IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_ee875fea51fd677b6244cbbfce203f99c672fd1e_2b1844b5_53e0877d-73ea-4182-a226-aef0b3a36460\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\62AbnS8U76t4fChT49E_pCT.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80C0.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Jun 22 20:55:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8286.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER82B6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\4bB2RBXJ9t2XWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\5FkjBEcdJ5c0Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\8uidv_1gOa1CLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\APLOT_ZUF7_HCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\Ev77dyZ6DdytWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\L8VsEhFCGIPBLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\Tv5HrFbm6VQdWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\b7LL445YiWRPLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\kAIBgX1YcxPWWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\mdFBWxXG_sLFHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\n7J29lEH1LkuHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\rGcUXvhfIN7LHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\tpFa0VILO3AVHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanA_q_KFFENg59\ybDrHyl_Me_EWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixyA_q_KFFENg59\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyA_q_KFFENg59\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyA_q_KFFENg59\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 1920

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://crl.microsoft
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33E
unknown
https://db-ip.com/
unknown
https://ipinfo.io/widget/demo/8.46.123.335
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://ipinfo.io/widget/demo/8.46.123.33:
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33ut
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33C
unknown
https://t.me/risepro_botiC
unknown
https://t.me/RiseProSUPPORTQ
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://db-ip.com/demo/home.php?s=8.46.123.334C
unknown
https://db-ip.com/5
unknown
https://ipinfo.io/t
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
https://t.me/risepro_botisepro_bot
unknown
https://ipinfo.io/j
unknown
https://t.me/RiseProSUPPORT?
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33#
unknown
https://db-ip.com/c
unknown
https://t.me/RiseProSUPPORTzo0u
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://t.me/RiseProSUPPORT$
unknown
https://db-ip.com/o
unknown
https://ipinfo.io/N
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33)W
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.81/cost/lenin.exet
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
34.117.186.192
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
104.26.4.15
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.81/cost/lenin.exe
unknown
There are 44 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{9f5cd183-32a4-e9f3-0cf5-7b31f66418d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5798000
heap
page read and write
malicious
585000
unkown
page write copy
C90000
heap
page read and write
C00000
heap
page read and write
57EB000
heap
page read and write
401000
unkown
page execute read
DB0000
direct allocation
page read and write
4F2E000
stack
page read and write
C30000
direct allocation
page read and write
C00000
heap
page read and write
401000
unkown
page execute read
2AFE000
stack
page read and write
19D000
stack
page read and write
C60000
heap
page read and write
576E000
stack
page read and write
E80000
heap
page read and write
C67000
heap
page read and write
4F2D000
stack
page read and write
D76000
heap
page read and write
598000
unkown
page execute and read and write
E50000
heap
page read and write
57CF000
heap
page read and write
57FB000
heap
page read and write
57EB000
heap
page read and write
5798000
heap
page read and write
5B70000
trusted library allocation
page read and write
C1A000
heap
page read and write
79A000
unkown
page execute and read and write
57DB000
heap
page read and write
1F0000
heap
page read and write
293E000
stack
page read and write
57EC000
heap
page read and write
E70000
heap
page read and write
102F000
stack
page read and write
D8E000
stack
page read and write
5787000
heap
page read and write
516F000
stack
page read and write
55D000
unkown
page readonly
57C7000
heap
page read and write
57EA000
heap
page read and write
57E5000
heap
page read and write
5777000
heap
page read and write
57DE000
heap
page read and write
980000
unkown
page execute read
57A9000
heap
page read and write
E70000
heap
page read and write
588E000
stack
page read and write
582E000
heap
page read and write
18E000
stack
page read and write
552E000
stack
page read and write
D20000
heap
page read and write
506E000
stack
page read and write
F07000
heap
page read and write
D92000
heap
page read and write
D06000
heap
page read and write
400000
unkown
page readonly
582A000
heap
page read and write
4EED000
stack
page read and write
583000
unkown
page execute and read and write
57B8000
heap
page read and write
57DB000
heap
page read and write
4E2D000
stack
page read and write
CE0000
heap
page read and write
55E000
unkown
page readonly
596000
unkown
page write copy
578C000
heap
page read and write
29B0000
direct allocation
page read and write
57FB000
heap
page read and write
2A00000
direct allocation
page read and write
F00000
heap
page read and write
2850000
direct allocation
page read and write
57BC000
heap
page read and write
57FD000
heap
page read and write
7A2000
unkown
page execute and read and write
57B9000
heap
page read and write
58A000
unkown
page readonly
57F7000
heap
page read and write
578A000
heap
page read and write
580A000
heap
page read and write
585000
unkown
page write copy
28E0000
direct allocation
page read and write
F0D000
heap
page read and write
55D000
unkown
page readonly
EAB000
heap
page read and write
2760000
direct allocation
page read and write
578E000
stack
page read and write
29E0000
heap
page read and write
57F6000
heap
page read and write
57B8000
heap
page read and write
400000
unkown
page readonly
5B70000
trusted library allocation
page read and write
582A000
heap
page read and write
57F6000
heap
page read and write
57B8000
heap
page read and write
5798000
heap
page read and write
19A000
stack
page read and write
580B000
heap
page read and write
57EB000
heap
page read and write
F50000
trusted library allocation
page read and write
57E3000
heap
page read and write
28CF000
stack
page read and write
50AE000
stack
page read and write
E76000
heap
page read and write
E99000
heap
page read and write
DB4000
heap
page read and write
5B70000
trusted library allocation
page read and write
7DD000
unkown
page execute and read and write
E50000
direct allocation
page read and write
581A000
heap
page read and write
980000
unkown
page execute read
1F7000
heap
page read and write
29F0000
heap
page read and write
57D2000
heap
page read and write
57F0000
heap
page read and write
CE0000
direct allocation
page read and write
566E000
stack
page read and write
57E1000
heap
page read and write
2990000
direct allocation
page read and write
2970000
heap
page read and write
294E000
stack
page read and write
574F000
stack
page read and write
55E000
unkown
page readonly
57E3000
heap
page read and write
580B000
heap
page read and write
401000
unkown
page execute read
57CC000
heap
page read and write
27D0000
heap
page read and write
D8C000
heap
page read and write
C00000
heap
page read and write
400000
unkown
page readonly
5770000
heap
page read and write
E37000
heap
page read and write
CE0000
direct allocation
page read and write
578E000
heap
page read and write
57E8000
heap
page read and write
D2A000
heap
page read and write
C82000
heap
page read and write
58A000
unkown
page readonly
980000
unkown
page execute read
C45000
heap
page read and write
2850000
direct allocation
page read and write
D2E000
heap
page read and write
DDD000
heap
page read and write
790000
unkown
page execute and read and write
598000
unkown
page execute and read and write
57C7000
heap
page read and write
4DAD000
stack
page read and write
D00000
heap
page read and write
E78000
heap
page read and write
7A2000
unkown
page execute and read and write
585000
unkown
page write copy
57DC000
heap
page read and write
55D000
unkown
page execute and read and write
E8E000
heap
page read and write
578A000
heap
page read and write
57F0000
heap
page read and write
5798000
heap
page read and write
5784000
heap
page read and write
57EF000
heap
page read and write
E7D000
heap
page read and write
57DF000
heap
page read and write
5B70000
trusted library allocation
page read and write
596000
unkown
page write copy
E30000
heap
page read and write
5802000
heap
page read and write
7D8000
unkown
page execute and read and write
57C9000
heap
page read and write
290E000
stack
page read and write
111F000
heap
page read and write
C8A000
heap
page read and write
5798000
heap
page read and write
58A000
unkown
page readonly
57DC000
heap
page read and write
57BC000
heap
page read and write
564E000
stack
page read and write
57F0000
heap
page read and write
578C000
heap
page read and write
57E5000
heap
page read and write
57E7000
heap
page read and write
D20000
heap
page read and write
D74000
heap
page read and write
9B000
stack
page read and write
400000
unkown
page readonly
57AD000
heap
page read and write
578A000
heap
page read and write
57BC000
heap
page read and write
299E000
stack
page read and write
582F000
heap
page read and write
CE5000
heap
page read and write
2760000
direct allocation
page read and write
598000
unkown
page execute and read and write
9B000
stack
page read and write
400000
unkown
page readonly
7D8000
unkown
page execute and read and write
401000
unkown
page execute read
502F000
stack
page read and write
57DE000
heap
page read and write
2970000
direct allocation
page read and write
57CE000
heap
page read and write
E67000
heap
page read and write
2A8F000
stack
page read and write
D90000
heap
page read and write
5B70000
trusted library allocation
page read and write
7E2000
unkown
page execute and read and write
58A000
unkown
page readonly
57BD000
heap
page read and write
578E000
heap
page read and write
581B000
heap
page read and write
6170000
heap
page read and write
401000
unkown
page execute read
C4E000
heap
page read and write
28CE000
stack
page read and write
598000
unkown
page execute and read and write
D88000
heap
page read and write
506F000
stack
page read and write
DA6000
heap
page read and write
2950000
heap
page read and write
C70000
heap
page read and write
C30000
direct allocation
page read and write
7DD000
unkown
page execute and read and write
5B70000
trusted library allocation
page read and write
400000
unkown
page readonly
57F2000
heap
page read and write
CFE000
heap
page read and write
57DE000
heap
page read and write
E91000
heap
page read and write
1080000
remote allocation
page read and write
55D000
unkown
page readonly
980000
unkown
page execute read
58A000
unkown
page readonly
C30000
direct allocation
page read and write
578B000
heap
page read and write
585000
unkown
page read and write
1080000
remote allocation
page read and write
580B000
heap
page read and write
C96000
heap
page read and write
5B70000
trusted library allocation
page read and write
118E000
stack
page read and write
50CE000
stack
page read and write
57CD000
heap
page read and write
57C9000
heap
page read and write
5520000
heap
page read and write
7E2000
unkown
page execute and read and write
7DD000
unkown
page execute and read and write
7D8000
unkown
page execute and read and write
58A000
unkown
page readonly
57F4000
heap
page read and write
57F0000
heap
page read and write
57BD000
heap
page read and write
790000
unkown
page execute and read and write
57F5000
heap
page read and write
57DD000
heap
page read and write
CFC000
heap
page read and write
2B20000
heap
page read and write
C5C000
heap
page read and write
4CAE000
stack
page read and write
E7D000
heap
page read and write
D6F000
heap
page read and write
7A2000
unkown
page execute and read and write
79A000
unkown
page execute and read and write
57BD000
heap
page read and write
57D5000
heap
page read and write
57B8000
heap
page read and write
596000
unkown
page read and write
4F8E000
stack
page read and write
19D000
stack
page read and write
57E2000
heap
page read and write
7B4000
unkown
page execute and read and write
C3F000
heap
page read and write
57CC000
heap
page read and write
4E8D000
stack
page read and write
2850000
direct allocation
page read and write
DB0000
direct allocation
page read and write
57DC000
heap
page read and write
C10000
heap
page read and write
5B70000
trusted library allocation
page read and write
114E000
stack
page read and write
7D8000
unkown
page execute and read and write
CE0000
direct allocation
page read and write
5B70000
trusted library allocation
page read and write
552E000
stack
page read and write
596000
unkown
page write copy
5771000
heap
page read and write
4F6E000
stack
page read and write
DE5000
heap
page read and write
57E8000
heap
page read and write
7DD000
unkown
page execute and read and write
57FB000
heap
page read and write
29EE000
stack
page read and write
5776000
heap
page read and write
FEF000
stack
page read and write
E62000
heap
page read and write
51CF000
stack
page read and write
581B000
heap
page read and write
D01000
heap
page read and write
C78000
heap
page read and write
2990000
direct allocation
page read and write
C6B000
heap
page read and write
57BC000
heap
page read and write
D30000
heap
page read and write
D06000
heap
page read and write
7DD000
unkown
page execute and read and write
508F000
stack
page read and write
19C000
stack
page read and write
582A000
heap
page read and write
4A9D000
heap
page read and write
E7A000
heap
page read and write
C10000
heap
page read and write
596000
unkown
page read and write
1080000
remote allocation
page read and write
58A000
unkown
page readonly
5180000
remote allocation
page read and write
790000
unkown
page execute and read and write
CDE000
stack
page read and write
C95000
heap
page read and write
598000
unkown
page execute and read and write
19C000
stack
page read and write
980000
unkown
page execute read
5798000
heap
page read and write
580A000
heap
page read and write
980000
unkown
page execute read
D06000
heap
page read and write
C70000
direct allocation
page read and write
C10000
heap
page read and write
5798000
heap
page read and write
57F0000
heap
page read and write
CE0000
direct allocation
page read and write
9C000
stack
page read and write
1090000
heap
page read and write
C47000
heap
page read and write
CF0000
heap
page read and write
401000
unkown
page execute read
2990000
direct allocation
page read and write
29A0000
heap
page read and write
596000
unkown
page write copy
DB0000
direct allocation
page read and write
79A000
unkown
page execute and read and write
58A000
unkown
page readonly
583000
unkown
page execute and read and write
5B70000
trusted library allocation
page read and write
57F6000
heap
page read and write
E0D000
heap
page read and write
582F000
heap
page read and write
57F6000
heap
page read and write
57CC000
heap
page read and write
55D000
unkown
page readonly
5804000
heap
page read and write
400000
unkown
page readonly
580A000
heap
page read and write
578C000
heap
page read and write
7B4000
unkown
page execute and read and write
9B000
stack
page read and write
C52000
heap
page read and write
57BD000
heap
page read and write
5780000
heap
page read and write
D09000
heap
page read and write
5180000
remote allocation
page read and write
57BC000
heap
page read and write
585000
unkown
page read and write
55D000
unkown
page readonly
400000
unkown
page readonly
5B70000
trusted library allocation
page read and write
7B4000
unkown
page execute and read and write
7B4000
unkown
page execute and read and write
57EB000
heap
page read and write
55D000
unkown
page readonly
D10000
heap
page read and write
D99000
heap
page read and write
57DE000
heap
page read and write
D35000
heap
page read and write
980000
unkown
page execute read
57FC000
heap
page read and write
4D8E000
stack
page read and write
100E000
stack
page read and write
580A000
heap
page read and write
578B000
heap
page read and write
57BD000
heap
page read and write
57CF000
heap
page read and write
55D000
unkown
page readonly
7D8000
unkown
page execute and read and write
10DE000
stack
page read and write
576F000
stack
page read and write
51AF000
stack
page read and write
C40000
heap
page read and write
57D3000
heap
page read and write
790000
unkown
page execute and read and write
57DE000
heap
page read and write
111E000
heap
page read and write
5836000
heap
page read and write
5B70000
trusted library allocation
page read and write
E93000
heap
page read and write
55D000
unkown
page readonly
58A000
unkown
page readonly
E08000
heap
page read and write
401000
unkown
page execute read
7E2000
unkown
page execute and read and write
49B7000
heap
page read and write
585000
unkown
page read and write
57DC000
heap
page read and write
790000
unkown
page execute and read and write
5180000
remote allocation
page read and write
57E5000
heap
page read and write
578E000
heap
page read and write
5771000
heap
page read and write
11B0000
remote allocation
page read and write
11B0000
remote allocation
page read and write
79A000
unkown
page execute and read and write
2850000
direct allocation
page read and write
585000
unkown
page read and write
DF0000
heap
page read and write
79A000
unkown
page execute and read and write
58A000
unkown
page readonly
D7A000
heap
page read and write
585000
unkown
page write copy
596000
unkown
page write copy
5B70000
trusted library allocation
page read and write
57BD000
heap
page read and write
57BD000
heap
page read and write
596000
unkown
page read and write
D90000
direct allocation
page read and write
400000
unkown
page readonly
2980000
heap
page read and write
57BA000
heap
page read and write
581A000
heap
page read and write
57DB000
heap
page read and write
55D000
unkown
page execute and read and write
2990000
direct allocation
page read and write
562F000
stack
page read and write
7A2000
unkown
page execute and read and write
C7A000
heap
page read and write
D0A000
heap
page read and write
401000
unkown
page execute read
5B70000
trusted library allocation
page read and write
578B000
heap
page read and write
E4B000
heap
page read and write
D02000
heap
page read and write
4DEE000
stack
page read and write
57DE000
heap
page read and write
D5D000
heap
page read and write
57EE000
heap
page read and write
DE0000
heap
page read and write
1F5000
heap
page read and write
6171000
heap
page read and write
57E8000
heap
page read and write
980000
unkown
page execute read
596000
unkown
page read and write
566E000
stack
page read and write
980000
unkown
page execute read
578C000
heap
page read and write
57C9000
heap
page read and write
980000
unkown
page execute read
57DD000
heap
page read and write
2990000
direct allocation
page read and write
401000
unkown
page execute read
7E2000
unkown
page execute and read and write
C65000
heap
page read and write
578C000
heap
page read and write
5B70000
trusted library allocation
page read and write
7B4000
unkown
page execute and read and write
400000
unkown
page readonly
57F7000
heap
page read and write
7A2000
unkown
page execute and read and write
DC0000
heap
page read and write
562F000
stack
page read and write
585000
unkown
page write copy
5B6F000
stack
page read and write
C00000
heap
page read and write
585000
unkown
page read and write
DB0000
direct allocation
page read and write
57DC000
heap
page read and write
D61000
heap
page read and write
7E2000
unkown
page execute and read and write
D8A000
heap
page read and write
D6B000
heap
page read and write
D1E000
stack
page read and write
5A6F000
stack
page read and write
596000
unkown
page read and write
57DE000
heap
page read and write
57E2000
heap
page read and write
FCE000
stack
page read and write
C7C000
heap
page read and write
5836000
heap
page read and write
5804000
heap
page read and write
C1E000
heap
page read and write
11B0000
remote allocation
page read and write
5510000
heap
page read and write
57A9000
heap
page read and write
CA2000
heap
page read and write
57E5000
heap
page read and write
2850000
direct allocation
page read and write
57FD000
heap
page read and write
57D1000
heap
page read and write
5780000
heap
page read and write
57CC000
heap
page read and write
57D4000
heap
page read and write
401000
unkown
page execute read
EA1000
heap
page read and write
57B9000
heap
page read and write
C5E000
stack
page read and write
4B3A000
heap
page read and write
5836000
heap
page read and write
D06000
heap
page read and write
9C000
stack
page read and write
There are 493 hidden memdumps, click here to show them.