IOC Report
IRqsWvBBMc.exe

loading gif

Files

File Path
Type
Category
Malicious
IRqsWvBBMc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CFHIIJDBKE.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\7847438767[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\server[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\build_2024-07-25_20-56[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000019001\server.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000020001\build_2024-07-25_20-56.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\KFCFBFHIEBKJ\AFBKKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KFCFBFHIEBKJ\CAAAFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\KFCFBFHIEBKJ\EHDBGD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFCFBFHIEBKJ\EHDBGD-shm
data
dropped
C:\ProgramData\KFCFBFHIEBKJ\FBGHII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFCFBFHIEBKJ\GHJKEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFCFBFHIEBKJ\HJDBAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFCFBFHIEBKJ\HJEBGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\KFCFBFHIEBKJ\IECGIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFCFBFHIEBKJ\JEBKKE
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\KFCFBFHIEBKJ\KJDAEC
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D02.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 26 10:58:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71C5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7224.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\76561199747278259[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Windows\Tasks\axplong.job
data
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IRqsWvBBMc.exe
"C:\Users\user\Desktop\IRqsWvBBMc.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000019001\server.exe
"C:\Users\user\AppData\Local\Temp\1000019001\server.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000020001\build_2024-07-25_20-56.exe
"C:\Users\user\AppData\Local\Temp\1000020001\build_2024-07-25_20-56.exe"
malicious
C:\ProgramData\CFHIIJDBKE.exe
"C:\ProgramData\CFHIIJDBKE.exe"
malicious
C:\ProgramData\CFHIIJDBKE.exe
C:\ProgramData\CFHIIJDBKE.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KFCFBFHIEBKJ" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 3000
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://5.75.212.60/sqls.dll
5.75.212.60
malicious
http://arpdabl.zapto.org/s
unknown
malicious
http://arpdabl.zapto.org/1/z
unknown
malicious
https://steamcommunity.com/profiles/76561199747278259
23.192.247.89
malicious
http://arpdabl.zapto.org
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://185.215.113.16/inc/build_2024-07-25_20-56.exeq
unknown
https://vaniloin.fun/Coll%C3%A8ge_Ahuntsic?zejw3gqwmp0vw=R8%2Fu9J%2Bj64IFw9x63%2F9aOpnzREOZKM709PyrbqHMCEioUh%2Blkv89lRN48Nn9a3rmWypKncjDf9lPiVhJRxR02Q%3D%3D
104.21.72.79
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://198.46.178.145/7847438767.exenderbird
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://185.215.113.16/inc/server.exe9c5867ded
unknown
https://5.75.212.60/nss3.dllll
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
http://185.215.113.16/inc/server.exe
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://steamcommunity.com/profiles/76561199747278259k
unknown
https://steamcommunity.com/profiles/76561199747278259/badges
unknown
https://5.75.212.60/msvcp140.dlld
unknown
https://vaniloin.fun/Coll%C3%A8ge_Ahuntsic06
unknown
http://185.215.113.16/Jo89Ku7d/index.phpft
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
http://185.215.113.16/Jo89Ku7d/index.phpnu
unknown
https://vaniloin.fun/Coll%C3%A8ge_Ahuntsic
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
https://store.steampowered.com/privac
unknown
https://steam.tv/
unknown
https://5.75.212.60/(
unknown
http://185.215.113.16/Jo89Ku7d/index.phpUsers
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=3eYWCMu_
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=54OKIvHlOQzF&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://5.75.212.60/?
unknown
https://t.me/armad2a
unknown
https://5.75.212.60/4
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://store.steampowered.com/points/shop/
unknown
https://5.75.212.60/L
unknown
https://5.75.212.60/softokn3.dllj
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://steamcommunity.com/profiles/76561199747278259gi_z2Mozilla/5.0
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://5.75.212.60/E
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
http://arpdabl.KFHJJJKKFH
unknown
https://5.75.212.60/Z
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://5.75.212.60art/form-data;
unknown
https://vaniloin.fun/Coll%C3%A8ge_Ahuntsic?zejw3gqwmp0vw=R8%2Fu9J%2Bj64IFw9x63%2F9aOpnzREOZKM709Pyrb
unknown
http://198.46.178.145/7847438767.exe
198.46.178.145
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
http://185.215.113.16/Jo89Ku7d/index.php6323e228833c10fe3eb39f1caffb81382ae#xe
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncodedy1
unknown
https://t.me/armad2ahellosqls.dllsqlite3.dllIn
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://5.75.212.60/softokn3.dll
5.75.212.60
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/Jo89Ku7d/index.phpzRm4SJjISZA3JNjZ64n0LR=
unknown
http://185.215.113.16/inc/server.exe9c5867ee8
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
http://185.215.113.16/inc/build_2024-07-25_20-56.exe
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://steamcommunity.com/profiles/76561199747278259/inventory/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.192.247.89
malicious
157.123.68.40.in-addr.arpa
unknown
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
vaniloin.fun
104.21.72.79
arpdabl.zapto.org
77.91.101.71

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious
23.192.247.89
steamcommunity.com
United States
malicious
91.92.250.213
unknown
Bulgaria
198.46.178.145
unknown
United States
77.91.101.71
arpdabl.zapto.org
Russian Federation
5.75.212.60
unknown
Germany
104.21.72.79
vaniloin.fun
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
ProgramId
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
FileId
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
LowerCaseLongPath
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
LongPathHash
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
Name
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
OriginalFileName
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
Publisher
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
Version
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
BinFileVersion
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
BinaryType
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
ProductName
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
ProductVersion
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
LinkDate
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
BinProductVersion
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
AppxPackageFullName
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
AppxPackageRelativeId
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
Size
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
Language
\REGISTRY\A\{83ff5351-d954-a10d-ec48-763f34980cb2}\Root\InventoryApplicationFile\build_2024-07-25|34e96fd02c73f8a9
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FA0000
direct allocation
page execute and read and write
malicious
8F1000
unkown
page execute and read and write
malicious
8F1000
unkown
page execute and read and write
malicious
141000
unkown
page execute and read and write
malicious
3FD0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
4AB0000
direct allocation
page read and write
malicious
4BC0000
direct allocation
page read and write
malicious
2577000
heap
page read and write
malicious
4FE0000
direct allocation
page read and write
malicious
4920000
direct allocation
page read and write
malicious
8F1000
unkown
page execute and read and write
malicious
345F000
stack
page read and write
7FF683110000
unkown
page readonly
2154A196000
heap
page read and write
790000
heap
page read and write
44A1000
heap
page read and write
80DC000
stack
page read and write
430000
unkown
page execute and read and write
43C000
unkown
page readonly
2F30000
heap
page read and write
4741000
heap
page read and write
309F000
stack
page read and write
C19000
unkown
page execute and write copy
10A0000
heap
page read and write
3D5E000
stack
page read and write
C0B000
unkown
page execute and read and write
51A0000
direct allocation
page execute and read and write
8F1000
unkown
page execute and write copy
3F1E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
19029000
heap
page read and write
24D4000
heap
page read and write
24D4000
heap
page read and write
F60000
direct allocation
page read and write
D6A000
heap
page read and write
2154BD13000
heap
page read and write
19085000
heap
page read and write
694000
heap
page read and write
4741000
heap
page read and write
215479C0000
remote allocation
page read and write
5150000
direct allocation
page execute and read and write
4741000
heap
page read and write
1C0000
heap
page read and write
1413E000
stack
page read and write
4B40000
direct allocation
page execute and read and write
24D0000
heap
page read and write
19059000
heap
page read and write
257D000
heap
page read and write
215479C0000
remote allocation
page read and write
9FE000
stack
page read and write
75C000
stack
page read and write
2BEF000
direct allocation
page read and write
451F000
stack
page read and write
694000
heap
page read and write
291F000
stack
page read and write
4741000
heap
page read and write
D96000
unkown
page write copy
4BC0000
direct allocation
page read and write
2C2A000
direct allocation
page read and write
405E000
stack
page read and write
1908D000
heap
page read and write
3BDF000
stack
page read and write
2461000
unkown
page readonly
496B000
stack
page read and write
2154C760000
heap
page read and write
2D07000
direct allocation
page read and write
19010000
heap
page read and write
1901E000
heap
page read and write
DFC000
heap
page read and write
143E0000
remote allocation
page read and write
690000
heap
page read and write
24D4000
heap
page read and write
19083000
heap
page read and write
79B000
heap
page read and write
135E000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
1908C000
heap
page read and write
2154C190000
heap
page read and write
29EF000
stack
page read and write
DF0000
direct allocation
page read and write
4741000
heap
page read and write
24D4000
heap
page read and write
4741000
heap
page read and write
19B50000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
4741000
heap
page read and write
F60000
direct allocation
page read and write
509E000
stack
page read and write
694000
heap
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
19039000
heap
page read and write
CEE000
unkown
page read and write
24D4000
heap
page read and write
4180000
heap
page read and write
4741000
heap
page read and write
E15000
heap
page read and write
4741000
heap
page read and write
AEF000
unkown
page execute and read and write
4C10000
direct allocation
page execute and read and write
EA6E9FC000
stack
page read and write
2CDF000
stack
page read and write
4920000
direct allocation
page read and write
E2B000
heap
page read and write
4741000
heap
page read and write
2D2F000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
F60000
direct allocation
page read and write
158E000
stack
page read and write
8F0000
unkown
page read and write
DC2000
unkown
page execute and read and write
24D4000
heap
page read and write
EA6D9F8000
stack
page read and write
2154BF96000
heap
page read and write
257D000
heap
page read and write
56E000
unkown
page execute and read and write
24D4000
heap
page read and write
2CEA000
direct allocation
page read and write
4741000
heap
page read and write
71C000
stack
page read and write
41C000
unkown
page execute and read and write
4741000
heap
page read and write
35DE000
stack
page read and write
21547897000
direct allocation
page read and write
2576000
heap
page read and write
694000
heap
page read and write
2154930F000
heap
page read and write
2CE3000
direct allocation
page read and write
D7A000
unkown
page read and write
39AF000
stack
page read and write
4C90000
direct allocation
page execute and read and write
2D2D000
direct allocation
page read and write
607000
unkown
page execute and read and write
143E0000
remote allocation
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
12BE000
stack
page read and write
2461000
unkown
page readonly
C1A000
unkown
page execute and write copy
469E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
FEA000
heap
page read and write
421000
unkown
page execute read
4741000
heap
page read and write
336F000
stack
page read and write
D64000
unkown
page read and write
8F0000
unkown
page readonly
2154B117000
heap
page read and write
21549197000
heap
page read and write
4741000
heap
page read and write
215477FF000
heap
page read and write
4741000
heap
page read and write
426F000
stack
page read and write
1998A000
heap
page read and write
5660000
heap
page read and write
44E000
unkown
page execute and read and write
24D4000
heap
page read and write
42C0000
heap
page read and write
1908C000
heap
page read and write
BFE000
unkown
page execute and read and write
1901E000
heap
page read and write
3DAE000
stack
page read and write
421F000
stack
page read and write
2E1F000
stack
page read and write
297E000
stack
page read and write
412F000
stack
page read and write
E00000
heap
page read and write
469000
unkown
page execute and write copy
257D000
heap
page read and write
694000
heap
page read and write
7FF68340D000
unkown
page read and write
461E000
stack
page read and write
64AF000
stack
page read and write
21549398000
heap
page read and write
C19000
unkown
page execute and read and write
199000
stack
page read and write
14A000
stack
page read and write
4191000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
3E5F000
stack
page read and write
5150000
direct allocation
page execute and read and write
24D4000
heap
page read and write
8D0000
direct allocation
page read and write
D94000
unkown
page read and write
694000
heap
page read and write
694000
heap
page read and write
33DD000
stack
page read and write
2EB0000
direct allocation
page read and write
2BFB000
direct allocation
page read and write
31DF000
stack
page read and write
3B0000
heap
page read and write
4B61000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4741000
heap
page read and write
42C6000
heap
page read and write
D98000
unkown
page read and write
4740000
heap
page read and write
19062000
heap
page read and write
134F000
stack
page read and write
4741000
heap
page read and write
10FC000
heap
page read and write
F60000
direct allocation
page read and write
4741000
heap
page read and write
6774000
heap
page read and write
1939D000
direct allocation
page readonly
3EDF000
stack
page read and write
44A1000
heap
page read and write
EC5000
heap
page read and write
24D4000
heap
page read and write
2F9E000
stack
page read and write
2ED7000
heap
page read and write
425E000
stack
page read and write
694000
heap
page read and write
13BE000
stack
page read and write
2D40000
heap
page read and write
21547796000
heap
page read and write
2583000
heap
page read and write
21547855000
heap
page read and write
379E000
stack
page read and write
44A1000
heap
page read and write
D60000
heap
page read and write
3350000
direct allocation
page execute and read and write
4741000
heap
page read and write
2C58000
direct allocation
page read and write
301E000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
32FD000
stack
page read and write
4D50000
direct allocation
page execute and read and write
3E5E000
stack
page read and write
26FB000
stack
page read and write
24D4000
heap
page read and write
4741000
heap
page read and write
1350000
heap
page read and write
190AF000
heap
page read and write
E42000
heap
page read and write
73E000
stack
page read and write
16A70000
heap
page read and write
694000
heap
page read and write
24D4000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
952000
unkown
page execute and read and write
4741000
heap
page read and write
D70000
unkown
page read and write
8A0000
heap
page read and write
1A2000
unkown
page execute and read and write
469000
unkown
page execute and read and write
479F000
stack
page read and write
3F9F000
stack
page read and write
2C47000
direct allocation
page read and write
2154A30E000
heap
page read and write
4741000
heap
page read and write
19059000
heap
page read and write
44A1000
heap
page read and write
449F000
stack
page read and write
1429C000
stack
page read and write
1A0000
heap
page read and write
D3B000
unkown
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
8D0000
direct allocation
page read and write
24D4000
heap
page read and write
400000
unkown
page readonly
2154B394000
heap
page read and write
124E000
stack
page read and write
3300000
direct allocation
page execute and read and write
8D0000
direct allocation
page read and write
24D4000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4741000
heap
page read and write
3B4000
heap
page read and write
471F000
stack
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
351E000
stack
page read and write
DF0000
direct allocation
page read and write
21547812000
heap
page read and write
1699D000
heap
page read and write
19085000
heap
page read and write
283F000
stack
page read and write
24D4000
heap
page read and write
354F000
stack
page read and write
7FF683111000
unkown
page execute read
33AE000
stack
page read and write
322F000
stack
page read and write
24D4000
heap
page read and write
24D4000
heap
page read and write
399E000
stack
page read and write
959000
unkown
page write copy
694000
heap
page read and write
44C0000
heap
page read and write
365E000
stack
page read and write
614000
unkown
page execute and write copy
24D4000
heap
page read and write
5041000
direct allocation
page read and write
4B11000
direct allocation
page read and write
215477DE000
heap
page read and write
19085000
heap
page read and write
3AEF000
stack
page read and write
4C80000
direct allocation
page execute and read and write
C19000
unkown
page execute and write copy
4631000
heap
page read and write
345F000
stack
page read and write
42CD000
heap
page read and write
2F33000
heap
page read and write
DA8000
unkown
page readonly
3FD0000
trusted library allocation
page read and write
438E000
stack
page read and write
215477E0000
heap
page read and write
24D4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
401000
unkown
page execute read
8F1000
unkown
page execute and write copy
1908D000
heap
page read and write
2CA8000
direct allocation
page read and write
24D4000
heap
page read and write
6C2DD000
unkown
page readonly
44A1000
heap
page read and write
4741000
heap
page read and write
140000
unkown
page readonly
C19000
unkown
page execute and write copy
BFE000
unkown
page execute and read and write
44A1000
heap
page read and write
DF0000
direct allocation
page read and write
3B947000
heap
page read and write
2154B715000
heap
page read and write
1F0000
direct allocation
page execute and read and write
19088000
heap
page read and write
271B000
heap
page read and write
44A1000
heap
page read and write
502F000
stack
page read and write
3D0000
heap
page read and write
4D80000
direct allocation
page execute and read and write
24D4000
heap
page read and write
6B0E000
heap
page read and write
3C6D000
stack
page read and write
4741000
heap
page read and write
215478AE000
direct allocation
page read and write
190A1000
heap
page read and write
1908D000
heap
page read and write
63AE000
stack
page read and write
29AE000
stack
page read and write
425E000
stack
page read and write
24EE000
heap
page read and write
EA6DDFE000
stack
page read and write
2A5F000
stack
page read and write
3B4000
heap
page read and write
4D50000
direct allocation
page execute and read and write
C1A000
unkown
page execute and write copy
D63000
unkown
page read and write
1908D000
heap
page read and write
4C5B000
stack
page read and write
C19000
unkown
page execute and read and write
DDB000
heap
page read and write
3D9F000
stack
page read and write
21547805000
heap
page read and write
19086000
heap
page read and write
44A1000
heap
page read and write
1906B000
heap
page read and write
CD4000
unkown
page read and write
7FF683111000
unkown
page execute read
257D000
heap
page read and write
448E000
stack
page read and write
7EA4000
heap
page read and write
4BC0000
direct allocation
page read and write
44A1000
heap
page read and write
694000
heap
page read and write
4741000
heap
page read and write
30DE000
stack
page read and write
EA6EDFE000
stack
page read and write
140000
unkown
page read and write
254F000
heap
page read and write
5160000
direct allocation
page execute and read and write
21547790000
heap
page read and write
4A1F000
stack
page read and write
2480000
heap
page read and write
7FF683391000
unkown
page readonly
38AE000
stack
page read and write
1908A000
heap
page read and write
1205000
heap
page read and write
3B4000
heap
page read and write
F60000
direct allocation
page read and write
8D0000
direct allocation
page read and write
959000
unkown
page read and write
24D4000
heap
page read and write
4741000
heap
page read and write
DD7000
heap
page read and write
8B0000
heap
page read and write
4EE5000
heap
page read and write
4B00000
direct allocation
page execute and read and write
44A1000
heap
page read and write
24D4000
heap
page read and write
44EF000
stack
page read and write
501E000
stack
page read and write
EA6EBFB000
stack
page read and write
2154A596000
heap
page read and write
8F0000
unkown
page readonly
D9C000
unkown
page write copy
694000
heap
page read and write
1907C000
heap
page read and write
295E000
stack
page read and write
2DD0000
heap
page read and write
215477FF000
heap
page read and write
3FEF000
stack
page read and write
694000
heap
page read and write
44DE000
stack
page read and write
694000
heap
page read and write
F67F000
stack
page read and write
2DE5000
heap
page read and write
215479E0000
heap
page read and write
24D4000
heap
page read and write
2154AB9F000
heap
page read and write
6B10000
heap
page read and write
24D4000
heap
page read and write
1B6D3000
heap
page read and write
2154AD17000
heap
page read and write
4741000
heap
page read and write
3FDE000
stack
page read and write
381F000
stack
page read and write
21547980000
heap
page execute read
4DEE000
stack
page read and write
4D50000
direct allocation
page execute and read and write
990000
heap
page read and write
281F000
stack
page read and write
959000
unkown
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
CE8000
unkown
page read and write
2BB3000
direct allocation
page read and write
438000
unkown
page execute and read and write
DC4000
unkown
page execute and write copy
24D4000
heap
page read and write
24D4000
heap
page read and write
44A1000
heap
page read and write
CBE000
unkown
page read and write
309F000
stack
page read and write
3B1F000
stack
page read and write
D76000
unkown
page read and write
4741000
heap
page read and write
34DF000
stack
page read and write
395F000
stack
page read and write
199C5000
heap
page read and write
19970000
heap
page read and write
439E000
stack
page read and write
4C21000
direct allocation
page read and write
215477C2000
heap
page read and write
28BE000
stack
page read and write
E2B000
heap
page read and write
24D4000
heap
page read and write
D76000
unkown
page read and write
2154B310000
heap
page read and write
4920000
direct allocation
page read and write
4741000
heap
page read and write
4EEF000
stack
page read and write
19158000
direct allocation
page execute read
4741000
heap
page read and write
19020000
heap
page read and write
2D00000
direct allocation
page execute and read and write
527000
unkown
page execute and read and write
44A1000
heap
page read and write
1A9000
unkown
page read and write
372F000
stack
page read and write
694000
heap
page read and write
215477E6000
heap
page read and write
2154A99A000
heap
page read and write
6C4E0000
unkown
page read and write
C19000
unkown
page execute and read and write
24D4000
heap
page read and write
2154B79F000
heap
page read and write
F60000
direct allocation
page read and write
44A1000
heap
page read and write
2E5E000
stack
page read and write
BFE000
unkown
page execute and read and write
42AE000
stack
page read and write
E2C000
heap
page read and write
1B81A000
heap
page read and write
25C7000
heap
page read and write
24D4000
heap
page read and write
511F000
stack
page read and write
DF0000
direct allocation
page read and write
400000
unkown
page readonly
4AEE000
stack
page read and write
19059000
heap
page read and write
4490000
heap
page read and write
4C50000
direct allocation
page execute and read and write
2154BB9B000
heap
page read and write
43DF000
stack
page read and write
44A1000
heap
page read and write
D94000
unkown
page read and write
AEF000
unkown
page execute and read and write
19072000
heap
page read and write
2C31000
direct allocation
page read and write
7B0000
heap
page read and write
2BDE000
stack
page read and write
6751000
heap
page read and write
403E000
stack
page read and write
19061000
heap
page read and write
24D4000
heap
page read and write
137E000
stack
page read and write
E27000
heap
page read and write
3F9E000
stack
page read and write
160000
heap
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
694000
heap
page read and write
21549599000
heap
page read and write
44A1000
heap
page read and write
44A1000
heap
page read and write
CF9000
unkown
page read and write
6C301000
unkown
page execute read
2154789E000
direct allocation
page read and write
6C261000
unkown
page execute read
4741000
heap
page read and write
6C300000
unkown
page readonly
11D0000
heap
page read and write
CC2000
unkown
page read and write
2BD9000
direct allocation
page read and write
1907C000
heap
page read and write
312E000
stack
page read and write
36DF000
stack
page read and write
43EE000
stack
page read and write
19062000
heap
page read and write
2154BD9E000
heap
page read and write
CEB000
unkown
page read and write
DC9000
heap
page read and write
44A1000
heap
page read and write
44A1000
heap
page read and write
3B4000
heap
page read and write
24D4000
heap
page read and write
CF9000
unkown
page read and write
19069000
heap
page read and write
3E9E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
389F000
stack
page read and write
28E7000
heap
page read and write
2FEE000
stack
page read and write
24D4000
heap
page read and write
215478A4000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
24D4000
heap
page read and write
19151000
direct allocation
page execute read
7FF683391000
unkown
page readonly
44A1000
heap
page read and write
2D26000
direct allocation
page read and write
31DF000
stack
page read and write
385E000
stack
page read and write
4BC0000
direct allocation
page read and write
429F000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
14002D000
direct allocation
page read and write
4720000
heap
page read and write
491E000
stack
page read and write
694000
heap
page read and write
6C2EE000
unkown
page read and write
520000
heap
page read and write
44A1000
heap
page read and write
4BEF000
stack
page read and write
44A1000
heap
page read and write
192B6000
direct allocation
page execute read
386F000
stack
page read and write
1935D000
direct allocation
page execute read
24D4000
heap
page read and write
48E0000
trusted library allocation
page read and write
1906B000
heap
page read and write
52DC000
stack
page read and write
33F000
unkown
page execute and read and write
694000
heap
page read and write
952000
unkown
page execute and read and write
24D4000
heap
page read and write
6C4DE000
unkown
page read and write
2717000
heap
page read and write
E15000
heap
page read and write
25C9000
heap
page read and write
19088000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4741000
heap
page read and write
48E0000
heap
page read and write
6772000
heap
page read and write
4741000
heap
page read and write
7EA0000
heap
page read and write
4741000
heap
page read and write
6C4DF000
unkown
page write copy
DC4000
unkown
page execute and write copy
5150000
direct allocation
page execute and read and write
2154A917000
heap
page read and write
1900B000
stack
page read and write
F7B000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
3D1F000
stack
page read and write
44A1000
heap
page read and write
D21000
unkown
page read and write
6B01000
heap
page read and write
21547855000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
2D90000
heap
page read and write
2154A79F000
heap
page read and write
694000
heap
page read and write
4B50000
direct allocation
page execute and read and write
21547827000
heap
page read and write
19060000
heap
page read and write
411E000
stack
page read and write
435F000
stack
page read and write
4741000
heap
page read and write
4ABC000
stack
page read and write
24EA000
heap
page read and write
44A1000
heap
page read and write
21547855000
heap
page read and write
3B4000
heap
page read and write
11BBF000
stack
page read and write
19072000
heap
page read and write
45DF000
stack
page read and write
371E000
stack
page read and write
2FAF000
stack
page read and write
3ADD000
stack
page read and write
24D4000
heap
page read and write
D21000
unkown
page read and write
3EEE000
stack
page read and write
694000
heap
page read and write
4B61000
heap
page read and write
19070000
heap
page read and write
4741000
heap
page read and write
33DE000
stack
page read and write
626E000
stack
page read and write
19066000
heap
page read and write
CC5000
unkown
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
2154BF16000
heap
page read and write
19088000
heap
page read and write
315E000
stack
page read and write
16ACC000
stack
page read and write
371E000
stack
page read and write
2BE8000
direct allocation
page read and write
44B0000
heap
page read and write
39EE000
stack
page read and write
8F0000
unkown
page readonly
10FD000
stack
page read and write
349E000
stack
page read and write
980000
heap
page read and write
24D4000
heap
page read and write
4B61000
heap
page read and write
E18000
heap
page read and write
401F000
stack
page read and write
321E000
stack
page read and write
EA6EFFF000
stack
page read and write
63D000
unkown
page execute and read and write
180000
heap
page read and write
4741000
heap
page read and write
1901E000
heap
page read and write
4741000
heap
page read and write
40DF000
stack
page read and write
44A1000
heap
page read and write
3EAF000
stack
page read and write
959000
unkown
page write copy
2470000
heap
page read and write
BCC000
unkown
page execute and read and write
2154B50C000
heap
page read and write
4981000
direct allocation
page read and write
3B4000
heap
page read and write
3E9E000
stack
page read and write
3C1E000
stack
page read and write
44A1000
heap
page read and write
441E000
stack
page read and write
19B50000
trusted library allocation
page read and write
C0B000
unkown
page execute and read and write
44A1000
heap
page read and write
694000
heap
page read and write
28C0000
direct allocation
page read and write
199F8000
heap
page read and write
4741000
heap
page read and write
2D6E000
stack
page read and write
21547857000
heap
page read and write
24D4000
heap
page read and write
331F000
stack
page read and write
402E000
stack
page read and write
1439C000
stack
page read and write
349E000
stack
page read and write
2E6F000
stack
page read and write
CE5000
unkown
page read and write
51E0000
direct allocation
page execute and read and write
143E0000
remote allocation
page read and write
7FF683411000
unkown
page readonly
3B4000
heap
page read and write
44C0000
unclassified section
page read and write
4B30000
direct allocation
page execute and read and write
25D7000
heap
page read and write
694000
heap
page read and write
531E000
stack
page read and write
8D0000
direct allocation
page read and write
2C74000
direct allocation
page read and write
D9C000
unkown
page read and write
EB0000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
19073000
heap
page read and write
4630000
heap
page read and write
2C9A000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
2D6E000
stack
page read and write
E00000
heap
page read and write
44A1000
heap
page read and write
359F000
stack
page read and write
4741000
heap
page read and write
21547812000
heap
page read and write
44A1000
heap
page read and write
337F000
direct allocation
page execute and read and write
44A1000
heap
page read and write
4D90000
direct allocation
page execute and read and write
411E000
stack
page read and write
EA6E5FF000
stack
page read and write
26BE000
stack
page read and write
2D1E000
stack
page read and write
44A1000
heap
page read and write
E2B000
heap
page read and write
18E000
stack
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
326E000
stack
page read and write
CE6000
unkown
page read and write
14A000
stack
page read and write
381F000
stack
page read and write
C1A000
unkown
page execute and write copy
2154990D000
heap
page read and write
E00000
heap
page read and write
2D45000
heap
page read and write
2154AF16000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
109E000
stack
page read and write
452E000
stack
page read and write
329E000
stack
page read and write
44A1000
heap
page read and write
24D4000
heap
page read and write
24CE000
stack
page read and write
8D0000
direct allocation
page read and write
2D60000
heap
page read and write
2154B59D000
heap
page read and write
21549B90000
heap
page read and write
2AEF000
stack
page read and write
D13F000
stack
page read and write
19079000
heap
page read and write
24D4000
heap
page read and write
24D4000
heap
page read and write
4FD000
stack
page read and write
5130000
direct allocation
page execute and read and write
21547893000
direct allocation
page read and write
694000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4741000
heap
page read and write
EA6E3FE000
stack
page read and write
CBE000
unkown
page write copy
44A1000
heap
page read and write
2C66000
direct allocation
page read and write
2D34000
direct allocation
page read and write
14002D000
direct allocation
page read and write
21549F15000
heap
page read and write
455E000
stack
page read and write
44A0000
heap
page read and write
434E000
stack
page read and write
19D1C000
stack
page read and write
FB8000
heap
page read and write
4070000
heap
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
24D4000
heap
page read and write
335E000
stack
page read and write
44A1000
heap
page read and write
34AF000
stack
page read and write
51D0000
direct allocation
page execute and read and write
D6E000
heap
page read and write
694000
heap
page read and write
2BEF000
stack
page read and write
2518000
heap
page read and write
375F000
stack
page read and write
3C1E000
stack
page read and write
21547857000
heap
page read and write
8D0000
direct allocation
page read and write
694000
heap
page read and write
CC1000
unkown
page read and write
4AB0000
direct allocation
page execute and read and write
8D0000
direct allocation
page read and write
4B61000
heap
page read and write
959000
unkown
page read and write
3C2F000
stack
page read and write
2BCA000
direct allocation
page read and write
3F9F000
stack
page read and write
E2C000
heap
page read and write
519F000
stack
page read and write
DF0000
direct allocation
page read and write
63B000
unkown
page execute and read and write
44A1000
heap
page read and write
4D20000
direct allocation
page execute and read and write
2E6F000
stack
page read and write
4741000
heap
page read and write
622F000
stack
page read and write
DCA000
heap
page read and write
3B4000
heap
page read and write
4741000
heap
page read and write
18C000
stack
page read and write
24D4000
heap
page read and write
430E000
stack
page read and write
1963E000
stack
page read and write
E15000
heap
page read and write
44A1000
heap
page read and write
95B000
unkown
page execute and read and write
E41000
heap
page read and write
24D4000
heap
page read and write
390000
heap
page read and write
1441E000
stack
page read and write
2154A50B000
heap
page read and write
190A0000
heap
page read and write
959000
unkown
page write copy
462F000
stack
page read and write
24D4000
heap
page read and write
190BD000
heap
page read and write
694000
heap
page read and write
CBE000
unkown
page read and write
1901F000
heap
page read and write
6C2F2000
unkown
page readonly
2154779C000
heap
page read and write
8D0000
direct allocation
page read and write
24D4000
heap
page read and write
FB0000
heap
page read and write
C0B000
unkown
page execute and read and write
2154A70E000
heap
page read and write
79F000
stack
page read and write
1994F000
stack
page read and write
28C0000
direct allocation
page read and write
694000
heap
page read and write
4C20000
direct allocation
page execute and read and write
24D4000
heap
page read and write
1907E000
heap
page read and write
29AF9000
heap
page read and write
24D4000
heap
page read and write
4741000
heap
page read and write
42BE000
stack
page read and write
7D0000
heap
page read and write
2EAE000
stack
page read and write
8F1000
unkown
page execute and write copy
19073000
heap
page read and write
19088000
heap
page read and write
24D4000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
21547895000
direct allocation
page read and write
32C000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
31F0000
heap
page read and write
19029000
heap
page read and write
DC2000
unkown
page execute and read and write
EA6DFFF000
stack
page read and write
FB8000
heap
page read and write
416E000
stack
page read and write
21547857000
heap
page read and write
4741000
heap
page read and write
52A000
unkown
page execute and read and write
3B4000
heap
page read and write
215478BC000
direct allocation
page read and write
19099000
heap
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
3180000
direct allocation
page execute and read and write
44A1000
heap
page read and write
1906C000
heap
page read and write
4741000
heap
page read and write
CD4000
unkown
page read and write
30DE000
stack
page read and write
1906C000
heap
page read and write
2F9E000
stack
page read and write
4741000
heap
page read and write
811E000
stack
page read and write
DDA000
heap
page read and write
24D4000
heap
page read and write
19990000
heap
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
215479C0000
remote allocation
page read and write
3B4000
heap
page read and write
1908D000
heap
page read and write
21547827000
heap
page read and write
D7F000
unkown
page read and write
359F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
1908A000
heap
page read and write
1902B000
heap
page read and write
3B4000
heap
page read and write
694000
heap
page read and write
21549D9D000
heap
page read and write
2B9F000
stack
page read and write
48DF000
stack
page read and write
434000
unkown
page execute and read and write
44A1000
heap
page read and write
19E9C000
stack
page read and write
E1E000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
19150000
direct allocation
page execute and read and write
24D4000
heap
page read and write
4A5E000
stack
page read and write
44A1000
heap
page read and write
2C23000
direct allocation
page read and write
EB0000
direct allocation
page read and write
465F000
stack
page read and write
190000
stack
page read and write
1939A000
direct allocation
page readonly
EB0000
direct allocation
page read and write
3A9F000
stack
page read and write
AEF000
unkown
page execute and read and write
4741000
heap
page read and write
19020000
heap
page read and write
DDB000
heap
page read and write
19072000
heap
page read and write
45B000
unkown
page execute and read and write
CE3000
unkown
page read and write
24D4000
heap
page read and write
24D4000
heap
page read and write
6750000
heap
page read and write
3B4000
heap
page read and write
5150000
direct allocation
page execute and read and write
694000
heap
page read and write
2C8A000
direct allocation
page read and write
4B61000
heap
page read and write
EA6DBFF000
stack
page read and write
1200000
heap
page read and write
DF0000
direct allocation
page read and write
1907F000
heap
page read and write
694000
heap
page read and write
2154B990000
heap
page read and write
2CD2000
direct allocation
page read and write
EB0000
direct allocation
page read and write
215477CB000
heap
page read and write
3DDE000
stack
page read and write
1907F000
heap
page read and write
2154786D000
heap
page read and write
1908D000
heap
page read and write
530000
unkown
page execute and read and write
DD7000
heap
page read and write
24D4000
heap
page read and write
215477E6000
heap
page read and write
169E6000
heap
page read and write
1A9000
unkown
page write copy
19061000
heap
page read and write
7FF683382000
unkown
page write copy
10C0000
heap
page read and write
16971000
heap
page read and write
10CC000
heap
page read and write
19150000
trusted library allocation
page read and write
2154AB12000
heap
page read and write
215477E0000
heap
page read and write
40DF000
stack
page read and write
2CF8000
direct allocation
page read and write
2E5E000
stack
page read and write
19110000
heap
page read and write
1907C000
heap
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
3D5E000
stack
page read and write
24D4000
heap
page read and write
4741000
heap
page read and write
2583000
heap
page read and write
4741000
heap
page read and write
43AF000
stack
page read and write
190A3000
heap
page read and write
930000
heap
page read and write
4741000
heap
page read and write
10B0000
direct allocation
page execute and read and write
83C000
stack
page read and write
D7F000
unkown
page read and write
3B4000
heap
page read and write
4741000
heap
page read and write
2154A393000
heap
page read and write
DF0000
direct allocation
page read and write
3B4000
heap
page read and write
127E000
stack
page read and write
2154C10E000
heap
page read and write
325F000
stack
page read and write
140FF000
stack
page read and write
24D4000
heap
page read and write
F60000
direct allocation
page read and write
16A52000
heap
page read and write
1906C000
heap
page read and write
24D4000
heap
page read and write
19033000
heap
page read and write
44A1000
heap
page read and write
6FD000
stack
page read and write
1902E000
heap
page read and write
23B84000
heap
page read and write
4741000
heap
page read and write
415F000
stack
page read and write
EA6F1FF000
stack
page read and write
4741000
heap
page read and write
215477E5000
heap
page read and write
24D4000
heap
page read and write
2C2E000
stack
page read and write
636F000
stack
page read and write
2A9E000
stack
page read and write
8D0000
direct allocation
page read and write
417F000
stack
page read and write
4181000
heap
page read and write
3D1F000
stack
page read and write
3A1E000
stack
page read and write
694000
heap
page read and write
2710000
heap
page read and write
24D4000
heap
page read and write
21547670000
heap
page read and write
359D7000
heap
page read and write
29BE000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
190A6000
heap
page read and write
4741000
heap
page read and write
440000
unkown
page write copy
24D4000
heap
page read and write
19093000
heap
page read and write
44A1000
heap
page read and write
2D3C000
direct allocation
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
DC2000
unkown
page execute and read and write
29EF000
stack
page read and write
4500000
heap
page read and write
8E0000
heap
page read and write
190AF000
heap
page read and write
4741000
heap
page read and write
19073000
heap
page read and write
23B7D000
stack
page read and write
421F000
stack
page read and write
148E000
stack
page read and write
DF0000
direct allocation
page read and write
DDB000
heap
page read and write
419E000
stack
page read and write
F9F000
stack
page read and write
8F0000
unkown
page read and write
21547805000
heap
page read and write
7FF6833A8000
unkown
page read and write
4D40000
direct allocation
page execute and read and write
694000
heap
page read and write
44A2000
heap
page read and write
4741000
heap
page read and write
4D50000
direct allocation
page execute and read and write
2C51000
direct allocation
page read and write
44A1000
heap
page read and write
694000
heap
page read and write
25C7000
heap
page read and write
2C12000
direct allocation
page read and write
24D4000
heap
page read and write
4751000
heap
page read and write
4EF0000
heap
page read and write
4741000
heap
page read and write
19059000
heap
page read and write
3BDE000
stack
page read and write
4741000
heap
page read and write
E41000
heap
page read and write
1B8DF000
heap
page read and write
46A000
unkown
page execute and write copy
4EE6000
heap
page read and write
CFA000
stack
page read and write
DF0000
direct allocation
page read and write
119E000
stack
page read and write
F60000
direct allocation
page read and write
1906B000
heap
page read and write
169DD000
heap
page read and write
4741000
heap
page read and write
E9E000
stack
page read and write
4741000
heap
page read and write
694000
heap
page read and write
193B6000
heap
page read and write
32D0000
heap
page read and write
DDC000
heap
page read and write
4C20000
direct allocation
page execute and read and write
D6D000
unkown
page read and write
694000
heap
page read and write
44A1000
heap
page read and write
1BC000
stack
page read and write
4741000
heap
page read and write
2C8A000
direct allocation
page read and write
3B2E000
stack
page read and write
DD7000
heap
page read and write
DF0000
direct allocation
page read and write
694000
heap
page read and write
4741000
heap
page read and write
EB0000
direct allocation
page read and write
1909F000
heap
page read and write
21547BE0000
heap
page read and write
4741000
heap
page read and write
2CCA000
direct allocation
page read and write
7FF683411000
unkown
page readonly
24D4000
heap
page read and write
24D4000
heap
page read and write
28C0000
direct allocation
page read and write
2154B198000
heap
page read and write
19062000
heap
page read and write
51C0000
direct allocation
page execute and read and write
EA0000
heap
page read and write
8D0000
direct allocation
page read and write
4B20000
direct allocation
page execute and read and write
24D4000
heap
page read and write
24D4000
heap
page read and write
92F000
stack
page read and write
2CAF000
direct allocation
page read and write
24D4000
heap
page read and write
24E0000
heap
page read and write
DF0000
direct allocation
page read and write
116A000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
2EB0000
direct allocation
page read and write
4920000
direct allocation
page read and write
8EE000
stack
page read and write
321E000
stack
page read and write
1908A000
heap
page read and write
4FA0000
trusted library allocation
page read and write
2EAE000
stack
page read and write
361F000
stack
page read and write
287E000
stack
page read and write
4741000
heap
page read and write
2C0A000
direct allocation
page read and write
25C4000
heap
page read and write
190000
heap
page read and write
24D4000
heap
page read and write
1B8E1000
heap
page read and write
541E000
stack
page read and write
CDA000
unkown
page read and write
24D4000
heap
page read and write
311F000
stack
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
30EF000
stack
page read and write
2C91000
direct allocation
page read and write
4631000
heap
page read and write
29D0000
heap
page read and write
EB0000
direct allocation
page read and write
6C49F000
unkown
page readonly
694000
heap
page read and write
44A1000
heap
page read and write
1907C000
heap
page read and write
7FF683382000
unkown
page read and write
21549992000
heap
page read and write
2576000
heap
page read and write
EA6E7FD000
stack
page read and write
362E000
stack
page read and write
DE1000
heap
page read and write
190B4000
heap
page read and write
DBF000
heap
page read and write
F70000
heap
page read and write
3A9F000
stack
page read and write
CE3000
unkown
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
34EE000
stack
page read and write
21547B50000
heap
page read and write
4181000
heap
page read and write
EB0000
direct allocation
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
4181000
heap
page read and write
1698D000
heap
page read and write
44A1000
heap
page read and write
44A1000
heap
page read and write
DC0000
heap
page read and write
2ED0000
heap
page read and write
19088000
heap
page read and write
1AB000
unkown
page execute and read and write
3B5E000
stack
page read and write
44A1000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4741000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
395F000
stack
page read and write
21547750000
heap
page read and write
19067000
heap
page read and write
19063000
heap
page read and write
2CE3000
heap
page read and write
4DAF000
stack
page read and write
44A1000
heap
page read and write
F60000
direct allocation
page read and write
4B61000
heap
page read and write
E46000
heap
page read and write
25C7000
heap
page read and write
24D4000
heap
page read and write
24D4000
heap
page read and write
2DE0000
heap
page read and write
51F0000
direct allocation
page execute and read and write
D3B000
unkown
page read and write
8D0000
direct allocation
page read and write
DA6000
unkown
page readonly
21547827000
heap
page read and write
4CAE000
stack
page read and write
2EB0000
direct allocation
page read and write
2CF1000
direct allocation
page read and write
4741000
heap
page read and write
7FF68340E000
unkown
page write copy
3D6F000
stack
page read and write
1907C000
heap
page read and write
2154B917000
heap
page read and write
19089000
heap
page read and write
44B0000
heap
page read and write
4741000
heap
page read and write
19C000
stack
page read and write
4D60000
direct allocation
page execute and read and write
24D4000
heap
page read and write
2C83000
direct allocation
page read and write
190A6000
heap
page read and write
8D0000
direct allocation
page read and write
4741000
heap
page read and write
10C6000
heap
page read and write
FFA000
heap
page read and write
694000
heap
page read and write
F60000
direct allocation
page read and write
952000
unkown
page execute and read and write
EB0000
direct allocation
page read and write
E15000
heap
page read and write
694000
heap
page read and write
2D43000
direct allocation
page read and write
24FD000
heap
page execute and read and write
D9C000
unkown
page read and write
5170000
direct allocation
page execute and read and write
1B6DA000
heap
page read and write
EB0000
direct allocation
page read and write
24D4000
heap
page read and write
170000
heap
page read and write
21549F9B000
heap
page read and write
DE9000
heap
page read and write
DE0000
heap
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
190AB000
heap
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
5150000
direct allocation
page execute and read and write
3B4000
heap
page read and write
54F000
unkown
page execute and read and write
21549510000
heap
page read and write
95B000
unkown
page execute and read and write
2154AF9F000
heap
page read and write
DA0000
unkown
page write copy
147F000
stack
page read and write
2D18000
direct allocation
page read and write
2C6D000
direct allocation
page read and write
1901E000
heap
page read and write
EB0000
direct allocation
page read and write
2D4A000
direct allocation
page read and write
D97000
unkown
page read and write
3C9E000
stack
page read and write
24D4000
heap
page read and write
19074000
heap
page read and write
4741000
heap
page read and write
19950000
heap
page read and write
2C38000
direct allocation
page read and write
4741000
heap
page read and write
1907B000
heap
page read and write
4741000
heap
page read and write
29D7000
heap
page read and write
4741000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
4F2E000
stack
page read and write
2FA6D000
heap
page read and write
2FDF000
stack
page read and write
D7A000
unkown
page read and write
4741000
heap
page read and write
4C60000
direct allocation
page execute and read and write
9C000
stack
page read and write
2BDF000
stack
page read and write
5180000
direct allocation
page execute and read and write
19368000
direct allocation
page readonly
4CA0000
direct allocation
page execute and read and write
4C0E000
stack
page read and write
2D1E000
stack
page read and write
4631000
heap
page read and write
2E1F000
stack
page read and write
4741000
heap
page read and write
4EF4000
heap
page read and write
821E000
stack
page read and write
42DE000
stack
page read and write
2569000
heap
page read and write
F60000
direct allocation
page read and write
5190000
direct allocation
page execute and read and write
4EE0000
heap
page read and write
65E000
stack
page read and write
3C5F000
stack
page read and write
439E000
stack
page read and write
8CE000
stack
page read and write
27AE000
stack
page read and write
2CBB000
direct allocation
page read and write
271D000
heap
page read and write
44A1000
heap
page read and write
4A90000
direct allocation
page execute and read and write
2D97000
heap
page read and write
694000
heap
page read and write
2576000
heap
page read and write
EA6E1FF000
stack
page read and write
1907C000
heap
page read and write
39DF000
stack
page read and write
694000
heap
page read and write
4C40000
direct allocation
page execute and read and write
DB1000
heap
page read and write
4C70000
direct allocation
page execute and read and write
331F000
stack
page read and write
215479E5000
heap
page read and write
2154C308000
heap
page read and write
2154AD9E000
heap
page read and write
660000
heap
page read and write
D73000
unkown
page read and write
339F000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
21549795000
heap
page read and write
6C260000
unkown
page readonly
612000
unkown
page execute and read and write
19059000
heap
page read and write
28E0000
heap
page read and write
4A6F000
stack
page read and write
8D0000
direct allocation
page read and write
4D0F000
stack
page read and write
EB0000
direct allocation
page read and write
F60000
direct allocation
page read and write
E1F000
heap
page read and write
19059000
heap
page read and write
19392000
direct allocation
page read and write
4B60000
heap
page read and write
21547770000
heap
page read and write
4741000
heap
page read and write
44A1000
heap
page read and write
35DE000
stack
page read and write
1907C000
heap
page read and write
77E000
stack
page read and write
694000
heap
page read and write
21549B0A000
heap
page read and write
51B0000
direct allocation
page execute and read and write
2D51000
direct allocation
page read and write
BCC000
unkown
page execute and read and write
4A70000
trusted library allocation
page read and write
199F0000
heap
page read and write
135A000
heap
page read and write
19062000
heap
page read and write
24D4000
heap
page read and write
2ADF000
stack
page read and write
24D4000
heap
page read and write
335E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
44A1000
heap
page read and write
D3E000
stack
page read and write
6B00000
heap
page read and write
4741000
heap
page read and write
24D4000
heap
page read and write
44A1000
heap
page read and write
4741000
heap
page read and write
EB0000
direct allocation
page read and write
8F0000
unkown
page read and write
F60000
direct allocation
page read and write
694000
heap
page read and write
E16000
heap
page read and write
24D4000
heap
page read and write
44A1000
heap
page read and write
47DE000
stack
page read and write
694000
heap
page read and write
DC4000
unkown
page execute and write copy
21549711000
heap
page read and write
E41000
heap
page read and write
4B5F000
stack
page read and write
190B8000
heap
page read and write
141000
unkown
page execute and write copy
EB0000
direct allocation
page read and write
24D4000
heap
page read and write
95B000
unkown
page execute and read and write
1939F000
direct allocation
page readonly
DF0000
direct allocation
page read and write
6C4E5000
unkown
page readonly
257D000
heap
page read and write
36DF000
stack
page read and write
51DD000
stack
page read and write
2C73000
direct allocation
page read and write
449F000
stack
page read and write
7FF683110000
unkown
page readonly
44A1000
heap
page read and write
780000
heap
page read and write
674C000
stack
page read and write
4741000
heap
page read and write
435F000
stack
page read and write
2154A113000
heap
page read and write
FCF000
heap
page read and write
91B000
stack
page read and write
44A1000
heap
page read and write
1907B000
heap
page read and write
2154BB08000
heap
page read and write
19020000
heap
page read and write
1906B000
heap
page read and write
24D4000
heap
page read and write
1B838000
heap
page read and write
FDF000
heap
page read and write
2CDF000
stack
page read and write
DF0000
direct allocation
page read and write
190B8000
heap
page read and write
4A80000
direct allocation
page execute and read and write
2F5F000
stack
page read and write
44A1000
heap
page read and write
1935F000
direct allocation
page readonly
385E000
stack
page read and write
399E000
stack
page read and write
4741000
heap
page read and write
1906B000
heap
page read and write
1901E000
heap
page read and write
3FDE000
stack
page read and write
19072000
heap
page read and write
418B3000
heap
page read and write
35EF000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
F60000
direct allocation
page read and write
24D4000
heap
page read and write
694000
heap
page read and write
1080000
heap
page read and write
2CE0000
heap
page read and write
694000
heap
page read and write
2D11000
direct allocation
page read and write
3ADE000
stack
page read and write
44A1000
heap
page read and write
1901E000
heap
page read and write
19020000
heap
page read and write
2C7C000
direct allocation
page read and write
24D4000
heap
page read and write
376E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
EB0000
direct allocation
page read and write
D06000
unkown
page write copy
664B000
stack
page read and write
38DE000
stack
page read and write
64E0000
heap
page read and write
694000
heap
page read and write
BCC000
unkown
page execute and read and write
19020000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
1695F000
stack
page read and write
5150000
direct allocation
page execute and read and write
7FDC000
stack
page read and write
6B10000
heap
page read and write
19088000
heap
page read and write
EC0000
heap
page read and write
7FF6833AB000
unkown
page read and write
1697C000
heap
page read and write
DF0000
direct allocation
page read and write
4752000
heap
page read and write
1908E000
heap
page read and write
694000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
44A1000
heap
page read and write
19062000
heap
page read and write
CE8000
unkown
page read and write
E00000
heap
page read and write
CC5000
unkown
page read and write
21549D08000
heap
page read and write
4741000
heap
page read and write
FE8000
heap
page read and write
2F5F000
stack
page read and write
612E000
stack
page read and write
1423D000
stack
page read and write
CEE000
unkown
page read and write
401000
unkown
page execute read
4FCBD000
stack
page read and write
4741000
heap
page read and write
There are 1452 hidden memdumps, click here to show them.