IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\l2[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\k[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_c81e728d9d4c2f636f067f89cc14862c\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\mMNhxEaskfVfjkc4NDz8xtN.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\IHobmyUUXF8jFZ9HHCK7.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\RthubJXJJOhKyKgs0z_b.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\AA6PGxJTkeWELogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\ElGSHigIWc8DWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\Fc2_H7IAU6AsHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\IQeCvOuk5XXrLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\Nw31iWCMK5uTCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\Osb6r9Cz1SKZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\Q401JET9409NCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\W9LjgHgMMdGgWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\exMrGp0bQTcpWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\fc39buFwaAmgHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\nDhYIm6Z9aF_Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\vd0iE2P7EOYhHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\yDQk2lzvekOJLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\za6uxHtLZkkSWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\zhSjLeSPGmokWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\trixy8fTqI7Z4TQTK\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8fTqI7Z4TQTK\History\Firefox_24a4ohrz.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8fTqI7Z4TQTK\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8fTqI7Z4TQTK\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8fTqI7Z4TQTK\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Wed Apr 24 11:43:17 2024, mtime=Wed Apr 24 11:43:17 2024, atime=Wed Apr 24 11:43:17 2024, length=4563640, window=hide
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\IHobmyUUXF8jFZ9HHCK7.exe
"C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\IHobmyUUXF8jFZ9HHCK7.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\RthubJXJJOhKyKgs0z_b.exe
"C:\Users\user\AppData\Local\Temp\span8fTqI7Z4TQTK\RthubJXJJOhKyKgs0z_b.exe"
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
"C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://193.233.132.175/server/k/l2.exe
193.233.132.175
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.mi
unknown
https://ipinfo.io:443/widget/demo/154.16.105.360
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
http://193.233.132.175/server/k/l2.exeo
unknown
https://easy2buy.ae/wp-content/upgrade/k.exexe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exeuser
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe(d
unknown
http://crl.sectigo.com/SectigoRSATimeStampi
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe
185.199.220.53
https://easy2buy.ae/_2
unknown
https://ipinfo.io/B
unknown
http://crt.sectigo
unknown
https://db-ip.com/demo/home.php?s=154.16.105.36
104.26.5.15
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://t.me/risepro_bot
unknown
http://ns.exif/1
unknown
https://db-ip.com:443/demo/home.php?s=154.16.105.36P
unknown
https://ipinfo.io/
unknown
https://ipinfo.io/widget/demo/154.16.105.36.
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://ns.adp/1.0/
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exeUdZRC
unknown
http://crl.usertrYQ
unknown
http://www.winimage.com/zLibDll
unknown
https://easy2buy.ae:80/wp-content/upgrade/k.exeid
unknown
https://ipinfo.io/k:
unknown
https://easy2buy.ae/
unknown
https://ipinfo.io/widget/demo/154.16.105.36
34.117.186.192
http://ns.microsofo/1.2/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
easy2buy.ae
185.199.220.53
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
193.233.132.47
unknown
Russian Federation
malicious
193.233.132.175
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States
185.199.220.53
easy2buy.ae
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5FE8000
heap
page read and write
malicious
5D8C000
heap
page read and write
malicious
5D8C000
heap
page read and write
661D000
heap
page read and write
5D8C000
heap
page read and write
400000
unkown
page readonly
C8E000
stack
page read and write
DA4000
heap
page read and write
B5D000
unkown
page readonly
5D40000
heap
page read and write
5D92000
heap
page read and write
B79000
unkown
page write copy
B78000
unkown
page execute and write copy
5DDC000
heap
page read and write
5D9B000
heap
page read and write
5D74000
heap
page read and write
125B000
heap
page read and write
622E000
heap
page read and write
2E90000
heap
page read and write
283D000
heap
page read and write
5D8C000
heap
page read and write
5D7A000
heap
page read and write
405000
unkown
page execute read
5D61000
heap
page read and write
5E03000
heap
page read and write
1201000
heap
page read and write
6216000
heap
page read and write
66D0000
heap
page read and write
661A000
heap
page read and write
2E80000
remote allocation
page read and write
8EB000
unkown
page read and write
404000
unkown
page execute and read and write
105F000
stack
page read and write
401000
unkown
page execute and write copy
6C8E000
stack
page read and write
401000
unkown
page execute read
5D9C000
heap
page read and write
6410000
heap
page read and write
C70000
heap
page read and write
1295000
heap
page read and write
C1A000
heap
page read and write
5D7A000
heap
page read and write
5D84000
heap
page read and write
5FB6000
heap
page read and write
5E41000
heap
page read and write
B79000
unkown
page write copy
405000
unkown
page execute read
1258000
heap
page read and write
5B4000
unkown
page execute and read and write
400000
unkown
page readonly
5D97000
heap
page read and write
1263000
heap
page read and write
403000
unkown
page readonly
5D84000
heap
page read and write
5D56000
heap
page read and write
6225000
heap
page read and write
5DD1000
heap
page read and write
622B000
heap
page read and write
5E08000
heap
page read and write
E10000
heap
page read and write
28BE000
heap
page read and write
D10000
heap
page read and write
B78000
unkown
page execute and write copy
6211000
heap
page read and write
B79000
unkown
page write copy
5DAA000
heap
page read and write
5EE0000
trusted library allocation
page read and write
5EE1000
heap
page read and write
5D92000
heap
page read and write
A42000
unkown
page readonly
5DB8000
heap
page read and write
405000
unkown
page execute read
5D91000
heap
page read and write
6210000
trusted library allocation
page read and write
5D5F000
heap
page read and write
9C000
stack
page read and write
622E000
heap
page read and write
2DC0000
heap
page read and write
5ED0000
heap
page read and write
B79000
unkown
page write copy
5E08000
heap
page read and write
6279000
heap
page read and write
5D84000
heap
page read and write
5DAE000
heap
page read and write
B79000
unkown
page write copy
400000
unkown
page readonly
6B80000
heap
page read and write
5D6C000
heap
page read and write
9C000
stack
page read and write
D3A000
heap
page read and write
400000
unkown
page readonly
12A2000
heap
page read and write
5D74000
heap
page read and write
D10000
heap
page read and write
2EA1000
heap
page read and write
2DE0000
heap
page read and write
BE0000
heap
page read and write
5D5F000
heap
page read and write
401000
unkown
page execute and write copy
5D5F000
heap
page read and write
5DCD000
heap
page read and write
DA4000
heap
page read and write
123B000
heap
page read and write
5D99000
heap
page read and write
5D92000
heap
page read and write
6210000
trusted library allocation
page read and write
B78000
unkown
page execute and write copy
B78000
unkown
page execute and read and write
5D5F000
heap
page read and write
5D99000
heap
page read and write
F2F000
stack
page read and write
5FA7000
heap
page read and write
5DFA000
heap
page read and write
622F000
heap
page read and write
129E000
heap
page read and write
5D8C000
heap
page read and write
405000
unkown
page execute read
622E000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
404000
unkown
page execute and read and write
400000
unkown
page readonly
1246000
heap
page read and write
622E000
heap
page read and write
62DF000
heap
page read and write
B79000
unkown
page write copy
D00000
heap
page read and write
5D92000
heap
page read and write
E1A000
heap
page read and write
5D92000
heap
page read and write
8EC000
unkown
page execute read
5D94000
heap
page read and write
BE0000
heap
page read and write
5D84000
heap
page read and write
6418000
heap
page read and write
405000
unkown
page execute read
5E0A000
heap
page read and write
105F000
stack
page read and write
5D6C000
heap
page read and write
2980000
heap
page read and write
C3E000
stack
page read and write
DA0000
heap
page read and write
5DB1000
heap
page read and write
403000
unkown
page readonly
5D7A000
heap
page read and write
A42000
unkown
page readonly
622F000
heap
page read and write
5E04000
heap
page read and write
D10000
heap
page read and write
5D72000
heap
page read and write
5DCC000
heap
page read and write
6221000
heap
page read and write
5D84000
heap
page read and write
401000
unkown
page execute and write copy
5D97000
heap
page read and write
2EA1000
heap
page read and write
D9E000
stack
page read and write
1214000
heap
page read and write
5DFF000
heap
page read and write
5DAD000
heap
page read and write
105E000
stack
page read and write
5D7A000
heap
page read and write
FFF000
stack
page read and write
5E08000
heap
page read and write
5DE5000
heap
page read and write
5B4000
unkown
page execute and read and write
5D99000
heap
page read and write
529F000
stack
page read and write
623E000
heap
page read and write
404000
unkown
page execute and read and write
5DAD000
heap
page read and write
401000
unkown
page execute read
5DAB000
heap
page read and write
BE0000
heap
page read and write
2EA1000
heap
page read and write
5D74000
heap
page read and write
2EA1000
heap
page read and write
5D97000
heap
page read and write
5B4000
unkown
page execute and read and write
6BA000
unkown
page readonly
F5E000
stack
page read and write
2EA1000
heap
page read and write
CBE000
stack
page read and write
400000
unkown
page readonly
B78000
unkown
page execute and read and write
2970000
heap
page read and write
DA4000
heap
page read and write
6975000
heap
page read and write
5D7A000
heap
page read and write
B78000
unkown
page execute and write copy
5EE0000
heap
page read and write
401000
unkown
page execute and write copy
6210000
trusted library allocation
page read and write
6210000
heap
page read and write
B78000
unkown
page execute and write copy
6D8F000
stack
page read and write
5D74000
heap
page read and write
403000
unkown
page readonly
8EC000
unkown
page execute read
148F000
stack
page read and write
1F0000
heap
page read and write
5D8C000
heap
page read and write
5EF0000
heap
page read and write
5EE0000
heap
page read and write
5B4000
unkown
page execute and read and write
5D94000
heap
page read and write
2EA1000
heap
page read and write
F7E000
stack
page read and write
6210000
trusted library allocation
page read and write
CD0000
heap
page read and write
5DB8000
heap
page read and write
5D92000
heap
page read and write
5DFF000
heap
page read and write
BE0000
heap
page read and write
120F000
heap
page read and write
5DBC000
heap
page read and write
C30000
heap
page read and write
5D97000
heap
page read and write
DD0000
heap
page read and write
5DA8000
heap
page read and write
5D94000
heap
page read and write
158F000
stack
page read and write
5D6C000
heap
page read and write
5D7A000
heap
page read and write
6210000
trusted library allocation
page read and write
125B000
heap
page read and write
5D72000
heap
page read and write
B79000
unkown
page write copy
5D8C000
heap
page read and write
6211000
heap
page read and write
1263000
heap
page read and write
5DFA000
heap
page read and write
C2E000
stack
page read and write
6221000
heap
page read and write
405000
unkown
page execute read
D60000
heap
page read and write
5DE8000
heap
page read and write
635E000
heap
page read and write
401000
unkown
page execute and write copy
5D94000
heap
page read and write
193000
stack
page read and write
5D7A000
heap
page read and write
B79000
unkown
page write copy
622E000
heap
page read and write
629E000
heap
page read and write
C9E000
heap
page read and write
D6E000
stack
page read and write
622C000
heap
page read and write
6228000
heap
page read and write
6225000
heap
page read and write
F8F000
stack
page read and write
404000
unkown
page execute and read and write
5D94000
heap
page read and write
2DA0000
heap
page read and write
5D74000
heap
page read and write
401000
unkown
page execute read
D30000
heap
page read and write
5E08000
heap
page read and write
5DD1000
heap
page read and write
2A20000
heap
page read and write
5DDF000
heap
page read and write
BE0000
heap
page read and write
2EA1000
heap
page read and write
560000
unkown
page readonly
560000
unkown
page readonly
DA4000
heap
page read and write
5E05000
heap
page read and write
A42000
unkown
page readonly
62E3000
heap
page read and write
A42000
unkown
page readonly
B79000
unkown
page write copy
5DFC000
heap
page read and write
6412000
heap
page read and write
9C000
stack
page read and write
5DA8000
heap
page read and write
5DE8000
heap
page read and write
401000
unkown
page execute read
BF0000
heap
page read and write
68D8000
heap
page read and write
401000
unkown
page execute and write copy
C38000
heap
page read and write
68BA000
heap
page read and write
5D7A000
heap
page read and write
629E000
heap
page read and write
5E08000
heap
page read and write
2E80000
remote allocation
page read and write
B5D000
unkown
page readonly
5D74000
heap
page read and write
5D74000
heap
page read and write
B78000
unkown
page execute and write copy
DA4000
heap
page read and write
5D92000
heap
page read and write
B5D000
unkown
page readonly
2EA1000
heap
page read and write
2EA0000
heap
page read and write
5D9C000
heap
page read and write
5B4000
unkown
page execute and read and write
5D9C000
heap
page read and write
B5D000
unkown
page readonly
5D5F000
heap
page read and write
1150000
heap
page read and write
E1E000
stack
page read and write
5D84000
heap
page read and write
5E4E000
heap
page read and write
5EF9000
heap
page read and write
6210000
trusted library allocation
page read and write
5D6C000
heap
page read and write
5D94000
heap
page read and write
106F000
stack
page read and write
5D92000
heap
page read and write
631E000
heap
page read and write
5D7A000
heap
page read and write
5D5F000
heap
page read and write
C3E000
stack
page read and write
C40000
heap
page read and write
193000
stack
page read and write
6E89000
stack
page read and write
5D6C000
heap
page read and write
5E48000
heap
page read and write
6210000
trusted library allocation
page read and write
5D94000
heap
page read and write
5D92000
heap
page read and write
B79000
unkown
page write copy
120B000
heap
page read and write
621F000
heap
page read and write
5D7A000
heap
page read and write
DA4000
heap
page read and write
5D8C000
heap
page read and write
5D62000
heap
page read and write
404000
unkown
page execute and read and write
401000
unkown
page execute read
B79000
unkown
page write copy
400000
unkown
page readonly
1246000
heap
page read and write
BF0000
heap
page read and write
404000
unkown
page execute and read and write
DA4000
heap
page read and write
5E08000
heap
page read and write
6228000
heap
page read and write
12BC000
heap
page read and write
BF0000
heap
page read and write
6225000
heap
page read and write
405000
unkown
page execute read
404000
unkown
page execute and read and write
A42000
unkown
page readonly
B78000
unkown
page execute and write copy
5D84000
heap
page read and write
400000
unkown
page readonly
DA4000
heap
page read and write
5EE6000
heap
page read and write
5D72000
heap
page read and write
5D84000
heap
page read and write
5DB8000
heap
page read and write
5D92000
heap
page read and write
6211000
heap
page read and write
C2E000
stack
page read and write
5C3E000
stack
page read and write
628A000
heap
page read and write
5EE7000
heap
page read and write
2B86000
heap
page read and write
403000
unkown
page readonly
DA4000
heap
page read and write
B78000
unkown
page execute and write copy
6410000
heap
page read and write
9C000
stack
page read and write
C10000
heap
page read and write
6211000
heap
page read and write
5DB3000
heap
page read and write
5DBC000
heap
page read and write
5D97000
heap
page read and write
405000
unkown
page execute read
DA4000
heap
page read and write
D1E000
stack
page read and write
5F9E000
heap
page read and write
1263000
heap
page read and write
5D5F000
heap
page read and write
5D74000
heap
page read and write
5DEA000
heap
page read and write
62A7000
heap
page read and write
B78000
unkown
page execute and write copy
400000
unkown
page readonly
2EA1000
heap
page read and write
622F000
heap
page read and write
F5E000
stack
page read and write
C30000
heap
page read and write
5D97000
heap
page read and write
630E000
heap
page read and write
193000
stack
page read and write
DA4000
heap
page read and write
5B4000
unkown
page execute and read and write
404000
unkown
page execute and read and write
BE0000
heap
page read and write
B78000
unkown
page execute and read and write
5D4F000
heap
page read and write
6C1D000
heap
page read and write
5D6C000
heap
page read and write
400000
unkown
page readonly
5D92000
heap
page read and write
B79000
unkown
page write copy
CF0000
heap
page read and write
400000
unkown
page readonly
5D8C000
heap
page read and write
6221000
heap
page read and write
5D94000
heap
page read and write
2EA1000
heap
page read and write
C3E000
stack
page read and write
5D5F000
heap
page read and write
6210000
trusted library allocation
page read and write
B78000
unkown
page execute and write copy
5E4C000
heap
page read and write
BE0000
heap
page read and write
9C000
stack
page read and write
621F000
heap
page read and write
5B4000
unkown
page execute and read and write
403000
unkown
page readonly
1227000
heap
page read and write
401000
unkown
page execute read
F1F000
stack
page read and write
B79000
unkown
page write copy
2EA1000
heap
page read and write
DA4000
heap
page read and write
D3E000
stack
page read and write
D70000
heap
page read and write
5D7A000
heap
page read and write
622E000
heap
page read and write
5D7A000
heap
page read and write
621B000
heap
page read and write
6210000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
6F1C000
heap
page read and write
BF0000
heap
page read and write
5D94000
heap
page read and write
B5D000
unkown
page readonly
403000
unkown
page readonly
5D97000
heap
page read and write
403000
unkown
page readonly
5DA8000
heap
page read and write
D3E000
heap
page read and write
5D7A000
heap
page read and write
5D92000
heap
page read and write
BE0000
heap
page read and write
122F000
heap
page read and write
5D5F000
heap
page read and write
400000
unkown
page readonly
5D84000
heap
page read and write
5D7A000
heap
page read and write
5D62000
heap
page read and write
11FD000
heap
page read and write
1263000
heap
page read and write
C18000
heap
page read and write
B79000
unkown
page write copy
5EF5000
heap
page read and write
D30000
heap
page read and write
A42000
unkown
page readonly
622E000
heap
page read and write
108E000
stack
page read and write
E1E000
heap
page read and write
623F000
heap
page read and write
6229000
heap
page read and write
6210000
trusted library allocation
page read and write
9C000
stack
page read and write
621B000
heap
page read and write
129A000
heap
page read and write
5DE6000
heap
page read and write
401000
unkown
page execute read
2830000
heap
page read and write
6A8C000
heap
page read and write
6211000
heap
page read and write
BFA000
heap
page read and write
5DFF000
heap
page read and write
F6E000
stack
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
5D84000
heap
page read and write
A42000
unkown
page readonly
401000
unkown
page execute and write copy
5D7A000
heap
page read and write
BF0000
heap
page read and write
5D7A000
heap
page read and write
5D7A000
heap
page read and write
5D9C000
heap
page read and write
B78000
unkown
page execute and read and write
5D6C000
heap
page read and write
1263000
heap
page read and write
5D6C000
heap
page read and write
404000
unkown
page execute and read and write
5D95000
heap
page read and write
5DEB000
heap
page read and write
5B4000
unkown
page execute and read and write
62A6000
heap
page read and write
5D6C000
heap
page read and write
405000
unkown
page execute read
622F000
heap
page read and write
5D95000
heap
page read and write
DC7000
heap
page read and write
BE0000
heap
page read and write
289F000
stack
page read and write
404000
unkown
page execute and read and write
5DAB000
heap
page read and write
5D61000
heap
page read and write
6211000
heap
page read and write
5D94000
heap
page read and write
D8E000
stack
page read and write
B5D000
unkown
page readonly
5D6A000
heap
page read and write
5DE8000
heap
page read and write
5D6C000
heap
page read and write
DEE000
stack
page read and write
5E08000
heap
page read and write
5D8C000
heap
page read and write
5E08000
heap
page read and write
11F4000
heap
page read and write
B79000
unkown
page write copy
5D84000
heap
page read and write
5D95000
heap
page read and write
5D74000
heap
page read and write
6977000
heap
page read and write
5D92000
heap
page read and write
403000
unkown
page readonly
5DFA000
heap
page read and write
621F000
heap
page read and write
DA4000
heap
page read and write
403000
unkown
page readonly
6211000
heap
page read and write
6351000
heap
page read and write
6E6F000
heap
page read and write
F3F000
stack
page read and write
5D94000
heap
page read and write
1E0000
heap
page read and write
BF0000
heap
page read and write
C3E000
stack
page read and write
10ED000
stack
page read and write
193000
stack
page read and write
5D7A000
heap
page read and write
6410000
heap
page read and write
404000
unkown
page execute and read and write
5D74000
heap
page read and write
DA4000
heap
page read and write
D9A000
heap
page read and write
5D92000
heap
page read and write
5D97000
heap
page read and write
5E08000
heap
page read and write
D9E000
heap
page read and write
5DDC000
heap
page read and write
5E08000
heap
page read and write
B79000
unkown
page write copy
621B000
heap
page read and write
62CE000
heap
page read and write
BF0000
heap
page read and write
5E4F000
heap
page read and write
401000
unkown
page execute and write copy
C30000
heap
page read and write
5AFE000
stack
page read and write
CFE000
stack
page read and write
650E000
stack
page read and write
BF0000
heap
page read and write
401000
unkown
page execute and write copy
622F000
heap
page read and write
DB0000
heap
page read and write
5D7C000
heap
page read and write
6B5C000
stack
page read and write
2E2E000
stack
page read and write
621D000
heap
page read and write
1258000
heap
page read and write
B5D000
unkown
page readonly
5DA1000
heap
page read and write
5D6C000
heap
page read and write
108E000
stack
page read and write
5FBC000
heap
page read and write
401000
unkown
page execute read
5D72000
heap
page read and write
28E0000
heap
page read and write
F5F000
stack
page read and write
C8E000
heap
page read and write
5D8C000
heap
page read and write
6220000
heap
page read and write
B78000
unkown
page execute and write copy
5D8C000
heap
page read and write
B79000
unkown
page write copy
D0B000
stack
page read and write
DA4000
heap
page read and write
5E08000
heap
page read and write
B5D000
unkown
page readonly
193000
stack
page read and write
5D8C000
heap
page read and write
5D84000
heap
page read and write
11CA000
heap
page read and write
5D72000
heap
page read and write
6225000
heap
page read and write
400000
unkown
page readonly
A42000
unkown
page readonly
5EA0000
heap
page read and write
5DBB000
heap
page read and write
5D8C000
heap
page read and write
5D8C000
heap
page read and write
C73000
unkown
page readonly
1225000
heap
page read and write
1227000
heap
page read and write
193000
stack
page read and write
660F000
stack
page read and write
5D97000
heap
page read and write
5D95000
heap
page read and write
DC0000
heap
page read and write
622E000
heap
page read and write
122C000
heap
page read and write
400000
unkown
page readonly
5D6C000
heap
page read and write
C9A000
heap
page read and write
400000
unkown
page readonly
5D8D000
heap
page read and write
5D84000
heap
page read and write
6E2000
unkown
page read and write
5FA5000
heap
page read and write
B78000
unkown
page execute and write copy
68D0000
direct allocation
page execute and read and write
1140000
trusted library allocation
page read and write
5FFC000
heap
page read and write
401000
unkown
page execute read
5DE0000
heap
page read and write
5DF8000
heap
page read and write
5D6C000
heap
page read and write
193000
stack
page read and write
5D6C000
heap
page read and write
401000
unkown
page execute read
405000
unkown
page execute read
B78000
unkown
page execute and read and write
D90000
heap
page read and write
5E08000
heap
page read and write
B78000
unkown
page execute and read and write
5DAB000
heap
page read and write
6B1C000
stack
page read and write
1262000
heap
page read and write
FAF000
stack
page read and write
DA4000
heap
page read and write
2E97000
heap
page read and write
5E08000
heap
page read and write
6211000
heap
page read and write
5E08000
heap
page read and write
A42000
unkown
page readonly
5DAD000
heap
page read and write
E2E000
stack
page read and write
9C000
stack
page read and write
5D7A000
heap
page read and write
5D6C000
heap
page read and write
1216000
heap
page read and write
621B000
heap
page read and write
5D94000
heap
page read and write
5EDA000
heap
page read and write
2EA1000
heap
page read and write
6E8D000
stack
page read and write
62DF000
heap
page read and write
5D94000
heap
page read and write
DC0000
heap
page read and write
5DBC000
heap
page read and write
2EA1000
heap
page read and write
113E000
stack
page read and write
5D92000
heap
page read and write
C20000
heap
page read and write
193000
stack
page read and write
A42000
unkown
page readonly
193000
stack
page read and write
5D8D000
heap
page read and write
6611000
heap
page read and write
5DDC000
heap
page read and write
5E08000
heap
page read and write
B78000
unkown
page execute and read and write
285F000
stack
page read and write
B78000
unkown
page execute and read and write
6ADB000
stack
page read and write
401000
unkown
page execute and write copy
400000
unkown
page readonly
107F000
stack
page read and write
5DAD000
heap
page read and write
5DF8000
heap
page read and write
400000
unkown
page readonly
5D9F000
heap
page read and write
6226000
heap
page read and write
C00000
heap
page read and write
D38000
heap
page read and write
5D62000
heap
page read and write
284F000
stack
page read and write
401000
unkown
page execute read
5D72000
heap
page read and write
5E08000
heap
page read and write
5D6C000
heap
page read and write
6231000
heap
page read and write
5D97000
heap
page read and write
B5D000
unkown
page readonly
5D61000
heap
page read and write
2824000
heap
page read and write
193000
stack
page read and write
6211000
heap
page read and write
5E0E000
heap
page read and write
561000
unkown
page execute read
5D74000
heap
page read and write
5D74000
heap
page read and write
5E08000
heap
page read and write
5D6C000
heap
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
5D7A000
heap
page read and write
A42000
unkown
page readonly
5D97000
heap
page read and write
5D5F000
heap
page read and write
621B000
heap
page read and write
B79000
unkown
page write copy
121A000
heap
page read and write
401000
unkown
page execute and write copy
B79000
unkown
page write copy
4FAB000
heap
page read and write
405000
unkown
page execute read
2A60000
heap
page read and write
2E80000
remote allocation
page read and write
BE0000
heap
page read and write
601E000
stack
page read and write
6222000
heap
page read and write
C7E000
stack
page read and write
C57000
heap
page read and write
DA4000
heap
page read and write
5D84000
heap
page read and write
621B000
heap
page read and write
123C000
heap
page read and write
401000
unkown
page execute and write copy
B5D000
unkown
page readonly
5E08000
heap
page read and write
5DB1000
heap
page read and write
B79000
unkown
page write copy
5F9B000
heap
page read and write
9C000
stack
page read and write
6221000
heap
page read and write
68B4000
heap
page read and write
5DCD000
heap
page read and write
5D94000
heap
page read and write
DA4000
heap
page read and write
6210000
trusted library allocation
page read and write
401000
unkown
page execute read
B5D000
unkown
page readonly
2B70000
heap
page read and write
C80000
heap
page read and write
193000
stack
page read and write
622E000
heap
page read and write
5D6C000
heap
page read and write
5D8C000
heap
page read and write
5B4000
unkown
page execute and read and write
622F000
heap
page read and write
629D000
heap
page read and write
C10000
heap
page read and write
C50000
heap
page read and write
5DFF000
heap
page read and write
2EA1000
heap
page read and write
285F000
stack
page read and write
D4E000
stack
page read and write
6226000
heap
page read and write
5E03000
heap
page read and write
C90000
heap
page read and write
11C0000
heap
page read and write
2EA1000
heap
page read and write
605E000
stack
page read and write
193000
stack
page read and write
DA0000
heap
page read and write
5D94000
heap
page read and write
5D6C000
heap
page read and write
5E08000
heap
page read and write
D6E000
stack
page read and write
B78000
unkown
page execute and read and write
403000
unkown
page readonly
FBF000
stack
page read and write
2EA1000
heap
page read and write
2970000
heap
page read and write
5DC0000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
C73000
unkown
page readonly
63D8000
heap
page read and write
5D61000
heap
page read and write
404000
unkown
page execute and read and write
2BB8000
heap
page read and write
5DAD000
heap
page read and write
2EA1000
heap
page read and write
BF0000
heap
page read and write
5E49000
heap
page read and write
5D95000
heap
page read and write
D70000
heap
page read and write
400000
unkown
page readonly
6261000
heap
page read and write
1F0000
heap
page read and write
405000
unkown
page execute read
403000
unkown
page readonly
6225000
heap
page read and write
622F000
heap
page read and write
5E08000
heap
page read and write
10F6000
stack
page read and write
64C8000
heap
page read and write
C1E000
heap
page read and write
5E08000
heap
page read and write
6221000
heap
page read and write
5B4000
unkown
page execute and read and write
BFE000
heap
page read and write
5D3D000
stack
page read and write
5DA1000
heap
page read and write
5B4000
unkown
page execute and read and write
5D84000
heap
page read and write
5D84000
heap
page read and write
DA4000
heap
page read and write
BF0000
heap
page read and write
C80000
heap
page read and write
62E2000
heap
page read and write
5D97000
heap
page read and write
2EA1000
heap
page read and write
5D84000
heap
page read and write
5D8C000
heap
page read and write
2EA1000
heap
page read and write
5D74000
heap
page read and write
5D61000
heap
page read and write
5D9B000
heap
page read and write
11CE000
heap
page read and write
5D8C000
heap
page read and write
6210000
trusted library allocation
page read and write
6215000
heap
page read and write
5B4000
unkown
page execute and read and write
623F000
heap
page read and write
67EA000
heap
page read and write
5D93000
heap
page read and write
6229000
heap
page read and write
400000
unkown
page readonly
68B2000
heap
page read and write
5DF8000
heap
page read and write
2EB0000
heap
page read and write
DA4000
heap
page read and write
DA4000
heap
page read and write
629E000
heap
page read and write
B5D000
unkown
page readonly
F8F000
stack
page read and write
70F000
unkown
page read and write
400000
unkown
page readonly
9C000
stack
page read and write
2820000
heap
page read and write
1263000
heap
page read and write
62CE000
heap
page read and write
D80000
heap
page read and write
2A20000
heap
page read and write
5DBC000
heap
page read and write
B78000
unkown
page execute and read and write
400000
unkown
page readonly
6E7000
unkown
page execute read
5E08000
heap
page read and write
6211000
heap
page read and write
5D84000
heap
page read and write
6612000
heap
page read and write
5D74000
heap
page read and write
B79000
unkown
page write copy
29E0000
heap
page read and write
2860000
heap
page read and write
5D95000
heap
page read and write
5D92000
heap
page read and write
130F000
stack
page read and write
5D8C000
heap
page read and write
6210000
trusted library allocation
page read and write
B79000
unkown
page write copy
68BC000
heap
page read and write
6225000
heap
page read and write
2BA8000
heap
page read and write
6950000
direct allocation
page execute and read and write
6610000
heap
page read and write
193000
stack
page read and write
5D74000
heap
page read and write
2830000
heap
page read and write
2EA1000
heap
page read and write
715000
unkown
page execute read
400000
unkown
page readonly
5DAE000
heap
page read and write
6415000
heap
page read and write
5D94000
heap
page read and write
401000
unkown
page execute read
9C000
stack
page read and write
DCA000
heap
page read and write
5D97000
heap
page read and write
5DF8000
heap
page read and write
D8E000
stack
page read and write
5DE6000
heap
page read and write
63D8000
heap
page read and write
2EA1000
heap
page read and write
5E08000
heap
page read and write
5D7C000
heap
page read and write
FBF000
stack
page read and write
5D94000
heap
page read and write
5D92000
heap
page read and write
5D8C000
heap
page read and write
5EE0000
heap
page read and write
A42000
unkown
page readonly
5D95000
heap
page read and write
5D6C000
heap
page read and write
5D5F000
heap
page read and write
11ED000
heap
page read and write
403000
unkown
page readonly
5D5A000
heap
page read and write
100F000
stack
page read and write
B78000
unkown
page execute and read and write
DCE000
heap
page read and write
405000
unkown
page execute read
5D84000
heap
page read and write
6222000
heap
page read and write
6248000
heap
page read and write
D80000
heap
page read and write
B5D000
unkown
page readonly
A42000
unkown
page readonly
B79000
unkown
page write copy
5DF8000
heap
page read and write
5DA8000
heap
page read and write
5FEC000
heap
page read and write
B79000
unkown
page write copy
5D63000
heap
page read and write
B78000
unkown
page execute and read and write
6210000
trusted library allocation
page read and write
5D74000
heap
page read and write
5D84000
heap
page read and write
5D72000
heap
page read and write
5E08000
heap
page read and write
5D9F000
heap
page read and write
B78000
unkown
page execute and write copy
5D61000
heap
page read and write
68B9000
heap
page read and write
2EA1000
heap
page read and write
404000
unkown
page execute and read and write
2EA1000
heap
page read and write
C8A000
heap
page read and write
641B000
heap
page read and write
9C000
stack
page read and write
5BFF000
stack
page read and write
6210000
trusted library allocation
page read and write
5DE0000
heap
page read and write
B78000
unkown
page execute and read and write
D6E000
stack
page read and write
6BC5000
heap
page read and write
5E08000
heap
page read and write
DA4000
heap
page read and write
403000
unkown
page readonly
6211000
heap
page read and write
62AD000
heap
page read and write
5D6C000
heap
page read and write
5B4000
unkown
page execute and read and write
There are 931 hidden memdumps, click here to show them.