IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
initial sample
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\l2[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\k[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_c81e728d9d4c2f636f067f89cc14862c\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\N4O5NsfSeWcOdpVyEJzNeXX.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\5GPjTEvg2YHkOZkXKUIi.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\ZlHraL5DGZz7_N8TciZb.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\adobecOVVl0OfBZ6o\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobecOVVl0OfBZ6o\History\Firefox_fqs92o4p.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobecOVVl0OfBZ6o\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobecOVVl0OfBZ6o\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobecOVVl0OfBZ6o\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\8BP7ZkMsHQhlWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\9i2JSLAIY35kCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\HR9Q6FgoeADvLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\Rl9j7tONt26FWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\URUpAQROL01BHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\Yn0dVSQXuPikLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\aSCXD0QvE1HpHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\alShe_6SpO_oLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\lJtbqCxq0KEXHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\o7NdaGQfpfZRWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\oXd0vIwZVuC7History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\qkQdE9viym6rWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\rO3XIS_4feuAWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\zhRxNE8Lbf0zWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Sat Apr 20 22:12:39 2024, mtime=Sat Apr 20 22:12:39 2024, atime=Sat Apr 20 22:12:38 2024, length=4563640, window=hide
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\ZlHraL5DGZz7_N8TciZb.exe
"C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\ZlHraL5DGZz7_N8TciZb.exe"
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\5GPjTEvg2YHkOZkXKUIi.exe
"C:\Users\user\AppData\Local\Temp\heidicOVVl0OfBZ6o\5GPjTEvg2YHkOZkXKUIi.exe"
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
"C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.175/server/k/l2.exe
193.233.132.175
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://193.233.132.175/server/k/l2.exeAGx
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ocsp.sectigo.com0
unknown
https://db-ip.com/
unknown
https://easy2buy.ae/wp-content/upgrade/k.exeqT=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe
185.199.220.53
http://ns.adobe.c/right
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exe
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/risepro_botrisep.VX
unknown
https://t.me/RiseProSUPPORTD
unknown
https://ipinfo.io/widget/demo/81.181.57.52Q
unknown
https://easy2buy.ae/wp-content/upgrade/k.exebT0
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exeVTd
unknown
https://db-ip.com:443/demo/home.php?s=81.181.57.52
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://193.233.132.175/server/k/l2.exeser
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.me/RiseProSUPPORT
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
http://ns.adobe.0/g/imx
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/81.181.57.52
34.117.186.192
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://t.me/risepro_bot1.181.57.52
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/9
unknown
https://ipinfo.io/
unknown
https://easy2buy.ae/wp-content/upgrade/k.exeO
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52
104.26.4.15
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://easy2buy.ae/d
unknown
https://easy2buy.ae:80/
unknown
http://www.winimage.com/zLibDll
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://easy2buy.ae/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.winimage.com/zLibDllDpRTpR
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
easy2buy.ae
185.199.220.53
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
193.233.132.47
unknown
Russian Federation
malicious
193.233.132.175
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States
185.199.220.53
easy2buy.ae
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5956000
heap
page read and write
malicious
5E50000
heap
page read and write
2AB1000
heap
page read and write
1077000
heap
page read and write
5B7E000
heap
page read and write
285F000
stack
page read and write
5B4000
unkown
page execute and read and write
5AF7000
heap
page read and write
2AB1000
heap
page read and write
E1E000
stack
page read and write
6236000
heap
page read and write
EBA000
heap
page read and write
10AF000
stack
page read and write
B79000
unkown
page write copy
6255000
heap
page read and write
9C000
stack
page read and write
BE0000
heap
page read and write
B5D000
unkown
page readonly
F50000
heap
page read and write
66E0000
direct allocation
page execute and read and write
F5E000
stack
page read and write
401000
unkown
page execute read
193000
stack
page read and write
F94000
heap
page read and write
404000
unkown
page execute and read and write
5B97000
heap
page read and write
5B4000
unkown
page execute and read and write
119E000
stack
page read and write
B78000
unkown
page execute and write copy
10A4000
heap
page read and write
5B4000
unkown
page execute and read and write
5BF000
unkown
page execute and read and write
400000
unkown
page readonly
5ADD000
heap
page read and write
29F0000
heap
page read and write
B5D000
unkown
page readonly
403000
unkown
page readonly
D5E000
stack
page read and write
A42000
unkown
page readonly
404000
unkown
page execute and read and write
1056000
heap
page read and write
130F000
stack
page read and write
5F08000
heap
page read and write
401000
unkown
page execute read
5DA1000
heap
page read and write
EAD000
heap
page read and write
5AF7000
heap
page read and write
55DE000
stack
page read and write
2AB1000
heap
page read and write
5B36000
heap
page read and write
403000
unkown
page readonly
5B4000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
401000
unkown
page execute and write copy
5850000
heap
page read and write
5B2C000
heap
page read and write
5AF7000
heap
page read and write
9C000
stack
page read and write
D1E000
stack
page read and write
F80000
direct allocation
page read and write
F80000
direct allocation
page read and write
270E000
stack
page read and write
D37000
heap
page read and write
5B39000
heap
page read and write
B78000
unkown
page execute and write copy
2AB1000
heap
page read and write
2AB1000
heap
page read and write
193000
stack
page read and write
283F000
stack
page read and write
5AD8000
heap
page read and write
625F000
heap
page read and write
9C000
stack
page read and write
5B4000
unkown
page execute and read and write
5B5C000
heap
page read and write
545E000
stack
page read and write
400000
unkown
page readonly
18E000
stack
page read and write
106F000
heap
page read and write
5F43000
heap
page read and write
CD0000
heap
page read and write
F5E000
stack
page read and write
5820000
heap
page read and write
545000
unkown
page execute read
401000
unkown
page execute read
5E51000
heap
page read and write
5E51000
heap
page read and write
401000
unkown
page execute and write copy
EAA000
heap
page read and write
110B000
heap
page read and write
5BC0000
trusted library allocation
page read and write
5ADB000
heap
page read and write
5B01000
heap
page read and write
B78000
unkown
page execute and read and write
2AB1000
heap
page read and write
5B17000
heap
page read and write
5BC0000
trusted library allocation
page read and write
5B99000
heap
page read and write
193000
stack
page read and write
401000
unkown
page execute and write copy
5AF7000
heap
page read and write
105F000
stack
page read and write
A42000
unkown
page readonly
404000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
5BC0000
trusted library allocation
page read and write
CC0000
heap
page read and write
5ADC000
heap
page read and write
400000
unkown
page readonly
5BA6000
heap
page read and write
5BC0000
trusted library allocation
page read and write
CE0000
heap
page read and write
405000
unkown
page execute read
5B22000
heap
page read and write
2AB1000
heap
page read and write
5B01000
heap
page read and write
193000
stack
page read and write
401000
unkown
page execute and write copy
D6E000
stack
page read and write
400000
unkown
page readonly
DD8000
unkown
page readonly
E1B000
unkown
page readonly
401000
unkown
page execute and write copy
6EB000
unkown
page execute and read and write
5B80000
heap
page read and write
B78000
unkown
page execute and write copy
5AD0000
heap
page read and write
B78000
unkown
page execute and write copy
F80000
direct allocation
page read and write
400000
unkown
page readonly
9C000
stack
page read and write
5B1B000
heap
page read and write
B79000
unkown
page write copy
515000
unkown
page readonly
29A0000
heap
page read and write
5BA1000
heap
page read and write
193000
stack
page read and write
5B0C000
heap
page read and write
405000
unkown
page execute read
400000
unkown
page readonly
273E000
stack
page read and write
401000
unkown
page execute read
280F000
stack
page read and write
F80000
direct allocation
page read and write
2BB0000
direct allocation
page read and write
5BC0000
trusted library allocation
page read and write
5B55000
heap
page read and write
405000
unkown
page execute read
D4E000
stack
page read and write
403000
unkown
page readonly
405000
unkown
page execute read
400000
unkown
page readonly
C1E000
heap
page read and write
5D2F000
stack
page read and write
2970000
heap
page read and write
B78000
unkown
page execute and write copy
B78000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
5ADB000
heap
page read and write
403000
unkown
page readonly
400000
unkown
page readonly
B78000
unkown
page execute and write copy
286E000
heap
page read and write
6A6000
unkown
page execute and read and write
2C60000
heap
page read and write
6F9000
unkown
page execute and read and write
405000
unkown
page execute read
9C000
stack
page read and write
5E8D000
heap
page read and write
6A4000
unkown
page execute and read and write
1089000
heap
page read and write
BE0000
heap
page read and write
6EF000
unkown
page execute and read and write
BE0000
heap
page read and write
5B54000
heap
page read and write
6267000
heap
page read and write
5B45000
heap
page read and write
5AD9000
heap
page read and write
1E0000
heap
page read and write
67F8000
heap
page read and write
6254000
heap
page read and write
5ADD000
heap
page read and write
102C000
heap
page read and write
5B3B000
heap
page read and write
193000
stack
page read and write
E40000
heap
page read and write
CD0000
heap
page read and write
B78000
unkown
page execute and write copy
5BA1000
heap
page read and write
2AB1000
heap
page read and write
B79000
unkown
page write copy
1094000
heap
page read and write
E28000
heap
page read and write
28EF000
stack
page read and write
403000
unkown
page readonly
2AB1000
heap
page read and write
2830000
heap
page read and write
401000
unkown
page execute read
5B01000
heap
page read and write
2BB0000
trusted library allocation
page read and write
B78000
unkown
page execute and read and write
2AB1000
heap
page read and write
5B4000
unkown
page execute and read and write
549E000
stack
page read and write
F94000
heap
page read and write
2AB1000
heap
page read and write
405000
unkown
page execute read
B78000
unkown
page execute and write copy
403000
unkown
page readonly
5B21000
heap
page read and write
404000
unkown
page execute and read and write
F80000
direct allocation
page read and write
F94000
heap
page read and write
B79000
unkown
page write copy
6FD000
unkown
page execute and read and write
F94000
heap
page read and write
A42000
unkown
page readonly
69E0000
heap
page read and write
6B4000
unkown
page execute and read and write
9C000
stack
page read and write
5B10000
heap
page read and write
FBE000
stack
page read and write
5B01000
heap
page read and write
5AF7000
heap
page read and write
401000
unkown
page execute read
E6E000
heap
page read and write
E5E000
stack
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
F57000
heap
page read and write
400000
unkown
page readonly
722000
unkown
page execute and read and write
5FF9000
heap
page read and write
2AB1000
heap
page read and write
2AB1000
heap
page read and write
F94000
heap
page read and write
405000
unkown
page execute read
5AC0000
heap
page read and write
2AB1000
heap
page read and write
B79000
unkown
page write copy
193000
stack
page read and write
CC0000
heap
page read and write
5EC8000
heap
page read and write
9C000
stack
page read and write
5B42000
heap
page read and write
3130000
remote allocation
page read and write
EA0000
heap
page read and write
6AEF000
stack
page read and write
5BC0000
trusted library allocation
page read and write
9C000
stack
page read and write
280F000
stack
page read and write
5EBB000
heap
page read and write
B78000
unkown
page execute and read and write
F1F000
stack
page read and write
401000
unkown
page execute read
DCA000
heap
page read and write
A42000
unkown
page readonly
5B1C000
heap
page read and write
B5D000
unkown
page readonly
D8A000
heap
page read and write
9D2000
unkown
page execute and read and write
9B000
stack
page read and write
D80000
heap
page read and write
2AB1000
heap
page read and write
6F3000
unkown
page execute and read and write
5AC6000
heap
page read and write
283F000
stack
page read and write
2FEE000
stack
page read and write
5B78000
heap
page read and write
6C2E000
stack
page read and write
6B8000
unkown
page execute and read and write
400000
unkown
page readonly
404000
unkown
page execute and read and write
CEE000
heap
page read and write
6B2C000
stack
page read and write
2AB1000
heap
page read and write
5B74000
heap
page read and write
2AB1000
heap
page read and write
5B10000
heap
page read and write
CFE000
stack
page read and write
5B0C000
heap
page read and write
E25000
unkown
page execute and write copy
400000
unkown
page readonly
2AB1000
heap
page read and write
2900000
heap
page read and write
5B20000
heap
page read and write
5B10000
heap
page read and write
D0E000
stack
page read and write
6A8000
unkown
page execute and read and write
5AF7000
heap
page read and write
401000
unkown
page execute and write copy
5B10000
heap
page read and write
6254000
heap
page read and write
B5D000
unkown
page readonly
F94000
heap
page read and write
6E9000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
5B01000
heap
page read and write
2AC0000
heap
page read and write
404000
unkown
page execute and read and write
E1E000
stack
page read and write
6F5000
unkown
page execute and read and write
10BF000
stack
page read and write
404000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
E26000
unkown
page write copy
5B96000
heap
page read and write
C10000
heap
page read and write
5B65000
heap
page read and write
6E3000
unkown
page execute and read and write
C10000
heap
page read and write
6660000
direct allocation
page execute and read and write
D1E000
stack
page read and write
401000
unkown
page execute read
5BC0000
trusted library allocation
page read and write
1017000
heap
page read and write
5C76000
heap
page read and write
5DA3000
heap
page read and write
5B17000
heap
page read and write
B79000
unkown
page write copy
405000
unkown
page execute read
A42000
unkown
page readonly
1041000
heap
page read and write
5AF7000
heap
page read and write
400000
unkown
page readonly
401000
unkown
page execute and write copy
EAF000
stack
page read and write
2AB1000
heap
page read and write
B78000
unkown
page execute and read and write
5BC0000
trusted library allocation
page read and write
B5D000
unkown
page readonly
5F42000
heap
page read and write
5B17000
heap
page read and write
2AB1000
heap
page read and write
5B20000
heap
page read and write
5DA4000
heap
page read and write
5ADB000
heap
page read and write
5B0C000
heap
page read and write
2AB1000
heap
page read and write
5B4A000
heap
page read and write
5AF7000
heap
page read and write
2AB1000
heap
page read and write
403000
unkown
page readonly
5B20000
heap
page read and write
E10000
heap
page read and write
120E000
stack
page read and write
5B10000
heap
page read and write
5B20000
heap
page read and write
5ADB000
heap
page read and write
F80000
direct allocation
page read and write
2AB1000
heap
page read and write
5B14000
heap
page read and write
B79000
unkown
page write copy
106D000
heap
page read and write
403000
unkown
page readonly
E1F000
stack
page read and write
F80000
direct allocation
page read and write
5B14000
heap
page read and write
C20000
heap
page read and write
CC0000
heap
page read and write
F7F000
stack
page read and write
400000
unkown
page readonly
BF0000
heap
page read and write
5B96000
heap
page read and write
5B10000
heap
page read and write
F80000
direct allocation
page read and write
5B99000
heap
page read and write
1045000
heap
page read and write
E26000
unkown
page write copy
2AB1000
heap
page read and write
B78000
unkown
page execute and write copy
BE0000
heap
page read and write
B79000
unkown
page write copy
404000
unkown
page execute and read and write
6260000
heap
page read and write
5B80000
heap
page read and write
2AB1000
heap
page read and write
5967000
heap
page read and write
401000
unkown
page execute and write copy
E6A000
heap
page read and write
5AE3000
heap
page read and write
EBE000
heap
page read and write
F80000
direct allocation
page read and write
6904000
heap
page read and write
BE0000
heap
page read and write
193000
stack
page read and write
5AE9000
heap
page read and write
B79000
unkown
page write copy
5B3B000
heap
page read and write
5860000
heap
page read and write
5BC0000
trusted library allocation
page read and write
E60000
heap
page read and write
400000
unkown
page readonly
6051000
heap
page read and write
5957000
heap
page read and write
6B2000
unkown
page execute and read and write
129F000
stack
page read and write
B5D000
unkown
page readonly
5AD9000
heap
page read and write
B79000
unkown
page write copy
DA0000
heap
page read and write
686C000
stack
page read and write
BF0000
heap
page read and write
9C000
stack
page read and write
C70000
heap
page read and write
5ADD000
heap
page read and write
2AB1000
heap
page read and write
5AF7000
heap
page read and write
5FF9000
heap
page read and write
5B65000
heap
page read and write
2AB1000
heap
page read and write
2AB1000
heap
page read and write
F80000
direct allocation
page read and write
2AB1000
heap
page read and write
5ADB000
heap
page read and write
5B01000
heap
page read and write
9C000
stack
page read and write
5A8F000
stack
page read and write
F94000
heap
page read and write
F94000
heap
page read and write
A42000
unkown
page readonly
5E51000
heap
page read and write
2AB1000
heap
page read and write
CEA000
heap
page read and write
5ADB000
heap
page read and write
B78000
unkown
page execute and read and write
DCE000
heap
page read and write
2AB1000
heap
page read and write
6C29000
stack
page read and write
C1A000
heap
page read and write
B5D000
unkown
page readonly
C5E000
heap
page read and write
546000
unkown
page readonly
5B0C000
heap
page read and write
5AE9000
heap
page read and write
5B35000
heap
page read and write
5B31000
heap
page read and write
193000
stack
page read and write
BF0000
heap
page read and write
2AB1000
heap
page read and write
403000
unkown
page readonly
F80000
direct allocation
page read and write
6AE000
unkown
page execute and read and write
5BA9000
heap
page read and write
6302000
heap
page read and write
F80000
direct allocation
page read and write
B79000
unkown
page write copy
105F000
stack
page read and write
63C4000
heap
page read and write
1075000
heap
page read and write
5B78000
heap
page read and write
B78000
unkown
page execute and read and write
2C67000
heap
page read and write
5BC0000
trusted library allocation
page read and write
C00000
heap
page read and write
6FB000
unkown
page execute and read and write
105F000
heap
page read and write
F80000
direct allocation
page read and write
400000
unkown
page readonly
F94000
heap
page read and write
B79000
unkown
page write copy
A42000
unkown
page readonly
5B63000
heap
page read and write
5F7F000
heap
page read and write
1010000
heap
page read and write
B5D000
unkown
page readonly
F5F000
stack
page read and write
5B40000
heap
page read and write
1058000
heap
page read and write
1F0000
heap
page read and write
404000
unkown
page execute and read and write
F80000
direct allocation
page read and write
5B01000
heap
page read and write
6B6000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
6261000
heap
page read and write
EDF000
stack
page read and write
6A2000
unkown
page execute and read and write
2AB1000
heap
page read and write
B79000
unkown
page write copy
400000
unkown
page readonly
3130000
remote allocation
page read and write
5B2F000
heap
page read and write
10F6000
heap
page read and write
A42000
unkown
page readonly
5F7F000
heap
page read and write
2AB1000
heap
page read and write
5AE9000
heap
page read and write
D50000
heap
page read and write
5173000
heap
page read and write
400000
unkown
page readonly
5B0C000
heap
page read and write
CC0000
heap
page read and write
C5A000
heap
page read and write
5B0C000
heap
page read and write
2AB1000
heap
page read and write
5B31000
heap
page read and write
2AB1000
heap
page read and write
5B55000
heap
page read and write
2AB1000
heap
page read and write
400000
unkown
page readonly
F94000
heap
page read and write
401000
unkown
page execute read
5C2E000
stack
page read and write
E25000
unkown
page execute and read and write
5F08000
heap
page read and write
5ADB000
heap
page read and write
6256000
heap
page read and write
CD0000
heap
page read and write
A42000
unkown
page readonly
D1E000
stack
page read and write
107F000
heap
page read and write
945000
unkown
page execute read
5B80000
heap
page read and write
D00000
heap
page read and write
403000
unkown
page readonly
404000
unkown
page execute and read and write
540000
unkown
page execute and read and write
5B1C000
heap
page read and write
5AF7000
heap
page read and write
2A00000
heap
page read and write
B5D000
unkown
page readonly
5BC0000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5B01000
heap
page read and write
CD0000
heap
page read and write
400000
unkown
page readonly
5B48000
heap
page read and write
2C6A000
heap
page read and write
2AB1000
heap
page read and write
5B0C000
heap
page read and write
5B01000
heap
page read and write
5B4000
unkown
page execute and read and write
63F0000
heap
page read and write
5F07000
heap
page read and write
D8E000
heap
page read and write
5B4000
unkown
page execute and read and write
400000
unkown
page readonly
BF0000
heap
page read and write
400000
unkown
page readonly
2AB1000
heap
page read and write
5AE1000
heap
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
D0E000
stack
page read and write
5AC8000
heap
page read and write
5B10000
heap
page read and write
193000
stack
page read and write
63FA000
heap
page read and write
6B0000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
B79000
unkown
page write copy
D28000
heap
page read and write
273E000
stack
page read and write
D30000
heap
page read and write
2AB1000
heap
page read and write
BE0000
heap
page read and write
405000
unkown
page execute read
405000
unkown
page execute read
5ADD000
heap
page read and write
B79000
unkown
page write copy
6E7000
unkown
page execute and read and write
F2F000
stack
page read and write
CC0000
heap
page read and write
2AB1000
heap
page read and write
BE0000
heap
page read and write
404000
unkown
page execute and read and write
5B64000
heap
page read and write
5B25000
heap
page read and write
110A000
heap
page read and write
5BA8000
heap
page read and write
DC0000
heap
page read and write
404000
unkown
page execute and read and write
6AA000
unkown
page execute and read and write
5BA4000
heap
page read and write
2AB1000
heap
page read and write
5B31000
heap
page read and write
B5D000
unkown
page readonly
B79000
unkown
page write copy
5B20000
heap
page read and write
B78000
unkown
page execute and write copy
661E000
heap
page read and write
5B80000
heap
page read and write
30EF000
stack
page read and write
2C6D000
heap
page read and write
BE0000
heap
page read and write
5B74000
heap
page read and write
B79000
unkown
page write copy
BE0000
heap
page read and write
2AC0000
heap
page read and write
598E000
stack
page read and write
E10000
unkown
page readonly
6F1000
unkown
page execute and read and write
5BC0000
trusted library allocation
page read and write
696E000
stack
page read and write
6415000
heap
page read and write
D20000
heap
page read and write
401000
unkown
page execute read
6200000
trusted library allocation
page read and write
400000
unkown
page readonly
FE0000
heap
page read and write
2860000
heap
page read and write
A42000
unkown
page readonly
C50000
heap
page read and write
E0F000
stack
page read and write
401000
unkown
page execute read
605F000
heap
page read and write
B78000
unkown
page execute and read and write
5B0C000
heap
page read and write
270E000
stack
page read and write
69AC000
stack
page read and write
2AB1000
heap
page read and write
9C000
stack
page read and write
400000
unkown
page readonly
5B20000
heap
page read and write
B5D000
unkown
page readonly
401000
unkown
page execute and write copy
400000
unkown
page readonly
403000
unkown
page readonly
FDE000
stack
page read and write
2AB1000
heap
page read and write
5EC8000
heap
page read and write
F60000
heap
page read and write
BE0000
heap
page read and write
401000
unkown
page execute read
193000
stack
page read and write
401000
unkown
page execute and write copy
F90000
heap
page read and write
5B32000
heap
page read and write
5B32000
heap
page read and write
2855000
heap
page read and write
405000
unkown
page execute read
5B79000
heap
page read and write
2AB1000
heap
page read and write
DCD000
unkown
page readonly
400000
unkown
page readonly
6ED000
unkown
page execute and read and write
F80000
direct allocation
page read and write
56DF000
stack
page read and write
29B0000
heap
page read and write
2AB1000
heap
page read and write
5B0C000
heap
page read and write
B79000
unkown
page write copy
D10000
heap
page read and write
CC0000
heap
page read and write
5B01000
heap
page read and write
E5E000
stack
page read and write
B78000
unkown
page execute and write copy
5B74000
heap
page read and write
5C1000
unkown
page execute and read and write
B78000
unkown
page execute and write copy
5AC1000
heap
page read and write
403000
unkown
page readonly
5BC0000
trusted library allocation
page read and write
BF0000
heap
page read and write
193000
stack
page read and write
E20000
heap
page read and write
C3E000
stack
page read and write
6AC000
unkown
page execute and read and write
2AB1000
heap
page read and write
405000
unkown
page execute read
6F7000
unkown
page execute and read and write
104F000
heap
page read and write
B79000
unkown
page write copy
6E5000
unkown
page execute and read and write
5B39000
heap
page read and write
F80000
direct allocation
page read and write
5B65000
heap
page read and write
5B74000
heap
page read and write
9C000
stack
page read and write
5B4000
unkown
page execute and read and write
5B14000
heap
page read and write
1077000
heap
page read and write
65AA000
heap
page read and write
A42000
unkown
page readonly
5B42000
heap
page read and write
5B10000
heap
page read and write
5BC0000
trusted library allocation
page read and write
5B1B000
heap
page read and write
5B48000
heap
page read and write
B5D000
unkown
page readonly
312E000
stack
page read and write
F1F000
stack
page read and write
5AF9000
heap
page read and write
29C0000
heap
page read and write
2AB0000
heap
page read and write
5B42000
heap
page read and write
611F000
heap
page read and write
3160000
heap
page read and write
E07000
unkown
page readonly
2AD2000
heap
page read and write
FBF000
stack
page read and write
DD0000
heap
page read and write
5851000
heap
page read and write
F80000
direct allocation
page read and write
193000
stack
page read and write
400000
unkown
page readonly
5B20000
heap
page read and write
401000
unkown
page execute and write copy
401000
unkown
page execute read
5B0C000
heap
page read and write
401000
unkown
page execute and write copy
B79000
unkown
page write copy
559D000
stack
page read and write
5BC4000
heap
page read and write
3130000
remote allocation
page read and write
F5F000
stack
page read and write
F5E000
stack
page read and write
2940000
heap
page read and write
5B55000
heap
page read and write
A42000
unkown
page readonly
401000
unkown
page execute and write copy
EB0000
heap
page read and write
There are 702 hidden memdumps, click here to show them.