IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\k[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\l2[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_c81e728d9d4c2f636f067f89cc14862c\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\Xfp4MT9n1IFhi1hjXC4bx59.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\hcMSmyGUCSEFc2FAKlzc.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\zy4GXi5yvCrsiS0ulH8Z.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\5LlX2itlchhlCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\EXPI0IUPrcubCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\EdetWCNLNo9NWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\Gb4XFU7Lmj75History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\H4VYK_JIpU1TWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\JC3XtWzdemjYHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\Obx2X__9Uw89History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\Ok36VMDQZkJbWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\TvNr25IJjGDuWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\VEE29fVioP1AWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\XMgneSrmE6awLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\_019ogo7XT61Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\d6oFOJlQgdy8History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\dvfWfY5Km8RXLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\tYBRSmE7D03rWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\trixyBqgSBuerctg2\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyBqgSBuerctg2\History\Firefox_v6zchhhv.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyBqgSBuerctg2\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyBqgSBuerctg2\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyBqgSBuerctg2\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Sun Apr 21 22:18:12 2024, mtime=Sun Apr 21 22:18:12 2024, atime=Sun Apr 21 22:18:12 2024, length=4563640, window=hide
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\zy4GXi5yvCrsiS0ulH8Z.exe
"C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\zy4GXi5yvCrsiS0ulH8Z.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\hcMSmyGUCSEFc2FAKlzc.exe
"C:\Users\user\AppData\Local\Temp\spanBqgSBuerctg2\hcMSmyGUCSEFc2FAKlzc.exe"
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
"C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.175/server/k/l2.exe
193.233.132.175
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://easy2buy.ae/wp-content/upgrade/k.exei
unknown
http://193.233.132.175/server/k/l2.exev
unknown
https://db-ip.com/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://ipinfo.io/widget/demo/81.181.57.52
34.117.186.192
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe
185.199.220.53
https://ipinfo.io/Content-Type:
unknown
https://ipinfo.io/widget/demo/81.181.57.52J-
unknown
https://ipinfo.io:443/widget/demo/81.181.57.52e
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exe
unknown
http://ns.exif/1U
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
unknown
https://ipinfo.io/sR
unknown
https://db-ip.com/demo/home.php?s=81.181.57.52
104.26.5.15
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://193.233.132.175/server/k/l2.execom
unknown
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io/j
unknown
https://db-ip.com:443/demo/home.php?s=81.181.57.52z
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exey4
unknown
https://easy2buy.ae/
unknown
http://ns.microsofo/1.2/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
easy2buy.ae
185.199.220.53
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
193.233.132.47
unknown
Russian Federation
malicious
193.233.132.175
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States
185.199.220.53
easy2buy.ae
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6588000
heap
page read and write
malicious
6306000
heap
page read and write
malicious
67AA000
heap
page read and write
6F24000
heap
page read and write
193000
stack
page read and write
16C9000
heap
page read and write
A42000
unkown
page readonly
6641000
heap
page read and write
ECA000
heap
page read and write
193000
stack
page read and write
113F000
stack
page read and write
62B0000
heap
page read and write
401000
unkown
page execute and write copy
404000
unkown
page execute and read and write
6747000
heap
page read and write
62E7000
heap
page read and write
62F1000
heap
page read and write
6673000
heap
page read and write
401000
unkown
page execute read
107F000
stack
page read and write
A42000
unkown
page readonly
B5D000
unkown
page readonly
5B4000
unkown
page execute and read and write
6699000
heap
page read and write
66CD000
heap
page read and write
B78000
unkown
page execute and read and write
400000
unkown
page readonly
9C000
stack
page read and write
6657000
heap
page read and write
16AA000
heap
page read and write
64C5000
heap
page read and write
6641000
heap
page read and write
BE0000
heap
page read and write
B5D000
unkown
page readonly
C52000
unkown
page read and write
6645000
heap
page read and write
6659000
heap
page read and write
32F0000
heap
page read and write
7928000
heap
page read and write
A42000
unkown
page readonly
9C000
stack
page read and write
15D4000
heap
page read and write
9C000
stack
page read and write
400000
unkown
page readonly
6C43000
heap
page read and write
B79000
unkown
page write copy
401000
unkown
page execute and write copy
664C000
heap
page read and write
B5D000
unkown
page readonly
403000
unkown
page readonly
D90000
heap
page read and write
6313000
heap
page read and write
6312000
heap
page read and write
D9E000
heap
page read and write
6643000
heap
page read and write
CC0000
heap
page read and write
D90000
heap
page read and write
405000
unkown
page execute read
5B4000
unkown
page execute and read and write
3341000
heap
page read and write
6640000
trusted library allocation
page read and write
62E7000
heap
page read and write
6640000
trusted library allocation
page read and write
15D4000
heap
page read and write
D0E000
stack
page read and write
B79000
unkown
page write copy
5B4000
unkown
page execute and read and write
66CE000
heap
page read and write
FCF000
stack
page read and write
16EE000
heap
page read and write
3340000
heap
page read and write
401000
unkown
page execute read
665F000
heap
page read and write
E5E000
stack
page read and write
F6E000
stack
page read and write
64D5000
heap
page read and write
F4E000
heap
page read and write
667D000
heap
page read and write
C30000
heap
page read and write
6312000
heap
page read and write
66D0000
heap
page read and write
6658000
heap
page read and write
6300000
heap
page read and write
6316000
heap
page read and write
645B000
heap
page read and write
D0E000
stack
page read and write
E3A000
heap
page read and write
400000
unkown
page readonly
403000
unkown
page readonly
6519000
heap
page read and write
B79000
unkown
page write copy
D20000
heap
page read and write
6658000
heap
page read and write
6840000
heap
page read and write
66EE000
heap
page read and write
5B4000
unkown
page execute and read and write
6319000
heap
page read and write
666D000
heap
page read and write
62F4000
heap
page read and write
6847000
heap
page read and write
730C000
stack
page read and write
62CA000
heap
page read and write
AD1000
unkown
page execute read
400000
unkown
page readonly
738C000
stack
page read and write
6846000
heap
page read and write
5CC0000
remote allocation
page read and write
664D000
heap
page read and write
15D4000
heap
page read and write
3580000
heap
page read and write
BE0000
heap
page read and write
6640000
trusted library allocation
page read and write
15D4000
heap
page read and write
403000
unkown
page readonly
9C000
stack
page read and write
66A5000
heap
page read and write
1600000
heap
page read and write
6313000
heap
page read and write
3240000
trusted library allocation
page read and write
741A000
heap
page read and write
62D4000
heap
page read and write
6656000
heap
page read and write
157D000
stack
page read and write
400000
unkown
page readonly
B78000
unkown
page execute and read and write
3337000
heap
page read and write
6313000
heap
page read and write
401000
unkown
page execute read
62D0000
heap
page read and write
63B0000
trusted library allocation
page read and write
62F4000
heap
page read and write
62F4000
heap
page read and write
71DE000
heap
page read and write
62FF000
heap
page read and write
403000
unkown
page readonly
664C000
heap
page read and write
B78000
unkown
page execute and write copy
6645000
heap
page read and write
5B4000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
282E000
stack
page read and write
15D4000
heap
page read and write
405000
unkown
page execute read
62AB000
stack
page read and write
D4E000
stack
page read and write
15D4000
heap
page read and write
3341000
heap
page read and write
6312000
heap
page read and write
3341000
heap
page read and write
C50000
heap
page read and write
666D000
heap
page read and write
174B000
heap
page read and write
664B000
heap
page read and write
401000
unkown
page execute read
62E4000
heap
page read and write
6738000
heap
page read and write
401000
unkown
page execute read
E66000
unkown
page execute read
5B5F000
stack
page read and write
6511000
heap
page read and write
6640000
trusted library allocation
page read and write
6694000
heap
page read and write
6312000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
B5D000
unkown
page readonly
DD7000
heap
page read and write
66AF000
heap
page read and write
D4E000
stack
page read and write
405000
unkown
page execute read
400000
unkown
page readonly
62F1000
heap
page read and write
EB0000
heap
page read and write
668D000
heap
page read and write
630B000
heap
page read and write
E6F000
stack
page read and write
2A30000
heap
page read and write
6312000
heap
page read and write
193000
stack
page read and write
D8E000
stack
page read and write
CC0000
heap
page read and write
CC0000
heap
page read and write
66D0000
heap
page read and write
665E000
heap
page read and write
403000
unkown
page readonly
193000
stack
page read and write
B78000
unkown
page execute and read and write
6313000
heap
page read and write
6306000
heap
page read and write
6312000
heap
page read and write
B78000
unkown
page execute and write copy
631E000
heap
page read and write
CC0000
heap
page read and write
6640000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
15D4000
heap
page read and write
6640000
trusted library allocation
page read and write
6657000
heap
page read and write
BE0000
heap
page read and write
E65000
unkown
page read and write
B79000
unkown
page write copy
638D000
heap
page read and write
6841000
heap
page read and write
B79000
unkown
page write copy
404000
unkown
page execute and read and write
16E0000
heap
page read and write
B5D000
unkown
page readonly
291F000
stack
page read and write
684F000
heap
page read and write
401000
unkown
page execute and write copy
AD0000
unkown
page readonly
6645000
heap
page read and write
B78000
unkown
page execute and write copy
A42000
unkown
page readonly
6641000
heap
page read and write
3341000
heap
page read and write
F3F000
stack
page read and write
F80000
heap
page read and write
62D3000
heap
page read and write
5B4000
unkown
page execute and read and write
B79000
unkown
page write copy
BE0000
heap
page read and write
62F4000
heap
page read and write
D57000
heap
page read and write
66F2000
heap
page read and write
B78000
unkown
page execute and write copy
3341000
heap
page read and write
D0E000
stack
page read and write
6641000
heap
page read and write
404000
unkown
page execute and read and write
631E000
heap
page read and write
16A2000
heap
page read and write
665E000
heap
page read and write
6312000
heap
page read and write
6691000
heap
page read and write
35A0000
heap
page read and write
6661000
heap
page read and write
62F1000
heap
page read and write
6E66000
heap
page read and write
E9F000
stack
page read and write
6842000
heap
page read and write
106F000
stack
page read and write
405000
unkown
page execute read
3341000
heap
page read and write
401000
unkown
page execute and write copy
645B000
heap
page read and write
29B0000
heap
page read and write
403000
unkown
page readonly
10AF000
stack
page read and write
FFF000
stack
page read and write
400000
unkown
page readonly
63B7000
heap
page read and write
9C000
stack
page read and write
16B8000
heap
page read and write
BE0000
heap
page read and write
6738000
heap
page read and write
DD0000
heap
page read and write
63B9000
heap
page read and write
72C1000
heap
page read and write
B78000
unkown
page execute and read and write
3341000
heap
page read and write
C2E000
stack
page read and write
6691000
heap
page read and write
631F000
heap
page read and write
66AF000
heap
page read and write
6665000
heap
page read and write
665B000
heap
page read and write
16E8000
heap
page read and write
6313000
heap
page read and write
6658000
heap
page read and write
400000
unkown
page readonly
3341000
heap
page read and write
5B4000
unkown
page execute and read and write
62F4000
heap
page read and write
666D000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
CE0000
heap
page read and write
666D000
heap
page read and write
F8E000
heap
page read and write
3341000
heap
page read and write
3341000
heap
page read and write
BE0000
heap
page read and write
403000
unkown
page readonly
3341000
heap
page read and write
E00000
heap
page read and write
703F000
heap
page read and write
15D4000
heap
page read and write
749E000
stack
page read and write
6456000
heap
page read and write
400000
unkown
page readonly
6312000
heap
page read and write
6748000
heap
page read and write
193000
stack
page read and write
664C000
heap
page read and write
70E4000
heap
page read and write
B78000
unkown
page execute and read and write
6658000
heap
page read and write
3341000
heap
page read and write
15D4000
heap
page read and write
6316000
heap
page read and write
405000
unkown
page execute read
651E000
stack
page read and write
B5D000
unkown
page readonly
400000
unkown
page readonly
670B000
heap
page read and write
401000
unkown
page execute and write copy
769D000
stack
page read and write
B79000
unkown
page write copy
62D4000
heap
page read and write
B78000
unkown
page execute and write copy
62E7000
heap
page read and write
401000
unkown
page execute read
66CE000
heap
page read and write
6E5F000
stack
page read and write
668D000
heap
page read and write
62FA000
heap
page read and write
67AA000
heap
page read and write
403000
unkown
page readonly
15D4000
heap
page read and write
6640000
trusted library allocation
page read and write
1696000
heap
page read and write
193000
stack
page read and write
70E7000
heap
page read and write
63C0000
heap
page read and write
675C000
heap
page read and write
10BF000
stack
page read and write
6319000
heap
page read and write
62F4000
heap
page read and write
E10000
heap
page read and write
62E7000
heap
page read and write
B78000
unkown
page execute and read and write
6641000
heap
page read and write
63B6000
heap
page read and write
193000
stack
page read and write
6641000
heap
page read and write
193000
stack
page read and write
668D000
heap
page read and write
A42000
unkown
page readonly
3341000
heap
page read and write
1691000
heap
page read and write
6312000
heap
page read and write
6316000
heap
page read and write
28E0000
heap
page read and write
667E000
heap
page read and write
A42000
unkown
page readonly
6647000
heap
page read and write
66DD000
heap
page read and write
6312000
heap
page read and write
2837000
heap
page read and write
C40000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
71AF000
heap
page read and write
28BF000
stack
page read and write
403000
unkown
page readonly
6640000
trusted library allocation
page read and write
E2F000
stack
page read and write
400000
unkown
page readonly
CC0000
heap
page read and write
7180000
direct allocation
page execute and read and write
B79000
unkown
page write copy
6E6F000
heap
page read and write
62CC000
heap
page read and write
62F1000
heap
page read and write
6641000
heap
page read and write
400000
unkown
page readonly
55B4000
heap
page read and write
63B7000
heap
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
5C9F000
stack
page read and write
66A1000
heap
page read and write
15D4000
heap
page read and write
6641000
heap
page read and write
B5D000
unkown
page readonly
F4A000
heap
page read and write
3341000
heap
page read and write
6665000
heap
page read and write
3341000
heap
page read and write
66A8000
heap
page read and write
9C000
stack
page read and write
6316000
heap
page read and write
63C1000
heap
page read and write
62F4000
heap
page read and write
6316000
heap
page read and write
6646000
heap
page read and write
C32000
unkown
page readonly
616F000
stack
page read and write
ECE000
heap
page read and write
B78000
unkown
page execute and read and write
6640000
heap
page read and write
16A0000
heap
page read and write
405000
unkown
page execute read
EBA000
heap
page read and write
3341000
heap
page read and write
645D000
heap
page read and write
5CC0000
remote allocation
page read and write
6316000
heap
page read and write
667E000
heap
page read and write
16BA000
heap
page read and write
CFE000
stack
page read and write
B79000
unkown
page write copy
D60000
heap
page read and write
7454000
heap
page read and write
D4E000
stack
page read and write
66E3000
heap
page read and write
15D4000
heap
page read and write
E3E000
heap
page read and write
6312000
heap
page read and write
62D3000
heap
page read and write
6641000
heap
page read and write
403000
unkown
page readonly
6640000
trusted library allocation
page read and write
400000
unkown
page readonly
61AE000
stack
page read and write
404000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
401000
unkown
page execute and write copy
F8A000
heap
page read and write
401000
unkown
page execute read
C88000
unkown
page execute read
6841000
heap
page read and write
1F0000
heap
page read and write
B79000
unkown
page write copy
B78000
unkown
page execute and read and write
3341000
heap
page read and write
71DA000
heap
page read and write
15D4000
heap
page read and write
404000
unkown
page execute and read and write
C90000
heap
page read and write
15D4000
heap
page read and write
670C000
heap
page read and write
664C000
heap
page read and write
7452000
heap
page read and write
E0A000
heap
page read and write
66F2000
heap
page read and write
58DD000
stack
page read and write
6E68000
heap
page read and write
9C000
stack
page read and write
63B0000
heap
page read and write
68BC000
heap
page read and write
E66000
unkown
page execute read
BE0000
heap
page read and write
AD0000
unkown
page readonly
BE0000
heap
page read and write
B79000
unkown
page write copy
6D5F000
stack
page read and write
16A7000
heap
page read and write
ECF000
stack
page read and write
B79000
unkown
page write copy
D5E000
stack
page read and write
6302000
heap
page read and write
6847000
heap
page read and write
BF0000
heap
page read and write
6641000
heap
page read and write
66CE000
heap
page read and write
6313000
heap
page read and write
3240000
heap
page read and write
6306000
heap
page read and write
16EB000
heap
page read and write
6514000
heap
page read and write
A42000
unkown
page readonly
7699000
stack
page read and write
148B000
stack
page read and write
7390000
heap
page read and write
400000
unkown
page readonly
C8E000
stack
page read and write
3341000
heap
page read and write
63D0000
heap
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
405000
unkown
page execute read
EC0000
heap
page read and write
C78000
heap
page read and write
666D000
heap
page read and write
6699000
heap
page read and write
3350000
heap
page read and write
193000
stack
page read and write
EAA000
heap
page read and write
11D7000
unkown
page readonly
1610000
heap
page read and write
404000
unkown
page execute and read and write
165E000
heap
page read and write
3341000
heap
page read and write
E0E000
heap
page read and write
193000
stack
page read and write
6641000
heap
page read and write
6640000
trusted library allocation
page read and write
759F000
stack
page read and write
62F4000
heap
page read and write
668D000
heap
page read and write
B78000
unkown
page execute and write copy
F40000
heap
page read and write
400000
unkown
page readonly
6643000
heap
page read and write
606E000
stack
page read and write
11D7000
unkown
page readonly
734C000
stack
page read and write
B78000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
6643000
heap
page read and write
62F4000
heap
page read and write
401000
unkown
page execute and write copy
16D4000
heap
page read and write
6301000
heap
page read and write
400000
unkown
page readonly
665D000
heap
page read and write
66DD000
heap
page read and write
B79000
unkown
page write copy
6652000
heap
page read and write
165A000
heap
page read and write
D6E000
stack
page read and write
404000
unkown
page execute and read and write
651A000
heap
page read and write
3341000
heap
page read and write
E0F000
stack
page read and write
6E6B000
heap
page read and write
62F1000
heap
page read and write
405000
unkown
page execute read
A42000
unkown
page readonly
ECF000
stack
page read and write
D4E000
stack
page read and write
B79000
unkown
page write copy
6314000
heap
page read and write
5B9E000
stack
page read and write
172E000
heap
page read and write
172B000
heap
page read and write
70E2000
heap
page read and write
BE0000
heap
page read and write
2C0F000
heap
page read and write
6313000
heap
page read and write
B79000
unkown
page write copy
15D4000
heap
page read and write
B5D000
unkown
page readonly
CC0000
heap
page read and write
65BE000
stack
page read and write
62DC000
heap
page read and write
9C000
stack
page read and write
6312000
heap
page read and write
6312000
heap
page read and write
6D11000
heap
page read and write
62E7000
heap
page read and write
D8E000
stack
page read and write
401000
unkown
page execute and write copy
404000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
5B4000
unkown
page execute and read and write
9C000
stack
page read and write
62D3000
heap
page read and write
62D3000
heap
page read and write
405000
unkown
page execute read
405000
unkown
page execute read
B79000
unkown
page write copy
62C2000
heap
page read and write
6699000
heap
page read and write
D40000
heap
page read and write
66D0000
heap
page read and write
1650000
heap
page read and write
2920000
heap
page read and write
D4E000
stack
page read and write
1586000
stack
page read and write
BE0000
heap
page read and write
7106000
heap
page read and write
6515000
heap
page read and write
BE0000
heap
page read and write
70E5000
heap
page read and write
62FF000
heap
page read and write
404000
unkown
page execute and read and write
6C66000
heap
page read and write
400000
unkown
page readonly
3330000
heap
page read and write
15D4000
heap
page read and write
B79000
unkown
page write copy
B78000
unkown
page execute and write copy
2A60000
heap
page read and write
6316000
heap
page read and write
172C000
heap
page read and write
B79000
unkown
page write copy
63B5000
heap
page read and write
9C000
stack
page read and write
404000
unkown
page execute and read and write
B78000
unkown
page execute and write copy
15D4000
heap
page read and write
B78000
unkown
page execute and write copy
CC0000
heap
page read and write
B78000
unkown
page execute and read and write
C5A000
unkown
page execute read
6640000
trusted library allocation
page read and write
6312000
heap
page read and write
666D000
heap
page read and write
400000
unkown
page readonly
6516000
heap
page read and write
D00000
heap
page read and write
63BB000
heap
page read and write
B78000
unkown
page execute and read and write
664C000
heap
page read and write
62BB000
heap
page read and write
5A5E000
stack
page read and write
405000
unkown
page execute read
286F000
stack
page read and write
A42000
unkown
page readonly
6713000
heap
page read and write
631C000
heap
page read and write
6640000
trusted library allocation
page read and write
B5D000
unkown
page readonly
D0E000
stack
page read and write
EAE000
heap
page read and write
630F000
heap
page read and write
193000
stack
page read and write
6658000
heap
page read and write
7410000
heap
page read and write
57DD000
stack
page read and write
7100000
direct allocation
page execute and read and write
B78000
unkown
page execute and write copy
6640000
trusted library allocation
page read and write
B78000
unkown
page execute and write copy
C2E000
stack
page read and write
169B000
heap
page read and write
6698000
heap
page read and write
B5D000
unkown
page readonly
6658000
heap
page read and write
405000
unkown
page execute read
B79000
unkown
page write copy
15D4000
heap
page read and write
6E6C000
heap
page read and write
12FF000
stack
page read and write
67C2000
heap
page read and write
A42000
unkown
page readonly
404000
unkown
page execute and read and write
6643000
heap
page read and write
401000
unkown
page execute and write copy
631C000
heap
page read and write
B79000
unkown
page write copy
664C000
heap
page read and write
C3E000
stack
page read and write
10AF000
stack
page read and write
D00000
heap
page read and write
2A00000
heap
page read and write
6658000
heap
page read and write
6641000
heap
page read and write
15D0000
heap
page read and write
16F6000
heap
page read and write
3341000
heap
page read and write
9C000
stack
page read and write
193000
stack
page read and write
665D000
heap
page read and write
401000
unkown
page execute and write copy
168B000
heap
page read and write
6312000
heap
page read and write
6747000
heap
page read and write
C70000
heap
page read and write
C30000
heap
page read and write
5CC0000
remote allocation
page read and write
DC0000
heap
page read and write
A42000
unkown
page readonly
9C000
stack
page read and write
2A00000
heap
page read and write
66D0000
heap
page read and write
3341000
heap
page read and write
404000
unkown
page execute and read and write
667D000
heap
page read and write
B5D000
unkown
page readonly
403000
unkown
page readonly
62C7000
heap
page read and write
15D4000
heap
page read and write
B79000
unkown
page write copy
62F1000
heap
page read and write
EBE000
heap
page read and write
D00000
heap
page read and write
62F4000
heap
page read and write
401000
unkown
page execute and write copy
F7E000
stack
page read and write
401000
unkown
page execute read
D9A000
heap
page read and write
F70000
heap
page read and write
66EE000
heap
page read and write
EA0000
heap
page read and write
CC0000
heap
page read and write
EB0000
heap
page read and write
6647000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
400000
unkown
page readonly
2A90000
heap
page read and write
16C0000
heap
page read and write
665E000
heap
page read and write
D0E000
stack
page read and write
403000
unkown
page readonly
101F000
stack
page read and write
D50000
heap
page read and write
5B4000
unkown
page execute and read and write
F8F000
stack
page read and write
666F000
heap
page read and write
400000
unkown
page readonly
3341000
heap
page read and write
66F3000
heap
page read and write
B79000
unkown
page write copy
6316000
heap
page read and write
15D4000
heap
page read and write
6659000
heap
page read and write
6641000
heap
page read and write
15D4000
heap
page read and write
631F000
heap
page read and write
645E000
heap
page read and write
DC0000
heap
page read and write
A42000
unkown
page readonly
62F6000
heap
page read and write
2950000
heap
page read and write
62D0000
heap
page read and write
62E7000
heap
page read and write
645D000
heap
page read and write
62E7000
heap
page read and write
1729000
heap
page read and write
6640000
trusted library allocation
page read and write
62F4000
heap
page read and write
62D0000
heap
page read and write
6640000
trusted library allocation
page read and write
B78000
unkown
page execute and write copy
C82000
unkown
page read and write
EB8000
heap
page read and write
62D3000
heap
page read and write
D30000
heap
page read and write
66CE000
heap
page read and write
70EF000
heap
page read and write
62F1000
heap
page read and write
B5D000
unkown
page readonly
E30000
heap
page read and write
There are 718 hidden memdumps, click here to show them.