IOC Report
plTAoSCew2.exe

loading gif

Files

File Path
Type
Category
Malicious
plTAoSCew2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_plTAoSCew2.exe_b578f245089fdb92c49ca29b61d78b5de94bd_4cd93bc8_d4836472-6356-48f9-9aaa-e95ab3a9b742\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\RRyR9q5fccm7OnjvPC2dXYR.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\i6XbcxN8dLmuU_sWPwGcEWP.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_35771a6693d2f9ed017f28b56de9aedffce803d_f4fd270f_51467a9a-3e89-495a-973b-ac70eee27268\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_35771a6693d2f9ed017f28b56de9aedffce803d_f4fd270f_e476fb89-b538-4349-955e-cbfc95808757\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D82.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 21:37:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3013.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3052.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3774.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 21:37:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER393A.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 21:37:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39F6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3A26.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3A63.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AC2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\CtJlzgnN12ymWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\EioxHbeh0kFpLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\JaptwNSGRKkjHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\LziObAp_xQYkWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\NyfGPm9JO5aHLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\QrwWp85edTOGWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\RYPsmo4mFY2aHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\cfLC6XtY7TPDHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\lYr9Rb7gll4tLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\lbl9TK4Z2XphWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\mzHFeshqUZ3VWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\rezvwwxF677yCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\wjDnbZn87O29Web Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span46Z3XSirMLZy\x2c20gF0jhVeHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\1lz2X_hnlF_eWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\A7WIY3rXdqseWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\BCrFKBgDjUtEWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\BXcENIBcAk_THistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\CVJRxkpfLg0jLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\K1yVDI_8n9leCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\O360yHtwBjGMHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\Un_yyl_MyyCnWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\iNhzurVyetV1Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\sxoey4yhYvwRHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\t2IZA4tw1EDpLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\tJraVEZ3gCYZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\u2IKyytiUcYXWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanDo7faKvaMiW4\xKOuSFGt78HrLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixy46Z3XSirMLZy\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy46Z3XSirMLZy\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy46Z3XSirMLZy\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyDo7faKvaMiW4\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyDo7faKvaMiW4\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyDo7faKvaMiW4\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\plTAoSCew2.exe
"C:\Users\user\Desktop\plTAoSCew2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 1920
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 1876
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6288 -s 1744
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
unknown
malicious
http://77.91.77.81/mine/amadka.exe.1
unknown
malicious
https://db-ip.com:443/demo/home.php?s=8.46.123.33J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://t.me/risepro_botJ
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
https://ipinfo.io/widget/demo/8.46.123.33P
unknown
https://db-ip.com/
unknown
https://t.me/risepro_botQB
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33U
unknown
https://t.me/risepro_botX
unknown
https://t.me/risepro
unknown
https://t.me/RiseProSUPPORTZ
unknown
https://ipinfo.io/Wp
unknown
https://ipinfo.io/widget/demo/8.46.123.33e
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://ipinfo.io/p
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://77.91.77.81/cost/go.exeP
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://db-ip.com/6
unknown
https://ipinfo.io/t
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
https://ipinfo.io/widget/demo/8.46.123.33o
unknown
https://t.me/risepro_botisepro_bot
unknown
https://ipinfo.io/widget/demo/8.46.123.33V0
unknown
https://t.me/risepro_bot.46.123.33
unknown
https://t.me/RiseProSUPPORT4
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33XB
unknown
http://77.91.77.81/cost/lenin.exeisepro_bot
unknown
http://microsoft.co
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://t.H
unknown
https://www.ecosia.org/newtab/
unknown
https://db-ip.com/i
unknown
https://ipinfo.io/Mozilla/5.0
unknown
http://77.91.77.81/cost/lenin.exe963
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33tA
unknown
https://ipinfo.io/
34.117.186.192
https://db-ip.com/z
unknown
http://77.91.77.81/cost/lenin.exe00.1
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com/u
unknown
https://t.5F
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
104.26.5.15
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/Grr
unknown
http://77.91.77.81/cost/lenin.exe
unknown
https://t.me/RiseProSUPPORT-n
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
ProgramId
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
FileId
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
LowerCaseLongPath
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
LongPathHash
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
Name
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
OriginalFileName
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
Publisher
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
Version
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
BinFileVersion
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
BinaryType
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
ProductName
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
ProductVersion
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
LinkDate
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
BinProductVersion
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
AppxPackageFullName
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
AppxPackageRelativeId
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
Size
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
Language
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\pltaoscew2.exe|be19dcf3511862b8
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{354ac268-0e16-a3c5-e667-b1db5e3d2cad}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
There are 41 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F1E000
heap
page read and write
malicious
57EE000
heap
page read and write
malicious
56E4000
heap
page read and write
malicious
56E3000
heap
page read and write
malicious
56E3000
heap
page read and write
malicious
57EE000
heap
page read and write
malicious
D26000
heap
page read and write
malicious
56E4000
heap
page read and write
malicious
568C000
heap
page read and write
malicious
56E3000
heap
page read and write
malicious
E0E000
stack
page read and write
56CE000
stack
page read and write
56AB000
heap
page read and write
56D9000
heap
page read and write
585000
unkown
page write copy
57F5000
heap
page read and write
5836000
heap
page read and write
57E4000
heap
page read and write
D60000
heap
page read and write
570B000
heap
page read and write
583D000
heap
page read and write
581F000
heap
page read and write
102E000
heap
page read and write
4A45000
heap
page read and write
56FA000
heap
page read and write
4E9D000
stack
page read and write
596000
unkown
page read and write
4D2E000
stack
page read and write
55D000
unkown
page readonly
CDA000
heap
page read and write
2A50000
heap
page read and write
509F000
stack
page read and write
51DF000
stack
page read and write
57EE000
heap
page read and write
57D1000
heap
page read and write
5836000
heap
page read and write
585000
unkown
page read and write
5739000
heap
page read and write
28B0000
direct allocation
page read and write
D24000
heap
page read and write
5850000
heap
page read and write
5E31000
heap
page read and write
57DB000
heap
page read and write
56F4000
heap
page read and write
56D9000
heap
page read and write
56C1000
heap
page read and write
CC1000
heap
page read and write
5836000
heap
page read and write
5B10000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5870000
heap
page read and write
9B000
stack
page read and write
19C000
stack
page read and write
585000
unkown
page read and write
2962000
heap
page read and write
5851000
heap
page read and write
5833000
heap
page read and write
56C1000
heap
page read and write
588C000
heap
page read and write
1009000
heap
page read and write
4F8E000
stack
page read and write
584D000
heap
page read and write
5B10000
trusted library allocation
page read and write
FF8000
heap
page read and write
1020000
heap
page read and write
D6D000
heap
page read and write
FFA000
heap
page read and write
CC6000
heap
page read and write
7E2000
unkown
page execute and read and write
CBE000
stack
page read and write
5719000
heap
page read and write
DDE000
stack
page read and write
570F000
heap
page read and write
F5B000
heap
page read and write
107D000
heap
page read and write
DAA000
heap
page read and write
1033000
heap
page read and write
570C000
heap
page read and write
51D0000
remote allocation
page read and write
5878000
heap
page read and write
D18000
heap
page read and write
F64000
heap
page read and write
56AB000
heap
page read and write
5B10000
trusted library allocation
page read and write
5831000
heap
page read and write
C70000
heap
page read and write
56D7000
heap
page read and write
56E8000
heap
page read and write
57D9000
heap
page read and write
4FAE000
stack
page read and write
1004000
heap
page read and write
57F5000
heap
page read and write
D2F000
heap
page read and write
56BD000
heap
page read and write
5835000
heap
page read and write
56C2000
heap
page read and write
56CE000
stack
page read and write
5708000
heap
page read and write
5841000
heap
page read and write
5B50000
trusted library allocation
page read and write
299E000
stack
page read and write
5870000
heap
page read and write
55D000
unkown
page readonly
567F000
stack
page read and write
C97000
heap
page read and write
F8A000
heap
page read and write
56D9000
heap
page read and write
5812000
heap
page read and write
582B000
heap
page read and write
29EE000
stack
page read and write
10B9000
heap
page read and write
9B2000
unkown
page execute read
57F8000
heap
page read and write
581F000
heap
page read and write
5841000
heap
page read and write
56D7000
heap
page read and write
5712000
heap
page read and write
2963000
heap
page read and write
5729000
heap
page read and write
D32000
heap
page read and write
1001000
heap
page read and write
F51000
heap
page read and write
5885000
heap
page read and write
56D5000
heap
page read and write
D25000
heap
page read and write
57EE000
heap
page read and write
1007000
heap
page read and write
5831000
heap
page read and write
28B0000
direct allocation
page read and write
582F000
heap
page read and write
5860000
heap
page read and write
18E000
stack
page read and write
1002000
heap
page read and write
585000
unkown
page write copy
5824000
heap
page read and write
56F7000
heap
page read and write
5838000
heap
page read and write
1007000
heap
page read and write
DE5000
heap
page read and write
2AAE000
stack
page read and write
5859000
heap
page read and write
19C000
stack
page read and write
57C0000
heap
page read and write
5801000
heap
page read and write
5B50000
trusted library allocation
page read and write
1009000
heap
page read and write
DBA000
heap
page read and write
29AE000
stack
page read and write
F6A000
heap
page read and write
5B60000
trusted library allocation
page read and write
57F3000
heap
page read and write
FE5000
heap
page read and write
57DC000
heap
page read and write
EF0000
heap
page read and write
583D000
heap
page read and write
5832000
heap
page read and write
5884000
heap
page read and write
102F000
stack
page read and write
5825000
heap
page read and write
D83000
heap
page read and write
56E8000
heap
page read and write
5821000
heap
page read and write
5835000
heap
page read and write
582F000
heap
page read and write
1005000
heap
page read and write
596000
unkown
page read and write
2AD0000
remote allocation
page read and write
5B60000
trusted library allocation
page read and write
585000
unkown
page write copy
28D0000
heap
page read and write
7BB000
unkown
page execute and read and write
56D9000
heap
page read and write
5838000
heap
page read and write
5801000
heap
page read and write
F10000
direct allocation
page read and write
2A60000
direct allocation
page read and write
50EE000
stack
page read and write
29E0000
heap
page read and write
28E0000
direct allocation
page read and write
FA0000
heap
page read and write
56E0000
heap
page read and write
5739000
heap
page read and write
585A000
heap
page read and write
58D1000
heap
page read and write
56CB000
heap
page read and write
1010000
heap
page read and write
56E8000
heap
page read and write
57DA000
heap
page read and write
57DC000
heap
page read and write
57F5000
heap
page read and write
5824000
heap
page read and write
4F5D000
stack
page read and write
56EE000
heap
page read and write
5806000
heap
page read and write
51DF000
stack
page read and write
4F6E000
stack
page read and write
5801000
heap
page read and write
296F000
stack
page read and write
506F000
stack
page read and write
D40000
heap
page read and write
56FA000
heap
page read and write
1007000
heap
page read and write
55D000
unkown
page readonly
56E8000
heap
page read and write
580D000
heap
page read and write
5830000
heap
page read and write
5B60000
trusted library allocation
page read and write
D30000
heap
page read and write
5719000
heap
page read and write
7BB000
unkown
page execute and read and write
57D9000
heap
page read and write
5849000
heap
page read and write
5813000
heap
page read and write
E25000
heap
page read and write
51AF000
stack
page read and write
5837000
heap
page read and write
5813000
heap
page read and write
5811000
heap
page read and write
57E4000
heap
page read and write
56FA000
heap
page read and write
5884000
heap
page read and write
401000
unkown
page execute read
56CB000
heap
page read and write
DD8000
heap
page read and write
C70000
heap
page read and write
5B50000
trusted library allocation
page read and write
51D0000
remote allocation
page read and write
5836000
heap
page read and write
56DC000
heap
page read and write
DB0000
heap
page read and write
56E0000
heap
page read and write
5832000
heap
page read and write
5836000
heap
page read and write
5811000
heap
page read and write
5836000
heap
page read and write
583C000
heap
page read and write
2A10000
heap
page read and write
5839000
heap
page read and write
5B50000
trusted library allocation
page read and write
D35000
heap
page read and write
E08000
heap
page read and write
5853000
heap
page read and write
56EE000
heap
page read and write
1009000
heap
page read and write
5B60000
trusted library allocation
page read and write
582F000
heap
page read and write
401000
unkown
page execute read
57F5000
heap
page read and write
56D5000
heap
page read and write
5856000
heap
page read and write
56D5000
heap
page read and write
9B000
stack
page read and write
56AB000
heap
page read and write
4D5E000
stack
page read and write
7BD000
unkown
page execute and read and write
596000
unkown
page write copy
D10000
direct allocation
page read and write
7EF000
unkown
page execute and read and write
F7A000
heap
page read and write
56C1000
heap
page read and write
56FD000
heap
page read and write
DE5000
heap
page read and write
56ED000
heap
page read and write
5824000
heap
page read and write
299E000
stack
page read and write
56D5000
heap
page read and write
57DF000
heap
page read and write
5B10000
trusted library allocation
page read and write
DAE000
heap
page read and write
56EE000
heap
page read and write
4A20000
heap
page read and write
28B0000
direct allocation
page read and write
5836000
heap
page read and write
2A90000
remote allocation
page read and write
5811000
heap
page read and write
5B10000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
28D0000
direct allocation
page read and write
E25000
heap
page read and write
587C000
heap
page read and write
57D8000
heap
page read and write
5860000
heap
page read and write
57D9000
heap
page read and write
F82000
heap
page read and write
51D0000
remote allocation
page read and write
5811000
heap
page read and write
101A000
heap
page read and write
4D0E000
stack
page read and write
5858000
heap
page read and write
F10000
direct allocation
page read and write
5860000
heap
page read and write
5820000
heap
page read and write
DA0000
heap
page read and write
585B000
heap
page read and write
5680000
heap
page read and write
570C000
heap
page read and write
5838000
heap
page read and write
5878000
heap
page read and write
DE0000
direct allocation
page read and write
582C000
heap
page read and write
401000
unkown
page execute read
573E000
heap
page read and write
56AB000
heap
page read and write
5801000
heap
page read and write
58A000
unkown
page readonly
D85000
heap
page read and write
DC9000
heap
page read and write
56ED000
heap
page read and write
EEF000
stack
page read and write
5836000
heap
page read and write
5812000
heap
page read and write
56BF000
heap
page read and write
DFC000
heap
page read and write
56D7000
heap
page read and write
19A000
stack
page read and write
FD7000
heap
page read and write
CFE000
stack
page read and write
F4D000
heap
page read and write
57EE000
heap
page read and write
583E000
heap
page read and write
583F000
heap
page read and write
401000
unkown
page execute read
596000
unkown
page read and write
51EF000
stack
page read and write
5706000
heap
page read and write
5853000
heap
page read and write
583D000
heap
page read and write
E06000
heap
page read and write
51D0000
remote allocation
page read and write
57F1000
heap
page read and write
584A000
heap
page read and write
5715000
heap
page read and write
5835000
heap
page read and write
5695000
heap
page read and write
5B10000
trusted library allocation
page read and write
E27000
heap
page read and write
5817000
heap
page read and write
9B2000
unkown
page execute read
E10000
direct allocation
page read and write
4AB5000
heap
page read and write
580E000
heap
page read and write
5B60000
trusted library allocation
page read and write
29AE000
stack
page read and write
50CE000
stack
page read and write
5800000
heap
page read and write
57DB000
heap
page read and write
9B2000
unkown
page execute read
5E31000
heap
page read and write
5813000
heap
page read and write
5821000
heap
page read and write
D10000
direct allocation
page read and write
C60000
heap
page read and write
5813000
heap
page read and write
57D3000
heap
page read and write
5818000
heap
page read and write
F8E000
heap
page read and write
5813000
heap
page read and write
55D000
unkown
page readonly
DA4000
heap
page read and write
1007000
heap
page read and write
558E000
stack
page read and write
568C000
heap
page read and write
5811000
heap
page read and write
5808000
heap
page read and write
5855000
heap
page read and write
5B60000
trusted library allocation
page read and write
9B2000
unkown
page execute read
582B000
heap
page read and write
401000
unkown
page execute read
E27000
heap
page read and write
56DB000
heap
page read and write
5848000
heap
page read and write
E00000
direct allocation
page read and write
58A000
unkown
page readonly
5835000
heap
page read and write
400000
unkown
page readonly
29DE000
stack
page read and write
5846000
heap
page read and write
FFF000
stack
page read and write
104D000
heap
page read and write
5B60000
trusted library allocation
page read and write
571C000
heap
page read and write
C60000
heap
page read and write
1018000
heap
page read and write
5B50000
trusted library allocation
page read and write
D7E000
stack
page read and write
51D0000
remote allocation
page read and write
28E0000
direct allocation
page read and write
5C31000
heap
page read and write
7BB000
unkown
page execute and read and write
59D0000
trusted library allocation
page read and write
400000
unkown
page readonly
7EF000
unkown
page execute and read and write
DCB000
heap
page read and write
570A000
heap
page read and write
4E0D000
stack
page read and write
1009000
heap
page read and write
583A000
heap
page read and write
584E000
heap
page read and write
583F000
heap
page read and write
56AC000
heap
page read and write
5811000
heap
page read and write
400000
unkown
page readonly
1041000
heap
page read and write
583A000
heap
page read and write
57E7000
heap
page read and write
5825000
heap
page read and write
57EE000
heap
page read and write
56EE000
heap
page read and write
598000
unkown
page execute and read and write
596000
unkown
page read and write
57D5000
heap
page read and write
5850000
heap
page read and write
7BB000
unkown
page execute and read and write
5832000
heap
page read and write
5843000
heap
page read and write
55D000
unkown
page readonly
5721000
heap
page read and write
5836000
heap
page read and write
EF0000
direct allocation
page read and write
581C000
heap
page read and write
5821000
heap
page read and write
56EE000
heap
page read and write
5711000
heap
page read and write
4F6E000
stack
page read and write
CFE000
heap
page read and write
19A000
stack
page read and write
509F000
stack
page read and write
5B60000
trusted library allocation
page read and write
5801000
heap
page read and write
5707000
heap
page read and write
CF7000
heap
page read and write
CCF000
heap
page read and write
5869000
heap
page read and write
572A000
heap
page read and write
5811000
heap
page read and write
5B10000
trusted library allocation
page read and write
584A000
heap
page read and write
F30000
direct allocation
page read and write
5B60000
trusted library allocation
page read and write
5813000
heap
page read and write
56F8000
heap
page read and write
29AE000
stack
page read and write
F0F000
stack
page read and write
56CB000
heap
page read and write
58A000
unkown
page readonly
56F7000
heap
page read and write
5821000
heap
page read and write
CDF000
heap
page read and write
5B50000
trusted library allocation
page read and write
5838000
heap
page read and write
1031000
heap
page read and write
50AF000
stack
page read and write
5860000
heap
page read and write
C90000
heap
page read and write
56F8000
heap
page read and write
401000
unkown
page execute read
5706000
heap
page read and write
56E0000
heap
page read and write
583F000
heap
page read and write
2AD0000
remote allocation
page read and write
57F5000
heap
page read and write
D80000
heap
page read and write
18E000
stack
page read and write
557E000
stack
page read and write
567F000
stack
page read and write
570B000
heap
page read and write
584D000
heap
page read and write
7BD000
unkown
page execute and read and write
400000
unkown
page readonly
56E8000
heap
page read and write
5A10000
heap
page read and write
5837000
heap
page read and write
5841000
heap
page read and write
5811000
heap
page read and write
DE0000
heap
page read and write
5815000
heap
page read and write
D8E000
stack
page read and write
4E4E000
stack
page read and write
401000
unkown
page execute read
D2F000
heap
page read and write
587D000
heap
page read and write
5849000
heap
page read and write
56F9000
heap
page read and write
5B10000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
58A000
unkown
page readonly
5B50000
trusted library allocation
page read and write
D20000
heap
page read and write
56ED000
heap
page read and write
FEA000
heap
page read and write
29DE000
stack
page read and write
56DB000
heap
page read and write
100D000
heap
page read and write
596000
unkown
page write copy
1009000
heap
page read and write
D10000
heap
page read and write
5839000
heap
page read and write
2A2E000
stack
page read and write
29EE000
stack
page read and write
56FF000
heap
page read and write
568F000
stack
page read and write
57CF000
stack
page read and write
2AD0000
remote allocation
page read and write
1061000
heap
page read and write
DB5000
heap
page read and write
2A90000
remote allocation
page read and write
583C000
heap
page read and write
5850000
heap
page read and write
5833000
heap
page read and write
56F7000
heap
page read and write
5838000
heap
page read and write
55D000
unkown
page readonly
7E2000
unkown
page execute and read and write
508F000
stack
page read and write
5700000
heap
page read and write
1030000
heap
page read and write
56E8000
heap
page read and write
9B000
stack
page read and write
5880000
heap
page read and write
585000
unkown
page read and write
5884000
heap
page read and write
56EC000
heap
page read and write
5833000
heap
page read and write
51E0000
remote allocation
page read and write
E10000
direct allocation
page read and write
2A1E000
stack
page read and write
2A8E000
stack
page read and write
FF5000
heap
page read and write
598000
unkown
page execute and read and write
596000
unkown
page read and write
5869000
heap
page read and write
110F000
stack
page read and write
4E5D000
stack
page read and write
596000
unkown
page write copy
5B10000
trusted library allocation
page read and write
56C2000
heap
page read and write
55D000
unkown
page readonly
5E30000
heap
page read and write
C60000
heap
page read and write
5801000
heap
page read and write
57F5000
heap
page read and write
F5F000
heap
page read and write
56F2000
heap
page read and write
D85000
heap
page read and write
5880000
heap
page read and write
5838000
heap
page read and write
5858000
heap
page read and write
585000
unkown
page read and write
58A000
unkown
page readonly
5702000
heap
page read and write
5843000
heap
page read and write
58A000
unkown
page readonly
56EE000
heap
page read and write
57D8000
heap
page read and write
5860000
heap
page read and write
58A000
unkown
page readonly
F10000
direct allocation
page read and write
2AE0000
heap
page read and write
106F000
heap
page read and write
57DB000
heap
page read and write
D86000
heap
page read and write
5801000
heap
page read and write
400000
unkown
page readonly
5871000
heap
page read and write
2A2E000
stack
page read and write
51E0000
remote allocation
page read and write
583A000
heap
page read and write
5839000
heap
page read and write
580B000
heap
page read and write
5B60000
trusted library allocation
page read and write
D30000
heap
page read and write
583C000
heap
page read and write
5B50000
trusted library allocation
page read and write
5846000
heap
page read and write
56FF000
heap
page read and write
582B000
heap
page read and write
1006000
heap
page read and write
CFE000
stack
page read and write
5838000
heap
page read and write
56C3000
heap
page read and write
F82000
heap
page read and write
56D7000
heap
page read and write
5836000
heap
page read and write
5884000
heap
page read and write
D10000
direct allocation
page read and write
F10000
direct allocation
page read and write
584E000
heap
page read and write
5836000
heap
page read and write
1026000
heap
page read and write
401000
unkown
page execute read
585000
unkown
page read and write
56D5000
heap
page read and write
DE0000
heap
page read and write
598000
unkown
page execute and read and write
567F000
stack
page read and write
56C1000
heap
page read and write
FD8000
heap
page read and write
568F000
stack
page read and write
5830000
heap
page read and write
56F2000
heap
page read and write
5812000
heap
page read and write
7BD000
unkown
page execute and read and write
50DE000
stack
page read and write
57E7000
heap
page read and write
5859000
heap
page read and write
598000
unkown
page execute and read and write
5836000
heap
page read and write
5801000
heap
page read and write
573D000
heap
page read and write
5839000
heap
page read and write
5836000
heap
page read and write
596000
unkown
page write copy
1001000
heap
page read and write
5836000
heap
page read and write
1007000
heap
page read and write
1002000
heap
page read and write
50AE000
stack
page read and write
5850000
heap
page read and write
5884000
heap
page read and write
587E000
heap
page read and write
7EF000
unkown
page execute and read and write
5851000
heap
page read and write
588C000
heap
page read and write
9B2000
unkown
page execute read
2A30000
heap
page read and write
56D5000
heap
page read and write
5B10000
trusted library allocation
page read and write
D36000
heap
page read and write
57DB000
heap
page read and write
5B50000
trusted library allocation
page read and write
5878000
heap
page read and write
7E2000
unkown
page execute and read and write
1039000
heap
page read and write
57F6000
heap
page read and write
588C000
heap
page read and write
56F8000
heap
page read and write
5836000
heap
page read and write
5855000
heap
page read and write
5844000
heap
page read and write
9B2000
unkown
page execute read
5849000
heap
page read and write
580B000
heap
page read and write
F2F000
stack
page read and write
FAE000
heap
page read and write
5813000
heap
page read and write
56E2000
heap
page read and write
CD8000
heap
page read and write
5824000
heap
page read and write
56D7000
heap
page read and write
5880000
heap
page read and write
400000
unkown
page readonly
57CE000
stack
page read and write
56E8000
heap
page read and write
580D000
heap
page read and write
570A000
heap
page read and write
5719000
heap
page read and write
5811000
heap
page read and write
5852000
heap
page read and write
56F2000
heap
page read and write
5806000
heap
page read and write
56D7000
heap
page read and write
5812000
heap
page read and write
5E31000
heap
page read and write
28A0000
heap
page read and write
400000
unkown
page readonly
5B10000
trusted library allocation
page read and write
5704000
heap
page read and write
E20000
heap
page read and write
5836000
heap
page read and write
5836000
heap
page read and write
584D000
heap
page read and write
289F000
stack
page read and write
5820000
heap
page read and write
D6A000
heap
page read and write
56BE000
stack
page read and write
400000
unkown
page readonly
57E4000
heap
page read and write
28D0000
direct allocation
page read and write
E10000
direct allocation
page read and write
D04000
heap
page read and write
56D7000
heap
page read and write
5836000
heap
page read and write
D10000
direct allocation
page read and write
5838000
heap
page read and write
5704000
heap
page read and write
7E2000
unkown
page execute and read and write
5B50000
trusted library allocation
page read and write
D9A000
heap
page read and write
9B2000
unkown
page execute read
56D5000
heap
page read and write
28B0000
direct allocation
page read and write
5709000
heap
page read and write
5828000
heap
page read and write
5849000
heap
page read and write
57C1000
heap
page read and write
FD0000
heap
page read and write
50DE000
stack
page read and write
5B60000
trusted library allocation
page read and write
112F000
stack
page read and write
5800000
heap
page read and write
56ED000
heap
page read and write
5685000
heap
page read and write
585000
unkown
page write copy
9B2000
unkown
page execute read
5B50000
trusted library allocation
page read and write
101D000
heap
page read and write
5855000
heap
page read and write
4D2E000
stack
page read and write
400000
unkown
page readonly
56D9000
heap
page read and write
582F000
heap
page read and write
582F000
heap
page read and write
56E3000
heap
page read and write
DD1000
heap
page read and write
5836000
heap
page read and write
5836000
heap
page read and write
5B60000
trusted library allocation
page read and write
5831000
heap
page read and write
5800000
heap
page read and write
5811000
heap
page read and write
583F000
heap
page read and write
572C000
heap
page read and write
5859000
heap
page read and write
5851000
heap
page read and write
5821000
heap
page read and write
401000
unkown
page execute read
5707000
heap
page read and write
5844000
heap
page read and write
582B000
heap
page read and write
7BB000
unkown
page execute and read and write
5733000
heap
page read and write
D85000
heap
page read and write
557E000
stack
page read and write
582B000
heap
page read and write
55D000
unkown
page readonly
1065000
heap
page read and write
1016000
heap
page read and write
4D9E000
stack
page read and write
FF9000
heap
page read and write
56BF000
heap
page read and write
E56000
heap
page read and write
4E2D000
stack
page read and write
5801000
heap
page read and write
1071000
heap
page read and write
5822000
heap
page read and write
5849000
heap
page read and write
F97000
heap
page read and write
584E000
heap
page read and write
58A000
unkown
page readonly
18E000
stack
page read and write
1009000
heap
page read and write
2970000
direct allocation
page read and write
F1A000
heap
page read and write
1007000
heap
page read and write
57C6000
heap
page read and write
5846000
heap
page read and write
FF5000
heap
page read and write
51E0000
remote allocation
page read and write
DCE000
stack
page read and write
56BF000
heap
page read and write
58D0000
trusted library allocation
page read and write
DCE000
stack
page read and write
E20000
heap
page read and write
7EF000
unkown
page execute and read and write
4E2D000
stack
page read and write
D83000
heap
page read and write
56FA000
heap
page read and write
582F000
heap
page read and write
5B10000
trusted library allocation
page read and write
CF1000
heap
page read and write
5844000
heap
page read and write
5813000
heap
page read and write
CEF000
heap
page read and write
56C2000
heap
page read and write
5851000
heap
page read and write
5800000
heap
page read and write
558E000
stack
page read and write
5811000
heap
page read and write
5811000
heap
page read and write
D32000
heap
page read and write
2A90000
remote allocation
page read and write
57D9000
heap
page read and write
56F7000
heap
page read and write
584B000
heap
page read and write
57EE000
heap
page read and write
5800000
heap
page read and write
56D7000
heap
page read and write
5707000
heap
page read and write
4F2E000
stack
page read and write
401000
unkown
page execute read
4E6E000
stack
page read and write
5B10000
trusted library allocation
page read and write
FD3000
heap
page read and write
5858000
heap
page read and write
568C000
heap
page read and write
5827000
heap
page read and write
D85000
heap
page read and write
5830000
heap
page read and write
584E000
heap
page read and write
5828000
heap
page read and write
1013000
heap
page read and write
F10000
heap
page read and write
56E7000
heap
page read and write
5831000
heap
page read and write
584A000
heap
page read and write
585000
unkown
page write copy
57FD000
heap
page read and write
580D000
heap
page read and write
4F9E000
stack
page read and write
FE0000
heap
page read and write
56E1000
heap
page read and write
584C000
heap
page read and write
55D000
unkown
page readonly
1006000
heap
page read and write
56CB000
heap
page read and write
1007000
heap
page read and write
583F000
heap
page read and write
57D9000
heap
page read and write
5838000
heap
page read and write
5851000
heap
page read and write
56BD000
heap
page read and write
57D0000
heap
page read and write
FFD000
heap
page read and write
28B0000
direct allocation
page read and write
5849000
heap
page read and write
5824000
heap
page read and write
5B50000
trusted library allocation
page read and write
580E000
heap
page read and write
D37000
heap
page read and write
5827000
heap
page read and write
5713000
heap
page read and write
2AA0000
heap
page read and write
5812000
heap
page read and write
E5E000
heap
page read and write
2960000
heap
page read and write
57E4000
heap
page read and write
C70000
heap
page read and write
C60000
heap
page read and write
57E7000
heap
page read and write
5B60000
trusted library allocation
page read and write
58D0000
heap
page read and write
5745000
heap
page read and write
5B10000
trusted library allocation
page read and write
5858000
heap
page read and write
57CD000
heap
page read and write
1006000
heap
page read and write
D0B000
heap
page read and write
5849000
heap
page read and write
581B000
heap
page read and write
56E4000
heap
page read and write
5836000
heap
page read and write
5838000
heap
page read and write
5811000
heap
page read and write
2A40000
heap
page read and write
F7C000
heap
page read and write
5808000
heap
page read and write
5827000
heap
page read and write
7BD000
unkown
page execute and read and write
56E7000
heap
page read and write
5835000
heap
page read and write
584E000
heap
page read and write
56EE000
heap
page read and write
584E000
heap
page read and write
DF1000
heap
page read and write
570A000
heap
page read and write
5801000
heap
page read and write
5745000
heap
page read and write
5B10000
trusted library allocation
page read and write
55D000
unkown
page readonly
5712000
heap
page read and write
58A000
unkown
page readonly
557E000
stack
page read and write
572C000
heap
page read and write
FEE000
heap
page read and write
9B2000
unkown
page execute read
5833000
heap
page read and write
57D7000
heap
page read and write
100B000
heap
page read and write
580E000
heap
page read and write
5C30000
heap
page read and write
5806000
heap
page read and write
19A000
stack
page read and write
5831000
heap
page read and write
400000
unkown
page readonly
596000
unkown
page write copy
587D000
heap
page read and write
56EA000
heap
page read and write
5820000
heap
page read and write
FDC000
heap
page read and write
5849000
heap
page read and write
7EF000
unkown
page execute and read and write
57FD000
heap
page read and write
5B50000
trusted library allocation
page read and write
5813000
heap
page read and write
5718000
heap
page read and write
D85000
heap
page read and write
5836000
heap
page read and write
584C000
heap
page read and write
57F5000
heap
page read and write
570C000
heap
page read and write
5813000
heap
page read and write
4F9D000
stack
page read and write
1058000
heap
page read and write
57F5000
heap
page read and write
E3A000
heap
page read and write
5837000
heap
page read and write
56F4000
heap
page read and write
56CB000
heap
page read and write
E00000
direct allocation
page read and write
C60000
heap
page read and write
58A000
unkown
page readonly
5801000
heap
page read and write
5849000
heap
page read and write
D30000
heap
page read and write
119F000
stack
page read and write
584A000
heap
page read and write
9B2000
unkown
page execute read
4F4E000
stack
page read and write
56F7000
heap
page read and write
56D7000
heap
page read and write
585A000
heap
page read and write
5836000
heap
page read and write
5813000
heap
page read and write
580D000
heap
page read and write
56FB000
heap
page read and write
582B000
heap
page read and write
5818000
heap
page read and write
5813000
heap
page read and write
56E7000
heap
page read and write
57E4000
heap
page read and write
E00000
direct allocation
page read and write
5871000
heap
page read and write
5813000
heap
page read and write
5B60000
trusted library allocation
page read and write
57E4000
heap
page read and write
28E0000
direct allocation
page read and write
56F5000
heap
page read and write
5841000
heap
page read and write
FC0000
heap
page read and write
9B000
stack
page read and write
5801000
heap
page read and write
598000
unkown
page execute and read and write
1006000
heap
page read and write
581F000
heap
page read and write
5844000
heap
page read and write
56D7000
heap
page read and write
5801000
heap
page read and write
CD6000
heap
page read and write
4AFB000
heap
page read and write
FAA000
heap
page read and write
7E2000
unkown
page execute and read and write
51CF000
stack
page read and write
570F000
heap
page read and write
FF3000
heap
page read and write
F66000
heap
page read and write
56CB000
heap
page read and write
583C000
heap
page read and write
5800000
heap
page read and write
56CB000
heap
page read and write
56E7000
heap
page read and write
584C000
heap
page read and write
4A6B000
heap
page read and write
CBE000
stack
page read and write
57BF000
stack
page read and write
E58000
heap
page read and write
56D7000
heap
page read and write
E27000
heap
page read and write
7BD000
unkown
page execute and read and write
51D0000
remote allocation
page read and write
568E000
heap
page read and write
28D0000
direct allocation
page read and write
5B60000
trusted library allocation
page read and write
57F5000
heap
page read and write
9B000
stack
page read and write
5801000
heap
page read and write
5851000
heap
page read and write
There are 967 hidden memdumps, click here to show them.