IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\k[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\l2[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_c81e728d9d4c2f636f067f89cc14862c\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\UhOL8vG3NSxPpn1EjM9IIxV.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\JcZ7W4aCxlpc4pOVLwL1.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\dD08ulq4N33OmW5HQdwT.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\0oMfHkGWFh4pWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\4sUtUNsvlrFeHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\HXF2GKJggz_xLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\Hm8O0mwXDHDOWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\KxyubmlbrMrsWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\McH__kxSGQ3CHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\ViabJlcWgYGJCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\XcbIA_ZWZ9jqWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\_oONYmGn6yA2Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\doi2rNpU9jTAWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\l0Mo_A56E5KdHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\mX4bSXvGCffaLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\ogxbFEXNUkQ0Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\qa2LU9gSDt_SHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\uqfKLeVZs6zqCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\trixy_lgbWpHb9dJ2\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy_lgbWpHb9dJ2\History\Firefox_v6zchhhv.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy_lgbWpHb9dJ2\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy_lgbWpHb9dJ2\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy_lgbWpHb9dJ2\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Thu Apr 25 13:29:15 2024, mtime=Thu Apr 25 13:29:15 2024, atime=Thu Apr 25 13:29:14 2024, length=4563640, window=hide
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\dD08ulq4N33OmW5HQdwT.exe
"C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\dD08ulq4N33OmW5HQdwT.exe"
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\JcZ7W4aCxlpc4pOVLwL1.exe
"C:\Users\user\AppData\Local\Temp\span_lgbWpHb9dJ2\JcZ7W4aCxlpc4pOVLwL1.exe"
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\MSIUpdaterV2.exe
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
"C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://easy2buy.ae/wp-content/upgrade/k.exe$
unknown
malicious
http://193.233.132.175/server/k/l2.exe
193.233.132.175
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/widget/demo/185.152.66.230
34.117.186.192
https://db-ip.com:443/demo/home.php?s=185.152.66.230P
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230
104.26.5.15
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://easy2buy.ae/wp-content/upgrade/k.exe
185.199.220.53
https://easy2buy.ae:80/wp-content/upgrade/k.exe
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/risepro_bot7
unknown
https://ipinfo.io:443/widget/demo/185.152.66.230B
unknown
https://support.mozilla.org
unknown
https://easy2buy.ae/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230VEY
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
easy2buy.ae
185.199.220.53
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
193.233.132.47
unknown
Russian Federation
malicious
193.233.132.175
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States
185.199.220.53
easy2buy.ae
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_c81e728d9d4c2f636f067f89cc14862c
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
62C7000
heap
page read and write
malicious
64CA000
heap
page read and write
malicious
64FC000
heap
page read and write
6501000
heap
page read and write
6420000
trusted library allocation
page read and write
64EF000
heap
page read and write
6E28000
heap
page read and write
60C4000
heap
page read and write
F4F000
stack
page read and write
60C5000
heap
page read and write
6441000
heap
page read and write
6501000
heap
page read and write
64E2000
heap
page read and write
631E000
stack
page read and write
6501000
heap
page read and write
400000
unkown
page readonly
105F000
stack
page read and write
E6E000
stack
page read and write
2A10000
heap
page read and write
6420000
trusted library allocation
page read and write
BE0000
heap
page read and write
B78000
unkown
page execute and read and write
6236000
heap
page read and write
148C000
heap
page read and write
A6F000
unkown
page read and write
6F60000
direct allocation
page execute and read and write
6441000
heap
page read and write
1D0000
heap
page read and write
64F0000
heap
page read and write
6194000
heap
page read and write
64F1000
heap
page read and write
60E5000
heap
page read and write
401000
unkown
page execute and write copy
400000
unkown
page readonly
B78000
unkown
page execute and write copy
60B5000
heap
page read and write
6245000
heap
page read and write
610D000
heap
page read and write
400000
unkown
page readonly
60C8000
heap
page read and write
5AA0000
remote allocation
page read and write
6430000
heap
page read and write
64E0000
heap
page read and write
642B000
heap
page read and write
30B1000
heap
page read and write
B78000
unkown
page execute and read and write
CE0000
heap
page read and write
60D8000
heap
page read and write
6535000
heap
page read and write
6501000
heap
page read and write
30B1000
heap
page read and write
6434000
heap
page read and write
6A44000
heap
page read and write
6AC6000
heap
page read and write
6420000
trusted library allocation
page read and write
B5D000
unkown
page readonly
6502000
heap
page read and write
D3E000
stack
page read and write
404000
unkown
page execute and read and write
60B5000
heap
page read and write
60D1000
heap
page read and write
60C4000
heap
page read and write
403000
unkown
page readonly
610E000
heap
page read and write
EF8000
heap
page read and write
6467000
heap
page read and write
B78000
unkown
page execute and write copy
E2F000
stack
page read and write
6502000
heap
page read and write
6450000
heap
page read and write
60D1000
heap
page read and write
282F000
stack
page read and write
6553000
heap
page read and write
B5D000
unkown
page readonly
60C5000
heap
page read and write
60C5000
heap
page read and write
13FB000
heap
page read and write
6430000
heap
page read and write
60B6000
heap
page read and write
B78000
unkown
page execute and write copy
405000
unkown
page execute read
6421000
heap
page read and write
6629000
heap
page read and write
30B1000
heap
page read and write
60B9000
heap
page read and write
6430000
heap
page read and write
60E3000
heap
page read and write
193000
stack
page read and write
64E5000
heap
page read and write
6425000
heap
page read and write
5E4E000
stack
page read and write
6146000
heap
page read and write
6624000
heap
page read and write
64D2000
heap
page read and write
64CB000
heap
page read and write
C8E000
stack
page read and write
6105000
heap
page read and write
6501000
heap
page read and write
1475000
heap
page read and write
6EE0000
direct allocation
page execute and read and write
F1A000
heap
page read and write
EC0000
heap
page read and write
28C0000
heap
page read and write
D0E000
stack
page read and write
6191000
heap
page read and write
60D1000
heap
page read and write
B78000
unkown
page execute and read and write
134D000
stack
page read and write
6553000
heap
page read and write
6437000
heap
page read and write
64DD000
heap
page read and write
401000
unkown
page execute and write copy
64FE000
heap
page read and write
3090000
heap
page read and write
C3E000
stack
page read and write
14C4000
heap
page read and write
585E000
stack
page read and write
C3E000
stack
page read and write
13F3000
heap
page read and write
64E4000
heap
page read and write
60B2000
heap
page read and write
D5E000
stack
page read and write
E6E000
stack
page read and write
6441000
heap
page read and write
BF0000
heap
page read and write
645C000
heap
page read and write
405000
unkown
page execute read
30B1000
heap
page read and write
D3E000
stack
page read and write
60E5000
heap
page read and write
60D1000
heap
page read and write
B79000
unkown
page write copy
30B0000
heap
page read and write
60D1000
heap
page read and write
6AC3000
heap
page read and write
2FF0000
trusted library allocation
page read and write
6626000
heap
page read and write
60C5000
heap
page read and write
5B4000
unkown
page execute and read and write
404000
unkown
page execute and read and write
E90000
heap
page read and write
6AC2000
heap
page read and write
60E3000
heap
page read and write
60E3000
heap
page read and write
401000
unkown
page execute read
A75000
unkown
page execute read
14D0000
heap
page read and write
64F6000
heap
page read and write
400000
unkown
page readonly
404000
unkown
page execute and read and write
6423000
heap
page read and write
14C4000
heap
page read and write
60D8000
heap
page read and write
B79000
unkown
page write copy
E00000
heap
page read and write
14C4000
heap
page read and write
64E9000
heap
page read and write
404000
unkown
page execute and read and write
6621000
heap
page read and write
60B8000
heap
page read and write
6195000
heap
page read and write
401000
unkown
page execute and write copy
64E0000
heap
page read and write
F1E000
heap
page read and write
193000
stack
page read and write
BE0000
heap
page read and write
599E000
stack
page read and write
6106000
heap
page read and write
6421000
heap
page read and write
A42000
unkown
page readonly
B78000
unkown
page execute and write copy
13CE000
heap
page read and write
2A90000
heap
page read and write
64E4000
heap
page read and write
60D1000
heap
page read and write
630B000
heap
page read and write
60D8000
heap
page read and write
193000
stack
page read and write
64F0000
heap
page read and write
10BF000
stack
page read and write
14C4000
heap
page read and write
6420000
trusted library allocation
page read and write
C5E000
heap
page read and write
A42000
unkown
page readonly
60D1000
heap
page read and write
6420000
trusted library allocation
page read and write
64DD000
heap
page read and write
C00000
heap
page read and write
6114000
heap
page read and write
E9E000
heap
page read and write
60E5000
heap
page read and write
401000
unkown
page execute and write copy
60E3000
heap
page read and write
401000
unkown
page execute read
6118000
heap
page read and write
64EC000
heap
page read and write
B78000
unkown
page execute and read and write
64CE000
heap
page read and write
B79000
unkown
page write copy
6117000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
E0E000
heap
page read and write
405000
unkown
page execute read
BE0000
heap
page read and write
30B1000
heap
page read and write
6501000
heap
page read and write
60C3000
heap
page read and write
60AB000
heap
page read and write
13E2000
heap
page read and write
BEA000
heap
page read and write
107F000
stack
page read and write
B79000
unkown
page write copy
5B4000
unkown
page execute and read and write
2A10000
heap
page read and write
404000
unkown
page execute and read and write
60B9000
heap
page read and write
6120000
heap
page read and write
64D3000
heap
page read and write
14C4000
heap
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
5B4000
unkown
page execute and read and write
64D8000
heap
page read and write
C2E000
stack
page read and write
B78000
unkown
page execute and write copy
9C000
stack
page read and write
E90000
heap
page read and write
5B4000
unkown
page execute and read and write
60D1000
heap
page read and write
B79000
unkown
page write copy
60B7000
heap
page read and write
647E000
heap
page read and write
D20000
heap
page read and write
6090000
heap
page read and write
64DD000
heap
page read and write
6681000
heap
page read and write
B78000
unkown
page execute and write copy
6421000
heap
page read and write
60D8000
heap
page read and write
64F5000
heap
page read and write
64F1000
heap
page read and write
6162000
heap
page read and write
6421000
heap
page read and write
E6E000
stack
page read and write
143F000
heap
page read and write
726C000
stack
page read and write
60E5000
heap
page read and write
6421000
heap
page read and write
193000
stack
page read and write
1442000
heap
page read and write
6AE1000
heap
page read and write
6420000
trusted library allocation
page read and write
60D1000
heap
page read and write
D20000
heap
page read and write
400000
unkown
page readonly
64D3000
heap
page read and write
646B000
heap
page read and write
405000
unkown
page execute read
400000
unkown
page readonly
60D1000
heap
page read and write
6AE0000
heap
page read and write
74AD000
stack
page read and write
282C000
heap
page read and write
64CB000
heap
page read and write
60E3000
heap
page read and write
5AA0000
remote allocation
page read and write
60C5000
heap
page read and write
A42000
unkown
page read and write
60C4000
heap
page read and write
64DC000
heap
page read and write
6459000
heap
page read and write
64D3000
heap
page read and write
6420000
trusted library allocation
page read and write
C8E000
stack
page read and write
F7F000
stack
page read and write
13A0000
heap
page read and write
60A4000
heap
page read and write
C9E000
heap
page read and write
401000
unkown
page execute read
F00000
heap
page read and write
60E3000
heap
page read and write
62F7000
heap
page read and write
73AC000
stack
page read and write
722E000
stack
page read and write
289F000
stack
page read and write
B79000
unkown
page write copy
A42000
unkown
page readonly
30A7000
heap
page read and write
64F9000
heap
page read and write
C3E000
stack
page read and write
60C5000
heap
page read and write
403000
unkown
page readonly
B78000
unkown
page execute and write copy
B79000
unkown
page write copy
14C4000
heap
page read and write
401000
unkown
page execute and write copy
6454000
heap
page read and write
6421000
heap
page read and write
30B1000
heap
page read and write
30B1000
heap
page read and write
6111000
heap
page read and write
A42000
unkown
page readonly
D40000
heap
page read and write
B79000
unkown
page write copy
64F5000
heap
page read and write
6421000
heap
page read and write
60E3000
heap
page read and write
405000
unkown
page execute read
FAF000
stack
page read and write
5AA0000
remote allocation
page read and write
60B8000
heap
page read and write
9C000
stack
page read and write
64FB000
heap
page read and write
E0A000
heap
page read and write
6454000
heap
page read and write
6B84000
heap
page read and write
30B1000
heap
page read and write
1418000
heap
page read and write
14C4000
heap
page read and write
60E3000
heap
page read and write
EC8000
heap
page read and write
6445000
heap
page read and write
401000
unkown
page execute and write copy
60D1000
heap
page read and write
6146000
heap
page read and write
13AA000
heap
page read and write
CFE000
stack
page read and write
60F6000
heap
page read and write
CC0000
heap
page read and write
60E3000
heap
page read and write
400000
unkown
page readonly
B5D000
unkown
page readonly
60E3000
heap
page read and write
6197000
heap
page read and write
6102000
heap
page read and write
60E3000
heap
page read and write
D9E000
stack
page read and write
401000
unkown
page execute read
60D8000
heap
page read and write
5A9F000
stack
page read and write
148C000
heap
page read and write
13AE000
heap
page read and write
30B1000
heap
page read and write
1425000
heap
page read and write
400000
unkown
page readonly
6237000
heap
page read and write
6237000
heap
page read and write
CB8000
heap
page read and write
B78000
unkown
page execute and read and write
400000
unkown
page readonly
403000
unkown
page readonly
D60000
heap
page read and write
64D3000
heap
page read and write
B5D000
unkown
page readonly
405000
unkown
page execute read
401000
unkown
page execute and write copy
6115000
heap
page read and write
707C000
heap
page read and write
14C4000
heap
page read and write
60D8000
heap
page read and write
404000
unkown
page execute and read and write
72F9000
heap
page read and write
6440000
heap
page read and write
736F000
stack
page read and write
60D1000
heap
page read and write
60B7000
heap
page read and write
B5D000
unkown
page readonly
E83000
heap
page read and write
183F000
stack
page read and write
60D8000
heap
page read and write
30B1000
heap
page read and write
64DB000
heap
page read and write
6562000
heap
page read and write
6ACB000
heap
page read and write
403000
unkown
page readonly
B78000
unkown
page execute and write copy
193000
stack
page read and write
30B1000
heap
page read and write
643D000
heap
page read and write
1437000
heap
page read and write
60D8000
heap
page read and write
400000
unkown
page readonly
A1A000
unkown
page readonly
400000
unkown
page readonly
6430000
heap
page read and write
CC0000
heap
page read and write
405000
unkown
page execute read
64E2000
heap
page read and write
30B1000
heap
page read and write
14C4000
heap
page read and write
6123000
heap
page read and write
A42000
unkown
page readonly
193000
stack
page read and write
193000
stack
page read and write
3350000
heap
page read and write
60E5000
heap
page read and write
403000
unkown
page readonly
60C5000
heap
page read and write
30B1000
heap
page read and write
400000
unkown
page readonly
BE0000
heap
page read and write
60C7000
heap
page read and write
193000
stack
page read and write
9C000
stack
page read and write
400000
unkown
page readonly
14C4000
heap
page read and write
B5D000
unkown
page readonly
64EF000
heap
page read and write
E2F000
stack
page read and write
60D8000
heap
page read and write
28AF000
stack
page read and write
400000
unkown
page readonly
637E000
stack
page read and write
60E3000
heap
page read and write
B5D000
unkown
page readonly
60D1000
heap
page read and write
14C4000
heap
page read and write
140C000
heap
page read and write
D70000
heap
page read and write
60E3000
heap
page read and write
30B1000
heap
page read and write
2910000
heap
page read and write
5F4F000
stack
page read and write
401000
unkown
page execute and write copy
60E3000
heap
page read and write
60D8000
heap
page read and write
B79000
unkown
page write copy
14C4000
heap
page read and write
143B000
heap
page read and write
6501000
heap
page read and write
403000
unkown
page readonly
6528000
heap
page read and write
64E2000
heap
page read and write
30B1000
heap
page read and write
E9A000
heap
page read and write
60C5000
heap
page read and write
60E3000
heap
page read and write
6127000
heap
page read and write
9C000
stack
page read and write
60B9000
heap
page read and write
60D1000
heap
page read and write
62FE000
heap
page read and write
148C000
heap
page read and write
6126000
heap
page read and write
A47000
unkown
page execute read
60D8000
heap
page read and write
60B5000
heap
page read and write
2970000
heap
page read and write
B79000
unkown
page write copy
400000
unkown
page readonly
60E5000
heap
page read and write
64EA000
heap
page read and write
193000
stack
page read and write
6620000
trusted library allocation
page read and write
64CB000
heap
page read and write
6501000
heap
page read and write
2950000
heap
page read and write
1410000
heap
page read and write
F10000
heap
page read and write
64E0000
heap
page read and write
143B000
heap
page read and write
60C8000
heap
page read and write
405000
unkown
page execute read
6450000
heap
page read and write
F07000
heap
page read and write
148C000
heap
page read and write
6123000
heap
page read and write
CCE000
heap
page read and write
404000
unkown
page execute and read and write
60D1000
heap
page read and write
CC0000
heap
page read and write
14C4000
heap
page read and write
6115000
heap
page read and write
6934000
heap
page read and write
64F5000
heap
page read and write
64E2000
heap
page read and write
3390000
heap
page read and write
29E0000
heap
page read and write
64E7000
heap
page read and write
405000
unkown
page execute read
60C5000
heap
page read and write
C4E000
stack
page read and write
193000
stack
page read and write
64CB000
heap
page read and write
64E2000
heap
page read and write
60E5000
heap
page read and write
6437000
heap
page read and write
CE0000
heap
page read and write
60EA000
heap
page read and write
60EF000
heap
page read and write
B5D000
unkown
page readonly
6420000
trusted library allocation
page read and write
6E2F000
heap
page read and write
C80000
heap
page read and write
CEE000
heap
page read and write
A42000
unkown
page readonly
6627000
heap
page read and write
B79000
unkown
page write copy
60B9000
heap
page read and write
60B8000
heap
page read and write
6109000
heap
page read and write
9C000
stack
page read and write
401000
unkown
page execute read
64F9000
heap
page read and write
B5D000
unkown
page readonly
3010000
heap
page read and write
612F000
heap
page read and write
5B4000
unkown
page execute and read and write
108F000
stack
page read and write
B78000
unkown
page execute and write copy
6DEA000
heap
page read and write
D00000
heap
page read and write
688A000
heap
page read and write
6146000
heap
page read and write
125B000
stack
page read and write
6887000
heap
page read and write
60D8000
heap
page read and write
60E3000
heap
page read and write
64CF000
heap
page read and write
E2F000
stack
page read and write
64DD000
heap
page read and write
E6F000
stack
page read and write
669F000
heap
page read and write
CB0000
heap
page read and write
405000
unkown
page execute read
60D1000
heap
page read and write
CA0000
heap
page read and write
1434000
heap
page read and write
64D3000
heap
page read and write
60D8000
heap
page read and write
400000
unkown
page readonly
645C000
heap
page read and write
30B1000
heap
page read and write
64F0000
heap
page read and write
193000
stack
page read and write
64E7000
heap
page read and write
60D8000
heap
page read and write
619F000
heap
page read and write
CB0000
heap
page read and write
6425000
heap
page read and write
B79000
unkown
page write copy
6111000
heap
page read and write
A42000
unkown
page readonly
60C5000
heap
page read and write
403000
unkown
page readonly
60E3000
heap
page read and write
64E2000
heap
page read and write
60E3000
heap
page read and write
405000
unkown
page execute read
60D1000
heap
page read and write
401000
unkown
page execute read
687F000
stack
page read and write
FC6000
unkown
page readonly
BE0000
heap
page read and write
6421000
heap
page read and write
400000
unkown
page readonly
2980000
heap
page read and write
6C93000
heap
page read and write
5B4000
unkown
page execute and read and write
B5D000
unkown
page readonly
403000
unkown
page readonly
C90000
heap
page read and write
6423000
heap
page read and write
D20000
heap
page read and write
60E3000
heap
page read and write
6882000
heap
page read and write
9C000
stack
page read and write
64D2000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute and write copy
30B1000
heap
page read and write
B79000
unkown
page write copy
60C7000
heap
page read and write
5B4000
unkown
page execute and read and write
E8F000
stack
page read and write
60D8000
heap
page read and write
6143000
heap
page read and write
6502000
heap
page read and write
C5A000
heap
page read and write
B78000
unkown
page execute and read and write
30B1000
heap
page read and write
400000
unkown
page readonly
60C4000
heap
page read and write
400000
unkown
page readonly
B78000
unkown
page execute and write copy
60C5000
heap
page read and write
62FC000
heap
page read and write
30B1000
heap
page read and write
6100000
heap
page read and write
6501000
heap
page read and write
F5F000
stack
page read and write
60C4000
heap
page read and write
8C0000
unkown
page readonly
64E2000
heap
page read and write
60C4000
heap
page read and write
405000
unkown
page execute read
5B4000
unkown
page execute and read and write
668F000
heap
page read and write
30A0000
heap
page read and write
CF0000
heap
page read and write
6420000
trusted library allocation
page read and write
BE0000
heap
page read and write
15FE000
stack
page read and write
8C1000
unkown
page execute read
404000
unkown
page execute and read and write
C50000
heap
page read and write
6502000
heap
page read and write
6420000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
BE0000
heap
page read and write
6421000
heap
page read and write
401000
unkown
page execute and write copy
60C3000
heap
page read and write
193000
stack
page read and write
60D1000
heap
page read and write
B79000
unkown
page write copy
B79000
unkown
page write copy
60C7000
heap
page read and write
60C5000
heap
page read and write
6434000
heap
page read and write
64F5000
heap
page read and write
A42000
unkown
page readonly
D0E000
stack
page read and write
147C000
heap
page read and write
64D3000
heap
page read and write
14C4000
heap
page read and write
6AE0000
heap
page read and write
60B9000
heap
page read and write
60D1000
heap
page read and write
6421000
heap
page read and write
A42000
unkown
page readonly
74A9000
stack
page read and write
673E000
heap
page read and write
F4F000
stack
page read and write
60D8000
heap
page read and write
13F8000
heap
page read and write
2850000
heap
page read and write
13F5000
heap
page read and write
B79000
unkown
page write copy
64E4000
heap
page read and write
16FF000
stack
page read and write
60D8000
heap
page read and write
6501000
heap
page read and write
403000
unkown
page readonly
6421000
heap
page read and write
62B0000
heap
page read and write
1406000
heap
page read and write
29A0000
heap
page read and write
30B1000
heap
page read and write
6421000
heap
page read and write
CCA000
heap
page read and write
64EF000
heap
page read and write
404000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
677F000
stack
page read and write
F8E000
stack
page read and write
60F4000
heap
page read and write
653E000
heap
page read and write
C48000
unkown
page execute read
64DD000
heap
page read and write
64F2000
heap
page read and write
6420000
trusted library allocation
page read and write
60B8000
heap
page read and write
62F6000
heap
page read and write
B78000
unkown
page execute and read and write
6130000
heap
page read and write
64E4000
heap
page read and write
60D8000
heap
page read and write
9C000
stack
page read and write
BE0000
heap
page read and write
30B1000
heap
page read and write
B79000
unkown
page write copy
BF0000
heap
page read and write
400000
unkown
page readonly
B5D000
unkown
page readonly
FC6000
unkown
page readonly
14C4000
heap
page read and write
14C4000
heap
page read and write
64FF000
heap
page read and write
404000
unkown
page execute and read and write
6420000
trusted library allocation
page read and write
60D8000
heap
page read and write
623D000
heap
page read and write
64DD000
heap
page read and write
A42000
unkown
page readonly
403000
unkown
page readonly
60E6000
heap
page read and write
6420000
trusted library allocation
page read and write
9C000
stack
page read and write
D80000
heap
page read and write
B79000
unkown
page write copy
9C000
stack
page read and write
9C000
stack
page read and write
6304000
heap
page read and write
401000
unkown
page execute read
643D000
heap
page read and write
6420000
heap
page read and write
60D1000
heap
page read and write
6420000
trusted library allocation
page read and write
143E000
heap
page read and write
401000
unkown
page execute and write copy
BEE000
heap
page read and write
30B1000
heap
page read and write
624D000
heap
page read and write
15B0000
heap
page read and write
289F000
stack
page read and write
60FC000
heap
page read and write
10EF000
stack
page read and write
60E3000
heap
page read and write
6421000
heap
page read and write
EF0000
heap
page read and write
14C4000
heap
page read and write
BF0000
heap
page read and write
60D1000
heap
page read and write
5B4000
unkown
page execute and read and write
401000
unkown
page execute read
60D8000
heap
page read and write
6430000
heap
page read and write
BE0000
heap
page read and write
C30000
heap
page read and write
60D8000
heap
page read and write
64D3000
heap
page read and write
60D8000
heap
page read and write
D70000
heap
page read and write
D00000
heap
page read and write
6502000
heap
page read and write
64D5000
heap
page read and write
14C4000
heap
page read and write
6DE0000
heap
page read and write
A42000
unkown
page readonly
6425000
heap
page read and write
B78000
unkown
page execute and write copy
60C3000
heap
page read and write
401000
unkown
page execute and write copy
609D000
heap
page read and write
403000
unkown
page readonly
13DE000
heap
page read and write
404000
unkown
page execute and read and write
60E5000
heap
page read and write
10AF000
stack
page read and write
400000
unkown
page readonly
B79000
unkown
page write copy
30B1000
heap
page read and write
C7E000
stack
page read and write
9C000
stack
page read and write
7120000
heap
page read and write
CFE000
stack
page read and write
645C000
heap
page read and write
6AC9000
heap
page read and write
14C4000
heap
page read and write
60B1000
heap
page read and write
60B8000
heap
page read and write
61B0000
heap
page read and write
A42000
unkown
page readonly
148C000
heap
page read and write
143A000
heap
page read and write
B78000
unkown
page execute and read and write
64E0000
heap
page read and write
610E000
heap
page read and write
6623000
heap
page read and write
64FB000
heap
page read and write
401000
unkown
page execute read
6450000
heap
page read and write
401000
unkown
page execute read
FFF000
stack
page read and write
14C4000
heap
page read and write
30C0000
heap
page read and write
70EB000
stack
page read and write
595F000
stack
page read and write
6421000
heap
page read and write
8C0000
unkown
page readonly
F8E000
stack
page read and write
64E2000
heap
page read and write
B79000
unkown
page write copy
9C000
stack
page read and write
6421000
heap
page read and write
14C4000
heap
page read and write
5B4000
unkown
page execute and read and write
C9A000
heap
page read and write
BF0000
heap
page read and write
BE0000
heap
page read and write
60E5000
heap
page read and write
64F0000
heap
page read and write
BF0000
heap
page read and write
B5D000
unkown
page readonly
60D1000
heap
page read and write
60E6000
heap
page read and write
60B5000
heap
page read and write
619E000
heap
page read and write
14C4000
heap
page read and write
64ED000
heap
page read and write
653D000
heap
page read and write
60E6000
heap
page read and write
60D8000
heap
page read and write
143B000
heap
page read and write
64CF000
heap
page read and write
404000
unkown
page execute and read and write
53AC000
heap
page read and write
60B8000
heap
page read and write
1356000
stack
page read and write
60E3000
heap
page read and write
B78000
unkown
page execute and write copy
B79000
unkown
page write copy
1474000
heap
page read and write
403000
unkown
page readonly
CFE000
stack
page read and write
60D1000
heap
page read and write
14C0000
heap
page read and write
13F1000
heap
page read and write
5B4000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
13EC000
heap
page read and write
64E0000
heap
page read and write
60B9000
heap
page read and write
64D3000
heap
page read and write
400000
unkown
page readonly
64E7000
heap
page read and write
B78000
unkown
page execute and read and write
BE0000
heap
page read and write
688F000
heap
page read and write
173E000
stack
page read and write
B79000
unkown
page write copy
401000
unkown
page execute read
60C7000
heap
page read and write
1481000
heap
page read and write
60C5000
heap
page read and write
6430000
heap
page read and write
642B000
heap
page read and write
60B5000
heap
page read and write
C48000
unkown
page execute read
612C000
heap
page read and write
60B9000
heap
page read and write
C40000
heap
page read and write
14C4000
heap
page read and write
64E8000
heap
page read and write
65B8000
heap
page read and write
64E2000
heap
page read and write
108F000
stack
page read and write
6BD9000
heap
page read and write
646B000
heap
page read and write
60E3000
heap
page read and write
B78000
unkown
page execute and read and write
60E3000
heap
page read and write
6450000
heap
page read and write
64E4000
heap
page read and write
64D3000
heap
page read and write
60C8000
heap
page read and write
610A000
heap
page read and write
64F6000
heap
page read and write
60B7000
heap
page read and write
5B4000
unkown
page execute and read and write
CEA000
heap
page read and write
6888000
heap
page read and write
C47000
unkown
page read and write
There are 845 hidden memdumps, click here to show them.