IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\l2[1].exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\dZGGvSkztfgYu5jqSY21Wne.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\llmcrdwzLnNKYB4T0Vnw.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\5PaUKQKCn1cOHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\GNGpmTFam5reWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\HYMDMNDHbpvCLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\KNCS9xAjcy97Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\Ln2ferf9cd9cHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\M2i6MTywpfRAHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\OaQuGlYHO2B0Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\Pe4W1HgFYxyTHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\UdeNZdOQSPDWWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\VCEccbr_cvO2Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\g85sD372nZcyCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\qUesDvlJI_ZiWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\sl01HQPBKH54Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\tnqSg6erqMxtWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\yDHoBcv6VALYLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixy1UB98D2D2zeo\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy1UB98D2D2zeo\History\Firefox_v6zchhhv.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy1UB98D2D2zeo\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy1UB98D2D2zeo\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy1UB98D2D2zeo\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS2.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Fri May 17 20:45:15 2024, mtime=Fri May 17 20:45:15 2024, atime=Fri May 17 20:45:15 2024, length=4563640, window=hide
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe" /tn "MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
C:\ProgramData\MSIUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\MSIUpdaterV2.exe
malicious
C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\llmcrdwzLnNKYB4T0Vnw.exe
"C:\Users\user\AppData\Local\Temp\span1UB98D2D2zeo\llmcrdwzLnNKYB4T0Vnw.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\user\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe
"C:\Users\user\AppData\Local\AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26\AdobeUpdaterV2.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe
"C:\Users\user\AppData\Local\Temp\EdgeMS2_45c48cce2e2d7fbdea1afc51c7c6ad26\EdgeMS2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://5.42.96.170/server/k/l2.exe
5.42.96.170
malicious
https://kuljyftgjk.online:80/server/k/l2.exe
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://kuljyftgjk.online:80/server/k/l2.exemespace
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://db-ip.com/z-
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://db-ip.com:443/demo/home.php?s=12.205.151.60
unknown
https://ipinfo.io/widget/demo/12.205.151.60
34.117.186.192
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://kuljyftgjk.online:80/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://kuljyftgjk.online/server/k/l2.exe5P#.
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://kuljyftgjk.online/server/k/l2.exedwzLnNKYB4T0Vnw.exe
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://t.me/risepro_bot
unknown
https://db-ip.com/demo/home.php?s=12.205.151.60
172.67.75.166
https://ipinfo.io/
unknown
https://kuljyftgjk.online:80/I
unknown
http://5.42.96.170/server/k/l2.exeDTl
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://5.42.96.170/server/k/l2.exe5
unknown
https://ipinfo.io/t
unknown
https://kuljyftgjk.online:80/server/k/l2.exe5G
unknown
https://kuljyftgjk.online/server/k/l2.exexefN
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://t.me/risepro_botisepro_bot
unknown
https://kuljyftgjk.online/server/k/l2.exeo
unknown
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io:443/widget/demo/12.205.151.60
unknown
https://support.mozilla.org
unknown
https://kuljyftgjk.online/server/k/l2.exe
unknown
https://kuljyftgjk.online:80/Mi&/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://kuljyftgjk.online:80/server/k/l2.exeJG
unknown
https://kuljyftgjk.online/
unknown
https://kuljyftgjk.online/Bb
unknown
https://t.me/risepro_bot%(
unknown
https://kuljyftgjk.online/ons
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kuljyftgjk.online
unknown
malicious
198.187.3.20.in-addr.arpa
unknown
malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
5.42.96.65
unknown
Russian Federation
malicious
5.42.96.170
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeUpdaterV2_45c48cce2e2d7fbdea1afc51c7c6ad26

Memdumps

Base Address
Regiontype
Protect
Malicious
61CB000
heap
page read and write
malicious
6449000
heap
page read and write
malicious
C2E000
stack
page read and write
105F000
stack
page read and write
6F50000
heap
page read and write
6456000
heap
page read and write
653E000
heap
page read and write
6531000
heap
page read and write
6550000
heap
page read and write
CFE000
heap
page read and write
EBF000
stack
page read and write
3211000
heap
page read and write
694F000
heap
page read and write
6444000
heap
page read and write
C3E000
stack
page read and write
B78000
unkown
page execute and write copy
647D000
heap
page read and write
6550000
heap
page read and write
6546000
heap
page read and write
647E000
heap
page read and write
655C000
heap
page read and write
6547000
heap
page read and write
3211000
heap
page read and write
65D9000
heap
page read and write
C40000
heap
page read and write
6540000
heap
page read and write
1604000
heap
page read and write
6530000
trusted library allocation
page read and write
45D000
unkown
page execute read
6444000
heap
page read and write
653B000
heap
page read and write
6444000
heap
page read and write
6B09000
heap
page read and write
62F3000
heap
page read and write
647F000
heap
page read and write
655B000
heap
page read and write
169D000
heap
page read and write
6542000
heap
page read and write
B79000
unkown
page write copy
1604000
heap
page read and write
1699000
heap
page read and write
401000
unkown
page execute and write copy
6C50000
heap
page read and write
6D20000
direct allocation
page execute and read and write
173B000
heap
page read and write
B79000
unkown
page write copy
9C000
stack
page read and write
6460000
heap
page read and write
646B000
heap
page read and write
658E000
heap
page read and write
6DA0000
direct allocation
page execute and read and write
3211000
heap
page read and write
6544000
heap
page read and write
6480000
heap
page read and write
B78000
unkown
page execute and write copy
1719000
heap
page read and write
A42000
unkown
page readonly
6550000
heap
page read and write
6555000
heap
page read and write
405000
unkown
page execute read
A42000
unkown
page readonly
6439000
heap
page read and write
FCB000
unkown
page execute read
658E000
heap
page read and write
6475000
heap
page read and write
653C000
heap
page read and write
64C0000
heap
page read and write
B78000
unkown
page execute and write copy
658E000
heap
page read and write
350D000
stack
page read and write
DFA000
heap
page read and write
658E000
heap
page read and write
646B000
heap
page read and write
6531000
heap
page read and write
6558000
heap
page read and write
1604000
heap
page read and write
B79000
unkown
page write copy
6565000
heap
page read and write
6530000
trusted library allocation
page read and write
5B4000
unkown
page execute and read and write
646B000
heap
page read and write
6490000
heap
page read and write
5530000
heap
page read and write
1A0F000
stack
page read and write
675C000
heap
page read and write
6489000
heap
page read and write
CD0000
heap
page read and write
5B4000
unkown
page execute and read and write
6603000
heap
page read and write
5B4000
unkown
page execute and read and write
1604000
heap
page read and write
B79000
unkown
page write copy
28A0000
heap
page read and write
647E000
heap
page read and write
646B000
heap
page read and write
64EF000
heap
page read and write
6444000
heap
page read and write
401000
unkown
page execute and write copy
F1F000
stack
page read and write
6481000
heap
page read and write
1604000
heap
page read and write
1604000
heap
page read and write
3211000
heap
page read and write
653F000
heap
page read and write
3210000
heap
page read and write
FBF000
stack
page read and write
DA8000
heap
page read and write
6456000
heap
page read and write
647D000
heap
page read and write
6456000
heap
page read and write
5A5F000
stack
page read and write
164E000
heap
page read and write
346F000
stack
page read and write
1604000
heap
page read and write
64C0000
heap
page read and write
F90000
heap
page read and write
64EF000
heap
page read and write
6530000
trusted library allocation
page read and write
6475000
heap
page read and write
3211000
heap
page read and write
DC0000
heap
page read and write
3200000
heap
page read and write
401000
unkown
page execute and write copy
B78000
unkown
page execute and write copy
6531000
heap
page read and write
6444000
heap
page read and write
64E1000
heap
page read and write
401000
unkown
page execute read
658E000
heap
page read and write
401000
unkown
page execute and write copy
6457000
heap
page read and write
6542000
heap
page read and write
644C000
heap
page read and write
6561000
heap
page read and write
15DE000
stack
page read and write
10BF000
stack
page read and write
1714000
heap
page read and write
335E000
stack
page read and write
B79000
unkown
page write copy
1604000
heap
page read and write
658E000
heap
page read and write
403000
unkown
page readonly
658E000
heap
page read and write
653B000
heap
page read and write
11DB000
stack
page read and write
6475000
heap
page read and write
6456000
heap
page read and write
6437000
heap
page read and write
B78000
unkown
page execute and read and write
28AF000
stack
page read and write
6475000
heap
page read and write
400000
unkown
page readonly
3211000
heap
page read and write
403000
unkown
page readonly
2C1B000
heap
page read and write
6C5A000
heap
page read and write
6475000
heap
page read and write
3211000
heap
page read and write
404000
unkown
page execute and read and write
64EF000
heap
page read and write
6734000
heap
page read and write
6475000
heap
page read and write
655B000
heap
page read and write
647D000
heap
page read and write
6444000
heap
page read and write
6545000
heap
page read and write
DD0000
heap
page read and write
1125000
unkown
page readonly
6490000
heap
page read and write
653B000
heap
page read and write
64EF000
heap
page read and write
CF0000
heap
page read and write
658E000
heap
page read and write
6550000
heap
page read and write
6603000
heap
page read and write
1738000
heap
page read and write
1604000
heap
page read and write
649E000
heap
page read and write
1E0000
heap
page read and write
658E000
heap
page read and write
8EC000
unkown
page execute read
1738000
heap
page read and write
6C94000
heap
page read and write
401000
unkown
page execute read
405000
unkown
page execute read
658E000
heap
page read and write
6545000
heap
page read and write
E1E000
stack
page read and write
6440000
heap
page read and write
6475000
heap
page read and write
6456000
heap
page read and write
401000
unkown
page execute and write copy
109F000
stack
page read and write
6438000
heap
page read and write
658E000
heap
page read and write
64C2000
heap
page read and write
1600000
heap
page read and write
6730000
heap
page read and write
6608000
heap
page read and write
A42000
unkown
page readonly
647D000
heap
page read and write
159E000
stack
page read and write
B79000
unkown
page write copy
647D000
heap
page read and write
647E000
heap
page read and write
647D000
heap
page read and write
646B000
heap
page read and write
16C7000
heap
page read and write
193000
stack
page read and write
3211000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
6545000
heap
page read and write
653B000
heap
page read and write
658E000
heap
page read and write
630C000
heap
page read and write
65E2000
heap
page read and write
193000
stack
page read and write
5B4000
unkown
page execute and read and write
658E000
heap
page read and write
6530000
trusted library allocation
page read and write
6456000
heap
page read and write
6456000
heap
page read and write
658E000
heap
page read and write
653B000
heap
page read and write
1694000
heap
page read and write
B5D000
unkown
page readonly
168D000
heap
page read and write
193000
stack
page read and write
292F000
stack
page read and write
65D8000
heap
page read and write
CFA000
heap
page read and write
2A30000
heap
page read and write
3211000
heap
page read and write
6548000
heap
page read and write
647D000
heap
page read and write
C30000
heap
page read and write
2B20000
heap
page read and write
6564000
heap
page read and write
6545000
heap
page read and write
6555000
heap
page read and write
D5E000
stack
page read and write
3211000
heap
page read and write
658F000
heap
page read and write
6604000
heap
page read and write
A42000
unkown
page readonly
400000
unkown
page readonly
6550000
heap
page read and write
647E000
heap
page read and write
643A000
heap
page read and write
6439000
heap
page read and write
1738000
heap
page read and write
6444000
heap
page read and write
6531000
heap
page read and write
6475000
heap
page read and write
3211000
heap
page read and write
16A9000
heap
page read and write
646B000
heap
page read and write
647E000
heap
page read and write
6543000
heap
page read and write
B5D000
unkown
page readonly
BE0000
heap
page read and write
6530000
trusted library allocation
page read and write
5B4000
unkown
page execute and read and write
6456000
heap
page read and write
D4E000
stack
page read and write
644B000
heap
page read and write
173B000
heap
page read and write
B78000
unkown
page execute and write copy
72D9000
stack
page read and write
6531000
heap
page read and write
BE0000
heap
page read and write
5B4000
unkown
page execute and read and write
658E000
heap
page read and write
6306000
heap
page read and write
646B000
heap
page read and write
173E000
heap
page read and write
B79000
unkown
page write copy
16B0000
heap
page read and write
648E000
heap
page read and write
6561000
heap
page read and write
1604000
heap
page read and write
6543000
heap
page read and write
6444000
heap
page read and write
653C000
heap
page read and write
6545000
heap
page read and write
6489000
heap
page read and write
193000
stack
page read and write
6548000
heap
page read and write
1604000
heap
page read and write
401000
unkown
page execute read
1550000
heap
page read and write
6475000
heap
page read and write
653F000
heap
page read and write
9C000
stack
page read and write
709C000
stack
page read and write
BE0000
heap
page read and write
16D3000
heap
page read and write
1604000
heap
page read and write
DB0000
heap
page read and write
630C000
heap
page read and write
6495000
heap
page read and write
653E000
heap
page read and write
3211000
heap
page read and write
658F000
heap
page read and write
6943000
heap
page read and write
B78000
unkown
page execute and read and write
643B000
heap
page read and write
33A000
unkown
page execute read
DFE000
heap
page read and write
657E000
heap
page read and write
653F000
heap
page read and write
61A0000
heap
page read and write
1604000
heap
page read and write
647D000
heap
page read and write
5C5000
unkown
page read and write
6495000
heap
page read and write
658E000
heap
page read and write
6561000
heap
page read and write
67F8000
heap
page read and write
61AB000
heap
page read and write
6542000
heap
page read and write
647E000
heap
page read and write
6564000
heap
page read and write
646B000
heap
page read and write
405000
unkown
page execute read
653E000
heap
page read and write
64EF000
heap
page read and write
653E000
heap
page read and write
5F5E000
stack
page read and write
609D000
stack
page read and write
6542000
heap
page read and write
705E000
stack
page read and write
400000
unkown
page readonly
647E000
heap
page read and write
6558000
heap
page read and write
C7E000
stack
page read and write
9C000
stack
page read and write
173C000
heap
page read and write
6475000
heap
page read and write
400000
unkown
page readonly
405000
unkown
page execute read
647D000
heap
page read and write
673A000
heap
page read and write
DA0000
heap
page read and write
3211000
heap
page read and write
6300000
trusted library allocation
page read and write
6438000
heap
page read and write
B79000
unkown
page write copy
5B4000
unkown
page execute and read and write
9C000
stack
page read and write
14ED000
stack
page read and write
6D26000
heap
page read and write
B5D000
unkown
page readonly
3207000
heap
page read and write
3211000
heap
page read and write
3211000
heap
page read and write
3211000
heap
page read and write
658E000
heap
page read and write
674C000
heap
page read and write
D0E000
stack
page read and write
400000
unkown
page readonly
657E000
heap
page read and write
65D8000
heap
page read and write
64CA000
heap
page read and write
6561000
heap
page read and write
6675000
heap
page read and write
5BB0000
remote allocation
page read and write
6739000
heap
page read and write
658E000
heap
page read and write
6243000
heap
page read and write
6949000
heap
page read and write
646B000
heap
page read and write
1692000
heap
page read and write
647D000
heap
page read and write
6246000
heap
page read and write
CDA000
heap
page read and write
CDE000
heap
page read and write
14F6000
stack
page read and write
647E000
heap
page read and write
3211000
heap
page read and write
6320000
heap
page read and write
630D000
heap
page read and write
6614000
heap
page read and write
400000
unkown
page readonly
6430000
trusted library allocation
page read and write
3220000
heap
page read and write
6531000
heap
page read and write
405000
unkown
page execute read
16C7000
heap
page read and write
1B0000
unkown
page readonly
6475000
heap
page read and write
1B1000
unkown
page execute read
655C000
heap
page read and write
65B5000
heap
page read and write
653C000
heap
page read and write
6531000
heap
page read and write
193000
stack
page read and write
6543000
heap
page read and write
647D000
heap
page read and write
29F0000
heap
page read and write
6530000
trusted library allocation
page read and write
1673000
heap
page read and write
624D000
heap
page read and write
400000
unkown
page readonly
F9A000
heap
page read and write
400000
unkown
page readonly
6530000
trusted library allocation
page read and write
653E000
heap
page read and write
646B000
heap
page read and write
6558000
heap
page read and write
6530000
trusted library allocation
page read and write
6545000
heap
page read and write
1738000
heap
page read and write
65E2000
heap
page read and write
3211000
heap
page read and write
B79000
unkown
page write copy
64C0000
heap
page read and write
647D000
heap
page read and write
6444000
heap
page read and write
6247000
heap
page read and write
6483000
heap
page read and write
404000
unkown
page execute and read and write
B5D000
unkown
page readonly
6480000
heap
page read and write
B78000
unkown
page execute and read and write
6946000
heap
page read and write
719F000
stack
page read and write
658E000
heap
page read and write
658E000
heap
page read and write
6543000
heap
page read and write
64EF000
heap
page read and write
8EC000
unkown
page execute read
400000
unkown
page readonly
403000
unkown
page readonly
6444000
heap
page read and write
6438000
heap
page read and write
6530000
heap
page read and write
1739000
heap
page read and write
71DC000
stack
page read and write
646B000
heap
page read and write
6438000
heap
page read and write
6483000
heap
page read and write
B78000
unkown
page execute and read and write
64DC000
heap
page read and write
6543000
heap
page read and write
173E000
heap
page read and write
6437000
heap
page read and write
6743000
heap
page read and write
658E000
heap
page read and write
649E000
heap
page read and write
30D000
unkown
page readonly
B79000
unkown
page write copy
1604000
heap
page read and write
658E000
heap
page read and write
653C000
heap
page read and write
BF0000
heap
page read and write
335000
unkown
page read and write
6545000
heap
page read and write
404000
unkown
page execute and read and write
B78000
unkown
page execute and read and write
16D3000
heap
page read and write
6475000
heap
page read and write
CDA000
heap
page read and write
CD0000
heap
page read and write
A42000
unkown
page readonly
6675000
heap
page read and write
B78000
unkown
page execute and write copy
B79000
unkown
page write copy
403000
unkown
page readonly
3360000
heap
page read and write
6439000
heap
page read and write
6530000
trusted library allocation
page read and write
591D000
stack
page read and write
A42000
unkown
page readonly
BF0000
heap
page read and write
400000
unkown
page readonly
6489000
heap
page read and write
1738000
heap
page read and write
658E000
heap
page read and write
653B000
heap
page read and write
6575000
heap
page read and write
64E1000
heap
page read and write
6306000
heap
page read and write
6444000
heap
page read and write
5CB000
unkown
page execute read
69FE000
heap
page read and write
9C000
stack
page read and write
647F000
heap
page read and write
619B000
stack
page read and write
1B0000
unkown
page readonly
648E000
heap
page read and write
693F000
stack
page read and write
647E000
heap
page read and write
653C000
heap
page read and write
B79000
unkown
page write copy
658E000
heap
page read and write
647E000
heap
page read and write
6456000
heap
page read and write
64EF000
heap
page read and write
653B000
heap
page read and write
653B000
heap
page read and write
65D9000
heap
page read and write
643B000
heap
page read and write
6543000
heap
page read and write
673D000
heap
page read and write
653F000
heap
page read and write
404000
unkown
page execute and read and write
658E000
heap
page read and write
654A000
heap
page read and write
65B5000
heap
page read and write
D5E000
stack
page read and write
653C000
heap
page read and write
405000
unkown
page execute read
6545000
heap
page read and write
581D000
stack
page read and write
2A10000
heap
page read and write
6530000
trusted library allocation
page read and write
1604000
heap
page read and write
6430000
trusted library allocation
page read and write
624D000
heap
page read and write
6575000
heap
page read and write
1604000
heap
page read and write
655C000
heap
page read and write
6437000
heap
page read and write
646B000
heap
page read and write
6457000
heap
page read and write
6437000
heap
page read and write
647E000
heap
page read and write
647D000
heap
page read and write
6EE2000
heap
page read and write
648D000
heap
page read and write
403000
unkown
page readonly
B78000
unkown
page execute and write copy
3520000
heap
page read and write
1604000
heap
page read and write
286A000
heap
page read and write
1640000
heap
page read and write
164A000
heap
page read and write
1604000
heap
page read and write
683F000
stack
page read and write
647D000
heap
page read and write
BE0000
heap
page read and write
6531000
heap
page read and write
403000
unkown
page readonly
9C000
stack
page read and write
61A0000
heap
page read and write
167D000
heap
page read and write
64EF000
heap
page read and write
6475000
heap
page read and write
C8E000
stack
page read and write
31B0000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
CF0000
heap
page read and write
401000
unkown
page execute and write copy
173B000
heap
page read and write
B5D000
unkown
page readonly
A42000
unkown
page readonly
653F000
heap
page read and write
1604000
heap
page read and write
3211000
heap
page read and write
1682000
heap
page read and write
6481000
heap
page read and write
F10000
heap
page read and write
16B9000
heap
page read and write
6444000
heap
page read and write
6475000
heap
page read and write
658E000
heap
page read and write
400000
unkown
page readonly
166D000
heap
page read and write
3211000
heap
page read and write
6565000
heap
page read and write
ECF000
stack
page read and write
6430000
heap
page read and write
6444000
heap
page read and write
595E000
stack
page read and write
6531000
heap
page read and write
61A3000
heap
page read and write
655B000
heap
page read and write
6F2B000
stack
page read and write
403000
unkown
page readonly
CDE000
heap
page read and write
6545000
heap
page read and write
28C0000
heap
page read and write
6456000
heap
page read and write
193000
stack
page read and write
648D000
heap
page read and write
621E000
stack
page read and write
1604000
heap
page read and write
72DD000
stack
page read and write
6531000
heap
page read and write
647D000
heap
page read and write
5BB0000
remote allocation
page read and write
193000
stack
page read and write
401000
unkown
page execute read
F17000
heap
page read and write
6561000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
6437000
heap
page read and write
624F000
heap
page read and write
6456000
heap
page read and write
6531000
heap
page read and write
6531000
heap
page read and write
6475000
heap
page read and write
64CA000
heap
page read and write
6604000
heap
page read and write
65B4000
heap
page read and write
401000
unkown
page execute and write copy
1604000
heap
page read and write
646B000
heap
page read and write
653F000
heap
page read and write
6736000
heap
page read and write
6542000
heap
page read and write
6475000
heap
page read and write
BF0000
heap
page read and write
658E000
heap
page read and write
3211000
heap
page read and write
400000
unkown
page readonly
647E000
heap
page read and write
D50000
heap
page read and write
16B1000
heap
page read and write
BE0000
heap
page read and write
3470000
heap
page read and write
405000
unkown
page execute read
C30000
heap
page read and write
716E000
heap
page read and write
109F000
stack
page read and write
5BB0000
remote allocation
page read and write
61A1000
heap
page read and write
6654000
heap
page read and write
B78000
unkown
page execute and read and write
653C000
heap
page read and write
1540000
heap
page read and write
6531000
heap
page read and write
404000
unkown
page execute and read and write
6530000
trusted library allocation
page read and write
658E000
heap
page read and write
6550000
heap
page read and write
3211000
heap
page read and write
6543000
heap
page read and write
3211000
heap
page read and write
646B000
heap
page read and write
646B000
heap
page read and write
605F000
stack
page read and write
16B9000
heap
page read and write
673B000
heap
page read and write
16B1000
heap
page read and write
6456000
heap
page read and write
6530000
trusted library allocation
page read and write
647E000
heap
page read and write
647E000
heap
page read and write
BE0000
heap
page read and write
DF0000
heap
page read and write
34CD000
stack
page read and write
6456000
heap
page read and write
658E000
heap
page read and write
B78000
unkown
page execute and read and write
6550000
heap
page read and write
45C000
unkown
page read and write
6457000
heap
page read and write
1604000
heap
page read and write
173B000
heap
page read and write
64FD000
heap
page read and write
F9F000
stack
page read and write
6545000
heap
page read and write
6675000
heap
page read and write
B5D000
unkown
page readonly
404000
unkown
page execute and read and write
B79000
unkown
page write copy
6545000
heap
page read and write
F9E000
heap
page read and write
643A000
heap
page read and write
1125000
unkown
page readonly
6550000
heap
page read and write
190F000
stack
page read and write
6532000
heap
page read and write
B79000
unkown
page write copy
9C000
stack
page read and write
2960000
heap
page read and write
6444000
heap
page read and write
CBE000
stack
page read and write
6675000
heap
page read and write
64C1000
heap
page read and write
F9F000
stack
page read and write
B5D000
unkown
page readonly
404000
unkown
page execute and read and write
6456000
heap
page read and write
401000
unkown
page execute read
CFE000
stack
page read and write
627E000
stack
page read and write
6543000
heap
page read and write
6489000
heap
page read and write
646B000
heap
page read and write
6456000
heap
page read and write
CC0000
heap
page read and write
64CC000
heap
page read and write
6438000
heap
page read and write
D00000
heap
page read and write
647D000
heap
page read and write
659D000
heap
page read and write
6444000
heap
page read and write
CC0000
heap
page read and write
F5E000
stack
page read and write
173C000
heap
page read and write
61AA000
heap
page read and write
6945000
heap
page read and write
173B000
heap
page read and write
6444000
heap
page read and write
6555000
heap
page read and write
16AB000
heap
page read and write
There are 701 hidden memdumps, click here to show them.