fd270f_dcff9e5d-ea84-4036-81f5-602fded4e405\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC90.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 17:37:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCCF.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 17:37:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE18.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE47.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE67.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEB5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF8E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 17:38:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0B8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0F7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\0xcCzZDCkizsHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\1KPuF2_u6oa0History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\1svbu3tIycZmWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\9QKiQirM1qXcHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\EAcPxnGdp6toWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\IK3k1Eo6e4pjWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\JPQQEN02i61OLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\JiHPSJNoS6I5Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\LgWikdVjWsKCHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\Rj9znu7z1UNzWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\b4ep9YrEJBiwLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\lC_8C6VvGWd_Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\rxZO4CLkowTrWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\tMEkdeo4FFLNLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span7YAMvZf65d3U\vSjx5btCeh_cWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\BUCWh4DsXRZeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\ETQM19BZ8bGnHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\FXnU9BYdLcbYHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\G6hWgD726jZgWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\GK7TDaUZmBPNLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\GREY2_eXs_bRCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\KJUlfwzLYDLDWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\OkfPwCov6EatWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\R5vbmWAWNRBAHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\YWghbxCAFBJrLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\b81p5RNJHBPPLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\cSR7Bpbbm4qNHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\jfotimpUpXrDCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\oRcPvxQGoX66Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanPy9S1QyQDExg\y31C2U2FqEpfWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\trixy7YAMvZf65d3U\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy7YAMvZf65d3U\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy7YAMvZf65d3U\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyPy9S1QyQDExg\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyPy9S1QyQDExg\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyPy9S1QyQDExg\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 53 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PNO3otPYOa.exe
"C:\Users\user\Desktop\PNO3otPYOa.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 1972
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 1916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 1736
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://ipinfo.io/widget/demo/8.46.123.33B
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33r
unknown
https://t.me/risepro_botL
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
https://db-ip.com/~OM
unknown
https://ipinfo.io/SE
unknown
https://db-ip.com/
unknown
https://t.me/risepro_botDU
unknown
https://t.zx
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.3352
unknown
https://t.me/risepro_botY
unknown
https://ipinfo.io/widget/demo/8.46.123.33?
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
https://ipinfo.io/widget/demo/8.46.123.33o
unknown
https://t.me/risepro_botisepro_bot
unknown
https://t.me/RiseProSUPPORTF
unknown
https://ipinfo.io/k
unknown
https://t.me/risepro_bot.46.123.33b
unknown
https://t.me/risepro_botrisepro
unknown
https://t.me/risepro_bot2
unknown
https://t.me/RiseProSUPPORT;
unknown
https://t.me/RiseProSUPPORTted88
unknown
https://t.7
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com/Z
unknown
http://77.91.77.81/cost/go.exen
unknown
https://ipinfo.io/T
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/widget/demo/8.46.123.33x
unknown
https://db-ip.com/PS
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33G
unknown
https://t.me/RiseProSUPPORTJ9U
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://77.91.77.81/cost/lenin.exe/risepro
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://t.me/RiseProSUPPORTp;
unknown
https://db-ip.com/~
unknown
https://ipinfo.io/
34.117.186.192
https://db-ip.com/demo/home.php?s=8.46.123.33?2
unknown
http://77.91.77.81/cost/lenin.exe00.1
unknown
http://77.91.77.81/mine/amadka.exeh
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://ipinfo.io/widget/demo/8.46.123.33OV
unknown
https://ipinfo.io/uQX
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33s
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
http://77.91.77.81/cost/lenin.exerracoi$
unknown
https://t.me/risepro_bots
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
104.26.4.15
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.81/cost/lenin.exe
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
ProgramId
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
FileId
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
LowerCaseLongPath
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
LongPathHash
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
Name
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
OriginalFileName
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
Publisher
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
Version
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
BinFileVersion
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
BinaryType
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
ProductName
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
ProductVersion
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
LinkDate
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
BinProductVersion
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
AppxPackageFullName
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
AppxPackageRelativeId
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
Size
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
Language
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\pno3otpyoa.exe|a47f143621250735
Usn
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{0ecbbb31-fce3-dea5-e200-5f96db751977}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
57C0000
heap
page read and write
malicious
57C0000
heap
page read and write
malicious
57C6000
heap
page read and write
malicious
F3A000
heap
page read and write
malicious
57C6000
heap
page read and write
malicious
57DE000
heap
page read and write
5BDE000
heap
page read and write
5C2B000
heap
page read and write
5822000
heap
page read and write
581C000
heap
page read and write
743000
unkown
page execute and read and write
57F0000
heap
page read and write
580E000
heap
page read and write
F0A000
heap
page read and write
5C2B000
heap
page read and write
D75000
heap
page read and write
5812000
heap
page read and write
E8A000
heap
page read and write
7B4000
unkown
page execute and read and write
57FC000
heap
page read and write
EF0000
direct allocation
page read and write
5D55000
heap
page read and write
5C6D000
heap
page read and write
582E000
heap
page read and write
5B5E000
heap
page read and write
5BEB000
heap
page read and write
5860000
heap
page read and write
585C000
heap
page read and write
5880000
heap
page read and write
5B60000
heap
page read and write
5837000
heap
page read and write
582B000
heap
page read and write
73D000
unkown
page execute and read and write
738000
unkown
page execute and read and write
776000
unkown
page execute and read and write
5823000
heap
page read and write
5C26000
heap
page read and write
400000
unkown
page readonly
5839000
heap
page read and write
400000
unkown
page readonly
4A02000
heap
page read and write
5C2B000
heap
page read and write
5809000
heap
page read and write
5803000
heap
page read and write
5812000
heap
page read and write
EB4000
heap
page read and write
57EB000
heap
page read and write
5812000
heap
page read and write
18E000
stack
page read and write
EF6000
heap
page read and write
757000
unkown
page execute and read and write
59C0000
trusted library allocation
page read and write
112F000
stack
page read and write
5A23000
heap
page read and write
DE5000
heap
page read and write
5BEF000
heap
page read and write
5829000
heap
page read and write
584C000
heap
page read and write
5C2B000
heap
page read and write
5C3B000
heap
page read and write
5834000
heap
page read and write
29AE000
stack
page read and write
E8B000
heap
page read and write
581D000
heap
page read and write
51C0000
remote allocation
page read and write
F16000
heap
page read and write
5814000
heap
page read and write
581A000
heap
page read and write
5824000
heap
page read and write
580C000
heap
page read and write
5C33000
heap
page read and write
5825000
heap
page read and write
5814000
heap
page read and write
5B40000
trusted library allocation
page read and write
5815000
heap
page read and write
5C2A000
heap
page read and write
57FF000
heap
page read and write
5BEE000
heap
page read and write
10BF000
stack
page read and write
73F000
unkown
page execute and read and write
5A21000
heap
page read and write
18E000
stack
page read and write
EEA000
heap
page read and write
5827000
heap
page read and write
582B000
heap
page read and write
19A000
stack
page read and write
58B0000
heap
page read and write
5811000
heap
page read and write
5880000
heap
page read and write
EDA000
heap
page read and write
778000
unkown
page execute and read and write
E03000
heap
page read and write
583C000
heap
page read and write
57FF000
heap
page read and write
57E8000
heap
page read and write
580D000
heap
page read and write
E02000
heap
page read and write
57EE000
heap
page read and write
4CEE000
stack
page read and write
5B65000
heap
page read and write
5F20000
trusted library allocation
page read and write
5851000
heap
page read and write
FBF000
stack
page read and write
580A000
heap
page read and write
5B40000
trusted library allocation
page read and write
5880000
heap
page read and write
ED4000
heap
page read and write
5968000
heap
page read and write
5B5B000
heap
page read and write
580A000
heap
page read and write
614E000
heap
page read and write
5880000
heap
page read and write
57E2000
heap
page read and write
E87000
heap
page read and write
4F6E000
stack
page read and write
595F000
heap
page read and write
73F000
unkown
page execute and read and write
5B50000
trusted library allocation
page read and write
5C21000
heap
page read and write
5CB6000
heap
page read and write
743000
unkown
page execute and read and write
5C02000
heap
page read and write
2890000
direct allocation
page read and write
741000
unkown
page execute and read and write
ECC000
heap
page read and write
2A40000
heap
page read and write
583B000
heap
page read and write
55D000
unkown
page readonly
780000
unkown
page execute and read and write
ED0000
heap
page read and write
585000
unkown
page write copy
5822000
heap
page read and write
57F1000
heap
page read and write
5880000
heap
page read and write
5B41000
heap
page read and write
E88000
heap
page read and write
5827000
heap
page read and write
57BE000
heap
page read and write
55D000
unkown
page readonly
5859000
heap
page read and write
566F000
stack
page read and write
CD0000
heap
page read and write
57EF000
heap
page read and write
7AC000
unkown
page execute and read and write
75E000
unkown
page execute and read and write
5824000
heap
page read and write
5C23000
heap
page read and write
5809000
heap
page read and write
9B2000
unkown
page execute read
5803000
heap
page read and write
EB4000
heap
page read and write
72E000
unkown
page execute and read and write
582F000
heap
page read and write
5814000
heap
page read and write
5812000
heap
page read and write
5812000
heap
page read and write
72E000
unkown
page execute and read and write
401000
unkown
page execute read
567F000
stack
page read and write
5804000
heap
page read and write
F67000
heap
page read and write
CF0000
direct allocation
page read and write
57C1000
heap
page read and write
4E4E000
stack
page read and write
5823000
heap
page read and write
5C3A000
heap
page read and write
5808000
heap
page read and write
E9E000
heap
page read and write
76E000
unkown
page execute and read and write
57FB000
heap
page read and write
5853000
heap
page read and write
5C2A000
heap
page read and write
581C000
heap
page read and write
5819000
heap
page read and write
5C4B000
heap
page read and write
582B000
heap
page read and write
5A11000
heap
page read and write
582F000
heap
page read and write
5B71000
heap
page read and write
5969000
heap
page read and write
5C61000
heap
page read and write
EF0000
direct allocation
page read and write
583C000
heap
page read and write
595A000
heap
page read and write
5C7E000
heap
page read and write
4DEF000
stack
page read and write
401000
unkown
page execute read
5C47000
heap
page read and write
5843000
heap
page read and write
57FD000
heap
page read and write
5B72000
heap
page read and write
5B50000
trusted library allocation
page read and write
E15000
heap
page read and write
5828000
heap
page read and write
58B2000
heap
page read and write
400000
unkown
page readonly
5868000
heap
page read and write
596000
unkown
page write copy
57F1000
heap
page read and write
C5A000
heap
page read and write
5850000
heap
page read and write
5813000
heap
page read and write
57FC000
heap
page read and write
9B2000
unkown
page execute read
5828000
heap
page read and write
5828000
heap
page read and write
DF8000
heap
page read and write
582E000
heap
page read and write
5809000
heap
page read and write
F24000
heap
page read and write
E82000
heap
page read and write
5818000
heap
page read and write
5C23000
heap
page read and write
5CA6000
heap
page read and write
FB9000
heap
page read and write
5880000
heap
page read and write
72C000
unkown
page execute and read and write
585000
unkown
page read and write
5880000
heap
page read and write
5C6A000
heap
page read and write
5B75000
heap
page read and write
5C2B000
heap
page read and write
581A000
heap
page read and write
5815000
heap
page read and write
F8B000
heap
page read and write
401000
unkown
page execute read
5B50000
trusted library allocation
page read and write
5812000
heap
page read and write
585C000
heap
page read and write
5809000
heap
page read and write
F32000
heap
page read and write
5CB7000
heap
page read and write
E89000
heap
page read and write
E88000
heap
page read and write
57EE000
heap
page read and write
57BF000
stack
page read and write
57F5000
heap
page read and write
4E2E000
stack
page read and write
5875000
heap
page read and write
5809000
heap
page read and write
5CA5000
heap
page read and write
72E000
unkown
page execute and read and write
582B000
heap
page read and write
5B40000
heap
page read and write
738000
unkown
page execute and read and write
2950000
heap
page read and write
741000
unkown
page execute and read and write
5960000
heap
page read and write
D65000
heap
page read and write
D10000
heap
page read and write
5815000
heap
page read and write
5B50000
trusted library allocation
page read and write
CB0000
direct allocation
page read and write
584F000
heap
page read and write
747000
unkown
page execute and read and write
5815000
heap
page read and write
72A000
unkown
page execute and read and write
5B57000
heap
page read and write
75E000
unkown
page execute and read and write
EE5000
heap
page read and write
EA7000
heap
page read and write
7B4000
unkown
page execute and read and write
57FC000
heap
page read and write
580F000
heap
page read and write
5803000
heap
page read and write
5C21000
heap
page read and write
5812000
heap
page read and write
FAB000
heap
page read and write
747000
unkown
page execute and read and write
EB4000
heap
page read and write
5C60000
heap
page read and write
2960000
heap
page read and write
5B53000
heap
page read and write
5BEE000
heap
page read and write
5C85000
heap
page read and write
57FF000
heap
page read and write
5858000
heap
page read and write
58A000
unkown
page readonly
749000
unkown
page execute and read and write
583C000
heap
page read and write
741000
unkown
page execute and read and write
77E000
unkown
page execute and read and write
5CB7000
heap
page read and write
401000
unkown
page execute read
29C0000
direct allocation
page read and write
580F000
heap
page read and write
5837000
heap
page read and write
57FC000
heap
page read and write
5824000
heap
page read and write
5800000
heap
page read and write
5BCE000
heap
page read and write
5966000
heap
page read and write
588D000
heap
page read and write
E0F000
heap
page read and write
580A000
heap
page read and write
7B1000
unkown
page execute and read and write
D60000
heap
page read and write
585E000
heap
page read and write
5803000
heap
page read and write
4F4F000
stack
page read and write
57F2000
heap
page read and write
5861000
heap
page read and write
5896000
heap
page read and write
9B2000
unkown
page execute read
5B50000
trusted library allocation
page read and write
580B000
heap
page read and write
77A000
unkown
page execute and read and write
5D43000
heap
page read and write
279E000
stack
page read and write
506D000
stack
page read and write
782000
unkown
page execute and read and write
75C000
unkown
page execute and read and write
57FC000
heap
page read and write
E89000
heap
page read and write
55D000
unkown
page readonly
5B51000
heap
page read and write
747000
unkown
page execute and read and write
595B000
heap
page read and write
508D000
stack
page read and write
57E8000
heap
page read and write
57FB000
heap
page read and write
5A27000
heap
page read and write
5964000
heap
page read and write
5CE3000
heap
page read and write
4F4F000
stack
page read and write
F7D000
heap
page read and write
76E000
unkown
page execute and read and write
5A28000
heap
page read and write
586E000
heap
page read and write
E8B000
heap
page read and write
5848000
heap
page read and write
596000
unkown
page write copy
757000
unkown
page execute and read and write
50CE000
stack
page read and write
5E20000
heap
page read and write
401000
unkown
page execute read
E8E000
heap
page read and write
5880000
heap
page read and write
5B50000
trusted library allocation
page read and write
29EE000
stack
page read and write
734000
unkown
page execute and read and write
5A1F000
heap
page read and write
EF0000
direct allocation
page read and write
5D41000
heap
page read and write
77A000
unkown
page execute and read and write
57EB000
heap
page read and write
5847000
heap
page read and write
F92000
heap
page read and write
DEB000
heap
page read and write
73D000
unkown
page execute and read and write
5815000
heap
page read and write
DD8000
heap
page read and write
581A000
heap
page read and write
5824000
heap
page read and write
5B50000
trusted library allocation
page read and write
583C000
heap
page read and write
CF0000
direct allocation
page read and write
5B40000
trusted library allocation
page read and write
4F2F000
stack
page read and write
782000
unkown
page execute and read and write
5BC4000
heap
page read and write
4CAE000
stack
page read and write
5818000
heap
page read and write
5B50000
trusted library allocation
page read and write
5850000
heap
page read and write
5812000
heap
page read and write
5B62000
heap
page read and write
584D000
heap
page read and write
5B40000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
EB4000
heap
page read and write
E93000
heap
page read and write
5BEA000
heap
page read and write
5D4B000
heap
page read and write
5C2A000
heap
page read and write
72C000
unkown
page execute and read and write
614A000
heap
page read and write
582F000
heap
page read and write
5BDD000
heap
page read and write
5868000
heap
page read and write
5C0B000
heap
page read and write
58A000
unkown
page readonly
5809000
heap
page read and write
4E0F000
stack
page read and write
5C2A000
heap
page read and write
C50000
heap
page read and write
583C000
heap
page read and write
F36000
heap
page read and write
C5E000
heap
page read and write
7B4000
unkown
page execute and read and write
4B19000
heap
page read and write
5B50000
trusted library allocation
page read and write
5B5F000
heap
page read and write
5C33000
heap
page read and write
5B51000
heap
page read and write
5C21000
heap
page read and write
5C23000
heap
page read and write
5874000
heap
page read and write
582B000
heap
page read and write
5BEA000
heap
page read and write
57FB000
heap
page read and write
580A000
heap
page read and write
5A2F000
heap
page read and write
50AE000
stack
page read and write
5821000
heap
page read and write
5853000
heap
page read and write
5B40000
trusted library allocation
page read and write
580A000
heap
page read and write
5816000
heap
page read and write
582A000
heap
page read and write
2960000
heap
page read and write
CD5000
heap
page read and write
F97000
heap
page read and write
57EE000
heap
page read and write
E28000
heap
page read and write
596F000
heap
page read and write
400000
unkown
page readonly
749000
unkown
page execute and read and write
5A2E000
heap
page read and write
582C000
heap
page read and write
E2B000
heap
page read and write
581B000
heap
page read and write
581A000
heap
page read and write
5822000
heap
page read and write
DC7000
heap
page read and write
401000
unkown
page execute read
9B2000
unkown
page execute read
EE0000
heap
page read and write
73D000
unkown
page execute and read and write
5809000
heap
page read and write
5BEF000
heap
page read and write
5818000
heap
page read and write
E82000
heap
page read and write
583A000
heap
page read and write
5BEA000
heap
page read and write
72A000
unkown
page execute and read and write
75C000
unkown
page execute and read and write
5814000
heap
page read and write
5880000
heap
page read and write
51CE000
stack
page read and write
F02000
heap
page read and write
583D000
heap
page read and write
585000
unkown
page read and write
EB3000
heap
page read and write
77E000
unkown
page execute and read and write
5870000
heap
page read and write
CA6000
heap
page read and write
788000
unkown
page execute and read and write
9B2000
unkown
page execute read
583B000
heap
page read and write
7AC000
unkown
page execute and read and write
582C000
heap
page read and write
734000
unkown
page execute and read and write
2890000
direct allocation
page read and write
5850000
heap
page read and write
E2E000
heap
page read and write
57B4000
heap
page read and write
5CBD000
heap
page read and write
5827000
heap
page read and write
EB4000
heap
page read and write
58C6000
heap
page read and write
5803000
heap
page read and write
F7B000
heap
page read and write
57F1000
heap
page read and write
596000
unkown
page write copy
580B000
heap
page read and write
5C57000
heap
page read and write
77C000
unkown
page execute and read and write
57FD000
heap
page read and write
581B000
heap
page read and write
5896000
heap
page read and write
57F5000
heap
page read and write
5840000
heap
page read and write
EAB000
heap
page read and write
5A11000
heap
page read and write
58C9000
heap
page read and write
4CEE000
stack
page read and write
580F000
heap
page read and write
5D5A000
heap
page read and write
2870000
direct allocation
page read and write
57C1000
heap
page read and write
582E000
heap
page read and write
57EE000
heap
page read and write
596A000
heap
page read and write
5814000
heap
page read and write
57F1000
heap
page read and write
5C21000
heap
page read and write
6145000
heap
page read and write
5BEF000
heap
page read and write
772000
unkown
page execute and read and write
EFA000
heap
page read and write
51D0000
remote allocation
page read and write
5CDF000
heap
page read and write
581A000
heap
page read and write
778000
unkown
page execute and read and write
581E000
heap
page read and write
9B000
stack
page read and write
5815000
heap
page read and write
E90000
heap
page read and write
5C5A000
heap
page read and write
759000
unkown
page execute and read and write
5826000
heap
page read and write
5803000
heap
page read and write
5804000
heap
page read and write
5831000
heap
page read and write
5C85000
heap
page read and write
5831000
heap
page read and write
585000
unkown
page read and write
580F000
heap
page read and write
E21000
heap
page read and write
9B2000
unkown
page execute read
5BEE000
heap
page read and write
5828000
heap
page read and write
73D000
unkown
page execute and read and write
5874000
heap
page read and write
582B000
heap
page read and write
57FC000
heap
page read and write
D5E000
stack
page read and write
F8A000
heap
page read and write
5803000
heap
page read and write
772000
unkown
page execute and read and write
5823000
heap
page read and write
5831000
heap
page read and write
5880000
heap
page read and write
EC8000
heap
page read and write
5C21000
heap
page read and write
5870000
heap
page read and write
E89000
heap
page read and write
57D0000
heap
page read and write
E87000
heap
page read and write
757000
unkown
page execute and read and write
C40000
heap
page read and write
4DEF000
stack
page read and write
E3B000
heap
page read and write
580A000
heap
page read and write
ED0000
direct allocation
page read and write
28C0000
direct allocation
page read and write
5C21000
heap
page read and write
5818000
heap
page read and write
5B98000
heap
page read and write
582F000
heap
page read and write
E08000
heap
page read and write
732000
unkown
page execute and read and write
58A000
unkown
page readonly
5A11000
heap
page read and write
57C6000
heap
page read and write
5BF0000
heap
page read and write
58A000
unkown
page readonly
5880000
heap
page read and write
2870000
heap
page read and write
5812000
heap
page read and write
580F000
heap
page read and write
57F0000
heap
page read and write
77A000
unkown
page execute and read and write
5B51000
heap
page read and write
E9E000
heap
page read and write
57FF000
heap
page read and write
5C39000
heap
page read and write
77A000
unkown
page execute and read and write
5896000
heap
page read and write
5821000
heap
page read and write
F98000
heap
page read and write
5B50000
trusted library allocation
page read and write
5962000
heap
page read and write
56BE000
stack
page read and write
56BE000
stack
page read and write
29F0000
heap
page read and write
EB4000
heap
page read and write
5831000
heap
page read and write
5832000
heap
page read and write
5BBE000
heap
page read and write
581A000
heap
page read and write
5A00000
trusted library allocation
page read and write
5812000
heap
page read and write
51AE000
stack
page read and write
5814000
heap
page read and write
585000
unkown
page write copy
5C24000
heap
page read and write
5812000
heap
page read and write
5832000
heap
page read and write
582A000
heap
page read and write
58A000
unkown
page readonly
51D0000
remote allocation
page read and write
582E000
heap
page read and write
5C61000
heap
page read and write
5C21000
heap
page read and write
1014000
heap
page read and write
581C000
heap
page read and write
5A23000
heap
page read and write
5814000
heap
page read and write
29EE000
stack
page read and write
5842000
heap
page read and write
51C0000
remote allocation
page read and write
5BEE000
heap
page read and write
51C0000
remote allocation
page read and write
581F000
heap
page read and write
DD2000
heap
page read and write
743000
unkown
page execute and read and write
E88000
heap
page read and write
5874000
heap
page read and write
580A000
heap
page read and write
5845000
heap
page read and write
CC2000
heap
page read and write
9B000
stack
page read and write
5D0D000
heap
page read and write
5824000
heap
page read and write
585000
unkown
page read and write
5BEE000
heap
page read and write
5BEA000
heap
page read and write
5880000
heap
page read and write
5F20000
trusted library allocation
page read and write
D3B000
heap
page read and write
5B40000
trusted library allocation
page read and write
E7E000
stack
page read and write
D15000
heap
page read and write
743000
unkown
page execute and read and write
5815000
heap
page read and write
595E000
heap
page read and write
5BEA000
heap
page read and write
5821000
heap
page read and write
5814000
heap
page read and write
5B51000
heap
page read and write
732000
unkown
page execute and read and write
9B000
stack
page read and write
782000
unkown
page execute and read and write
580B000
heap
page read and write
582B000
heap
page read and write
DE7000
heap
page read and write
9B2000
unkown
page execute read
57D0000
heap
page read and write
57FD000
heap
page read and write
596000
unkown
page read and write
D9A000
heap
page read and write
776000
unkown
page execute and read and write
5802000
heap
page read and write
E8A000
heap
page read and write
E85000
heap
page read and write
581A000
heap
page read and write
5B50000
heap
page read and write
5D17000
heap
page read and write
5B50000
trusted library allocation
page read and write
554E000
stack
page read and write
73F000
unkown
page execute and read and write
C40000
heap
page read and write
5814000
heap
page read and write
581A000
heap
page read and write
F38000
heap
page read and write
5A17000
heap
page read and write
5BEF000
heap
page read and write
77C000
unkown
page execute and read and write
C8D000
heap
page read and write
5824000
heap
page read and write
5B65000
heap
page read and write
DF1000
heap
page read and write
58CE000
heap
page read and write
5B40000
trusted library allocation
page read and write
51C0000
remote allocation
page read and write
5D51000
heap
page read and write
57C1000
heap
page read and write
7B4000
unkown
page execute and read and write
F90000
heap
page read and write
5863000
heap
page read and write
5836000
heap
page read and write
5819000
heap
page read and write
5874000
heap
page read and write
5818000
heap
page read and write
596000
unkown
page write copy
5803000
heap
page read and write
5BAB000
heap
page read and write
CC9000
heap
page read and write
582F000
heap
page read and write
E80000
heap
page read and write
5880000
heap
page read and write
76E000
unkown
page execute and read and write
5880000
heap
page read and write
5F20000
trusted library allocation
page read and write
EA5000
heap
page read and write
55D000
unkown
page readonly
772000
unkown
page execute and read and write
75C000
unkown
page execute and read and write
5C75000
heap
page read and write
CAA000
heap
page read and write
5812000
heap
page read and write
CA4000
heap
page read and write
72E000
unkown
page execute and read and write
741000
unkown
page execute and read and write
72C000
unkown
page execute and read and write
5B50000
trusted library allocation
page read and write
57FC000
heap
page read and write
58B3000
heap
page read and write
57AE000
stack
page read and write
108F000
stack
page read and write
400000
unkown
page readonly
5805000
heap
page read and write
581E000
heap
page read and write
580F000
heap
page read and write
5C32000
heap
page read and write
582A000
heap
page read and write
5B40000
trusted library allocation
page read and write
5CDB000
heap
page read and write
5805000
heap
page read and write
CDE000
stack
page read and write
7B1000
unkown
page execute and read and write
57F3000
heap
page read and write
5817000
heap
page read and write
57EB000
heap
page read and write
57E6000
heap
page read and write
57FB000
heap
page read and write
EB3000
heap
page read and write
57FB000
heap
page read and write
5974000
heap
page read and write
56BE000
stack
page read and write
57FD000
heap
page read and write
4BAE000
stack
page read and write
5814000
heap
page read and write
F2F000
heap
page read and write
582C000
heap
page read and write
EA7000
heap
page read and write
C9E000
stack
page read and write
5812000
heap
page read and write
5B54000
heap
page read and write
778000
unkown
page execute and read and write
51CD000
stack
page read and write
5896000
heap
page read and write
749000
unkown
page execute and read and write
583E000
heap
page read and write
757000
unkown
page execute and read and write
7B1000
unkown
page execute and read and write
D30000
heap
page read and write
58CB000
heap
page read and write
4CEE000
stack
page read and write
5808000
heap
page read and write
5823000
heap
page read and write
51D0000
remote allocation
page read and write
5B50000
trusted library allocation
page read and write
19A000
stack
page read and write
D05000
heap
page read and write
780000
unkown
page execute and read and write
D30000
direct allocation
page read and write
DB0000
direct allocation
page read and write
57F5000
heap
page read and write
5868000
heap
page read and write
58C0000
heap
page read and write
5B50000
trusted library allocation
page read and write
586D000
heap
page read and write
5C21000
heap
page read and write
DF0000
direct allocation
page read and write
5B72000
heap
page read and write
5B50000
trusted library allocation
page read and write
55D000
unkown
page readonly
5800000
heap
page read and write
77C000
unkown
page execute and read and write
5809000
heap
page read and write
5839000
heap
page read and write
5823000
heap
page read and write
5839000
heap
page read and write
5818000
heap
page read and write
EB6000
heap
page read and write
596000
unkown
page read and write
583B000
heap
page read and write
5C33000
heap
page read and write
5880000
heap
page read and write
4A5D000
heap
page read and write
5880000
heap
page read and write
CBA000
heap
page read and write
5880000
heap
page read and write
5B41000
heap
page read and write
19C000
stack
page read and write
EB4000
heap
page read and write
57E2000
heap
page read and write
581C000
heap
page read and write
CD7000
heap
page read and write
5BEF000
heap
page read and write
400000
unkown
page readonly
759000
unkown
page execute and read and write
5809000
heap
page read and write
5809000
heap
page read and write
57FC000
heap
page read and write
5CA6000
heap
page read and write
596B000
heap
page read and write
5B60000
heap
page read and write
584A000
heap
page read and write
5834000
heap
page read and write
596000
unkown
page read and write
5C33000
heap
page read and write
57CD000
heap
page read and write
5814000
heap
page read and write
5814000
heap
page read and write
5C13000
heap
page read and write
51AF000
stack
page read and write
57FC000
heap
page read and write
F8D000
heap
page read and write
580C000
heap
page read and write
5D46000
heap
page read and write
5829000
heap
page read and write
77C000
unkown
page execute and read and write
7AC000
unkown
page execute and read and write
C50000
heap
page read and write
5BEF000
heap
page read and write
5A15000
heap
page read and write
5863000
heap
page read and write
5828000
heap
page read and write
D9D000
heap
page read and write
5803000
heap
page read and write
57B4000
heap
page read and write
5812000
heap
page read and write
2A00000
direct allocation
page read and write
741000
unkown
page execute and read and write
57EE000
heap
page read and write
580F000
heap
page read and write
EA7000
heap
page read and write
2890000
direct allocation
page read and write
5BEA000
heap
page read and write
5880000
heap
page read and write
57EB000
heap
page read and write
F00000
heap
page read and write
5816000
heap
page read and write
5815000
heap
page read and write
596C000
heap
page read and write
782000
unkown
page execute and read and write
582F000
heap
page read and write
5B51000
heap
page read and write
5874000
heap
page read and write
DFC000
heap
page read and write
5831000
heap
page read and write
596000
unkown
page write copy
757000
unkown
page execute and read and write
5841000
heap
page read and write
5822000
heap
page read and write
75C000
unkown
page execute and read and write
736000
unkown
page execute and read and write
73D000
unkown
page execute and read and write
5830000
heap
page read and write
5814000
heap
page read and write
5822000
heap
page read and write
5B50000
trusted library allocation
page read and write
EB4000
heap
page read and write
E8E000
heap
page read and write
5802000
heap
page read and write
57FB000
heap
page read and write
5A21000
heap
page read and write
E87000
heap
page read and write
E33000
heap
page read and write
5CA6000
heap
page read and write
5860000
heap
page read and write
5827000
heap
page read and write
57E9000
heap
page read and write
5B50000
trusted library allocation
page read and write
C40000
heap
page read and write
738000
unkown
page execute and read and write
4F2E000
stack
page read and write
5BF5000
heap
page read and write
2960000
heap
page read and write
582B000
heap
page read and write
CD7000
heap
page read and write
596000
unkown
page read and write
5813000
heap
page read and write
5D5F000
heap
page read and write
583C000
heap
page read and write
788000
unkown
page execute and read and write
58A000
unkown
page readonly
77E000
unkown
page execute and read and write
72A000
unkown
page execute and read and write
5831000
heap
page read and write
29B0000
heap
page read and write
5B50000
trusted library allocation
page read and write
57F0000
heap
page read and write
5809000
heap
page read and write
4F8E000
stack
page read and write
5818000
heap
page read and write
5818000
heap
page read and write
555E000
stack
page read and write
564D000
stack
page read and write
5811000
heap
page read and write
5C95000
heap
page read and write
57F1000
heap
page read and write
5832000
heap
page read and write
583C000
heap
page read and write
76E000
unkown
page execute and read and write
5B98000
heap
page read and write
C40000
heap
page read and write
FC8000
heap
page read and write
5880000
heap
page read and write
580F000
heap
page read and write
582C000
heap
page read and write
5D52000
heap
page read and write
5848000
heap
page read and write
EEF000
heap
page read and write
5A02000
heap
page read and write
E7C000
heap
page read and write
CD5000
heap
page read and write
D50000
heap
page read and write
5A18000
heap
page read and write
580B000
heap
page read and write
780000
unkown
page execute and read and write
58B5000
heap
page read and write
5896000
heap
page read and write
5D40000
heap
page read and write
EA7000
heap
page read and write
58A000
unkown
page readonly
587C000
heap
page read and write
506E000
stack
page read and write
2970000
direct allocation
page read and write
EA7000
heap
page read and write
5E21000
heap
page read and write
5800000
heap
page read and write
5850000
heap
page read and write
556E000
stack
page read and write
D70000
heap
page read and write
DB0000
direct allocation
page read and write
5BF8000
heap
page read and write
57BE000
stack
page read and write
298E000
stack
page read and write
57FF000
heap
page read and write
F30000
heap
page read and write
5B40000
trusted library allocation
page read and write
F80000
heap
page read and write
5D4B000
heap
page read and write
E04000
heap
page read and write
5C95000
heap
page read and write
5B71000
heap
page read and write
51D0000
remote allocation
page read and write
583A000
heap
page read and write
5820000
heap
page read and write
5801000
heap
page read and write
5E21000
heap
page read and write
5809000
heap
page read and write
5C35000
heap
page read and write
EB3000
heap
page read and write
DCC000
heap
page read and write
5821000
heap
page read and write
5C21000
heap
page read and write
5880000
heap
page read and write
759000
unkown
page execute and read and write
58C1000
heap
page read and write
782000
unkown
page execute and read and write
C40000
heap
page read and write
C90000
heap
page read and write
DDC000
heap
page read and write
5C75000
heap
page read and write
585000
unkown
page read and write
5829000
heap
page read and write
5D27000
heap
page read and write
5C3A000
heap
page read and write
778000
unkown
page execute and read and write
5826000
heap
page read and write
5830000
heap
page read and write
5838000
heap
page read and write
5B68000
heap
page read and write
EA6000
heap
page read and write
57F1000
heap
page read and write
58C5000
heap
page read and write
E8E000
heap
page read and write
EA8000
heap
page read and write
582B000
heap
page read and write
E0A000
heap
page read and write
5880000
heap
page read and write
57F5000
heap
page read and write
57F1000
heap
page read and write
5A10000
heap
page read and write
5880000
heap
page read and write
57FB000
heap
page read and write
2A3E000
stack
page read and write
57F1000
heap
page read and write
9B2000
unkown
page execute read
4F8E000
stack
page read and write
5809000
heap
page read and write
580A000
heap
page read and write
581F000
heap
page read and write
F7F000
stack
page read and write
582B000
heap
page read and write
5A25000
heap
page read and write
5B51000
heap
page read and write
5809000
heap
page read and write
EB4000
heap
page read and write
5880000
heap
page read and write
5C58000
heap
page read and write
5BEA000
heap
page read and write
5823000
heap
page read and write
57F3000
heap
page read and write
5896000
heap
page read and write
57FD000
heap
page read and write
5B40000
trusted library allocation
page read and write
EA7000
heap
page read and write
581F000
heap
page read and write
DF6000
heap
page read and write
58BC000
heap
page read and write
DC0000
heap
page read and write
5805000
heap
page read and write
58A000
unkown
page readonly
5817000
heap
page read and write
5CDA000
heap
page read and write
9B2000
unkown
page execute read
5C6C000
heap
page read and write
580F000
heap
page read and write
598000
unkown
page execute and read and write
400000
unkown
page readonly
57E2000
heap
page read and write
5807000
heap
page read and write
5C57000
heap
page read and write
5822000
heap
page read and write
583B000
heap
page read and write
5827000
heap
page read and write
5815000
heap
page read and write
56AE000
stack
page read and write
5868000
heap
page read and write
5812000
heap
page read and write
5880000
heap
page read and write
5808000
heap
page read and write
580A000
heap
page read and write
5C21000
heap
page read and write
772000
unkown
page execute and read and write
5C2A000
heap
page read and write
5849000
heap
page read and write
5BE9000
heap
page read and write
19C000
stack
page read and write
5891000
heap
page read and write
598000
unkown
page execute and read and write
5809000
heap
page read and write
5880000
heap
page read and write
5C33000
heap
page read and write
400000
unkown
page readonly
57F5000
heap
page read and write
5838000
heap
page read and write
580F000
heap
page read and write
743000
unkown
page execute and read and write
732000
unkown
page execute and read and write
F38000
heap
page read and write
D30000
direct allocation
page read and write
298E000
stack
page read and write
5812000
heap
page read and write
581A000
heap
page read and write
50AE000
stack
page read and write
5803000
heap
page read and write
580A000
heap
page read and write
55D000
unkown
page readonly
4E2E000
stack
page read and write
EB4000
heap
page read and write
57FC000
heap
page read and write
57FC000
heap
page read and write
5828000
heap
page read and write
585000
unkown
page write copy
4A04000
heap
page read and write
772000
unkown
page execute and read and write
5C21000
heap
page read and write
C9B000
heap
page read and write
583B000
heap
page read and write
583C000
heap
page read and write
5B71000
heap
page read and write
58C1000
heap
page read and write
5880000
heap
page read and write
75C000
unkown
page execute and read and write
596000
unkown
page read and write
E08000
heap
page read and write
5814000
heap
page read and write
5F20000
trusted library allocation
page read and write
5952000
heap
page read and write
58A000
unkown
page readonly
5C8F000
heap
page read and write
EF8000
heap
page read and write
5A3E000
heap
page read and write
DFA000
heap
page read and write
581B000
heap
page read and write
51C0000
remote allocation
page read and write
582B000
heap
page read and write
565D000
stack
page read and write
583C000
heap
page read and write
57FF000
heap
page read and write
E20000
heap
page read and write
759000
unkown
page execute and read and write
580F000
heap
page read and write
5809000
heap
page read and write
5D58000
heap
page read and write
580B000
heap
page read and write
58CD000
heap
page read and write
57EE000
heap
page read and write
5BF7000
heap
page read and write
57CE000
heap
page read and write
5827000
heap
page read and write
749000
unkown
page execute and read and write
5824000
heap
page read and write
5822000
heap
page read and write
72E000
unkown
page execute and read and write
598000
unkown
page execute and read and write
745000
unkown
page execute and read and write
75E000
unkown
page execute and read and write
736000
unkown
page execute and read and write
5C20000
heap
page read and write
57FB000
heap
page read and write
D00000
heap
page read and write
5822000
heap
page read and write
738000
unkown
page execute and read and write
5880000
heap
page read and write
736000
unkown
page execute and read and write
5BDE000
heap
page read and write
5C21000
heap
page read and write
57FC000
heap
page read and write
585B000
heap
page read and write
5C2A000
heap
page read and write
584D000
heap
page read and write
57EE000
heap
page read and write
9B2000
unkown
page execute read
580A000
heap
page read and write
29FE000
stack
page read and write
4F6E000
stack
page read and write
E22000
heap
page read and write
77A000
unkown
page execute and read and write
77E000
unkown
page execute and read and write
57AF000
stack
page read and write
5D50000
trusted library allocation
page read and write
7B4000
unkown
page execute and read and write
5A28000
heap
page read and write
5834000
heap
page read and write
5820000
heap
page read and write
E89000
heap
page read and write
747000
unkown
page execute and read and write
5850000
heap
page read and write
58CA000
heap
page read and write
745000
unkown
page execute and read and write
5C2B000
heap
page read and write
401000
unkown
page execute read
5828000
heap
page read and write
580D000
heap
page read and write
77E000
unkown
page execute and read and write
788000
unkown
page execute and read and write
5803000
heap
page read and write
5824000
heap
page read and write
580F000
heap
page read and write
5824000
heap
page read and write
D10000
heap
page read and write
57D0000
heap
page read and write
C84000
heap
page read and write
5BEE000
heap
page read and write
2ACE000
stack
page read and write
759000
unkown
page execute and read and write
736000
unkown
page execute and read and write
CF0000
direct allocation
page read and write
5966000
heap
page read and write
CA2000
heap
page read and write
5880000
heap
page read and write
5B50000
trusted library allocation
page read and write
29F0000
heap
page read and write
EBE000
stack
page read and write
5B50000
trusted library allocation
page read and write
72A000
unkown
page execute and read and write
5823000
heap
page read and write
5BEF000
heap
page read and write
5822000
heap
page read and write
55D000
unkown
page readonly
5B41000
heap
page read and write
749000
unkown
page execute and read and write
5868000
heap
page read and write
5809000
heap
page read and write
5C2B000
heap
page read and write
5C37000
heap
page read and write
19A000
stack
page read and write
5823000
heap
page read and write
5A02000
heap
page read and write
C50000
heap
page read and write
5830000
heap
page read and write
584D000
heap
page read and write
5CA6000
heap
page read and write
4BF7000
heap
page read and write
5850000
heap
page read and write
581D000
heap
page read and write
2A8E000
stack
page read and write
E7C000
heap
page read and write
778000
unkown
page execute and read and write
5817000
heap
page read and write
582D000
heap
page read and write
401000
unkown
page execute read
57D7000
heap
page read and write
557E000
stack
page read and write
57FC000
heap
page read and write
557E000
stack
page read and write
745000
unkown
page execute and read and write
5818000
heap
page read and write
401000
unkown
page execute read
5825000
heap
page read and write
57E4000
heap
page read and write
400000
unkown
page readonly
497C000
heap
page read and write
5B41000
heap
page read and write
E89000
heap
page read and write
587C000
heap
page read and write
5B56000
heap
page read and write
73F000
unkown
page execute and read and write
5B40000
trusted library allocation
page read and write
F76000
heap
page read and write
5823000
heap
page read and write
50AE000
stack
page read and write
5C35000
heap
page read and write
5C4B000
heap
page read and write
580A000
heap
page read and write
E30000
heap
page read and write
4F2F000
stack
page read and write
5B41000
heap
page read and write
5BEA000
heap
page read and write
57EE000
heap
page read and write
CF0000
direct allocation
page read and write
5806000
heap
page read and write
E9A000
heap
page read and write
5C58000
heap
page read and write
5BF0000
heap
page read and write
5D17000
heap
page read and write
58B5000
heap
page read and write
E89000
heap
page read and write
5C75000
heap
page read and write
E8B000
heap
page read and write
5841000
heap
page read and write
5C85000
heap
page read and write
7B1000
unkown
page execute and read and write
581F000
heap
page read and write
75E000
unkown
page execute and read and write
57FC000
heap
page read and write
CF0000
heap
page read and write
57FC000
heap
page read and write
5956000
heap
page read and write
5C03000
heap
page read and write
745000
unkown
page execute and read and write
5828000
heap
page read and write
776000
unkown
page execute and read and write
5814000
heap
page read and write
EDE000
heap
page read and write
D90000
heap
page read and write
5BAB000
heap
page read and write
EB3000
heap
page read and write
5896000
heap
page read and write
115F000
stack
page read and write
583D000
heap
page read and write
F9F000
heap
page read and write
788000
unkown
page execute and read and write
738000
unkown
page execute and read and write
567F000
stack
page read and write
5C75000
heap
page read and write
EB4000
heap
page read and write
51D0000
remote allocation
page read and write
582D000
heap
page read and write
5B40000
trusted library allocation
page read and write
587C000
heap
page read and write
2A00000
direct allocation
page read and write
5850000
heap
page read and write
581A000
heap
page read and write
5B50000
trusted library allocation
page read and write
4BF8000
heap
page read and write
FBE000
stack
page read and write
57FD000
heap
page read and write
585000
unkown
page write copy
580B000
heap
page read and write
5802000
heap
page read and write
581F000
heap
page read and write
57FB000
heap
page read and write
586C000
heap
page read and write
F34000
heap
page read and write
732000
unkown
page execute and read and write
5838000
heap
page read and write
5B40000
trusted library allocation
page read and write
51D0000
remote allocation
page read and write
5801000
heap
page read and write
5818000
heap
page read and write
5822000
heap
page read and write
118F000
stack
page read and write
584C000
heap
page read and write
4D4E000
stack
page read and write
E88000
heap
page read and write
72C000
unkown
page execute and read and write
DFF000
heap
page read and write
CDE000
stack
page read and write
582D000
heap
page read and write
5C13000
heap
page read and write
582D000
heap
page read and write
9B000
stack
page read and write
57EB000
heap
page read and write
57EB000
heap
page read and write
4E4F000
stack
page read and write
5F20000
trusted library allocation
page read and write
5B51000
heap
page read and write
5BDE000
heap
page read and write
597D000
heap
page read and write
788000
unkown
page execute and read and write
55D000
unkown
page readonly
776000
unkown
page execute and read and write
105F000
stack
page read and write
57F2000
heap
page read and write
5809000
heap
page read and write
585E000
heap
page read and write
5814000
heap
page read and write
581D000
heap
page read and write
58C9000
heap
page read and write
51D0000
remote allocation
page read and write
581A000
heap
page read and write
DF0000
direct allocation
page read and write
51D0000
remote allocation
page read and write
5809000
heap
page read and write
5832000
heap
page read and write
583B000
heap
page read and write
5C75000
heap
page read and write
76E000
unkown
page execute and read and write
5C21000
heap
page read and write
5834000
heap
page read and write
EF0000
direct allocation
page read and write
582B000
heap
page read and write
D07000
heap
page read and write
51D0000
remote allocation
page read and write
DF0000
direct allocation
page read and write
5809000
heap
page read and write
580A000
heap
page read and write
5815000
heap
page read and write
55D000
unkown
page readonly
5B82000
heap
page read and write
5812000
heap
page read and write
58CA000
heap
page read and write
5F20000
trusted library allocation
page read and write
5824000
heap
page read and write
57BF000
stack
page read and write
780000
unkown
page execute and read and write
5C23000
heap
page read and write
5801000
heap
page read and write
580D000
heap
page read and write
582D000
heap
page read and write
581F000
heap
page read and write
28BF000
stack
page read and write
5B41000
heap
page read and write
5A18000
heap
page read and write
583A000
heap
page read and write
58B8000
heap
page read and write
DF0000
direct allocation
page read and write
732000
unkown
page execute and read and write
57E4000
heap
page read and write
5880000
heap
page read and write
D60000
heap
page read and write
2B00000
heap
page read and write
5C58000
heap
page read and write
5C23000
heap
page read and write
28C0000
direct allocation
page read and write
57E2000
heap
page read and write
580A000
heap
page read and write
5812000
heap
page read and write
5965000
heap
page read and write
5C21000
heap
page read and write
5C2A000
heap
page read and write
734000
unkown
page execute and read and write
736000
unkown
page execute and read and write
5C95000
heap
page read and write
582D000
heap
page read and write
598000
unkown
page execute and read and write
5809000
heap
page read and write
E7E000
stack
page read and write
5807000
heap
page read and write
5CB7000
heap
page read and write
DE0000
heap
page read and write
5E21000
heap
page read and write
747000
unkown
page execute and read and write
5BF7000
heap
page read and write
4E2E000
stack
page read and write
72A000
unkown
page execute and read and write
5880000
heap
page read and write
5B40000
trusted library allocation
page read and write
580A000
heap
page read and write
E0F000
heap
page read and write
5814000
heap
page read and write
72C000
unkown
page execute and read and write
27B0000
heap
page read and write
581A000
heap
page read and write
7AC000
unkown
page execute and read and write
5D17000
heap
page read and write
29AE000
stack
page read and write
7B1000
unkown
page execute and read and write
585C000
heap
page read and write
582B000
heap
page read and write
18E000
stack
page read and write
F70000
heap
page read and write
5868000
heap
page read and write
57F0000
heap
page read and write
5818000
heap
page read and write
EB4000
heap
page read and write
5800000
heap
page read and write
5824000
heap
page read and write
5812000
heap
page read and write
75E000
unkown
page execute and read and write
5B41000
heap
page read and write
5860000
heap
page read and write
585000
unkown
page write copy
580F000
heap
page read and write
583C000
heap
page read and write
5C2A000
heap
page read and write
5B51000
heap
page read and write
582B000
heap
page read and write
58A000
unkown
page readonly
CB0000
heap
page read and write
5803000
heap
page read and write
585A000
heap
page read and write
5B50000
trusted library allocation
page read and write
5824000
heap
page read and write
56AE000
stack
page read and write
734000
unkown
page execute and read and write
5803000
heap
page read and write
5829000
heap
page read and write
5818000
heap
page read and write
5D5A000
heap
page read and write
57F1000
heap
page read and write
D17000
heap
page read and write
C91000
heap
page read and write
5828000
heap
page read and write
734000
unkown
page execute and read and write
5C43000
heap
page read and write
E89000
heap
page read and write
58C7000
heap
page read and write
776000
unkown
page execute and read and write
5880000
heap
page read and write
5CA3000
heap
page read and write
5804000
heap
page read and write
5818000
heap
page read and write
5880000
heap
page read and write
57F3000
heap
page read and write
5812000
heap
page read and write
5C14000
heap
page read and write
5D17000
heap
page read and write
51AD000
stack
page read and write
57FC000
heap
page read and write
5BEA000
heap
page read and write
5809000
heap
page read and write
5BEA000
heap
page read and write
CBC000
heap
page read and write
57FD000
heap
page read and write
5827000
heap
page read and write
5C3B000
heap
page read and write
400000
unkown
page readonly
9B000
stack
page read and write
5CDF000
heap
page read and write
5809000
heap
page read and write
51C0000
remote allocation
page read and write
582F000
heap
page read and write
57D8000
heap
page read and write
57F5000
heap
page read and write
57F1000
heap
page read and write
5870000
heap
page read and write
745000
unkown
page execute and read and write
57FB000
heap
page read and write
5880000
heap
page read and write
EA5000
heap
page read and write
5B50000
trusted library allocation
page read and write
F8A000
heap
page read and write
580F000
heap
page read and write
4DEF000
stack
page read and write
28C0000
direct allocation
page read and write
583C000
heap
page read and write
5B41000
heap
page read and write
F8B000
heap
page read and write
5C7E000
heap
page read and write
5BEF000
heap
page read and write
5811000
heap
page read and write
ED0000
heap
page read and write
5BEB000
heap
page read and write
55D000
unkown
page readonly
58CC000
heap
page read and write
5A19000
heap
page read and write
598000
unkown
page execute and read and write
2890000
direct allocation
page read and write
5880000
heap
page read and write
F74000
heap
page read and write
EE3000
heap
page read and write
EA7000
heap
page read and write
5952000
heap
page read and write
58CC000
heap
page read and write
58C5000
heap
page read and write
5804000
heap
page read and write
F62000
heap
page read and write
401000
unkown
page execute read
5CB8000
heap
page read and write
5835000
heap
page read and write
57DF000
heap
page read and write
CD7000
heap
page read and write
5B40000
trusted library allocation
page read and write
5C2C000
heap
page read and write
7AC000
unkown
page execute and read and write
581F000
heap
page read and write
508D000
stack
page read and write
583C000
heap
page read and write
EA5000
heap
page read and write
57FD000
heap
page read and write
C9E000
stack
page read and write
57B0000
heap
page read and write
5B51000
heap
page read and write
5CBD000
heap
page read and write
5823000
heap
page read and write
5B5D000
heap
page read and write
506D000
stack
page read and write
C8E000
stack
page read and write
50CE000
stack
page read and write
580F000
heap
page read and write
77C000
unkown
page execute and read and write
5B41000
heap
page read and write
582B000
heap
page read and write
5832000
heap
page read and write
780000
unkown
page execute and read and write
580D000
heap
page read and write
5829000
heap
page read and write
5809000
heap
page read and write
5C13000
heap
page read and write
73F000
unkown
page execute and read and write
4F6E000
stack
page read and write
5C75000
heap
page read and write
There are 1493 hidden memdumps, click here to show them.