IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\EfSAyduNP94O7VkIcUcjXr_.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MPGPH131.exe_cf4e7bfd48f2a6b37dc7526592834c22e9a43fc_f4fd270f_a89dfd47-cc32-4b15-9bfd-9524009e54c9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBC0.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Jun 20 23:30:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD16E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1AD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\spanAK6XIXNsn5Nq\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
modified
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
modified
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\08X6GAad3tnjCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\4k4Hzk2ExswRLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\Bafr0LqMPV7GWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\MBy5KfxI1GpwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\NQpa6sjCjyVKCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\OeaSQGdKQorHWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\Sa6XQ5SqTeBqWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\XMAM6bJvCsxVHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\XV6CMo7Jg4S7Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\_jIgbEVzKGGZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\diymrzMDsfMULogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\h5oY31u6hqY9Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\oqtSf5YllwSpWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\wvw07oIVwAzfHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanTk4mNNg5wnH2\zV4ixzbU2nqVHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixyTk4mNNg5wnH2\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyTk4mNNg5wnH2\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyTk4mNNg5wnH2\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 824

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33J
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://t.me/RiseProSUPPORTv
unknown
https://t.me/risepro_botL
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
https://t.me/risepro_botB
unknown
https://db-ip.com/
unknown
http://77.91.77.81/cost/go.exeE
unknown
https://ipinfo.io/widget/demo/8.46.123.335
unknown
https://t.me/risepro_botZ
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://t.y
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33K
unknown
https://t.me/risepro
unknown
https://t.me/risepro_botO
unknown
https://ipinfo.io/y
unknown
http://77.91.77.81/mine/amadka.exerisepro3J
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
https://ipinfo.io/widget/demo/8.46.123.33o
unknown
https://t.me/risepro_botisepro_bot
unknown
https://t.me/RiseProSUPPORTMP=C:
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33r
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33h
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://t.me/risepro_bot33
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://t.me/RiseProSUPPORT-
unknown
http://77.91.77.81/cost/go.exep
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://ipinfo.io/widget/demo/8.46.123.33s
unknown
https://t.me/RiseProSUPPORT
unknown
https://db-ip.com/n
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
34.117.186.192
http://77.91.77.81/cost/lenin.exen
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33z
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33Ap
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33SE
unknown
https://db-ip.com/w
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
172.67.75.166
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33i
unknown
http://77.91.77.81/cost/lenin.exe
unknown
https://t.me/RiseProSUPPORTOCESSOR_IDENTIFIER=Intel%q
unknown
https://t._
unknown
https://t.me/risepro_botq
unknown
https://ipinfo.io/&
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33%
unknown
There are 52 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProgramId
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
FileId
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LowerCaseLongPath
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LongPathHash
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Name
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
OriginalFileName
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Publisher
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Version
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinFileVersion
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinaryType
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductName
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
ProductVersion
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
LinkDate
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
BinProductVersion
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageFullName
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
AppxPackageRelativeId
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Size
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Language
\REGISTRY\A\{e550765f-c5f2-d982-234b-6307e094cd7d}\Root\InventoryApplicationFile\mpgph131.exe|9aac11c6f9321563
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5796000
heap
page read and write
malicious
F28000
heap
page read and write
malicious
F2B000
heap
page read and write
malicious
DD3000
heap
page read and write
4F6F000
stack
page read and write
401000
unkown
page execute read
2850000
direct allocation
page read and write
5BC1000
heap
page read and write
5BDD000
heap
page read and write
575F000
stack
page read and write
518F000
stack
page read and write
5770000
heap
page read and write
57AB000
heap
page read and write
D2A000
heap
page read and write
5BFF000
heap
page read and write
DDC000
heap
page read and write
7B0000
unkown
page execute and read and write
57B0000
heap
page read and write
EDC000
heap
page read and write
57A9000
heap
page read and write
5BFF000
heap
page read and write
E92000
heap
page read and write
596000
unkown
page read and write
5796000
heap
page read and write
291E000
heap
page read and write
F2F000
heap
page read and write
D80000
direct allocation
page read and write
2950000
heap
page read and write
57A7000
heap
page read and write
596000
unkown
page write copy
5BFF000
heap
page read and write
5BFF000
heap
page read and write
D20000
heap
page read and write
F3E000
heap
page read and write
57A1000
heap
page read and write
4B78000
heap
page read and write
5C11000
heap
page read and write
FDA000
heap
page read and write
599B000
stack
page read and write
4EED000
stack
page read and write
980000
unkown
page execute read
DCE000
heap
page read and write
19C000
stack
page read and write
5BFF000
heap
page read and write
401000
unkown
page execute read
5C02000
heap
page read and write
107F000
stack
page read and write
DA0000
direct allocation
page read and write
E9D000
heap
page read and write
D37000
heap
page read and write
4F1D000
stack
page read and write
298E000
stack
page read and write
57A1000
heap
page read and write
5BD6000
heap
page read and write
5BD1000
heap
page read and write
19A000
stack
page read and write
5647000
heap
page read and write
D25000
heap
page read and write
5BCB000
heap
page read and write
57A1000
heap
page read and write
5BD7000
heap
page read and write
F3E000
heap
page read and write
516F000
stack
page read and write
ED0000
heap
page read and write
5860000
trusted library allocation
page read and write
57A8000
heap
page read and write
57AC000
heap
page read and write
509E000
stack
page read and write
506D000
stack
page read and write
5BFF000
heap
page read and write
2840000
direct allocation
page read and write
F3E000
heap
page read and write
D25000
heap
page read and write
EE7000
heap
page read and write
5764000
heap
page read and write
5BE7000
heap
page read and write
E3F000
stack
page read and write
DD1000
heap
page read and write
4F5E000
stack
page read and write
1001000
heap
page read and write
D70000
direct allocation
page read and write
E40000
direct allocation
page read and write
5BFF000
heap
page read and write
2B60000
heap
page read and write
9B000
stack
page read and write
58A000
unkown
page readonly
585000
unkown
page write copy
561F000
stack
page read and write
D73000
heap
page read and write
561F000
stack
page read and write
5AE0000
trusted library allocation
page read and write
2950000
remote allocation
page read and write
FE2000
heap
page read and write
DCE000
heap
page read and write
5BE2000
heap
page read and write
E8F000
heap
page read and write
5AE0000
trusted library allocation
page read and write
2950000
remote allocation
page read and write
4B98000
heap
page read and write
5BFF000
heap
page read and write
5C28000
heap
page read and write
D37000
heap
page read and write
5C02000
heap
page read and write
57AB000
heap
page read and write
DC0000
heap
page read and write
5769000
heap
page read and write
2990000
heap
page read and write
506E000
stack
page read and write
400000
unkown
page readonly
FDC000
heap
page read and write
58A000
unkown
page readonly
D30000
heap
page read and write
100B000
heap
page read and write
DD5000
heap
page read and write
5BF7000
heap
page read and write
560F000
stack
page read and write
5860000
trusted library allocation
page read and write
FEA000
heap
page read and write
57AC000
heap
page read and write
57A5000
heap
page read and write
771000
unkown
page execute and read and write
5BE8000
heap
page read and write
19C000
stack
page read and write
D2F000
heap
page read and write
5860000
trusted library allocation
page read and write
5C1D000
heap
page read and write
5C02000
heap
page read and write
5778000
heap
page read and write
578D000
heap
page read and write
401000
unkown
page execute read
585000
unkown
page read and write
F70000
heap
page read and write
18E000
stack
page read and write
E4E000
heap
page read and write
2850000
direct allocation
page read and write
D6E000
heap
page read and write
578A000
heap
page read and write
F3E000
heap
page read and write
980000
unkown
page execute read
109F000
stack
page read and write
BF0000
heap
page read and write
5625000
heap
page read and write
E97000
heap
page read and write
400000
unkown
page readonly
57AC000
heap
page read and write
5999000
stack
page read and write
2860000
direct allocation
page read and write
5BC1000
heap
page read and write
5BC1000
heap
page read and write
59B0000
trusted library allocation
page read and write
5C02000
heap
page read and write
F3E000
heap
page read and write
D15000
heap
page read and write
E46000
heap
page read and write
EF4000
heap
page read and write
55D000
unkown
page readonly
DCA000
heap
page read and write
400000
unkown
page readonly
59B0000
trusted library allocation
page read and write
502F000
stack
page read and write
C3E000
stack
page read and write
5797000
heap
page read and write
E4A000
heap
page read and write
5BD7000
heap
page read and write
596000
unkown
page read and write
517F000
stack
page read and write
401000
unkown
page execute read
5625000
heap
page read and write
577C000
heap
page read and write
565E000
stack
page read and write
2820000
direct allocation
page read and write
EAA000
heap
page read and write
5777000
heap
page read and write
7B0000
unkown
page execute and read and write
5C15000
heap
page read and write
2840000
direct allocation
page read and write
57A8000
heap
page read and write
BF0000
heap
page read and write
29CE000
stack
page read and write
5C02000
heap
page read and write
5BCB000
heap
page read and write
4AC8000
heap
page read and write
980000
unkown
page execute read
EC0000
heap
page read and write
980000
unkown
page execute read
58A000
unkown
page readonly
2A20000
heap
page read and write
296E000
stack
page read and write
5BD1000
heap
page read and write
100F000
heap
page read and write
E9B000
heap
page read and write
5BC1000
heap
page read and write
D90000
direct allocation
page read and write
516F000
stack
page read and write
EEE000
heap
page read and write
CB5000
heap
page read and write
585000
unkown
page read and write
F34000
heap
page read and write
2ADE000
stack
page read and write
2A9E000
stack
page read and write
57A7000
heap
page read and write
57AE000
heap
page read and write
E71000
heap
page read and write
5C28000
heap
page read and write
F3E000
heap
page read and write
EAD000
heap
page read and write
585000
unkown
page write copy
598000
unkown
page execute and read and write
294E000
stack
page read and write
551E000
stack
page read and write
D90000
direct allocation
page read and write
BF0000
heap
page read and write
400000
unkown
page readonly
5BCB000
heap
page read and write
5DC1000
heap
page read and write
BF0000
heap
page read and write
401000
unkown
page execute read
57A5000
heap
page read and write
2840000
direct allocation
page read and write
575E000
stack
page read and write
57AC000
heap
page read and write
589E000
stack
page read and write
E0B000
heap
page read and write
5BD6000
heap
page read and write
5C02000
heap
page read and write
10BF000
stack
page read and write
5BE2000
heap
page read and write
55D000
unkown
page readonly
58A000
unkown
page readonly
5170000
remote allocation
page read and write
575E000
stack
page read and write
57A9000
heap
page read and write
596000
unkown
page write copy
2840000
direct allocation
page read and write
F31000
heap
page read and write
5AE0000
trusted library allocation
page read and write
7B0000
unkown
page execute and read and write
5ADA000
stack
page read and write
596000
unkown
page write copy
5BFF000
heap
page read and write
57A7000
heap
page read and write
2A5E000
stack
page read and write
E7A000
heap
page read and write
5BE2000
heap
page read and write
5BFF000
heap
page read and write
401000
unkown
page execute read
5BFF000
heap
page read and write
2B60000
remote allocation
page read and write
EBE000
heap
page read and write
5BCB000
heap
page read and write
19C000
stack
page read and write
5AE0000
trusted library allocation
page read and write
DD9000
heap
page read and write
58A000
unkown
page readonly
5BC1000
heap
page read and write
5BCD000
heap
page read and write
57A7000
heap
page read and write
585000
unkown
page write copy
5C02000
heap
page read and write
2A00000
heap
page read and write
401000
unkown
page execute read
5BE2000
heap
page read and write
5C02000
heap
page read and write
565E000
stack
page read and write
5C11000
heap
page read and write
29A0000
direct allocation
page read and write
FC4000
heap
page read and write
5BFF000
heap
page read and write
575E000
stack
page read and write
5BFC000
heap
page read and write
401000
unkown
page execute read
57AB000
heap
page read and write
DF4000
heap
page read and write
5BD3000
heap
page read and write
5BFF000
heap
page read and write
5BC1000
heap
page read and write
29D0000
heap
page read and write
4B02000
heap
page read and write
5BCA000
heap
page read and write
116F000
stack
page read and write
2B80000
heap
page read and write
5DC1000
heap
page read and write
2B60000
remote allocation
page read and write
5792000
heap
page read and write
5C02000
heap
page read and write
CD0000
heap
page read and write
F3E000
heap
page read and write
9B000
stack
page read and write
DFD000
heap
page read and write
CD0000
heap
page read and write
2AE0000
remote allocation
page read and write
5AE0000
trusted library allocation
page read and write
5770000
heap
page read and write
29AE000
stack
page read and write
D25000
heap
page read and write
5BDD000
heap
page read and write
5C28000
heap
page read and write
507E000
stack
page read and write
5BFF000
heap
page read and write
505F000
stack
page read and write
57A6000
heap
page read and write
57B0000
heap
page read and write
D7A000
heap
page read and write
5BC1000
heap
page read and write
5BD4000
heap
page read and write
5BFF000
heap
page read and write
E9B000
heap
page read and write
57AE000
heap
page read and write
DA0000
direct allocation
page read and write
59DE000
stack
page read and write
292E000
stack
page read and write
59B0000
trusted library allocation
page read and write
578C000
heap
page read and write
57A7000
heap
page read and write
59B0000
trusted library allocation
page read and write
E32000
heap
page read and write
5BDA000
heap
page read and write
F7E000
stack
page read and write
E84000
heap
page read and write
5AF0000
trusted library allocation
page read and write
57AB000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
296E000
stack
page read and write
5AF0000
trusted library allocation
page read and write
5BD8000
heap
page read and write
551E000
stack
page read and write
57AC000
heap
page read and write
E12000
heap
page read and write
508F000
stack
page read and write
E1A000
heap
page read and write
551E000
stack
page read and write
57A5000
heap
page read and write
400000
unkown
page readonly
5AE0000
trusted library allocation
page read and write
5BC1000
heap
page read and write
5C11000
heap
page read and write
E40000
heap
page read and write
EA0000
heap
page read and write
55D000
unkown
page readonly
F3E000
heap
page read and write
5BDB000
heap
page read and write
503F000
stack
page read and write
5BC1000
heap
page read and write
FCA000
heap
page read and write
4F8D000
stack
page read and write
D70000
heap
page read and write
58A000
unkown
page readonly
9B000
stack
page read and write
2A9E000
stack
page read and write
59B0000
trusted library allocation
page read and write
5BC1000
heap
page read and write
EDE000
stack
page read and write
2B4E000
stack
page read and write
CE0000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5859000
stack
page read and write
4E6D000
stack
page read and write
5860000
trusted library allocation
page read and write
F3E000
heap
page read and write
292E000
stack
page read and write
5BD4000
heap
page read and write
EFC000
heap
page read and write
9B000
stack
page read and write
5C02000
heap
page read and write
DC2000
heap
page read and write
5170000
remote allocation
page read and write
D10000
heap
page read and write
771000
unkown
page execute and read and write
576D000
heap
page read and write
2840000
direct allocation
page read and write
F3E000
heap
page read and write
D27000
heap
page read and write
55D000
unkown
page readonly
E39000
heap
page read and write
CE7000
heap
page read and write
55D000
unkown
page readonly
DD1000
heap
page read and write
5BE8000
heap
page read and write
2AE0000
remote allocation
page read and write
5BDD000
heap
page read and write
5783000
heap
page read and write
106E000
heap
page read and write
4DED000
stack
page read and write
59B0000
trusted library allocation
page read and write
5620000
heap
page read and write
E92000
heap
page read and write
DD9000
heap
page read and write
1061000
heap
page read and write
EB2000
heap
page read and write
5BC5000
heap
page read and write
29E0000
direct allocation
page read and write
5BE2000
heap
page read and write
5BC1000
heap
page read and write
9B000
stack
page read and write
2AA0000
remote allocation
page read and write
5770000
heap
page read and write
5769000
heap
page read and write
284F000
stack
page read and write
DD6000
heap
page read and write
5DC1000
heap
page read and write
5BCD000
heap
page read and write
E81000
heap
page read and write
E8B000
heap
page read and write
5632000
heap
page read and write
5BDE000
heap
page read and write
2AA0000
remote allocation
page read and write
5BFF000
heap
page read and write
E14000
heap
page read and write
771000
unkown
page execute and read and write
5793000
heap
page read and write
2960000
direct allocation
page read and write
5AE0000
trusted library allocation
page read and write
2840000
direct allocation
page read and write
55D000
unkown
page readonly
57A5000
heap
page read and write
E8D000
heap
page read and write
5BC1000
heap
page read and write
57AC000
heap
page read and write
5C15000
heap
page read and write
EB0000
heap
page read and write
D0E000
stack
page read and write
5BD9000
heap
page read and write
5BFF000
heap
page read and write
4DBD000
stack
page read and write
59B0000
trusted library allocation
page read and write
5770000
heap
page read and write
E01000
heap
page read and write
598000
unkown
page execute and read and write
5770000
heap
page read and write
400000
unkown
page readonly
5BC5000
heap
page read and write
5778000
heap
page read and write
F9E000
heap
page read and write
401000
unkown
page execute read
5AF0000
trusted library allocation
page read and write
589E000
stack
page read and write
58A000
unkown
page readonly
57AB000
heap
page read and write
2B5E000
stack
page read and write
5AE0000
trusted library allocation
page read and write
D1E000
stack
page read and write
585000
unkown
page read and write
5796000
heap
page read and write
FAC000
heap
page read and write
519F000
stack
page read and write
DBF000
heap
page read and write
4DFE000
stack
page read and write
5BCB000
heap
page read and write
2950000
remote allocation
page read and write
57A6000
heap
page read and write
D65000
heap
page read and write
5761000
heap
page read and write
57A1000
heap
page read and write
DD1000
heap
page read and write
BF0000
heap
page read and write
5BF7000
heap
page read and write
57AC000
heap
page read and write
59B0000
trusted library allocation
page read and write
2AA0000
remote allocation
page read and write
596000
unkown
page read and write
2AE0000
remote allocation
page read and write
DC8000
heap
page read and write
D37000
heap
page read and write
57A0000
heap
page read and write
5BD1000
heap
page read and write
55D000
unkown
page readonly
E96000
heap
page read and write
D1F000
heap
page read and write
5BCD000
heap
page read and write
C9E000
stack
page read and write
29AE000
stack
page read and write
F9E000
stack
page read and write
596000
unkown
page write copy
5BCB000
heap
page read and write
5BFF000
heap
page read and write
5BD1000
heap
page read and write
F3E000
heap
page read and write
565E000
stack
page read and write
57AB000
heap
page read and write
5BFC000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
F3E000
heap
page read and write
980000
unkown
page execute read
5BE6000
heap
page read and write
F3B000
heap
page read and write
FBA000
heap
page read and write
EC2000
heap
page read and write
596000
unkown
page write copy
EC8000
heap
page read and write
57A8000
heap
page read and write
5C1D000
heap
page read and write
FAF000
stack
page read and write
5BFF000
heap
page read and write
29EE000
stack
page read and write
19C000
stack
page read and write
EB0000
heap
page read and write
5BC1000
heap
page read and write
57AB000
heap
page read and write
E40000
heap
page read and write
4D1E000
stack
page read and write
5BC1000
heap
page read and write
57AB000
heap
page read and write
5BC0000
heap
page read and write
585000
unkown
page read and write
D42000
heap
page read and write
D90000
direct allocation
page read and write
EA8000
heap
page read and write
106E000
heap
page read and write
D6E000
stack
page read and write
2820000
heap
page read and write
2ADE000
stack
page read and write
E94000
heap
page read and write
598000
unkown
page execute and read and write
5BFF000
heap
page read and write
2AB0000
heap
page read and write
D11000
heap
page read and write
5770000
heap
page read and write
5860000
trusted library allocation
page read and write
EC5000
heap
page read and write
D1E000
stack
page read and write
D23000
heap
page read and write
F3C000
heap
page read and write
4E8E000
stack
page read and write
FA3000
heap
page read and write
CA0000
direct allocation
page read and write
2840000
direct allocation
page read and write
598000
unkown
page execute and read and write
CA0000
direct allocation
page read and write
2840000
direct allocation
page read and write
F7A000
heap
page read and write
55D000
unkown
page readonly
5BC8000
heap
page read and write
5C02000
heap
page read and write
578D000
heap
page read and write
F3E000
heap
page read and write
DCE000
heap
page read and write
D5E000
stack
page read and write
5BFF000
heap
page read and write
F36000
heap
page read and write
5BE0000
heap
page read and write
561F000
stack
page read and write
105F000
heap
page read and write
E9A000
heap
page read and write
5AF0000
trusted library allocation
page read and write
D80000
heap
page read and write
5BFF000
heap
page read and write
D40000
heap
page read and write
F4B000
heap
page read and write
292E000
stack
page read and write
578D000
heap
page read and write
4F2E000
stack
page read and write
F7E000
heap
page read and write
D20000
heap
page read and write
5BFF000
heap
page read and write
29EE000
stack
page read and write
2960000
heap
page read and write
771000
unkown
page execute and read and write
57A7000
heap
page read and write
57AC000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5760000
heap
page read and write
5BD1000
heap
page read and write
57A6000
heap
page read and write
4A32000
heap
page read and write
5170000
remote allocation
page read and write
DD9000
heap
page read and write
DDC000
heap
page read and write
291A000
heap
page read and write
5BD1000
heap
page read and write
2840000
direct allocation
page read and write
596000
unkown
page read and write
5BEB000
heap
page read and write
5760000
heap
page read and write
2B1E000
stack
page read and write
F3E000
heap
page read and write
980000
unkown
page execute read
E2F000
stack
page read and write
2AF0000
heap
page read and write
EA8000
heap
page read and write
57A5000
heap
page read and write
58A000
unkown
page readonly
551E000
stack
page read and write
5AF0000
trusted library allocation
page read and write
7B0000
unkown
page execute and read and write
ED1000
heap
page read and write
5BFF000
heap
page read and write
5767000
heap
page read and write
2B0E000
stack
page read and write
2970000
direct allocation
page read and write
550E000
stack
page read and write
E2A000
heap
page read and write
D1E000
stack
page read and write
57A6000
heap
page read and write
7B0000
unkown
page execute and read and write
5BED000
heap
page read and write
4E1D000
stack
page read and write
5BFF000
heap
page read and write
5796000
heap
page read and write
5BFF000
heap
page read and write
5C1D000
heap
page read and write
5BE7000
heap
page read and write
5BFF000
heap
page read and write
980000
unkown
page execute read
D2C000
heap
page read and write
D48000
heap
page read and write
5BCB000
heap
page read and write
577D000
heap
page read and write
5DC1000
heap
page read and write
292E000
stack
page read and write
E68000
heap
page read and write
D5C000
heap
page read and write
401000
unkown
page execute read
5AF0000
trusted library allocation
page read and write
DDE000
heap
page read and write
5BFF000
heap
page read and write
5796000
heap
page read and write
400000
unkown
page readonly
105F000
heap
page read and write
5BDD000
heap
page read and write
FF6000
heap
page read and write
D90000
direct allocation
page read and write
400000
unkown
page readonly
980000
unkown
page execute read
980000
unkown
page execute read
585000
unkown
page write copy
59B0000
trusted library allocation
page read and write
5BF0000
heap
page read and write
CA0000
direct allocation
page read and write
D35000
heap
page read and write
5AF0000
trusted library allocation
page read and write
FBF000
stack
page read and write
598000
unkown
page execute and read and write
5BEC000
heap
page read and write
EA8000
heap
page read and write
55D000
unkown
page readonly
5BFF000
heap
page read and write
400000
unkown
page readonly
57B0000
heap
page read and write
CC0000
heap
page read and write
5BE2000
heap
page read and write
58A000
unkown
page readonly
FB0000
heap
page read and write
5BFC000
heap
page read and write
5860000
trusted library allocation
page read and write
5DC0000
heap
page read and write
400000
unkown
page readonly
D4F000
heap
page read and write
596000
unkown
page read and write
DD0000
heap
page read and write
5767000
heap
page read and write
4EFE000
stack
page read and write
5793000
heap
page read and write
585000
unkown
page read and write
5BD1000
heap
page read and write
E60000
heap
page read and write
5BFF000
heap
page read and write
57AC000
heap
page read and write
561F000
stack
page read and write
5761000
heap
page read and write
C40000
heap
page read and write
57A5000
heap
page read and write
585000
unkown
page write copy
4F3E000
stack
page read and write
E2C000
heap
page read and write
FC2000
heap
page read and write
771000
unkown
page execute and read and write
EB0000
heap
page read and write
DDC000
heap
page read and write
57A6000
heap
page read and write
58A000
unkown
page readonly
5BFF000
heap
page read and write
5BC3000
heap
page read and write
CB0000
heap
page read and write
EA6000
heap
page read and write
980000
unkown
page execute read
57A6000
heap
page read and write
55D000
unkown
page readonly
CD0000
heap
page read and write
5BFF000
heap
page read and write
1058000
heap
page read and write
5BFF000
heap
page read and write
FB4000
heap
page read and write
5BD0000
heap
page read and write
D35000
heap
page read and write
5BFC000
heap
page read and write
2B60000
remote allocation
page read and write
5AE0000
trusted library allocation
page read and write
57A3000
heap
page read and write
EB8000
heap
page read and write
There are 682 hidden memdumps, click here to show them.