IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\EBGDAAKJJD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFIEGCAECGCAEBFHDHIE
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\FIJECAEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IDHIDBAEGIIIDHJKEGDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJKFCFHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\JDHJKKFBAEGDGDGCBKEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKFHIIEHIEGDHJJJKFIIIIDGID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJEHCGDBFCBAKECBKKEBKEBFCA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\30e89fff-668c-4214-acf7-132f1426e2ae.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4eed8ea2-d17e-4d91-9d2e-901dcea053d9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\58a8b97a-0c72-4138-b547-7916e16022c2.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8891fdfd-eb28-4ba8-a708-ad2299871ea9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-674A960A-15A4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37996.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF385ac.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF385bb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b3309569-4258-4903-866d-02c733cde60a.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 30 03:35:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 30 03:35:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 30 03:35:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 30 03:35:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 30 03:35:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 103
Unicode text, UTF-8 text, with very long lines (766)
downloaded
Chrome Cache Entry: 104
ASCII text
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (65531)
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 --field-trial-handle=2156,i,8393790621749056733,7974252991863149852,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2228,i,1120198258231087020,15420474062858251713,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2196,i,8473927376584108934,11490923910240063118,262144 /prefetch:3
malicious
C:\Users\user\Documents\EBGDAAKJJD.exe
"C:\Users\user\Documents\EBGDAAKJJD.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\EBGDAAKJJD.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.206/nz
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.206/c4becf79229cb002.phpDR
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/c4becf79229cb002.phpp
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phps
unknown
http://185.215.113.206/c4becf79229cb002.phpx
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php3104b87b6aafced5548c82a0454c-release
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.68
http://185.215.113.43/Zu7JuNko/index.php.P
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll/3v
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllqIK
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/pz
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.68
http://185.215.113.206DHJming
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dlloI9
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.43/1
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.68
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://185.215.113.206/c4becf79229cb002.php=
unknown
http://185.215.113.43/Zu7JuNko/index.phpx
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.43/Zu7JuNko/index.php~
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dllY
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
http://185.215.113.43/Zu7JuNko/index.phpm
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.43/Zu7JuNko/index.phpl
unknown
http://185.215.113.206/c4becf79229cb002.phpU
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll7I
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4A80000
direct allocation
page read and write
malicious
E51000
unkown
page execute and read and write
malicious
E51000
unkown
page execute and read and write
malicious
4C00000
direct allocation
page read and write
malicious
66E000
heap
page read and write
malicious
5280000
direct allocation
page read and write
malicious
E51000
unkown
page execute and read and write
malicious
4F30000
direct allocation
page read and write
malicious
5640000
direct allocation
page read and write
malicious
7B1000
unkown
page execute and read and write
malicious
411000
unkown
page execute and read and write
malicious
3D6E000
stack
page read and write
660000
heap
page read and write
6C4D1000
unkown
page execute read
493E000
stack
page read and write
1650000
direct allocation
page read and write
EBE000
heap
page read and write
232B0000
heap
page read and write
F1D000
heap
page read and write
4771000
heap
page read and write
32AE000
stack
page read and write
1300000
unkown
page execute and write copy
4760000
direct allocation
page read and write
4E01000
heap
page read and write
148E000
stack
page read and write
2E3F000
stack
page read and write
F0B000
heap
page read and write
650000
direct allocation
page read and write
18DB000
heap
page read and write
650000
direct allocation
page read and write
3310000
direct allocation
page read and write
2D3E000
stack
page read and write
702000
heap
page read and write
151D000
heap
page read and write
3327000
heap
page read and write
4C20000
direct allocation
page execute and read and write
1D0F0000
heap
page read and write
EB9000
unkown
page write copy
1CB8E000
stack
page read and write
5790000
direct allocation
page execute and read and write
1544000
heap
page read and write
1CDCF000
stack
page read and write
1D0D8000
heap
page read and write
1D107000
heap
page read and write
4601000
heap
page read and write
4E01000
heap
page read and write
1D0FE000
heap
page read and write
356F000
stack
page read and write
4601000
heap
page read and write
F48000
heap
page read and write
5480000
direct allocation
page execute and read and write
F2D000
heap
page read and write
604000
heap
page read and write
E3D000
stack
page read and write
834000
unkown
page execute and read and write
B84000
heap
page read and write
41AE000
stack
page read and write
4601000
heap
page read and write
1520000
direct allocation
page read and write
4601000
heap
page read and write
1CA4E000
stack
page read and write
4771000
heap
page read and write
53D0000
direct allocation
page execute and read and write
1544000
heap
page read and write
3310000
direct allocation
page read and write
70F000
heap
page read and write
E40000
heap
page read and write
9FA000
unkown
page read and write
1544000
heap
page read and write
5640000
direct allocation
page read and write
3E6E000
stack
page read and write
3310000
direct allocation
page read and write
4771000
heap
page read and write
604000
heap
page read and write
4771000
heap
page read and write
397F000
stack
page read and write
4601000
heap
page read and write
3BEE000
stack
page read and write
4E01000
heap
page read and write
2ABE000
stack
page read and write
1CC8F000
stack
page read and write
4771000
heap
page read and write
1D107000
heap
page read and write
4BBF000
stack
page read and write
B84000
heap
page read and write
1D0EC000
heap
page read and write
4771000
heap
page read and write
581F000
stack
page read and write
604000
heap
page read and write
650000
direct allocation
page read and write
235AC000
heap
page read and write
36EF000
stack
page read and write
E51000
unkown
page execute and write copy
1D0EE000
heap
page read and write
4601000
heap
page read and write
1D0EA000
heap
page read and write
4771000
heap
page read and write
367E000
stack
page read and write
4771000
heap
page read and write
410000
unkown
page readonly
4E01000
heap
page read and write
23157000
heap
page read and write
4601000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4760000
direct allocation
page read and write
3320000
heap
page read and write
1D0D7000
heap
page read and write
45AF000
stack
page read and write
63DF000
stack
page read and write
12FE000
unkown
page execute and read and write
1660000
heap
page read and write
4E01000
heap
page read and write
5C1E000
stack
page read and write
30FE000
stack
page read and write
4D80000
direct allocation
page execute and read and write
4771000
heap
page read and write
F48000
heap
page read and write
1D109000
heap
page read and write
EB0000
heap
page read and write
4E01000
heap
page read and write
4771000
heap
page read and write
1164000
unkown
page execute and write copy
57C0000
direct allocation
page execute and read and write
B50000
heap
page read and write
4BAE000
stack
page read and write
4E01000
heap
page read and write
2EE7000
heap
page read and write
6A0E000
stack
page read and write
4601000
heap
page read and write
629F000
stack
page read and write
4E01000
heap
page read and write
2E7F000
stack
page read and write
4771000
heap
page read and write
4E10000
direct allocation
page execute and read and write
9D0000
heap
page read and write
2EBE000
stack
page read and write
6C7000
heap
page read and write
650000
direct allocation
page read and write
30AF000
stack
page read and write
1D0ED000
heap
page read and write
4E01000
heap
page read and write
35FE000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
2820000
direct allocation
page read and write
34AE000
stack
page read and write
456E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
283B000
heap
page read and write
232D2000
heap
page read and write
3A2E000
stack
page read and write
232E8000
heap
page read and write
5470000
direct allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
14E0000
heap
page read and write
3C7F000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
4601000
heap
page read and write
1540000
heap
page read and write
3D2F000
stack
page read and write
4601000
heap
page read and write
1544000
heap
page read and write
4E01000
heap
page read and write
EB2000
unkown
page execute and read and write
50B0000
direct allocation
page execute and read and write
4CEE000
stack
page read and write
17B0000
heap
page read and write
61EB4000
direct allocation
page read and write
4E01000
heap
page read and write
604000
heap
page read and write
14D0000
direct allocation
page read and write
95B000
stack
page read and write
5850000
direct allocation
page execute and read and write
E90000
heap
page read and write
1D0FE000
heap
page read and write
4601000
heap
page read and write
1D0000
heap
page read and write
4E00000
heap
page read and write
EE4000
heap
page read and write
4771000
heap
page read and write
7E7000
unkown
page execute and read and write
61ED0000
direct allocation
page read and write
4E01000
heap
page read and write
1D0D5000
heap
page read and write
4E01000
heap
page read and write
604000
heap
page read and write
232E5000
heap
page read and write
2FAE000
stack
page read and write
17B7000
heap
page read and write
45FF000
stack
page read and write
57C0000
direct allocation
page execute and read and write
3C2E000
stack
page read and write
2A23C000
stack
page read and write
1D0EA000
heap
page read and write
1700000
heap
page read and write
4C30000
direct allocation
page execute and read and write
595F000
stack
page read and write
12FE000
unkown
page execute and read and write
39FF000
stack
page read and write
E4E000
stack
page read and write
1D0F1000
heap
page read and write
4E01000
heap
page read and write
1D0EA000
heap
page read and write
1D10C000
heap
page read and write
1D0EA000
heap
page read and write
235A4000
heap
page read and write
72A9000
heap
page read and write
F33000
heap
page read and write
14CE000
stack
page read and write
6156000
heap
page read and write
3D7E000
stack
page read and write
4BB0000
trusted library allocation
page read and write
18EB000
heap
page read and write
604000
heap
page read and write
1CF5E000
stack
page read and write
436E000
stack
page read and write
3310000
direct allocation
page read and write
4760000
direct allocation
page read and write
4601000
heap
page read and write
2A2E000
heap
page read and write
47B000
unkown
page execute and read and write
3CAE000
stack
page read and write
4771000
heap
page read and write
1D0FE000
heap
page read and write
4F04000
heap
page read and write
1D0F4000
heap
page read and write
1544000
heap
page read and write
4A7E000
stack
page read and write
38AF000
stack
page read and write
1CF1D000
stack
page read and write
F3E000
stack
page read and write
23290000
heap
page read and write
57C0000
direct allocation
page execute and read and write
1544000
heap
page read and write
8BCC000
stack
page read and write
4771000
heap
page read and write
F1E000
heap
page read and write
3F6F000
stack
page read and write
4CFE000
stack
page read and write
5860000
direct allocation
page execute and read and write
346E000
stack
page read and write
114C000
unkown
page execute and read and write
1CCCE000
stack
page read and write
479000
unkown
page write copy
4E01000
heap
page read and write
4FB000
stack
page read and write
4771000
heap
page read and write
4610000
heap
page read and write
23359000
heap
page read and write
2A7F000
stack
page read and write
690E000
stack
page read and write
4E01000
heap
page read and write
3DFE000
stack
page read and write
232D6000
heap
page read and write
4760000
direct allocation
page read and write
52B0000
trusted library allocation
page read and write
577F000
stack
page read and write
5430000
direct allocation
page execute and read and write
4771000
heap
page read and write
4BBE000
stack
page read and write
4771000
heap
page read and write
14D0000
direct allocation
page read and write
3F2E000
stack
page read and write
1155000
unkown
page execute and read and write
1D0F1000
heap
page read and write
1D0D7000
heap
page read and write
6C4D0000
unkown
page readonly
31EF000
stack
page read and write
46BE000
stack
page read and write
7B0000
unkown
page readonly
EBB000
unkown
page execute and read and write
35AF000
stack
page read and write
17B5000
heap
page read and write
323E000
stack
page read and write
3D2E000
stack
page read and write
61EB7000
direct allocation
page readonly
604000
heap
page read and write
1D0E9000
heap
page read and write
17B7000
heap
page read and write
37AE000
stack
page read and write
432F000
stack
page read and write
443E000
stack
page read and write
1D0E3000
heap
page read and write
4AB1000
heap
page read and write
47ED000
stack
page read and write
1CA0F000
stack
page read and write
33BF000
stack
page read and write
C85000
unkown
page execute and read and write
6C54D000
unkown
page readonly
650000
direct allocation
page read and write
61ED3000
direct allocation
page read and write
3E2F000
stack
page read and write
50B0000
direct allocation
page execute and read and write
1D0FE000
heap
page read and write
604000
heap
page read and write
1D0DE000
heap
page read and write
1500000
heap
page read and write
4771000
heap
page read and write
50A0000
direct allocation
page execute and read and write
1544000
heap
page read and write
1D0F1000
heap
page read and write
5410000
direct allocation
page execute and read and write
235AC000
heap
page read and write
51B1000
heap
page read and write
4771000
heap
page read and write
4760000
direct allocation
page read and write
4760000
direct allocation
page read and write
3310000
direct allocation
page read and write
144C000
stack
page read and write
4601000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
4CBF000
stack
page read and write
F20000
heap
page read and write
3E7F000
stack
page read and write
604000
heap
page read and write
111F000
unkown
page execute and read and write
1D10C000
heap
page read and write
486E000
stack
page read and write
4620000
heap
page read and write
4C00000
direct allocation
page execute and read and write
6140000
heap
page read and write
3BEF000
stack
page read and write
1544000
heap
page read and write
4771000
heap
page read and write
E50000
unkown
page readonly
4E01000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
F33000
heap
page read and write
1D0F5000
heap
page read and write
4DFF000
stack
page read and write
E60000
heap
page read and write
7B0000
unkown
page read and write
4601000
heap
page read and write
1520000
direct allocation
page read and write
1544000
heap
page read and write
4601000
heap
page read and write
4C00000
direct allocation
page read and write
4771000
heap
page read and write
462E000
stack
page read and write
4E01000
heap
page read and write
2F6F000
stack
page read and write
4601000
heap
page read and write
4760000
direct allocation
page read and write
472000
unkown
page execute and read and write
4771000
heap
page read and write
176E000
stack
page read and write
1544000
heap
page read and write
53F0000
direct allocation
page execute and read and write
EBE000
heap
page read and write
396E000
stack
page read and write
EA6000
heap
page read and write
4601000
heap
page read and write
103E000
stack
page read and write
EB9000
unkown
page write copy
1D05D000
stack
page read and write
4E01000
heap
page read and write
452F000
stack
page read and write
6155000
heap
page read and write
4771000
heap
page read and write
43EF000
stack
page read and write
14D0000
direct allocation
page read and write
604000
heap
page read and write
4E01000
heap
page read and write
472F000
stack
page read and write
4F6E000
stack
page read and write
342F000
stack
page read and write
5FD000
unkown
page execute and read and write
4601000
heap
page read and write
669B000
stack
page read and write
382E000
stack
page read and write
3FAE000
stack
page read and write
4E01000
heap
page read and write
1D10C000
heap
page read and write
1163000
unkown
page execute and write copy
332E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
6C74F000
unkown
page write copy
1D0FE000
heap
page read and write
417F000
stack
page read and write
4601000
heap
page read and write
4D60000
direct allocation
page execute and read and write
1517000
heap
page read and write
714000
heap
page read and write
44AF000
stack
page read and write
232DC000
heap
page read and write
B84000
heap
page read and write
386E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
32BE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4600000
heap
page read and write
604000
heap
page read and write
5080000
direct allocation
page execute and read and write
4E01000
heap
page read and write
436F000
stack
page read and write
721000
heap
page read and write
70C000
unkown
page execute and read and write
51B1000
heap
page read and write
3310000
direct allocation
page read and write
57F0000
direct allocation
page execute and read and write
1D10C000
heap
page read and write
1D0EA000
heap
page read and write
403F000
stack
page read and write
4E01000
heap
page read and write
16BD000
heap
page read and write
1D0FE000
heap
page read and write
B84000
heap
page read and write
3AAE000
stack
page read and write
4E01000
heap
page read and write
23331000
heap
page read and write
283E000
heap
page read and write
4E01000
heap
page read and write
453E000
stack
page read and write
103D000
unkown
page execute and read and write
B84000
heap
page read and write
2E2F000
stack
page read and write
36AF000
stack
page read and write
4E01000
heap
page read and write
1544000
heap
page read and write
4771000
heap
page read and write
43BE000
stack
page read and write
5640000
direct allocation
page read and write
3D3E000
stack
page read and write
604000
heap
page read and write
1D10C000
heap
page read and write
1D0E3000
heap
page read and write
E5E000
stack
page read and write
B84000
heap
page read and write
EBB000
unkown
page execute and read and write
39EF000
stack
page read and write
299B000
stack
page read and write
1163000
unkown
page execute and read and write
105E000
stack
page read and write
1520000
direct allocation
page read and write
4601000
heap
page read and write
1D0CB000
heap
page read and write
352F000
stack
page read and write
1544000
heap
page read and write
35BF000
stack
page read and write
293F000
stack
page read and write
5C5D000
stack
page read and write
6C74E000
unkown
page read and write
1D10C000
heap
page read and write
48FF000
stack
page read and write
4601000
heap
page read and write
4771000
heap
page read and write
1D0E9000
heap
page read and write
4E01000
heap
page read and write
1D0DE000
heap
page read and write
1544000
heap
page read and write
426E000
stack
page read and write
4601000
heap
page read and write
53F0000
direct allocation
page execute and read and write
14D0000
direct allocation
page read and write
4DE0000
direct allocation
page execute and read and write
3C6F000
stack
page read and write
4E01000
heap
page read and write
4771000
heap
page read and write
723000
unkown
page execute and write copy
604000
heap
page read and write
604000
heap
page read and write
C58000
unkown
page execute and read and write
4601000
heap
page read and write
114C000
unkown
page execute and read and write
6C570000
unkown
page readonly
4771000
heap
page read and write
17A0000
heap
page read and write
4E01000
heap
page read and write
62DE000
stack
page read and write
E50000
unkown
page read and write
2E7E000
stack
page read and write
EFD000
heap
page read and write
604000
heap
page read and write
4601000
heap
page read and write
3310000
direct allocation
page read and write
4B7F000
stack
page read and write
2A1E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
3FBF000
stack
page read and write
6E0000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
42AF000
stack
page read and write
F0C000
heap
page read and write
4E01000
heap
page read and write
1300000
unkown
page execute and write copy
3A6F000
stack
page read and write
353E000
stack
page read and write
23290000
trusted library allocation
page read and write
2EE0000
heap
page read and write
16A7000
heap
page read and write
14D0000
direct allocation
page read and write
5840000
direct allocation
page execute and read and write
604000
heap
page read and write
604000
heap
page read and write
1D0DE000
heap
page read and write
4E01000
heap
page read and write
3EBE000
stack
page read and write
4771000
heap
page read and write
4E01000
heap
page read and write
5810000
direct allocation
page execute and read and write
1D0ED000
heap
page read and write
652E000
heap
page read and write
57A0000
direct allocation
page execute and read and write
650000
direct allocation
page read and write
1D10C000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
9E0000
heap
page read and write
3310000
direct allocation
page read and write
1163000
unkown
page execute and read and write
373E000
stack
page read and write
2340E000
stack
page read and write
5110000
direct allocation
page execute and read and write
1544000
heap
page read and write
EBB000
unkown
page execute and read and write
4771000
heap
page read and write
5440000
direct allocation
page execute and read and write
4771000
heap
page read and write
1520000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
650000
direct allocation
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
4616000
heap
page read and write
B84000
heap
page read and write
723000
unkown
page execute and read and write
4771000
heap
page read and write
4601000
heap
page read and write
619E000
stack
page read and write
1ACF000
stack
page read and write
4771000
heap
page read and write
1544000
heap
page read and write
1D104000
heap
page read and write
4F2000
stack
page read and write
4E20000
direct allocation
page execute and read and write
457E000
stack
page read and write
1D107000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
2E6E000
stack
page read and write
4E01000
heap
page read and write
1544000
heap
page read and write
9E8000
unkown
page execute and read and write
231F3000
heap
page read and write
4601000
heap
page read and write
EB9000
unkown
page write copy
1510000
heap
page read and write
4E01000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4E01000
heap
page read and write
604000
heap
page read and write
B83000
unkown
page execute and read and write
4771000
heap
page read and write
4E01000
heap
page read and write
6C55E000
unkown
page read and write
2350F000
stack
page read and write
45EF000
stack
page read and write
EB9000
unkown
page write copy
4870000
trusted library allocation
page read and write
332F000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
1D0E6000
heap
page read and write
2820000
direct allocation
page read and write
392F000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4601000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
30EE000
stack
page read and write
185E000
stack
page read and write
CFA000
stack
page read and write
4E01000
heap
page read and write
EB9000
unkown
page write copy
232EE000
heap
page read and write
45EE000
stack
page read and write
4771000
heap
page read and write
1D104000
heap
page read and write
71B000
heap
page read and write
342F000
stack
page read and write
4E01000
heap
page read and write
3ABF000
stack
page read and write
604000
heap
page read and write
4601000
heap
page read and write
1D0FE000
heap
page read and write
3EEF000
stack
page read and write
14D0000
direct allocation
page read and write
F1D000
heap
page read and write
C9D000
unkown
page execute and write copy
70A000
heap
page read and write
17B7000
heap
page read and write
3BAF000
stack
page read and write
4771000
heap
page read and write
55DE000
stack
page read and write
4E01000
heap
page read and write
4771000
heap
page read and write
31EF000
stack
page read and write
40EF000
stack
page read and write
406E000
stack
page read and write
4601000
heap
page read and write
B84000
heap
page read and write
1C90E000
stack
page read and write
3EFF000
stack
page read and write
4F2F000
stack
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
3FFE000
stack
page read and write
CAE000
stack
page read and write
327F000
stack
page read and write
1544000
heap
page read and write
410000
unkown
page read and write
1D0E9000
heap
page read and write
14D0000
direct allocation
page read and write
1544000
heap
page read and write
4771000
heap
page read and write
2837000
heap
page read and write
650000
direct allocation
page read and write
C9C000
unkown
page execute and write copy
E6E000
heap
page read and write
1520000
direct allocation
page read and write
4601000
heap
page read and write
1D10C000
heap
page read and write
366E000
stack
page read and write
559B000
stack
page read and write
111F000
unkown
page execute and read and write
1D10C000
heap
page read and write
1D0D7000
heap
page read and write
111F000
unkown
page execute and read and write
5090000
direct allocation
page execute and read and write
1D0C2000
heap
page read and write
3AEE000
stack
page read and write
4771000
heap
page read and write
4A2F000
stack
page read and write
604000
heap
page read and write
43AE000
stack
page read and write
4E01000
heap
page read and write
4771000
heap
page read and write
12FE000
unkown
page execute and read and write
715000
unkown
page execute and read and write
32EE000
stack
page read and write
333F000
stack
page read and write
1544000
heap
page read and write
1D0FE000
heap
page read and write
40AF000
stack
page read and write
57C0000
direct allocation
page execute and read and write
44FE000
stack
page read and write
23510000
trusted library allocation
page read and write
14D0000
direct allocation
page read and write
604000
heap
page read and write
4F00000
heap
page read and write
F48000
heap
page read and write
4771000
heap
page read and write
46AE000
stack
page read and write
1544000
heap
page read and write
1D10C000
heap
page read and write
4D50000
direct allocation
page execute and read and write
51B1000
heap
page read and write
1D0E3000
heap
page read and write
1544000
heap
page read and write
51AF000
stack
page read and write
423F000
stack
page read and write
5B1D000
stack
page read and write
44BF000
stack
page read and write
EC0000
heap
page read and write
4770000
heap
page read and write
47FE000
stack
page read and write
2FEF000
stack
page read and write
4771000
heap
page read and write
46EF000
stack
page read and write
4771000
heap
page read and write
1544000
heap
page read and write
1D0FE000
heap
page read and write
724000
unkown
page execute and write copy
E33000
unkown
page execute and write copy
B84000
heap
page read and write
1544000
heap
page read and write
9C0000
heap
page read and write
4E01000
heap
page read and write
1D0F4000
heap
page read and write
61E01000
direct allocation
page execute read
53C0000
direct allocation
page execute and read and write
4730000
heap
page read and write
7B1000
unkown
page execute and write copy
39BE000
stack
page read and write
4771000
heap
page read and write
362F000
stack
page read and write
14D0000
direct allocation
page read and write
6C70F000
unkown
page readonly
5F0000
heap
page read and write
4771000
heap
page read and write
3CBE000
stack
page read and write
2D2F000
stack
page read and write
1520000
direct allocation
page read and write
32EF000
stack
page read and write
49AE000
stack
page read and write
604000
heap
page read and write
139C000
stack
page read and write
4F00000
trusted library allocation
page read and write
40FF000
stack
page read and write
4771000
heap
page read and write
103D000
unkown
page execute and read and write
416F000
stack
page read and write
604000
heap
page read and write
53F0000
direct allocation
page execute and read and write
506F000
stack
page read and write
1C0000
heap
page read and write
B84000
heap
page read and write
40EE000
stack
page read and write
2FBE000
stack
page read and write
F1D000
heap
page read and write
5D5C000
stack
page read and write
3CEF000
stack
page read and write
1544000
heap
page read and write
18CE000
stack
page read and write
B84000
heap
page read and write
1520000
direct allocation
page read and write
1D106000
heap
page read and write
4771000
heap
page read and write
1544000
heap
page read and write
387E000
stack
page read and write
4771000
heap
page read and write
47AF000
stack
page read and write
4771000
heap
page read and write
479000
unkown
page write copy
1544000
heap
page read and write
B90000
heap
page read and write
4C10000
direct allocation
page execute and read and write
2B2F000
stack
page read and write
4601000
heap
page read and write
1544000
heap
page read and write
C8D000
unkown
page execute and read and write
E51000
unkown
page execute and write copy
4771000
heap
page read and write
604000
heap
page read and write
413E000
stack
page read and write
9E5000
heap
page read and write
604000
heap
page read and write
4AB1000
heap
page read and write
4C00000
direct allocation
page read and write
4F30000
direct allocation
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4771000
heap
page read and write
232D1000
heap
page read and write
604000
heap
page read and write
1544000
heap
page read and write
1D0EA000
heap
page read and write
EDC000
heap
page read and write
2A20000
heap
page read and write
4601000
heap
page read and write
3DBF000
stack
page read and write
6150000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4E01000
heap
page read and write
57C0000
direct allocation
page execute and read and write
50E0000
direct allocation
page execute and read and write
1D0D7000
heap
page read and write
EB2000
unkown
page execute and read and write
59CE000
stack
page read and write
4E01000
heap
page read and write
1650000
direct allocation
page read and write
4E01000
heap
page read and write
6C562000
unkown
page readonly
4771000
heap
page read and write
4E01000
heap
page read and write
30BF000
stack
page read and write
1D106000
heap
page read and write
4D80000
direct allocation
page execute and read and write
3B6E000
stack
page read and write
4771000
heap
page read and write
4E01000
heap
page read and write
14EE000
heap
page read and write
1300000
unkown
page execute and write copy
4760000
direct allocation
page read and write
650000
direct allocation
page read and write
1D10C000
heap
page read and write
4771000
heap
page read and write
4760000
direct allocation
page read and write
14D0000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
1D0CD000
heap
page read and write
38FE000
stack
page read and write
F30000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
363F000
stack
page read and write
1D0FE000
heap
page read and write
48EF000
stack
page read and write
4740000
heap
page read and write
5120000
direct allocation
page execute and read and write
4601000
heap
page read and write
114C000
unkown
page execute and read and write
604000
heap
page read and write
604000
heap
page read and write
6520000
heap
page read and write
36EE000
stack
page read and write
446F000
stack
page read and write
1544000
heap
page read and write
1D0EC000
heap
page read and write
4601000
heap
page read and write
1D0FE000
heap
page read and write
396F000
stack
page read and write
1520000
direct allocation
page read and write
4771000
heap
page read and write
3310000
direct allocation
page read and write
4E01000
heap
page read and write
1155000
unkown
page execute and read and write
412E000
stack
page read and write
4E01000
heap
page read and write
3310000
direct allocation
page read and write
4CAF000
stack
page read and write
3AFE000
stack
page read and write
4E01000
heap
page read and write
32F0000
heap
page read and write
4771000
heap
page read and write
4AAF000
stack
page read and write
115E000
stack
page read and write
4771000
heap
page read and write
F1D000
heap
page read and write
37BE000
stack
page read and write
14D0000
direct allocation
page read and write
53F0000
direct allocation
page execute and read and write
4601000
heap
page read and write
53FC000
stack
page read and write
15C000
stack
page read and write
14D0000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
4771000
heap
page read and write
4E01000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
5830000
direct allocation
page execute and read and write
1520000
direct allocation
page read and write
4A40000
trusted library allocation
page read and write
4771000
heap
page read and write
604000
heap
page read and write
604000
heap
page read and write
4E16000
heap
page read and write
1D0CE000
heap
page read and write
4AB6000
direct allocation
page read and write
4771000
heap
page read and write
1D107000
heap
page read and write
8CEA000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
29DE000
stack
page read and write
604000
heap
page read and write
3310000
direct allocation
page read and write
B2C000
stack
page read and write
3FEE000
stack
page read and write
650000
direct allocation
page read and write
1D0D7000
heap
page read and write
140D000
stack
page read and write
1D10C000
heap
page read and write
1164000
unkown
page execute and write copy
4601000
heap
page read and write
8CD1000
heap
page read and write
422E000
stack
page read and write
4A6E000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
411000
unkown
page execute and write copy
377F000
stack
page read and write
4771000
heap
page read and write
3F3E000
stack
page read and write
E1E000
stack
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
F32000
heap
page read and write
4C3E000
stack
page read and write
4601000
heap
page read and write
14D0000
direct allocation
page read and write
4E01000
heap
page read and write
14D0000
direct allocation
page read and write
4771000
heap
page read and write
1D10C000
heap
page read and write
2830000
heap
page read and write
2CFF000
stack
page read and write
2BBF000
stack
page read and write
4B6F000
stack
page read and write
4F91000
direct allocation
page read and write
1D10C000
heap
page read and write
4BD0000
heap
page read and write
337E000
stack
page read and write
6C755000
unkown
page readonly
1D0F1000
heap
page read and write
604000
heap
page read and write
4E01000
heap
page read and write
4601000
heap
page read and write
4DEF000
stack
page read and write
1544000
heap
page read and write
72A0000
heap
page read and write
232D4000
heap
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
4AB1000
heap
page read and write
347F000
stack
page read and write
346F000
stack
page read and write
36FF000
stack
page read and write
1D10C000
heap
page read and write
5800000
direct allocation
page execute and read and write
42EE000
stack
page read and write
8CD0000
heap
page read and write
B84000
heap
page read and write
4760000
direct allocation
page read and write
4601000
heap
page read and write
E32000
unkown
page execute and read and write
4E01000
heap
page read and write
1D0D7000
heap
page read and write
4771000
heap
page read and write
4E01000
heap
page read and write
23311000
heap
page read and write
604000
heap
page read and write
1520000
direct allocation
page read and write
C9C000
unkown
page execute and read and write
51B0000
heap
page read and write
57B0000
direct allocation
page execute and read and write
4771000
heap
page read and write
4C61000
direct allocation
page read and write
4E2E000
stack
page read and write
4771000
heap
page read and write
1D10C000
heap
page read and write
4601000
heap
page read and write
4771000
heap
page read and write
4E01000
heap
page read and write
39AE000
stack
page read and write
8C0000
unkown
page execute and write copy
650000
direct allocation
page read and write
4E01000
heap
page read and write
1D0FE000
heap
page read and write
600000
heap
page read and write
1D0FE000
heap
page read and write
1D0FE000
heap
page read and write
42FE000
stack
page read and write
1544000
heap
page read and write
1D10C000
heap
page read and write
232F1000
heap
page read and write
4771000
heap
page read and write
4601000
heap
page read and write
4A3F000
stack
page read and write
E50000
unkown
page read and write
336E000
stack
page read and write
1544000
heap
page read and write
437F000
stack
page read and write
61ECC000
direct allocation
page read and write
E50000
unkown
page read and write
4760000
direct allocation
page read and write
482F000
stack
page read and write
1D107000
heap
page read and write
4E01000
heap
page read and write
4AB1000
heap
page read and write
1D0C0000
heap
page read and write
650000
direct allocation
page read and write
2BFE000
stack
page read and write
3310000
direct allocation
page read and write
442E000
stack
page read and write
679C000
stack
page read and write
E50000
unkown
page readonly
1D1EC000
heap
page read and write
38EE000
stack
page read and write
5420000
direct allocation
page execute and read and write
4771000
heap
page read and write
1544000
heap
page read and write
1520000
direct allocation
page read and write
585E000
stack
page read and write
41BE000
stack
page read and write
16FD000
stack
page read and write
4E01000
heap
page read and write
303E000
stack
page read and write
467F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
ED7000
heap
page read and write
641E000
stack
page read and write
37EF000
stack
page read and write
4F6E000
stack
page read and write
4771000
heap
page read and write
F32000
heap
page read and write
4760000
direct allocation
page read and write
4771000
heap
page read and write
1D0EA000
heap
page read and write
4601000
heap
page read and write
235B4000
heap
page read and write
4771000
heap
page read and write
F32000
heap
page read and write
3310000
direct allocation
page read and write
3B3F000
stack
page read and write
B80000
heap
page read and write
1D108000
heap
page read and write
9FA000
unkown
page write copy
4BE0000
direct allocation
page execute and read and write
4771000
heap
page read and write
41EF000
stack
page read and write
3DEE000
stack
page read and write
4771000
heap
page read and write
23349000
heap
page read and write
164F000
stack
page read and write
322E000
stack
page read and write
5130000
direct allocation
page execute and read and write
E50000
unkown
page readonly
496F000
stack
page read and write
567E000
stack
page read and write
2A0F0000
heap
page read and write
1544000
heap
page read and write
1D0EA000
heap
page read and write
1544000
heap
page read and write
604000
heap
page read and write
1163000
unkown
page execute and read and write
604000
heap
page read and write
56A1000
direct allocation
page read and write
34FF000
stack
page read and write
4D3F000
stack
page read and write
1544000
heap
page read and write
57D0000
direct allocation
page execute and read and write
23390000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
4771000
heap
page read and write
1544000
heap
page read and write
BFE000
stack
page read and write
1D0FE000
heap
page read and write
472E000
stack
page read and write
61ED4000
direct allocation
page readonly
B84000
heap
page read and write
1544000
heap
page read and write
EFD000
heap
page read and write
DEE000
stack
page read and write
422F000
stack
page read and write
AFD000
stack
page read and write
1544000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
4771000
heap
page read and write
23290000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
57E0000
direct allocation
page execute and read and write
317C000
stack
page read and write
757000
heap
page read and write
1520000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
EB2000
unkown
page execute and read and write
4AB1000
heap
page read and write
57C0000
direct allocation
page execute and read and write
1D107000
heap
page read and write
4771000
heap
page read and write
1D10C000
heap
page read and write
1D10C000
heap
page read and write
5820000
direct allocation
page execute and read and write
42BF000
stack
page read and write
6AA0000
trusted library allocation
page read and write
4771000
heap
page read and write
4AB0000
heap
page read and write
4D80000
direct allocation
page execute and read and write
382F000
stack
page read and write
297B000
stack
page read and write
5240000
heap
page read and write
4E01000
heap
page read and write
4771000
heap
page read and write
4760000
direct allocation
page read and write
2A13C000
stack
page read and write
4771000
heap
page read and write
75A000
heap
page read and write
44EE000
stack
page read and write
1520000
direct allocation
page read and write
3EAE000
stack
page read and write
651F000
stack
page read and write
4771000
heap
page read and write
1155000
unkown
page execute and read and write
61E00000
direct allocation
page execute and read and write
4601000
heap
page read and write
1544000
heap
page read and write
1D0FE000
heap
page read and write
4771000
heap
page read and write
1CE1D000
stack
page read and write
1164000
unkown
page execute and write copy
2EC0000
heap
page read and write
1D0EA000
heap
page read and write
6530000
heap
page read and write
865000
unkown
page execute and read and write
402F000
stack
page read and write
372E000
stack
page read and write
7EC000
stack
page read and write
5460000
direct allocation
page execute and read and write
87C000
unkown
page execute and read and write
466F000
stack
page read and write
1D0FE000
heap
page read and write
1520000
direct allocation
page read and write
4F7000
stack
page read and write
166B000
heap
page read and write
34BE000
stack
page read and write
3310000
direct allocation
page read and write
B60000
heap
page read and write
79E000
stack
page read and write
3DAF000
stack
page read and write
DAF000
stack
page read and write
18D0000
heap
page read and write
1163000
unkown
page execute and write copy
4771000
heap
page read and write
4E20000
heap
page read and write
1CB4F000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3FAE000
stack
page read and write
4601000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
1D105000
heap
page read and write
1D0F4000
heap
page read and write
4E01000
heap
page read and write
604000
heap
page read and write
5150000
direct allocation
page execute and read and write
44AE000
stack
page read and write
604000
heap
page read and write
47BF000
stack
page read and write
3A3E000
stack
page read and write
31FF000
stack
page read and write
1163000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
4771000
heap
page read and write
3AAF000
stack
page read and write
3C3E000
stack
page read and write
506F000
stack
page read and write
3BFF000
stack
page read and write
E51000
unkown
page execute and write copy
6DF000
unkown
page execute and read and write
43FF000
stack
page read and write
383F000
stack
page read and write
8CCC000
stack
page read and write
4E01000
heap
page read and write
1D0D5000
heap
page read and write
4771000
heap
page read and write
407E000
stack
page read and write
3B2F000
stack
page read and write
4601000
heap
page read and write
1D0EA000
heap
page read and write
604000
heap
page read and write
F0C000
heap
page read and write
35EE000
stack
page read and write
52BC000
stack
page read and write
50AE000
stack
page read and write
35AE000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
376F000
stack
page read and write
492E000
stack
page read and write
6530000
heap
page read and write
917000
unkown
page execute and read and write
465D000
heap
page read and write
1544000
heap
page read and write
4771000
heap
page read and write
F25000
heap
page read and write
B84000
heap
page read and write
F2D000
heap
page read and write
4601000
heap
page read and write
1D10C000
heap
page read and write
2A240000
heap
page read and write
1D0FE000
heap
page read and write
295E000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
5400000
direct allocation
page execute and read and write
1D0F1000
heap
page read and write
9FC000
unkown
page execute and read and write
16D7000
heap
page read and write
E6A000
heap
page read and write
52E1000
direct allocation
page read and write
1D0EA000
heap
page read and write
313F000
stack
page read and write
604000
heap
page read and write
1D0EA000
heap
page read and write
F4A000
heap
page read and write
604000
heap
page read and write
2C2F000
stack
page read and write
EDD000
heap
page read and write
3B7E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4771000
heap
page read and write
140F000
stack
page read and write
6C571000
unkown
page execute read
B84000
heap
page read and write
604000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
30EF000
stack
page read and write
14EA000
heap
page read and write
F25000
heap
page read and write
2F7F000
stack
page read and write
1544000
heap
page read and write
4601000
heap
page read and write
4771000
heap
page read and write
23326000
heap
page read and write
571E000
stack
page read and write
4E01000
heap
page read and write
61ECD000
direct allocation
page readonly
53F0000
direct allocation
page execute and read and write
F52000
heap
page read and write
1D0E5000
heap
page read and write
EAB000
heap
page read and write
4771000
heap
page read and write
235B2000
heap
page read and write
66A000
heap
page read and write
53BF000
stack
page read and write
5490000
direct allocation
page execute and read and write
1D0CE000
heap
page read and write
4601000
heap
page read and write
1D0DE000
heap
page read and write
2820000
direct allocation
page read and write
281E000
stack
page read and write
3E6E000
stack
page read and write
6B2000
heap
page read and write
4E01000
heap
page read and write
1544000
heap
page read and write
1D0CD000
heap
page read and write
6C750000
unkown
page read and write
4771000
heap
page read and write
1770000
heap
page read and write
1D1E0000
trusted library allocation
page read and write
EBF000
heap
page read and write
4601000
heap
page read and write
103D000
unkown
page execute and read and write
4601000
heap
page read and write
2A27000
heap
page read and write
64E000
stack
page read and write
1D0F4000
heap
page read and write
1D0F1000
heap
page read and write
4771000
heap
page read and write
4ABC000
stack
page read and write
4E01000
heap
page read and write
427E000
stack
page read and write
6521000
heap
page read and write
4771000
heap
page read and write
650000
direct allocation
page read and write
1D0EB000
heap
page read and write
1D10C000
heap
page read and write
4F30000
direct allocation
page read and write
1D0F4000
heap
page read and write
EB9000
unkown
page write copy
650000
direct allocation
page read and write
5ACF000
stack
page read and write
4771000
heap
page read and write
56DF000
stack
page read and write
4771000
heap
page read and write
1D0F1000
heap
page read and write
8BE000
unkown
page execute and read and write
1544000
heap
page read and write
4771000
heap
page read and write
38BF000
stack
page read and write
33FE000
stack
page read and write
There are 1239 hidden memdumps, click here to show them.