IOC Report
oZ3vtWXObB.exe

loading gif

Files

File Path
Type
Category
Malicious
oZ3vtWXObB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\u3w5\ast.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\astclient.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\astrct.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\aw_sas32.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\hatls.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-02JO0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-0I1DI.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-16M5V.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-4DKN3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-9P1JU.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-HTIEL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-J00N2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-JTK9U.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-L5V14.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-QB9RB.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-T74LT.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-TI6M0.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-U37IG.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-U4T29.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\is-V6G0T.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\libcrypto-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\libcryptoMD.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\libcurl.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\libjpeg-turbo-win.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\libssl-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\opus.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\quartz.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3w5\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\AstCrp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\ast.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\astclient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\astrct.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\aw_sas32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\hatls.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\libcrypto-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\libcryptoMD.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\libcurl.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\libjpeg-turbo-win.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\libssl-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\opus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\is\quartz.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-30F0I.tmp\oZ3vtWXObB.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-7K2HG.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-7K2HG.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-GEEHR.tmp\oZ3vtWXObB.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-J9P8D.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-J9P8D.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\u3w5\6nnnc.bmp (copy)
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 304x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\u3w5\AstCrp.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\u3w5\config.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u3w5\dsm7v.cfg (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\u3w5\is-6KVQP.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\u3w5\is-CH79V.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\u3w5\is-EHIT0.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u3w5\is-L5GBL.tmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 304x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\u3w5\msvcr120.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\is\6nnnc.bmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 304x165, components 3
dropped
C:\Users\user\AppData\Roaming\is\config.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\is\dsm7v.cfg
data
dropped
C:\Users\user\AppData\Roaming\is\msvcr120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 53 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oZ3vtWXObB.exe
"C:\Users\user\Desktop\oZ3vtWXObB.exe"
malicious
C:\Users\user\Desktop\oZ3vtWXObB.exe
"C:\Users\user\Desktop\oZ3vtWXObB.exe" /verysilent /password=6s7w4
malicious
C:\Users\user\AppData\Roaming\is\ast.exe
"C:\Users\user\AppData\Roaming\is\ast.exe"
malicious
C:\Users\user\AppData\Roaming\is\ast.exe
"C:\Users\user\AppData\Roaming\is\ast.exe"
malicious
C:\Users\user\AppData\Roaming\is\ast.exe
"C:\Users\user\AppData\Roaming\is\ast.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-GEEHR.tmp\oZ3vtWXObB.tmp
"C:\Users\user\AppData\Local\Temp\is-GEEHR.tmp\oZ3vtWXObB.tmp" /SL5="$10408,7132714,832512,C:\Users\user\Desktop\oZ3vtWXObB.exe"
C:\Users\user\AppData\Local\Temp\is-30F0I.tmp\oZ3vtWXObB.tmp
"C:\Users\user\AppData\Local\Temp\is-30F0I.tmp\oZ3vtWXObB.tmp" /SL5="$20416,7132714,832512,C:\Users\user\Desktop\oZ3vtWXObB.exe" /verysilent /password=6s7w4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\u3w5\rbxsdlx.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\xcopy.exe
xcopy /Y /I /S "C:\Users\user\AppData\Local\Temp\u3w5\*" "C:\Users\user\AppData\Roaming\is\"

URLs

Name
IP
Malicious
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://www.borland.com/namespaces/TypesM
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
http://ocsp.sectigo.com0
unknown
http://www.openssl.org/V
unknown
https://id.xn--80akicokc0aa
unknown
https://id.xn--80akicokc0aablc.xn--p1aidllb/y
unknown
http://crl.sectigo.com/COMODOTimeStampingCA_2.crl0r
unknown
https://id.xn--80akicokc0aablc.xn--p1aiI
unknown
https://id.xn--80akicokc0aablc.xn--p1aixe03
unknown
http://schemas.xmlsoap.org/soap/encoding/xe
unknown
http://www.indyproject.org/
unknown
https://id.xn--80akicokc0aablc.xn--p1aiE
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://curl.haxx.se/docs/http-cookies.html#
unknown
http://www.openssl.org/support/faq.html
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443RW
unknown
https://datatracker.ietf.org/ipr/1526/
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335-
unknown
http://www.borland.com/namespaces/Types
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335/api/exec
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443rO
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443uIz
unknown
https://sectigo.com/CPS0B
unknown
https://www.remobjects.com/ps
unknown
https://curl.haxx.se/docs/copyright.htmlD
unknown
https://curl.haxx.se/V
unknown
https://datatracker.ietf.org/ipr/1914/
unknown
https://www.innosetup.com/
unknown
https://sectigo.com/CPS0C
unknown
https://sectigo.com/CPS0D
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/Log
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:4433
unknown
https://id.xn--80akicokc0aablc.xn--p1ainke
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:4432
unknown
https://id.xn--80akicokc0aablc.xn--p1ai03
unknown
http://www.borland.com/namespaces/Typesd
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...
unknown
https://id.xn--80akicokc0aablc.xn--p1ai1
unknown
http://crt.sectigo.com/COMODOTimeStampingCA_2.crt0#
unknown
http://www.sqlite.org/copyright.html.
unknown
https://id.xn--80akicokc0aablc.xn--p1ai00
unknown
https://id.xn--80akicokc0aablc.xn--p1aillQ/
unknown
https://id.xn--80akicokc0aablc.xn--p1aillU
unknown
https://sectigo.com/CPS0
unknown
https://www.openssl.org/docs/faq.html
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/api/exec
212.193.169.65
https://id.xn--80akicokc0aablc.xn--p1ar
unknown
https://id.xn--80akicokc0aablc.xn--p1ai
unknown
http://www.borland.com/namespaces/Typescrypto
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335...
unknown
https://id.xn--80akico
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443nA
unknown
https://id.xn--80akicokc0aablc.xn--p1aidll
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://id.xn-
unknown
http://www.borland.com/namespaces/Typeswuu
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...43
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/tClnstCln
unknown
https://id.xn--80akicokc0aablc.xn--p1aills
unknown
https://id.xn--80akicokc0aablc.xn--p1aiU
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://www.borland.com/namespaces/Types6
unknown
http://www.borland.com/namespaces/Typesuntime
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443SI
unknown
https://id.xn--80akicokc0aablcZ
unknown
https://datatracker.ietf.org/ipr/1524/
unknown
https://www.openssl.org/H
unknown
https://id.xn--80akicokc0aablc.xn--p1aid003
unknown
https://id.xn--80a
unknown
https://id.xn--80akicokc0aablc.xn--p1ainkEx
unknown
http://crypto-st.art/update.php
unknown
https://id.xn--80akicokc0aaP
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443n
unknown
http://www.openssl.org/)
unknown
http://www.borland.com/namespaces/Typesx6
unknown
http://www.borland.com/namespaces/Types%
unknown
http://www.borland.com/namespaces/Types_9
unknown
https://id.xn--80akicokc0aablc.xn--p1airq
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
id.xn--80akicokc0aablc.xn--p1ai
212.193.169.65

IPs

IP
Domain
Country
Malicious
212.193.169.65
id.xn--80akicokc0aablc.xn--p1ai
Russian Federation
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup CodeFile: Name
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup CodeFile: UsageMode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\folder_is1
Inno Setup CodeFile: DataDir
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.FixPass
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Main.Autorun
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Main.CloseButtonOperation
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Main.CheckUpdates
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.UseLocalSecuritySettings
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.DynPassKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.PassLifetime
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.CanWinAuth
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.AccessKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.CanWinLoginAnotherUser
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.UNCONTROLLED_ACCESS
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.CanWinLoginNotAdmin
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.DenyRemoteSettingsControl
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Security.DenyLockControls
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Log.ServerStoreTechLog
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Main.AWAYMODE_REQUIRED
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Main.LogsLifetime
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Main.LogsForMail2Support
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
ProxySettings.UseKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
ProxySettings.StoreUserAndPassw
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
act
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
Values.HDD
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
IEProxyAttributes.Server
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
IEProxyAttributes.Port
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS
IEProxyAttributes.ProxyBypass
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown
page execute read
malicious
19A000
stack
page read and write
4B7000
unkown
page read and write
2353000
direct allocation
page read and write
302C000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
34D2000
direct allocation
page read and write
6C943000
unkown
page read and write
5FDE000
stack
page read and write
AFE000
direct allocation
page read and write
660F000
stack
page read and write
C24000
heap
page read and write
2986000
heap
page read and write
6C3A8000
unkown
page write copy
910000
heap
page read and write
6D0F0000
unkown
page readonly
23EE000
stack
page read and write
2DBF000
direct allocation
page read and write
718F000
stack
page read and write
33F3000
direct allocation
page read and write
3129000
direct allocation
page read and write
5BE0000
heap
page read and write
3049000
direct allocation
page read and write
6C737000
unkown
page execute read
2CB0000
heap
page read and write
6C947000
unkown
page readonly
A29000
direct allocation
page read and write
2D65000
direct allocation
page read and write
6FC61000
unkown
page readonly
3413000
direct allocation
page read and write
2DDC000
direct allocation
page read and write
3087000
direct allocation
page read and write
AC6000
direct allocation
page read and write
34BE000
direct allocation
page read and write
DF6000
heap
page read and write
C27000
heap
page read and write
C24000
heap
page read and write
6D4B9000
unkown
page readonly
42A0000
direct allocation
page read and write
3111000
direct allocation
page read and write
30A5000
direct allocation
page read and write
C24000
heap
page read and write
43A6000
direct allocation
page read and write
436A000
direct allocation
page read and write
24CC000
direct allocation
page read and write
2FDD000
direct allocation
page read and write
C24000
heap
page read and write
DF9000
heap
page read and write
77B0000
heap
page read and write
8D9000
unkown
page read and write
8BB000
unkown
page read and write
3D8D000
stack
page read and write
351B000
direct allocation
page read and write
359F000
stack
page read and write
7FD90000
direct allocation
page read and write
2F97000
direct allocation
page read and write
5BF4000
heap
page read and write
7B0000
heap
page read and write
2D11000
heap
page read and write
2FBD000
direct allocation
page read and write
B3D000
direct allocation
page read and write
2EFC000
direct allocation
page read and write
2FF0000
direct allocation
page read and write
25B0000
heap
page read and write
334E000
stack
page read and write
78C000
heap
page read and write
6D23E000
unkown
page readonly
34BC000
direct allocation
page read and write
34E8000
direct allocation
page read and write
C01000
heap
page read and write
6C0000
heap
page read and write
4811000
heap
page read and write
A4E000
direct allocation
page read and write
2911000
heap
page read and write
5BF4000
heap
page read and write
C24000
heap
page read and write
7083000
unkown
page execute and write copy
6B0000
heap
page read and write
2EE6000
direct allocation
page read and write
3126000
direct allocation
page read and write
2513000
direct allocation
page read and write
303B000
direct allocation
page read and write
26F9000
heap
page read and write
2EF0000
heap
page read and write
3545000
direct allocation
page read and write
619D000
stack
page read and write
5BE0000
heap
page read and write
6FC63000
unkown
page readonly
4C0000
unkown
page read and write
3480000
direct allocation
page read and write
9B000
stack
page read and write
6D4B6000
unkown
page read and write
7B4000
heap
page read and write
A37000
direct allocation
page read and write
C24000
heap
page read and write
42DA000
direct allocation
page read and write
2950000
heap
page read and write
2EBB000
direct allocation
page read and write
7B4000
heap
page read and write
61E01000
unkown
page execute read
4395000
direct allocation
page read and write
DD6000
heap
page read and write
26D3000
heap
page read and write
473E000
direct allocation
page read and write
4E0000
heap
page read and write
25CD000
direct allocation
page read and write
2EFC000
direct allocation
page read and write
5C10000
heap
page read and write
61E9D000
unkown
page read and write
8BF000
unkown
page read and write
6DD000
unkown
page readonly
5F9D000
stack
page read and write
2E9C000
direct allocation
page read and write
AA6000
direct allocation
page read and write
93A000
unkown
page read and write
C17000
heap
page read and write
3558000
direct allocation
page read and write
C24000
heap
page read and write
35A9000
direct allocation
page read and write
92A000
unkown
page read and write
25DC000
direct allocation
page read and write
7AF000
heap
page read and write
C24000
heap
page read and write
26F8000
heap
page read and write
6D430000
unkown
page readonly
2F64000
direct allocation
page read and write
36AE000
stack
page read and write
3E8E000
stack
page read and write
5BC2000
heap
page read and write
5B79000
heap
page read and write
61EA1000
unkown
page readonly
34AE000
direct allocation
page read and write
2301000
direct allocation
page read and write
6D290000
unkown
page readonly
3591000
direct allocation
page read and write
C24000
heap
page read and write
E1B000
heap
page read and write
256E000
stack
page read and write
6C14E000
unkown
page execute read
7790000
heap
page read and write
30AC000
direct allocation
page read and write
26F8000
heap
page read and write
23D8000
direct allocation
page read and write
5B7C000
heap
page read and write
5DCC000
direct allocation
page read and write
480A000
heap
page read and write
7BA000
heap
page read and write
3D2F000
stack
page read and write
B9D000
direct allocation
page read and write
2726000
heap
page read and write
34C4000
direct allocation
page read and write
7089000
unkown
page write copy
24F6000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
42A8000
direct allocation
page read and write
B8B000
unkown
page readonly
C24000
heap
page read and write
2E8D000
direct allocation
page read and write
34A6000
direct allocation
page read and write
316F000
stack
page read and write
34EE000
direct allocation
page read and write
3BEF000
stack
page read and write
AE3000
direct allocation
page read and write
6C9000
unkown
page read and write
B2C000
direct allocation
page read and write
AF8000
direct allocation
page read and write
418C000
stack
page read and write
8CB000
unkown
page read and write
3019000
direct allocation
page read and write
7C5000
heap
page read and write
34D0000
heap
page read and write
846000
heap
page read and write
3016000
direct allocation
page read and write
2F79000
direct allocation
page read and write
3409000
direct allocation
page read and write
4736000
direct allocation
page read and write
357B000
direct allocation
page read and write
341B000
direct allocation
page read and write
81C8000
heap
page read and write
34DA000
direct allocation
page read and write
383D000
stack
page read and write
5C02000
heap
page read and write
25F1000
direct allocation
page read and write
3070000
direct allocation
page read and write
2A90000
heap
page read and write
900000
direct allocation
page execute and read and write
76E000
stack
page read and write
DC0000
heap
page read and write
C24000
heap
page read and write
2956000
heap
page read and write
10BF000
stack
page read and write
3449000
direct allocation
page read and write
3521000
direct allocation
page read and write
4296000
direct allocation
page read and write
25F0000
direct allocation
page execute and read and write
E16000
heap
page read and write
5C26000
heap
page read and write
34A0000
direct allocation
page read and write
8E2000
unkown
page read and write
3484000
direct allocation
page read and write
6BE04000
unkown
page readonly
9F6000
direct allocation
page read and write
6D0F1000
unkown
page execute read
23C8000
direct allocation
page read and write
6C30D000
unkown
page readonly
5BD1000
heap
page read and write
9B000
stack
page read and write
DEB000
heap
page read and write
34D0000
direct allocation
page read and write
2566000
direct allocation
page read and write
2D9B000
direct allocation
page read and write
9D1000
direct allocation
page read and write
C24000
heap
page read and write
2549000
direct allocation
page read and write
2E5E000
stack
page read and write
A98000
direct allocation
page read and write
371F000
stack
page read and write
5C37000
heap
page read and write
34D0000
direct allocation
page read and write
858000
heap
page read and write
350B000
direct allocation
page read and write
2E60000
direct allocation
page execute and read and write
26F9000
heap
page read and write
3482000
direct allocation
page read and write
2D93000
direct allocation
page read and write
5C45000
heap
page read and write
BFF000
heap
page read and write
7000000
unkown
page readonly
8D0000
unkown
page read and write
2EC9000
direct allocation
page read and write
3025000
direct allocation
page read and write
6FBE000
stack
page read and write
6CD000
unkown
page read and write
BE0000
heap
page read and write
357F000
stack
page read and write
44DC000
stack
page read and write
5BF4000
heap
page read and write
5BBD000
heap
page read and write
8E2000
unkown
page read and write
117E000
stack
page read and write
C24000
heap
page read and write
778000
heap
page read and write
C24000
heap
page read and write
A1A000
direct allocation
page read and write
C24000
heap
page read and write
2660000
direct allocation
page read and write
6C277000
unkown
page readonly
5C28000
heap
page read and write
4E0000
heap
page read and write
AC3000
direct allocation
page read and write
E0E000
heap
page read and write
326F000
stack
page read and write
A90000
direct allocation
page read and write
3486000
direct allocation
page read and write
2B00000
heap
page read and write
2680000
direct allocation
page read and write
34AA000
direct allocation
page read and write
C24000
heap
page read and write
A13000
direct allocation
page read and write
6D431000
unkown
page execute read
43AB000
direct allocation
page read and write
6C940000
unkown
page read and write
A7A000
direct allocation
page read and write
32EC000
stack
page read and write
85AD000
stack
page read and write
2F6C000
direct allocation
page read and write
43A4000
direct allocation
page read and write
4B9000
unkown
page read and write
5BDA000
heap
page read and write
C24000
heap
page read and write
5E5F000
stack
page read and write
B54000
direct allocation
page read and write
C24000
heap
page read and write
728D000
stack
page read and write
2930000
heap
page read and write
33FB000
direct allocation
page read and write
99F000
stack
page read and write
BB3000
direct allocation
page read and write
B5B000
direct allocation
page read and write
26F9000
heap
page read and write
5D5E000
stack
page read and write
8C8000
unkown
page read and write
A8F000
stack
page read and write
DDE000
stack
page read and write
349E000
direct allocation
page read and write
26F9000
heap
page read and write
2F5D000
direct allocation
page read and write
81B0000
heap
page read and write
9E1000
direct allocation
page read and write
C25000
heap
page read and write
C24000
heap
page read and write
4354000
direct allocation
page read and write
3B00000
direct allocation
page execute and read and write
2F40000
heap
page read and write
291A000
heap
page read and write
792D000
stack
page read and write
939000
unkown
page write copy
8C3000
unkown
page read and write
E2D000
heap
page read and write
2DA2000
direct allocation
page read and write
37F7000
direct allocation
page read and write
3496000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
4811000
heap
page read and write
34CC000
direct allocation
page read and write
C24000
heap
page read and write
33EC000
direct allocation
page read and write
979000
heap
page read and write
299A000
heap
page read and write
918000
heap
page read and write
2E50000
direct allocation
page read and write
3492000
direct allocation
page read and write
C24000
heap
page read and write
353B000
direct allocation
page read and write
C0A000
heap
page read and write
3144000
direct allocation
page read and write
270F000
heap
page read and write
2E50000
trusted library allocation
page read and write
6D5000
unkown
page read and write
3135000
direct allocation
page read and write
3515000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
347E000
stack
page read and write
24EF000
stack
page read and write
96000
stack
page read and write
39F7000
heap
page read and write
26D0000
heap
page read and write
6C110000
unkown
page execute read
313C000
direct allocation
page read and write
BA4000
direct allocation
page read and write
6FC51000
unkown
page execute read
3438000
direct allocation
page read and write
35DE000
stack
page read and write
4356000
direct allocation
page read and write
47D0000
heap
page read and write
5C52000
heap
page read and write
26E8000
heap
page read and write
3517000
direct allocation
page read and write
7062000
unkown
page execute and read and write
C24000
heap
page read and write
2905000
heap
page read and write
640D000
stack
page read and write
A88000
direct allocation
page read and write
34B2000
direct allocation
page read and write
2E7E000
direct allocation
page read and write
5C45000
heap
page read and write
259A000
direct allocation
page read and write
8BB000
unkown
page read and write
C00000
direct allocation
page read and write
2F48000
direct allocation
page read and write
2533000
direct allocation
page read and write
8D3000
unkown
page read and write
2FA1000
direct allocation
page read and write
C24000
heap
page read and write
8D3000
unkown
page read and write
5B79000
heap
page read and write
C24000
heap
page read and write
2D6D000
direct allocation
page read and write
2FB1000
direct allocation
page read and write
3085000
direct allocation
page read and write
34CA000
direct allocation
page read and write
EDE000
stack
page read and write
39F0000
heap
page read and write
4360000
direct allocation
page read and write
311B000
direct allocation
page read and write
C24000
heap
page read and write
19D000
stack
page read and write
2520000
heap
page read and write
289F000
stack
page read and write
B88000
direct allocation
page read and write
E0B000
heap
page read and write
380D000
direct allocation
page read and write
103F000
stack
page read and write
C24000
heap
page read and write
3AF0000
trusted library allocation
page read and write
8D0000
unkown
page read and write
308B000
direct allocation
page read and write
2DB8000
direct allocation
page read and write
6C29C000
unkown
page readonly
E1D000
heap
page read and write
C0F000
stack
page read and write
8F0000
heap
page read and write
2670000
heap
page read and write
34E4000
direct allocation
page read and write
34F0000
direct allocation
page read and write
26E0000
heap
page read and write
4732000
direct allocation
page read and write
285E000
stack
page read and write
5BD0000
heap
page read and write
5C1A000
heap
page read and write
C24000
heap
page read and write
23F4000
direct allocation
page read and write
2A30000
heap
page read and write
7C0000
heap
page read and write
2F50000
direct allocation
page execute and read and write
BAC000
direct allocation
page read and write
39F1000
heap
page read and write
ACA000
direct allocation
page read and write
26F9000
heap
page read and write
2AF0000
direct allocation
page execute and read and write
2AE0000
heap
page read and write
23FC000
direct allocation
page read and write
23B2000
direct allocation
page read and write
6C307000
unkown
page read and write
231A000
direct allocation
page read and write
25BF000
direct allocation
page read and write
19A000
stack
page read and write
3107000
direct allocation
page read and write
E07000
heap
page read and write
348E000
direct allocation
page read and write
2F2B000
direct allocation
page read and write
3EDE000
stack
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
5C4C000
heap
page read and write
5C2B000
heap
page read and write
5C14000
heap
page read and write
A98000
direct allocation
page read and write
5FE000
stack
page read and write
2584000
direct allocation
page read and write
799000
heap
page read and write
C24000
heap
page read and write
7C5000
heap
page read and write
2F23000
direct allocation
page read and write
23DF000
direct allocation
page read and write
E23000
heap
page read and write
A62000
direct allocation
page read and write
C24000
heap
page read and write
373E000
stack
page read and write
34C6000
direct allocation
page read and write
3370000
heap
page read and write
795000
heap
page read and write
294B000
heap
page read and write
2592000
direct allocation
page read and write
F1E000
stack
page read and write
5C1D000
heap
page read and write
7AA000
heap
page read and write
81C0000
heap
page read and write
3AEE000
stack
page read and write
25B8000
direct allocation
page read and write
2377000
direct allocation
page read and write
BC7000
heap
page read and write
235A000
direct allocation
page read and write
6C115000
unkown
page execute read
2EF5000
direct allocation
page read and write
5B88000
heap
page read and write
25F8000
direct allocation
page read and write
AB0000
direct allocation
page read and write
B36000
direct allocation
page read and write
5C32000
heap
page read and write
D3E000
stack
page read and write
5B86000
heap
page read and write
34A2000
direct allocation
page read and write
42C4000
direct allocation
page read and write
2F40000
direct allocation
page read and write
43CE000
direct allocation
page read and write
6C2C2000
unkown
page readonly
5C34000
heap
page read and write
C24000
heap
page read and write
3B11000
heap
page read and write
C24000
heap
page read and write
6C6000
unkown
page write copy
ABC000
direct allocation
page read and write
3089000
direct allocation
page read and write
3565000
direct allocation
page read and write
33C6000
direct allocation
page read and write
B30000
unkown
page readonly
84B000
heap
page read and write
2F11000
direct allocation
page read and write
BDE000
stack
page read and write
7A6000
heap
page read and write
3003000
heap
page read and write
5C6E000
heap
page read and write
2670000
heap
page read and write
BC0000
heap
page read and write
2521000
direct allocation
page read and write
349A000
direct allocation
page read and write
61E9B000
unkown
page readonly
3FDF000
stack
page read and write
5BF4000
heap
page read and write
C24000
heap
page read and write
6FD69000
unkown
page readonly
D2E000
stack
page read and write
3042000
direct allocation
page read and write
2660000
direct allocation
page read and write
35B8000
direct allocation
page read and write
923000
unkown
page read and write
24BA000
stack
page read and write
34C2000
direct allocation
page read and write
8B6000
heap
page read and write
6C0FF000
unkown
page execute read
2988000
heap
page read and write
348A000
direct allocation
page read and write
428E000
stack
page read and write
34D6000
direct allocation
page read and write
2403000
direct allocation
page read and write
A55000
direct allocation
page read and write
26D0000
heap
page read and write
BBA000
direct allocation
page read and write
2EB3000
direct allocation
page read and write
3502000
direct allocation
page read and write
4370000
direct allocation
page read and write
C24000
heap
page read and write
5E9D000
stack
page read and write
34DC000
direct allocation
page read and write
4352000
direct allocation
page read and write
C24000
heap
page read and write
5C32000
heap
page read and write
708A000
unkown
page readonly
2DF1000
direct allocation
page read and write
6C3B2000
unkown
page readonly
3490000
direct allocation
page read and write
2ED8000
direct allocation
page read and write
2EF4000
direct allocation
page read and write
435A000
direct allocation
page read and write
5BF5000
heap
page read and write
770000
heap
page read and write
5C08000
heap
page read and write
C24000
heap
page read and write
600000
heap
page read and write
4386000
direct allocation
page read and write
6C74F000
unkown
page execute read
2328000
direct allocation
page read and write
296A000
heap
page read and write
2A90000
heap
page read and write
2F0A000
direct allocation
page read and write
94D000
heap
page read and write
2336000
direct allocation
page read and write
86AD000
stack
page read and write
937000
unkown
page read and write
6C331000
unkown
page execute read
255C000
direct allocation
page read and write
7087000
unkown
page execute read
B90000
heap
page read and write
6D24E000
unkown
page readonly
5BF4000
heap
page read and write
5C02000
heap
page read and write
101F000
stack
page read and write
A9F000
direct allocation
page read and write
5C51000
heap
page read and write
A22000
direct allocation
page read and write
25A8000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
400000
unkown
page readonly
6FC0000
remote allocation
page read and write
B96000
direct allocation
page read and write
8CA000
unkown
page read and write
2900000
heap
page read and write
8C8000
unkown
page read and write
5BF4000
heap
page read and write
3F40000
heap
page read and write
AF1000
direct allocation
page read and write
C24000
heap
page read and write
5C57000
heap
page read and write
C24000
heap
page read and write
61EA0000
unkown
page write copy
C20000
heap
page read and write
C24000
heap
page read and write
807000
heap
page read and write
9FE000
direct allocation
page read and write
2F20000
heap
page read and write
24FD000
direct allocation
page read and write
ABF000
direct allocation
page read and write
473A000
direct allocation
page read and write
2EAC000
direct allocation
page read and write
2927000
heap
page read and write
807000
heap
page read and write
5BD8000
heap
page read and write
4290000
direct allocation
page read and write
34D0000
direct allocation
page read and write
4366000
direct allocation
page read and write
C10000
heap
page read and write
33D6000
direct allocation
page read and write
BFD000
heap
page read and write
C24000
heap
page read and write
5C04000
heap
page read and write
61E00000
unkown
page readonly
7FB40000
direct allocation
page read and write
A76000
direct allocation
page read and write
2345000
direct allocation
page read and write
429A000
direct allocation
page read and write
18F000
stack
page read and write
5C27000
heap
page read and write
5BBC000
heap
page read and write
25AD000
stack
page read and write
2680000
direct allocation
page read and write
6D25F000
unkown
page readonly
2ED0000
direct allocation
page read and write
C24000
heap
page read and write
5C1A000
heap
page read and write
A6A000
direct allocation
page read and write
2DD4000
direct allocation
page read and write
3582000
direct allocation
page read and write
3509000
direct allocation
page read and write
5C57000
heap
page read and write
4372000
direct allocation
page read and write
340C000
direct allocation
page read and write
2F8C000
direct allocation
page read and write
6FC60000
unkown
page read and write
4368000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
B20000
heap
page read and write
A3E000
direct allocation
page read and write
927000
unkown
page read and write
C24000
heap
page read and write
9EF000
direct allocation
page read and write
2FF7000
direct allocation
page read and write
9DA000
direct allocation
page read and write
2E50000
heap
page read and write
3E6D000
stack
page read and write
C24000
heap
page read and write
7C6000
heap
page read and write
7BA000
heap
page read and write
6D287000
unkown
page read and write
99000
stack
page read and write
2550000
direct allocation
page read and write
4892000
heap
page read and write
2DEA000
direct allocation
page read and write
47D1000
heap
page read and write
26F8000
heap
page read and write
8B0000
heap
page read and write
2937000
heap
page read and write
D8D000
heap
page read and write
26F9000
heap
page read and write
34EA000
direct allocation
page read and write
401000
unkown
page execute read
3458000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
4376000
direct allocation
page read and write
5BBB000
heap
page read and write
240A000
direct allocation
page read and write
702000
unkown
page readonly
A30000
direct allocation
page read and write
2F4F000
direct allocation
page read and write
DF4000
heap
page read and write
79B0000
trusted library allocation
page read and write
7088000
unkown
page read and write
64E000
stack
page read and write
AEA000
direct allocation
page read and write
6C6000
unkown
page read and write
C24000
heap
page read and write
239C000
direct allocation
page read and write
6FD51000
unkown
page execute read
5C41000
heap
page read and write
7BA000
heap
page read and write
C24000
heap
page read and write
19A000
stack
page read and write
8C3000
unkown
page read and write
2917000
heap
page read and write
720000
heap
page read and write
650C000
stack
page read and write
D48000
heap
page read and write
4358000
direct allocation
page read and write
480A000
heap
page read and write
93A000
unkown
page read and write
26F9000
heap
page read and write
3D6C000
stack
page read and write
2387000
direct allocation
page read and write
435E000
direct allocation
page read and write
B01000
direct allocation
page read and write
870000
heap
page read and write
2F7A000
direct allocation
page read and write
3C2E000
stack
page read and write
76E000
stack
page read and write
7B5000
heap
page read and write
6D5000
unkown
page read and write
2941000
heap
page read and write
247D000
stack
page read and write
6C2E0000
unkown
page readonly
8BF000
unkown
page read and write
7A6000
heap
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
2945000
heap
page read and write
2DE0000
direct allocation
page read and write
2418000
direct allocation
page read and write
26F8000
heap
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
7AC000
heap
page read and write
84AC000
stack
page read and write
C07000
heap
page read and write
23E6000
direct allocation
page read and write
C24000
heap
page read and write
6C94C000
unkown
page readonly
2FED000
direct allocation
page read and write
3081000
direct allocation
page read and write
396E000
stack
page read and write
C24000
heap
page read and write
670000
heap
page read and write
3519000
direct allocation
page read and write
434B000
direct allocation
page read and write
6C0BD000
unkown
page execute read
C24000
heap
page read and write
6C0B1000
unkown
page execute read
2EF3000
heap
page read and write
9B000
stack
page read and write
429C000
direct allocation
page read and write
3418000
direct allocation
page read and write
2574000
direct allocation
page read and write
350F000
direct allocation
page read and write
36BF000
stack
page read and write
4349000
direct allocation
page read and write
25C6000
direct allocation
page read and write
257D000
direct allocation
page read and write
B2F000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
6D493000
unkown
page readonly
C24000
heap
page read and write
7C0000
heap
page read and write
F3F000
stack
page read and write
6FFD000
stack
page read and write
39E0000
direct allocation
page execute and read and write
9E8000
direct allocation
page read and write
8E2000
unkown
page read and write
8B7000
heap
page read and write
530000
heap
page read and write
C24000
heap
page read and write
237E000
direct allocation
page read and write
34F0000
direct allocation
page read and write
C24000
heap
page read and write
25A1000
direct allocation
page read and write
5C18000
heap
page read and write
BE0000
heap
page read and write
6BE01000
unkown
page read and write
A81000
direct allocation
page read and write
5BDE000
heap
page read and write
30BB000
direct allocation
page read and write
C24000
heap
page read and write
B44000
direct allocation
page read and write
34D4000
direct allocation
page read and write
3159000
direct allocation
page read and write
3488000
direct allocation
page read and write
8DE000
unkown
page read and write
926000
unkown
page read and write
AAD000
direct allocation
page read and write
6D8000
unkown
page write copy
A0C000
direct allocation
page read and write
5BF7000
heap
page read and write
34C8000
direct allocation
page read and write
3113000
direct allocation
page read and write
23ED000
direct allocation
page read and write
AD8000
direct allocation
page read and write
27F0000
heap
page read and write
2F0C000
direct allocation
page read and write
8BB000
unkown
page write copy
39AE000
stack
page read and write
2362000
direct allocation
page read and write
34CE000
direct allocation
page read and write
19D000
stack
page read and write
C24000
heap
page read and write
34E0000
direct allocation
page read and write
3573000
direct allocation
page read and write
361E000
stack
page read and write
C24000
heap
page read and write
ACD000
direct allocation
page read and write
37ED000
direct allocation
page read and write
4C0000
unkown
page read and write
C24000
heap
page read and write
720000
heap
page read and write
C24000
heap
page read and write
5BC2000
heap
page read and write
538000
heap
page read and write
5C5F000
heap
page read and write
C24000
heap
page read and write
34BA000
direct allocation
page read and write
7BF000
stack
page read and write
DE7000
heap
page read and write
24E0000
direct allocation
page read and write
26F9000
heap
page read and write
34F4000
direct allocation
page read and write
2E30000
heap
page read and write
7088000
unkown
page read and write
C24000
heap
page read and write
6C0CE000
unkown
page execute read
6D225000
unkown
page readonly
3513000
direct allocation
page read and write
5C0D000
heap
page read and write
6C330000
unkown
page readonly
2370000
direct allocation
page read and write
C24000
heap
page read and write
5C57000
heap
page read and write
6FC0000
remote allocation
page read and write
34DE000
direct allocation
page read and write
255F000
direct allocation
page read and write
4892000
heap
page read and write
9A8000
unkown
page readonly
C24000
heap
page read and write
6CD000
unkown
page read and write
42A2000
direct allocation
page read and write
BD8000
heap
page read and write
34D8000
direct allocation
page read and write
6BD81000
unkown
page execute read
436E000
direct allocation
page read and write
291B000
heap
page read and write
3411000
direct allocation
page read and write
B11000
direct allocation
page read and write
4742000
direct allocation
page read and write
436C000
direct allocation
page read and write
4B7000
unkown
page write copy
6C391000
unkown
page readonly
3000000
heap
page read and write
34C0000
direct allocation
page read and write
C24000
heap
page read and write
C06000
heap
page read and write
258B000
direct allocation
page read and write
2935000
heap
page read and write
3099000
direct allocation
page read and write
942000
heap
page read and write
7FDDB000
direct allocation
page read and write
2EC2000
direct allocation
page read and write
61E8A000
unkown
page read and write
2920000
heap
page read and write
250C000
direct allocation
page read and write
6C0B0000
unkown
page readonly
9B000
stack
page read and write
3B10000
heap
page read and write
5B82000
heap
page read and write
C24000
heap
page read and write
2504000
direct allocation
page read and write
7FE34000
direct allocation
page read and write
6D28A000
unkown
page read and write
C24000
heap
page read and write
6D28E000
unkown
page read and write
6BDEB000
unkown
page readonly
2B05000
heap
page read and write
BD0000
heap
page read and write
B30000
heap
page read and write
3498000
direct allocation
page read and write
6C8D0000
unkown
page execute read
B90000
heap
page read and write
6C8000
unkown
page read and write
C24000
heap
page read and write
3B11000
heap
page read and write
2960000
heap
page read and write
351D000
direct allocation
page read and write
3C10000
trusted library allocation
page read and write
3152000
direct allocation
page read and write
C24000
heap
page read and write
8DE000
unkown
page read and write
6FD77000
unkown
page read and write
C24000
heap
page read and write
77B2000
heap
page read and write
5C33000
heap
page read and write
4811000
heap
page read and write
E10000
heap
page read and write
C22000
heap
page read and write
2EDF000
direct allocation
page read and write
6FD50000
unkown
page readonly
D15000
heap
page read and write
2900000
heap
page read and write
347E000
stack
page read and write
B90000
heap
page read and write
2E85000
direct allocation
page read and write
2758000
direct allocation
page read and write
2411000
direct allocation
page read and write
6D4B4000
unkown
page write copy
4C4000
unkown
page readonly
473C000
direct allocation
page read and write
2DCD000
direct allocation
page read and write
DC8000
heap
page read and write
5C41000
heap
page read and write
6FD79000
unkown
page readonly
2DA9000
direct allocation
page read and write
19A000
stack
page read and write
3117000
direct allocation
page read and write
39E0000
direct allocation
page execute and read and write
850000
heap
page read and write
2D10000
heap
page read and write
3034000
direct allocation
page read and write
6C6000
unkown
page read and write
234C000
direct allocation
page read and write
26F9000
heap
page read and write
B6A000
direct allocation
page read and write
33E6000
direct allocation
page read and write
9BC000
unkown
page readonly
350D000
direct allocation
page read and write
D40000
heap
page read and write
C1C000
heap
page read and write
8D7000
unkown
page read and write
A72000
direct allocation
page read and write
6C749000
unkown
page execute read
C24000
heap
page read and write
C24000
heap
page read and write
AD1000
direct allocation
page read and write
4364000
direct allocation
page read and write
4374000
direct allocation
page read and write
3100000
direct allocation
page read and write
4BA000
unkown
page read and write
3422000
direct allocation
page read and write
2D8C000
direct allocation
page read and write
3511000
direct allocation
page read and write
401000
unkown
page execute read
6BD80000
unkown
page readonly
C19000
heap
page read and write
400000
unkown
page readonly
A9C000
direct allocation
page read and write
C0D000
heap
page read and write
C24000
heap
page read and write
23BA000
direct allocation
page read and write
3060000
heap
page read and write
C24000
heap
page read and write
5C1A000
heap
page read and write
D10000
heap
page read and write
78EC000
stack
page read and write
61E8A000
unkown
page read and write
6D288000
unkown
page write copy
6D4B2000
unkown
page read and write
45DF000
stack
page read and write
8CA000
unkown
page read and write
39F0000
heap
page read and write
30B4000
direct allocation
page read and write
5C04000
heap
page read and write
796D000
stack
page read and write
2DC6000
direct allocation
page read and write
296C000
heap
page read and write
3063000
heap
page read and write
E07000
heap
page read and write
615D000
stack
page read and write
937000
unkown
page read and write
400000
unkown
page readonly
2CC0000
direct allocation
page read and write
3AF0000
trusted library allocation
page read and write
C04000
heap
page read and write
611C000
stack
page read and write
2F56000
direct allocation
page read and write
271C000
heap
page read and write
C24000
heap
page read and write
24EF000
direct allocation
page read and write
5C51000
heap
page read and write
BC1000
direct allocation
page read and write
26B3000
heap
page read and write
C15000
heap
page read and write
2369000
direct allocation
page read and write
BF0000
heap
page read and write
6FC0000
remote allocation
page read and write
5BD0000
heap
page read and write
C2C000
heap
page read and write
256D000
direct allocation
page read and write
39F7000
heap
page read and write
61E89000
unkown
page write copy
26EB000
heap
page read and write
BC5000
heap
page read and write
3429000
direct allocation
page read and write
C24000
heap
page read and write
937000
unkown
page read and write
6C310000
unkown
page readonly
3B17000
heap
page read and write
3AAF000
stack
page read and write
7A2000
heap
page read and write
846000
heap
page read and write
7BD000
heap
page read and write
2CD0000
trusted library allocation
page read and write
791000
heap
page read and write
B0E000
stack
page read and write
7AD000
heap
page read and write
C24000
heap
page read and write
314B000
direct allocation
page read and write
6C3AB000
unkown
page read and write
8E0000
unkown
page read and write
8DE000
unkown
page read and write
6D0000
unkown
page read and write
E27000
heap
page read and write
C24000
heap
page read and write
ADC000
direct allocation
page read and write
C00000
heap
page read and write
B19000
direct allocation
page read and write
A05000
direct allocation
page read and write
7C4000
heap
page read and write
2D5E000
direct allocation
page read and write
6DF000
unkown
page readonly
C24000
heap
page read and write
C24000
heap
page read and write
2DB0000
direct allocation
page read and write
3429000
direct allocation
page read and write
D19000
heap
page read and write
C24000
heap
page read and write
356C000
direct allocation
page read and write
6C11A000
unkown
page execute read
C24000
heap
page read and write
351F000
direct allocation
page read and write
23C1000
direct allocation
page read and write
5C27000
heap
page read and write
C24000
heap
page read and write
2EED000
direct allocation
page read and write
232F000
direct allocation
page read and write
251A000
direct allocation
page read and write
34A4000
direct allocation
page read and write
A47000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
3431000
direct allocation
page read and write
5B9A000
heap
page read and write
3119000
direct allocation
page read and write
25D4000
direct allocation
page read and write
C24000
heap
page read and write
4B7000
unkown
page read and write
6FC50000
unkown
page readonly
4811000
heap
page read and write
C24000
heap
page read and write
AB4000
direct allocation
page read and write
2A10000
heap
page read and write
26B0000
heap
page read and write
3020000
heap
page read and write
5C45000
heap
page read and write
7001000
unkown
page execute and read and write
C24000
heap
page read and write
C24000
heap
page read and write
435C000
direct allocation
page read and write
3009000
direct allocation
page read and write
BA0000
heap
page read and write
4C6000
unkown
page readonly
6C941000
unkown
page write copy
2541000
direct allocation
page read and write
5B71000
heap
page read and write
34A8000
direct allocation
page read and write
FBF000
stack
page read and write
5C04000
heap
page read and write
C24000
heap
page read and write
26CE000
stack
page read and write
25EA000
direct allocation
page read and write
349E000
stack
page read and write
C24000
heap
page read and write
233E000
direct allocation
page read and write
C24000
heap
page read and write
25E3000
direct allocation
page read and write
AD4000
direct allocation
page read and write
2E10000
direct allocation
page read and write
5C4C000
heap
page read and write
B62000
direct allocation
page read and write
300B000
direct allocation
page read and write
42FE000
direct allocation
page read and write
7088000
unkown
page read and write
923000
unkown
page read and write
34B8000
direct allocation
page read and write
439E000
direct allocation
page read and write
6605000
stack
page read and write
61E8A000
unkown
page read and write
C24000
heap
page read and write
42A6000
direct allocation
page read and write
5BB9000
heap
page read and write
4378000
direct allocation
page read and write
807000
heap
page read and write
C24000
heap
page read and write
C05000
heap
page read and write
34AC000
direct allocation
page read and write
2321000
direct allocation
page read and write
942000
unkown
page readonly
6C670000
unkown
page readonly
95000
stack
page read and write
34DE000
direct allocation
page read and write
C24000
heap
page read and write
61E8B000
unkown
page readonly
7FE00000
direct allocation
page read and write
C24000
heap
page read and write
A4F000
stack
page read and write
34E6000
direct allocation
page read and write
34E6000
direct allocation
page read and write
34B6000
direct allocation
page read and write
4362000
direct allocation
page read and write
4294000
direct allocation
page read and write
3402000
direct allocation
page read and write
2AB0000
direct allocation
page read and write
34EC000
direct allocation
page read and write
C24000
heap
page read and write
66E000
stack
page read and write
4892000
heap
page read and write
2917000
heap
page read and write
8BB000
unkown
page read and write
34B0000
direct allocation
page read and write
C24000
heap
page read and write
4734000
direct allocation
page read and write
B20000
direct allocation
page read and write
C24000
heap
page read and write
34B4000
direct allocation
page read and write
43BD000
direct allocation
page read and write
281F000
stack
page read and write
2F1C000
direct allocation
page read and write
297F000
heap
page read and write
42A4000
direct allocation
page read and write
3B20000
heap
page read and write
3077000
direct allocation
page read and write
7B8000
heap
page read and write
34E2000
direct allocation
page read and write
349C000
direct allocation
page read and write
429E000
direct allocation
page read and write
60DF000
stack
page read and write
6D0000
unkown
page read and write
3210000
heap
page read and write
5BA8000
heap
page read and write
5BA0000
heap
page read and write
2395000
direct allocation
page read and write
4C2000
unkown
page write copy
2E9E000
stack
page read and write
E03000
heap
page read and write
5BD1000
heap
page read and write
5B70000
heap
page read and write
793000
heap
page read and write
39F1000
heap
page read and write
3096000
direct allocation
page read and write
348C000
direct allocation
page read and write
30C2000
direct allocation
page read and write
107E000
stack
page read and write
6C3AC000
unkown
page readonly
3438000
direct allocation
page read and write
7C1000
heap
page read and write
7AE000
stack
page read and write
238E000
direct allocation
page read and write
5C49000
heap
page read and write
30C9000
direct allocation
page read and write
8C3000
unkown
page read and write
3115000
direct allocation
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
2F32000
direct allocation
page read and write
3494000
direct allocation
page read and write
2B70000
heap
page read and write
79D000
heap
page read and write
42EE000
direct allocation
page read and write
7064000
unkown
page execute and read and write
6C8E2000
unkown
page readonly
34F2000
direct allocation
page read and write
33F6000
direct allocation
page read and write
5BDE000
heap
page read and write
2528000
direct allocation
page read and write
C23000
heap
page read and write
24C0000
direct allocation
page read and write
3598000
direct allocation
page read and write
24C8000
direct allocation
page read and write
9C1000
direct allocation
page read and write
2F82000
direct allocation
page read and write
BDE000
stack
page read and write
C24000
heap
page read and write
BC8000
direct allocation
page read and write
C24000
heap
page read and write
C19000
heap
page read and write
36DF000
stack
page read and write
4298000
direct allocation
page read and write
There are 1138 hidden memdumps, click here to show them.