IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
initial sample
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\l2[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\k[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_c81e728d9d4c2f636f067f89cc14862c\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\fAeDYcmqiE_joVxmGjCsOKI.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\IQUKpYR1BFFsqw1YWBOv.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\VkHLTH_m2kErRb6vpA5n.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\adobeaXLeM4rqVSWS\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeaXLeM4rqVSWS\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobeaXLeM4rqVSWS\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\4tSPFpXQutr4Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\6AnhfraUJlEqWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\9jprAd9TJlp8History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\BnEseNXlZ88bCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\IU0ppEceFl7lWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\JRnMnaejRFpgHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\J_WXka4lbCqfLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\_8oNeyvPRQyICookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\dodb_DQcaf8eLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\huOuGcbbeYhHWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\itwYrTLtu21UWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\m6tIV73IadSxHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\prD5bQEFZ56iLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\sdru5iOyd6bwHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\y2gVOPXLowdsWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Tue Apr 16 13:23:30 2024, mtime=Tue Apr 16 13:23:30 2024, atime=Tue Apr 16 13:23:29 2024, length=4563640, window=hide
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\VkHLTH_m2kErRb6vpA5n.exe
"C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\VkHLTH_m2kErRb6vpA5n.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\IQUKpYR1BFFsqw1YWBOv.exe
"C:\Users\user\AppData\Local\Temp\heidiaXLeM4rqVSWS\IQUKpYR1BFFsqw1YWBOv.exe"
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
"C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.175/server/k/l2.exe
193.233.132.175
malicious
https://db-ip.com:443/demo/home.php?s=81.181.57.52
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://193.233.132.175/server/k/l2.exeia
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
http://193.233.132.175/server/k/l2.exey
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/81.181.57.52
34.117.186.192
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe
185.199.220.53
https://t.me/risepro_botO
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe27
unknown
https://t.me/risepro_bot.52
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exe
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://easy2buy.ae/wp-content/upgrade/k.exeQn%
unknown
https://t.me/risepro_bot
unknown
https://easy2buy.ae/p
unknown
https://ipinfo.io/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52
104.26.5.15
https://ipinfo.io:443/widget/demo/81.181.57.52
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://easy2buy.ae/:
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://193.233.132.175/server/k/l2.exeg
unknown
http://www.winimage.com/zLibDllDpRTpR
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
easy2buy.ae
185.199.220.53
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
193.233.132.47
unknown
Russian Federation
malicious
193.233.132.175
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States
185.199.220.53
easy2buy.ae
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5D60000
heap
page read and write
malicious
5D70000
heap
page read and write
5D77000
heap
page read and write
B5D000
unkown
page readonly
5D78000
heap
page read and write
2FBE000
stack
page read and write
5D41000
heap
page read and write
1E0000
heap
page read and write
553D000
stack
page read and write
2A71000
heap
page read and write
C3E000
stack
page read and write
5FF2000
heap
page read and write
EA6000
heap
page read and write
A42000
unkown
page readonly
F8E000
stack
page read and write
B78000
unkown
page execute and read and write
2A60000
direct allocation
page read and write
B5D000
unkown
page readonly
F2F000
heap
page read and write
B79000
unkown
page write copy
5F7B000
heap
page read and write
C7E000
stack
page read and write
5D3C000
heap
page read and write
271E000
stack
page read and write
5D75000
heap
page read and write
193000
stack
page read and write
A42000
unkown
page readonly
D4E000
stack
page read and write
28C0000
heap
page read and write
5D6C000
heap
page read and write
2A60000
direct allocation
page read and write
63C0000
direct allocation
page execute and read and write
5D6C000
heap
page read and write
2A71000
heap
page read and write
405000
unkown
page execute read
2A71000
heap
page read and write
5D56000
heap
page read and write
404000
unkown
page execute and read and write
5D3A000
heap
page read and write
401000
unkown
page execute read
5DB5000
heap
page read and write
2900000
heap
page read and write
B78000
unkown
page execute and write copy
A42000
unkown
page readonly
A42000
unkown
page readonly
5E30000
trusted library allocation
page read and write
401000
unkown
page execute read
5D85000
heap
page read and write
5D84000
heap
page read and write
B78000
unkown
page execute and write copy
B79000
unkown
page write copy
2B70000
heap
page read and write
401000
unkown
page execute and write copy
E4E000
heap
page read and write
BE0000
heap
page read and write
5D8F000
heap
page read and write
A42000
unkown
page readonly
E2E000
heap
page read and write
5D41000
heap
page read and write
5D78000
heap
page read and write
5D56000
heap
page read and write
405000
unkown
page execute read
F67000
heap
page read and write
117F000
stack
page read and write
400000
unkown
page readonly
5F75000
heap
page read and write
403000
unkown
page readonly
5B4000
unkown
page execute and read and write
401000
unkown
page execute read
B79000
unkown
page write copy
5D74000
heap
page read and write
5D70000
heap
page read and write
5FB7000
heap
page read and write
5B4000
unkown
page execute and read and write
5D6C000
heap
page read and write
FA4000
heap
page read and write
698E000
stack
page read and write
2A71000
heap
page read and write
2A60000
direct allocation
page read and write
D40000
heap
page read and write
5D41000
heap
page read and write
5E30000
trusted library allocation
page read and write
5D7D000
heap
page read and write
5B4000
unkown
page execute and read and write
A42000
unkown
page readonly
401000
unkown
page execute read
F60000
heap
page read and write
C50000
heap
page read and write
5D37000
heap
page read and write
5D87000
heap
page read and write
105F000
stack
page read and write
5D4D000
heap
page read and write
401000
unkown
page execute and write copy
5D36000
heap
page read and write
B78000
unkown
page execute and read and write
FA4000
heap
page read and write
B78000
unkown
page execute and write copy
9C000
stack
page read and write
5D36000
heap
page read and write
5D4D000
heap
page read and write
630E000
heap
page read and write
C6E000
heap
page read and write
2A71000
heap
page read and write
D1A000
heap
page read and write
270E000
stack
page read and write
400000
unkown
page readonly
405000
unkown
page execute read
6C2000
unkown
page execute and read and write
EBB000
heap
page read and write
C9E000
stack
page read and write
E30000
heap
page read and write
2A71000
heap
page read and write
5D36000
heap
page read and write
5D67000
heap
page read and write
29F0000
heap
page read and write
63A6000
heap
page read and write
1E0000
heap
page read and write
56BE000
stack
page read and write
2A71000
heap
page read and write
613A000
heap
page read and write
405000
unkown
page execute read
5D56000
heap
page read and write
5D70000
heap
page read and write
5D80000
heap
page read and write
B78000
unkown
page execute and read and write
584E000
stack
page read and write
2A71000
heap
page read and write
BF0000
heap
page read and write
401000
unkown
page execute and write copy
5D80000
heap
page read and write
5D41000
heap
page read and write
5D86000
heap
page read and write
F8F000
stack
page read and write
C8E000
stack
page read and write
63A7000
heap
page read and write
57E0000
remote allocation
page read and write
E5A000
heap
page read and write
B79000
unkown
page write copy
545000
unkown
page execute read
5D84000
heap
page read and write
5D6D000
heap
page read and write
401000
unkown
page execute and write copy
5D92000
heap
page read and write
B5D000
unkown
page readonly
400000
unkown
page readonly
5D75000
heap
page read and write
5D41000
heap
page read and write
2822000
heap
page read and write
5B0E000
unkown
page read and write
E85000
heap
page read and write
D78000
heap
page read and write
404000
unkown
page execute and read and write
5CE0000
heap
page read and write
5D6D000
heap
page read and write
923000
unkown
page execute read
594F000
stack
page read and write
E10000
heap
page read and write
582000
unkown
page execute and read and write
5F5B000
heap
page read and write
9C000
stack
page read and write
B78000
unkown
page execute and write copy
2A60000
direct allocation
page read and write
5D8C000
heap
page read and write
FDF000
stack
page read and write
403000
unkown
page readonly
404000
unkown
page execute and read and write
5D95000
heap
page read and write
5D88000
heap
page read and write
5D75000
heap
page read and write
5DAE000
heap
page read and write
5D7F000
heap
page read and write
400000
unkown
page readonly
2A71000
heap
page read and write
5D83000
heap
page read and write
B78000
unkown
page execute and read and write
ED7000
heap
page read and write
2A71000
heap
page read and write
5D6D000
heap
page read and write
5DC1000
heap
page read and write
5D36000
heap
page read and write
2A71000
heap
page read and write
2834000
heap
page read and write
5F68000
heap
page read and write
193000
stack
page read and write
400000
unkown
page readonly
E96000
heap
page read and write
9C000
stack
page read and write
193000
stack
page read and write
5D6C000
heap
page read and write
E8E000
heap
page read and write
401000
unkown
page execute read
FA4000
heap
page read and write
646A000
heap
page read and write
2A71000
heap
page read and write
EE3000
heap
page read and write
2A71000
heap
page read and write
FA4000
heap
page read and write
BF0000
heap
page read and write
2A71000
heap
page read and write
313E000
stack
page read and write
D0E000
heap
page read and write
6135000
heap
page read and write
5E30000
trusted library allocation
page read and write
2A71000
heap
page read and write
674C000
stack
page read and write
5F31000
heap
page read and write
5B4000
unkown
page execute and read and write
5D95000
heap
page read and write
28DF000
stack
page read and write
5D95000
heap
page read and write
BEA000
heap
page read and write
5D9D000
heap
page read and write
5E30000
trusted library allocation
page read and write
BE0000
heap
page read and write
5D94000
heap
page read and write
5F30000
heap
page read and write
271E000
stack
page read and write
5D3A000
heap
page read and write
2A60000
direct allocation
page read and write
5DAE000
heap
page read and write
12BE000
stack
page read and write
5D78000
heap
page read and write
403000
unkown
page readonly
5D54000
heap
page read and write
2A60000
direct allocation
page read and write
5D8E000
heap
page read and write
5F72000
heap
page read and write
401000
unkown
page execute and write copy
5D41000
heap
page read and write
5D4D000
heap
page read and write
2A71000
heap
page read and write
5E30000
trusted library allocation
page read and write
D60000
heap
page read and write
5D41000
heap
page read and write
5D41000
heap
page read and write
5D86000
heap
page read and write
BE0000
heap
page read and write
57E0000
remote allocation
page read and write
5D75000
heap
page read and write
2C10000
heap
page read and write
405000
unkown
page execute read
2A71000
heap
page read and write
6FB000
unkown
page execute and read and write
D9E000
heap
page read and write
BF0000
heap
page read and write
5D4D000
heap
page read and write
404000
unkown
page execute and read and write
E1F000
stack
page read and write
2A71000
heap
page read and write
5D36000
heap
page read and write
5D75000
heap
page read and write
5D7F000
heap
page read and write
5D63000
heap
page read and write
649A000
heap
page read and write
400000
unkown
page readonly
30BF000
stack
page read and write
EEE000
heap
page read and write
D0A000
heap
page read and write
5DB5000
heap
page read and write
2A60000
direct allocation
page read and write
401000
unkown
page execute and write copy
E40000
heap
page read and write
567F000
stack
page read and write
D9A000
heap
page read and write
5D80000
heap
page read and write
B79000
unkown
page write copy
281E000
stack
page read and write
400000
unkown
page readonly
193000
stack
page read and write
5D6C000
heap
page read and write
280F000
stack
page read and write
6D0000
unkown
page execute and read and write
BF0000
heap
page read and write
B79000
unkown
page write copy
E4A000
heap
page read and write
B5D000
unkown
page readonly
5D6C000
heap
page read and write
B79000
unkown
page write copy
FA4000
heap
page read and write
557E000
stack
page read and write
CF0000
heap
page read and write
5D94000
heap
page read and write
2A60000
direct allocation
page read and write
63C3000
heap
page read and write
405000
unkown
page execute read
5D3A000
heap
page read and write
5E30000
trusted library allocation
page read and write
C3E000
stack
page read and write
401000
unkown
page execute and write copy
6440000
direct allocation
page execute and read and write
CC0000
heap
page read and write
D1E000
stack
page read and write
F21000
heap
page read and write
5F6A000
heap
page read and write
5D97000
heap
page read and write
BF0000
heap
page read and write
5D83000
heap
page read and write
F3F000
stack
page read and write
66E0000
heap
page read and write
57BF000
stack
page read and write
5D3A000
heap
page read and write
2910000
heap
page read and write
C3E000
stack
page read and write
5D40000
heap
page read and write
5D6C000
heap
page read and write
5B4000
unkown
page execute and read and write
5D4D000
heap
page read and write
5D8C000
heap
page read and write
5D41000
heap
page read and write
515000
unkown
page readonly
6C4000
unkown
page execute and read and write
5D7E000
heap
page read and write
A00000
unkown
page execute and read and write
5D70000
heap
page read and write
9C000
stack
page read and write
5D36000
heap
page read and write
105F000
stack
page read and write
9C000
stack
page read and write
B79000
unkown
page write copy
BEE000
heap
page read and write
B78000
unkown
page execute and write copy
A42000
unkown
page readonly
5D75000
heap
page read and write
405000
unkown
page execute read
E5E000
heap
page read and write
5F75000
heap
page read and write
5D67000
heap
page read and write
5D6C000
heap
page read and write
C2E000
stack
page read and write
5D3C000
heap
page read and write
5D36000
heap
page read and write
5D8B000
heap
page read and write
401000
unkown
page execute read
5D6C000
heap
page read and write
5DBB000
heap
page read and write
5D3C000
heap
page read and write
5D33000
heap
page read and write
404000
unkown
page execute and read and write
400000
unkown
page readonly
BE0000
heap
page read and write
59F000
unkown
page execute and read and write
5D6C000
heap
page read and write
5D6C000
heap
page read and write
5FB6000
heap
page read and write
5D72000
heap
page read and write
5D37000
heap
page read and write
BEA000
heap
page read and write
5D82000
heap
page read and write
193000
stack
page read and write
2A71000
heap
page read and write
5D3A000
heap
page read and write
C6A000
heap
page read and write
B78000
unkown
page execute and read and write
5D6C000
heap
page read and write
5DD0000
heap
page read and write
5D36000
heap
page read and write
2A71000
heap
page read and write
2826000
heap
page read and write
5D70000
heap
page read and write
5E30000
trusted library allocation
page read and write
D1E000
stack
page read and write
5D36000
heap
page read and write
2A60000
direct allocation
page read and write
670E000
stack
page read and write
B78000
unkown
page execute and read and write
EE3000
heap
page read and write
403000
unkown
page readonly
5D94000
heap
page read and write
2A71000
heap
page read and write
B79000
unkown
page write copy
5D36000
heap
page read and write
BE0000
heap
page read and write
2A71000
heap
page read and write
A42000
unkown
page readonly
401000
unkown
page execute read
5D95000
heap
page read and write
5D6C000
heap
page read and write
5D7A000
heap
page read and write
688C000
stack
page read and write
5D36000
heap
page read and write
108E000
stack
page read and write
401000
unkown
page execute read
9C000
stack
page read and write
5D94000
heap
page read and write
2830000
heap
page read and write
6136000
heap
page read and write
193000
stack
page read and write
5D70000
heap
page read and write
10DF000
stack
page read and write
5F55000
heap
page read and write
400000
unkown
page readonly
5D6C000
heap
page read and write
5DB9000
heap
page read and write
2A80000
heap
page read and write
11BE000
stack
page read and write
2A60000
direct allocation
page read and write
5F5A000
heap
page read and write
BE0000
heap
page read and write
B78000
unkown
page execute and read and write
5D4C000
heap
page read and write
193000
stack
page read and write
5D36000
heap
page read and write
401000
unkown
page execute read
5D64000
heap
page read and write
E0F000
stack
page read and write
5D4D000
heap
page read and write
5B4000
unkown
page execute and read and write
5D36000
heap
page read and write
6032000
heap
page read and write
5E30000
trusted library allocation
page read and write
5F75000
heap
page read and write
5F79000
heap
page read and write
FA4000
heap
page read and write
2A71000
heap
page read and write
400000
unkown
page readonly
6133000
heap
page read and write
400000
unkown
page readonly
5D75000
heap
page read and write
5D56000
heap
page read and write
A42000
unkown
page readonly
E40000
heap
page read and write
B79000
unkown
page write copy
2960000
heap
page read and write
D90000
heap
page read and write
5E30000
trusted library allocation
page read and write
5D90000
heap
page read and write
57E0000
remote allocation
page read and write
63AC000
heap
page read and write
C30000
heap
page read and write
193000
stack
page read and write
540000
unkown
page execute and read and write
5D41000
heap
page read and write
5D41000
heap
page read and write
5B4000
unkown
page execute and read and write
F7E000
stack
page read and write
9C000
stack
page read and write
5D6C000
heap
page read and write
2A20000
heap
page read and write
2A71000
heap
page read and write
5D35000
heap
page read and write
E1E000
stack
page read and write
BEE000
heap
page read and write
543D000
stack
page read and write
CE0000
heap
page read and write
401000
unkown
page execute and write copy
5D77000
heap
page read and write
FA4000
heap
page read and write
5D41000
heap
page read and write
6700000
heap
page read and write
2A71000
heap
page read and write
2A71000
heap
page read and write
EAC000
heap
page read and write
5D7A000
heap
page read and write
5DA6000
heap
page read and write
C40000
heap
page read and write
5D6C000
heap
page read and write
2A71000
heap
page read and write
ED7000
heap
page read and write
2A60000
direct allocation
page read and write
5D46000
heap
page read and write
A42000
unkown
page readonly
D1E000
heap
page read and write
B79000
unkown
page write copy
5D80000
heap
page read and write
5D70000
heap
page read and write
5D4C000
heap
page read and write
405000
unkown
page execute read
5E30000
trusted library allocation
page read and write
5D78000
heap
page read and write
C77000
heap
page read and write
2A71000
heap
page read and write
DD0000
heap
page read and write
5DB9000
heap
page read and write
6D4000
unkown
page execute and read and write
5D87000
heap
page read and write
5D95000
heap
page read and write
404000
unkown
page execute and read and write
6600000
heap
page read and write
2A70000
heap
page read and write
403000
unkown
page readonly
400000
unkown
page readonly
B79000
unkown
page write copy
F5E000
stack
page read and write
684F000
stack
page read and write
401000
unkown
page execute and write copy
5D6C000
heap
page read and write
E20000
heap
page read and write
5D92000
heap
page read and write
5D3E000
heap
page read and write
D70000
heap
page read and write
C10000
heap
page read and write
5D4C000
heap
page read and write
5D42000
heap
page read and write
5D6C000
heap
page read and write
CC0000
heap
page read and write
D00000
heap
page read and write
2A71000
heap
page read and write
9C000
stack
page read and write
405000
unkown
page execute read
B78000
unkown
page execute and read and write
B79000
unkown
page write copy
401000
unkown
page execute and write copy
5C6E000
stack
page read and write
400000
unkown
page readonly
5F69000
heap
page read and write
2A60000
heap
page read and write
5D75000
heap
page read and write
405000
unkown
page execute read
B78000
unkown
page execute and write copy
B5D000
unkown
page readonly
5D3A000
heap
page read and write
5F2F000
stack
page read and write
2A71000
heap
page read and write
5D5D000
heap
page read and write
5D36000
heap
page read and write
5D6C000
heap
page read and write
5153000
heap
page read and write
D80000
heap
page read and write
5C0F000
stack
page read and write
2A71000
heap
page read and write
5D4D000
heap
page read and write
CC0000
heap
page read and write
C70000
heap
page read and write
E2A000
heap
page read and write
5D65000
heap
page read and write
2A71000
heap
page read and write
B5D000
unkown
page readonly
BE0000
heap
page read and write
F7E000
stack
page read and write
2A60000
direct allocation
page read and write
400000
unkown
page readonly
5B4000
unkown
page execute and read and write
5D70000
heap
page read and write
5D6C000
heap
page read and write
5D6C000
heap
page read and write
B78000
unkown
page execute and write copy
B5D000
unkown
page readonly
B79000
unkown
page write copy
403000
unkown
page readonly
5D56000
heap
page read and write
5D95000
heap
page read and write
281F000
stack
page read and write
401000
unkown
page execute and write copy
193000
stack
page read and write
400000
unkown
page readonly
5DE5000
heap
page read and write
2A71000
heap
page read and write
F3F000
stack
page read and write
400000
unkown
page readonly
5E30000
trusted library allocation
page read and write
CD0000
heap
page read and write
2A71000
heap
page read and write
403000
unkown
page readonly
FA4000
heap
page read and write
2A71000
heap
page read and write
271E000
stack
page read and write
F1F000
stack
page read and write
9C000
stack
page read and write
5D54000
heap
page read and write
2B90000
direct allocation
page read and write
2A60000
direct allocation
page read and write
6989000
stack
page read and write
18E000
stack
page read and write
B78000
unkown
page execute and read and write
401000
unkown
page execute read
2888000
heap
page read and write
5B4000
unkown
page execute and read and write
5D97000
heap
page read and write
E50000
heap
page read and write
5F72000
heap
page read and write
2A60000
direct allocation
page read and write
B78000
unkown
page execute and write copy
ECE000
heap
page read and write
5B4000
unkown
page execute and read and write
5D4C000
heap
page read and write
5D6C000
heap
page read and write
5D6C000
heap
page read and write
9C000
stack
page read and write
403000
unkown
page readonly
5D36000
heap
page read and write
598E000
stack
page read and write
5D41000
heap
page read and write
B78000
unkown
page execute and write copy
EEB000
heap
page read and write
9B000
stack
page read and write
5D6D000
heap
page read and write
6135000
heap
page read and write
5D6D000
heap
page read and write
B79000
unkown
page write copy
B78000
unkown
page execute and write copy
BE0000
heap
page read and write
BE0000
heap
page read and write
5D92000
heap
page read and write
5D6D000
heap
page read and write
5D8B000
heap
page read and write
F20000
heap
page read and write
EC1000
heap
page read and write
E40000
heap
page read and write
2A71000
heap
page read and write
B79000
unkown
page write copy
9C000
stack
page read and write
F5E000
stack
page read and write
D10000
heap
page read and write
61F6000
heap
page read and write
5D86000
heap
page read and write
6C8000
unkown
page execute and read and write
5D41000
heap
page read and write
403000
unkown
page readonly
B79000
unkown
page write copy
5F75000
heap
page read and write
63AE000
heap
page read and write
CD0000
heap
page read and write
2A71000
heap
page read and write
B78000
unkown
page execute and read and write
ECC000
heap
page read and write
5DA5000
heap
page read and write
5D4E000
heap
page read and write
E92000
heap
page read and write
400000
unkown
page readonly
2A71000
heap
page read and write
5D33000
heap
page read and write
281E000
stack
page read and write
9C000
stack
page read and write
5A8B000
stack
page read and write
5D36000
heap
page read and write
5D36000
heap
page read and write
5E30000
trusted library allocation
page read and write
FA4000
heap
page read and write
404000
unkown
page execute and read and write
E08000
unkown
page execute and read and write
5D3A000
heap
page read and write
2940000
heap
page read and write
5D4D000
heap
page read and write
5F5A000
heap
page read and write
5D41000
heap
page read and write
65EC000
stack
page read and write
3140000
heap
page read and write
F1F000
stack
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
401000
unkown
page execute and write copy
193000
stack
page read and write
B78000
unkown
page execute and read and write
5D4C000
heap
page read and write
B5D000
unkown
page readonly
5D6D000
heap
page read and write
2C17000
heap
page read and write
5D70000
heap
page read and write
5D41000
heap
page read and write
FA4000
heap
page read and write
F3F000
stack
page read and write
E48000
heap
page read and write
2A71000
heap
page read and write
5D6C000
heap
page read and write
5D6C000
heap
page read and write
E08000
unkown
page execute and write copy
5D84000
heap
page read and write
5D3A000
heap
page read and write
6590000
unkown
page read and write
A42000
unkown
page readonly
6D2000
unkown
page execute and read and write
DD0000
heap
page read and write
5D6C000
heap
page read and write
5D8F000
heap
page read and write
193000
stack
page read and write
FCF000
stack
page read and write
5D92000
heap
page read and write
404000
unkown
page execute and read and write
E1E000
stack
page read and write
2A71000
heap
page read and write
5D6C000
heap
page read and write
6CA000
unkown
page execute and read and write
5D8D000
heap
page read and write
6CE000
unkown
page execute and read and write
5D85000
heap
page read and write
5D4C000
heap
page read and write
5DB5000
heap
page read and write
BE0000
heap
page read and write
2A60000
direct allocation
page read and write
5D90000
heap
page read and write
5D63000
heap
page read and write
5D6C000
heap
page read and write
5D6C000
heap
page read and write
EB9000
heap
page read and write
5D6D000
heap
page read and write
546000
unkown
page readonly
E1E000
stack
page read and write
2A60000
direct allocation
page read and write
193000
stack
page read and write
5D4C000
heap
page read and write
5D6C000
heap
page read and write
401000
unkown
page execute and write copy
5F68000
heap
page read and write
B5D000
unkown
page readonly
5D88000
heap
page read and write
5D3A000
heap
page read and write
5E30000
trusted library allocation
page read and write
400000
unkown
page readonly
5DBB000
heap
page read and write
400000
unkown
page readonly
103F000
stack
page read and write
BF0000
heap
page read and write
F2B000
heap
page read and write
2A71000
heap
page read and write
EA4000
heap
page read and write
107F000
stack
page read and write
2B90000
direct allocation
page read and write
D1E000
stack
page read and write
5DC1000
heap
page read and write
2A71000
heap
page read and write
5D41000
heap
page read and write
584000
unkown
page readonly
5D4D000
heap
page read and write
5D3A000
heap
page read and write
400000
unkown
page readonly
5D3A000
heap
page read and write
5D71000
heap
page read and write
6571000
heap
page read and write
28E0000
heap
page read and write
400000
unkown
page readonly
5D41000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
B79000
unkown
page write copy
2B70000
trusted library allocation
page read and write
5D6C000
heap
page read and write
2A71000
heap
page read and write
2A60000
direct allocation
page read and write
C3E000
stack
page read and write
403000
unkown
page readonly
5D75000
heap
page read and write
D0E000
stack
page read and write
B79000
unkown
page write copy
B78000
unkown
page execute and write copy
6D6000
unkown
page execute and read and write
5D3E000
heap
page read and write
B79000
unkown
page write copy
5D71000
heap
page read and write
E09000
unkown
page write copy
5D56000
heap
page read and write
405000
unkown
page execute read
5B4000
unkown
page execute and read and write
405000
unkown
page execute read
D5E000
stack
page read and write
5D33000
heap
page read and write
5B4000
unkown
page execute and read and write
CE0000
heap
page read and write
2A71000
heap
page read and write
5D84000
heap
page read and write
2840000
heap
page read and write
B79000
unkown
page write copy
400000
unkown
page readonly
5D41000
heap
page read and write
B78000
unkown
page execute and write copy
5F7B000
heap
page read and write
5D33000
heap
page read and write
6CC000
unkown
page execute and read and write
10CE000
stack
page read and write
5D6C000
heap
page read and write
B5D000
unkown
page readonly
400000
unkown
page readonly
5DC1000
heap
page read and write
B79000
unkown
page write copy
403000
unkown
page readonly
A42000
unkown
page readonly
2970000
heap
page read and write
5D8C000
heap
page read and write
5D6C000
heap
page read and write
401000
unkown
page execute and write copy
5D6C000
heap
page read and write
404000
unkown
page execute and read and write
107F000
stack
page read and write
193000
stack
page read and write
5D30000
heap
page read and write
B78000
unkown
page execute and write copy
400000
unkown
page readonly
5D6C000
heap
page read and write
5D6C000
heap
page read and write
5D6C000
heap
page read and write
401000
unkown
page execute read
5DA0000
heap
page read and write
6C0000
unkown
page execute and read and write
404000
unkown
page execute and read and write
C80000
heap
page read and write
5F75000
heap
page read and write
2B98000
heap
page read and write
5DA5000
heap
page read and write
193000
stack
page read and write
5E30000
trusted library allocation
page read and write
9C000
stack
page read and write
B79000
unkown
page write copy
404000
unkown
page execute and read and write
5D6C000
heap
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
DC0000
heap
page read and write
63A2000
heap
page read and write
2A60000
direct allocation
page read and write
6952000
heap
page read and write
B78000
unkown
page execute and read and write
E09000
unkown
page write copy
403000
unkown
page readonly
5D86000
heap
page read and write
F21000
heap
page read and write
ECA000
heap
page read and write
6C6000
unkown
page execute and read and write
405000
unkown
page execute read
5D80000
heap
page read and write
400000
unkown
page readonly
A42000
unkown
page readonly
FA0000
heap
page read and write
5D72000
heap
page read and write
2A71000
heap
page read and write
B5D000
unkown
page readonly
5D6C000
heap
page read and write
EEB000
heap
page read and write
403000
unkown
page readonly
404000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
C17000
heap
page read and write
5D41000
heap
page read and write
BE0000
heap
page read and write
5D70000
heap
page read and write
30FE000
stack
page read and write
5D8C000
heap
page read and write
2A71000
heap
page read and write
C60000
heap
page read and write
B5D000
unkown
page readonly
CA0000
heap
page read and write
401000
unkown
page execute read
5E30000
trusted library allocation
page read and write
401000
unkown
page execute read
CD0000
heap
page read and write
EEE000
heap
page read and write
B5D000
unkown
page readonly
404000
unkown
page execute and read and write
5D3D000
heap
page read and write
5D31000
heap
page read and write
B79000
unkown
page write copy
B78000
unkown
page execute and read and write
E9C000
heap
page read and write
5E30000
trusted library allocation
page read and write
2C5F000
heap
page read and write
5D41000
heap
page read and write
5D6D000
heap
page read and write
D60000
heap
page read and write
5D36000
heap
page read and write
2A71000
heap
page read and write
There are 838 hidden memdumps, click here to show them.