IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1011212001\77d2de4f7b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1011213001\c3e4899de4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1011214001\74cb638a83.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\AEBKFIJEGC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFHDAKJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CAAAFCAKKKFBFIDGDBFHJJEHID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGCBAFCFIJJJECBGIIJKECAFID
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHCGDAFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHCGDAFCFHIDBGDHCFCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JDAFBKECAKFCAAAKJDAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKKEHJDHJKFIECAAKFIJ
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3d67ac99-8b22-456b-a848-5ab3b382621d.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\623bcd8f-0e07-4e0b-a1a8-18e746165c84.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\68e45932-3757-483c-8066-b56037094333.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8dd1176b-30be-40f4-b5a5-f81318f1cf22.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-674D55B2-1F04.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3b93f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3b94e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c3ce.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c3de.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e096eee1-09d5-42c3-847c-d77f4e4b8441.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 86
ASCII text, with very long lines (768)
downloaded
Chrome Cache Entry: 87
ASCII text
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (2802)
downloaded
Chrome Cache Entry: 91
SVG Scalable Vector Graphics image
downloaded
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2252,i,2575064197677187059,9976136192055710644,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2240,i,13998815529808110965,14487419510429948634,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2236,i,13329737199814142274,14700275200820245279,262144 /prefetch:3
malicious
C:\Users\user\Documents\AEBKFIJEGC.exe
"C:\Users\user\Documents\AEBKFIJEGC.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1011212001\77d2de4f7b.exe
"C:\Users\user\AppData\Local\Temp\1011212001\77d2de4f7b.exe"
malicious
C:\Users\user\AppData\Local\Temp\1011213001\c3e4899de4.exe
"C:\Users\user\AppData\Local\Temp\1011213001\c3e4899de4.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\AEBKFIJEGC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://92.63.197.221/add?substr=mixtwo&s=three&sub=
92.63.197.221
malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.16/steam/random.exep
unknown
http://185.215.113.16/steam/random.exexz
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.16/steam/random.exe1395d
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/steam/random.exen
unknown
http://185.215.113.43/Zu7JuNko/index.phpvx
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.16/steam/random.exem
unknown
http://185.215.113.43/Zu7JuNko/index.phpM
unknown
http://31.41.244.11/files/unique2/random.exe60
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://185.215.113.16/luma/random.exe
unknown
http://185.215.113.16/steam/ra
unknown
http://185.215.113.16/steam/random.exe:u
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dllC
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/P
unknown
http://185.215.113.16/steam/random.exexe
unknown
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://atten-supporse.biz/apiZ
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
http://185.215.113.206/?
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
https://apis.google.com
unknown
http://185.215.113.206ta
unknown
http://185.215.113.16/steam/random.exeAz
unknown
http://185.215.113.16/steam/random.exe4.exe
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.16/steam/random.exebz
unknown
http://185.215.113.16/steam/random.exe13c
unknown
http://185.215.113.16/luma/random.exewQ
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.206/c4becf79229cb002.phpge
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dllz
unknown
http://185.215.113.16/steam/random.exeju
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/steam/random.exe
unknown
http://185.215.113.206i
unknown
https://atten-supporse.biz/H2
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
http://185.215.113.16/steam/random.exe1
unknown
https://atten-supporse.biz/api
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206/c4becf79229cb002.phpbs
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
http://31.41.244.11/files/unique2/random.exeO
unknown
http://185.215.113.43/Zu7JuNko/index.phpu
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://atten-supporse.biz:443/api
unknown
https://support.mozilla.org
unknown
http://185.215.113.16/steam/random.exetch
unknown
http://185.215.113.206
unknown
https://atten-supporse.biz/
unknown
http://185.215.113.206/c4becf79229cb002.php1369323ae2e65563c024a986d411Extension
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.16/steam/random.exe61395d7f
unknown
http://185.215.113.16/steam/random.exep32
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://31.41.244.11/files/unique2/random.exe
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
plus.l.google.com
172.217.17.78
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
92.63.197.221
unknown
Russian Federation
malicious
185.215.113.16
unknown
Portugal
malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.17.78
plus.l.google.com
United States
172.67.165.166
atten-supporse.biz
United States
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c3e4899de4.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B91000
unkown
page execute and read and write
malicious
B91000
unkown
page execute and read and write
malicious
5300000
direct allocation
page read and write
malicious
AF1000
unkown
page execute and read and write
malicious
4D00000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
5630000
direct allocation
page read and write
malicious
4B50000
direct allocation
page execute and read and write
malicious
ED1000
unkown
page execute and read and write
malicious
197E000
heap
page read and write
malicious
52F0000
direct allocation
page read and write
malicious
4890000
direct allocation
page read and write
malicious
4DB0000
direct allocation
page read and write
malicious
B91000
unkown
page execute and read and write
malicious
1DC57000
heap
page read and write
B80000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
376F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
1584000
heap
page read and write
C69000
unkown
page execute and write copy
51B1000
heap
page read and write
112F000
stack
page read and write
4411000
heap
page read and write
1DC8C000
heap
page read and write
1550000
heap
page read and write
3A9E000
stack
page read and write
23FFC000
heap
page read and write
486E000
stack
page read and write
E70000
heap
page read and write
1DC69000
heap
page read and write
304E000
stack
page read and write
1DC63000
heap
page read and write
366F000
stack
page read and write
118D000
stack
page read and write
5F5000
heap
page read and write
520000
direct allocation
page read and write
111C000
unkown
page execute and read and write
C41000
unkown
page execute and write copy
48B1000
heap
page read and write
5FA000
heap
page read and write
1584000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
591000
heap
page read and write
4E61000
heap
page read and write
48B1000
heap
page read and write
4E61000
heap
page read and write
590000
heap
page read and write
51B1000
heap
page read and write
93D000
stack
page read and write
4411000
heap
page read and write
2AD28000
heap
page read and write
1584000
heap
page read and write
4411000
heap
page read and write
320E000
stack
page read and write
D78000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
6F4000
heap
page read and write
41DF000
stack
page read and write
4E70000
heap
page read and write
51B1000
heap
page read and write
3C0E000
stack
page read and write
350F000
stack
page read and write
13B5000
unkown
page execute and write copy
2D1E000
stack
page read and write
1DC67000
heap
page read and write
1374000
unkown
page execute and read and write
A64000
heap
page read and write
D25000
heap
page read and write
51B1000
heap
page read and write
3EEF000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
51FF000
stack
page read and write
6F4000
heap
page read and write
1584000
heap
page read and write
10C0000
heap
page read and write
34AF000
stack
page read and write
51C0000
heap
page read and write
4E61000
heap
page read and write
2A7F000
stack
page read and write
1DC53000
heap
page read and write
4410000
heap
page read and write
4A00000
direct allocation
page execute and read and write
C30000
direct allocation
page read and write
426F000
stack
page read and write
358F000
stack
page read and write
4711000
heap
page read and write
AE3000
heap
page read and write
51B1000
heap
page read and write
382E000
stack
page read and write
432F000
stack
page read and write
1DC6B000
heap
page read and write
1584000
heap
page read and write
51B1000
heap
page read and write
326E000
stack
page read and write
B90000
unkown
page readonly
392E000
stack
page read and write
5790000
direct allocation
page execute and read and write
5212000
heap
page read and write
1DC83000
heap
page read and write
2A0E000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
C90000
unkown
page execute and read and write
1474000
heap
page read and write
1DC83000
heap
page read and write
328F000
stack
page read and write
412F000
stack
page read and write
3CDF000
stack
page read and write
5DDC000
stack
page read and write
48B0000
heap
page read and write
6F4000
heap
page read and write
1DC5B000
heap
page read and write
342E000
stack
page read and write
CE0000
heap
page read and write
23D54000
heap
page read and write
4411000
heap
page read and write
2910000
heap
page read and write
54C0000
direct allocation
page execute and read and write
23D11000
heap
page read and write
354E000
stack
page read and write
421E000
stack
page read and write
1474000
heap
page read and write
E02000
unkown
page execute and read and write
6F4000
heap
page read and write
4E61000
heap
page read and write
542F000
stack
page read and write
1570000
direct allocation
page read and write
4711000
heap
page read and write
51B1000
heap
page read and write
430E000
stack
page read and write
31D7000
heap
page read and write
416F000
stack
page read and write
8AB9000
heap
page read and write
4411000
heap
page read and write
DF3000
stack
page read and write
4BEF000
stack
page read and write
543F000
stack
page read and write
4A2E000
stack
page read and write
51B1000
heap
page read and write
6F4000
heap
page read and write
4810000
trusted library allocation
page read and write
1584000
heap
page read and write
4D20000
remote allocation
page read and write
2C2F000
stack
page read and write
52A0000
trusted library allocation
page read and write
4E61000
heap
page read and write
5B3000
heap
page read and write
4E61000
heap
page read and write
1470000
heap
page read and write
45DE000
stack
page read and write
3F2F000
stack
page read and write
4E61000
heap
page read and write
E17000
unkown
page execute and read and write
48B1000
heap
page read and write
2EAE000
stack
page read and write
6CB6F000
unkown
page readonly
1474000
heap
page read and write
1584000
heap
page read and write
170000
heap
page read and write
6B60000
heap
page read and write
CD0000
direct allocation
page read and write
4E61000
heap
page read and write
F36000
unkown
page execute and write copy
3F8F000
stack
page read and write
4E61000
heap
page read and write
AD0000
direct allocation
page execute and read and write
342F000
stack
page read and write
C30000
direct allocation
page read and write
4D40000
direct allocation
page execute and read and write
436E000
stack
page read and write
61DE000
stack
page read and write
1570000
direct allocation
page read and write
2F4F000
stack
page read and write
36AF000
stack
page read and write
1DC7E000
heap
page read and write
51B1000
heap
page read and write
485E000
stack
page read and write
4F50000
direct allocation
page execute and read and write
23DAA000
heap
page read and write
504D000
stack
page read and write
4E61000
heap
page read and write
1584000
heap
page read and write
1584000
heap
page read and write
31AE000
stack
page read and write
6C930000
unkown
page readonly
54D0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
2BCE000
stack
page read and write
4411000
heap
page read and write
54F0000
direct allocation
page execute and read and write
5AB000
heap
page read and write
41EE000
stack
page read and write
4E61000
heap
page read and write
3AEF000
stack
page read and write
1040000
unkown
page execute and write copy
4711000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
1040000
unkown
page execute and write copy
520000
direct allocation
page read and write
4E61000
heap
page read and write
6F4000
heap
page read and write
1DC8C000
heap
page read and write
4411000
heap
page read and write
10B0000
direct allocation
page read and write
CD0000
direct allocation
page read and write
36AE000
stack
page read and write
4411000
heap
page read and write
3A2F000
stack
page read and write
4931000
heap
page read and write
4ECE000
stack
page read and write
1D6AF000
stack
page read and write
2ABF0000
heap
page read and write
1570000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
3A5F000
stack
page read and write
1584000
heap
page read and write
1584000
heap
page read and write
4CEF000
stack
page read and write
336F000
stack
page read and write
422E000
stack
page read and write
36EE000
stack
page read and write
1466000
heap
page read and write
179E000
stack
page read and write
2B00000
heap
page read and write
4711000
heap
page read and write
2C4F000
stack
page read and write
348E000
stack
page read and write
3020000
heap
page read and write
A60000
heap
page read and write
39EE000
stack
page read and write
1584000
heap
page read and write
51B1000
heap
page read and write
2B8F000
stack
page read and write
AB9000
unkown
page execute and read and write
48B1000
heap
page read and write
6F4000
heap
page read and write
346E000
stack
page read and write
1474000
heap
page read and write
4A6E000
stack
page read and write
4E61000
heap
page read and write
308F000
stack
page read and write
4E61000
heap
page read and write
57C0000
direct allocation
page execute and read and write
350F000
stack
page read and write
AC5000
heap
page read and write
300F000
stack
page read and write
B80000
direct allocation
page read and write
1DC71000
heap
page read and write
1EE000
stack
page read and write
6360000
trusted library allocation
page read and write
19FC000
heap
page read and write
4411000
heap
page read and write
5470000
direct allocation
page execute and read and write
4411000
heap
page read and write
1560000
direct allocation
page read and write
6F4000
heap
page read and write
398E000
stack
page read and write
23DD0000
trusted library allocation
page read and write
3AAE000
stack
page read and write
F1B000
unkown
page execute and read and write
4411000
heap
page read and write
E88000
unkown
page execute and read and write
1DC8C000
heap
page read and write
51B1000
heap
page read and write
3BAE000
stack
page read and write
1474000
heap
page read and write
4CAF000
stack
page read and write
51B1000
heap
page read and write
4711000
heap
page read and write
4E61000
heap
page read and write
4711000
heap
page read and write
51B1000
heap
page read and write
4411000
heap
page read and write
9A7000
unkown
page execute and read and write
180000
heap
page read and write
C70000
heap
page read and write
520000
direct allocation
page read and write
83C000
stack
page read and write
4AEE000
stack
page read and write
BF9000
unkown
page write copy
5480000
direct allocation
page execute and read and write
57A0000
direct allocation
page execute and read and write
6F4000
heap
page read and write
4E61000
heap
page read and write
36DE000
stack
page read and write
4E61000
heap
page read and write
52E0000
direct allocation
page read and write
312F000
stack
page read and write
1DADD000
stack
page read and write
102E000
stack
page read and write
23F50000
trusted library allocation
page read and write
6F3C000
stack
page read and write
4D20000
direct allocation
page execute and read and write
51B1000
heap
page read and write
19C1000
heap
page read and write
5D90000
heap
page read and write
B91000
unkown
page execute and write copy
4411000
heap
page read and write
4E61000
heap
page read and write
5EDF000
stack
page read and write
520000
direct allocation
page read and write
CD0000
direct allocation
page read and write
4D30000
direct allocation
page read and write
4711000
heap
page read and write
1560000
direct allocation
page read and write
BCE000
stack
page read and write
49E0000
direct allocation
page execute and read and write
6F4000
heap
page read and write
4E61000
heap
page read and write
1570000
direct allocation
page read and write
23D3D000
heap
page read and write
54F0000
direct allocation
page execute and read and write
1584000
heap
page read and write
520000
direct allocation
page read and write
615F000
stack
page read and write
51B1000
heap
page read and write
5CDD000
stack
page read and write
10CE000
heap
page read and write
5AE000
heap
page read and write
39EF000
stack
page read and write
4E65000
heap
page read and write
BFB000
unkown
page execute and read and write
432E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
452F000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
10B0000
direct allocation
page read and write
449E000
stack
page read and write
23FFE000
heap
page read and write
4E3E000
stack
page read and write
431F000
stack
page read and write
1DC75000
heap
page read and write
6C9D1000
unkown
page execute read
1584000
heap
page read and write
3E1F000
stack
page read and write
372F000
stack
page read and write
606000
heap
page read and write
51B1000
heap
page read and write
EC0000
heap
page read and write
376E000
stack
page read and write
51B1000
heap
page read and write
6F4000
heap
page read and write
359E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
51D0000
heap
page read and write
3DAF000
stack
page read and write
1DC89000
heap
page read and write
BF9000
unkown
page read and write
C30000
direct allocation
page read and write
547C000
stack
page read and write
B90000
unkown
page readonly
4EA0000
direct allocation
page execute and read and write
190E000
stack
page read and write
E93000
unkown
page execute and read and write
48B1000
heap
page read and write
6F4000
heap
page read and write
E02000
unkown
page execute and write copy
51B1000
heap
page read and write
6F4000
heap
page read and write
AD6000
heap
page read and write
1950000
direct allocation
page read and write
1474000
heap
page read and write
48EF000
stack
page read and write
5F4000
heap
page read and write
5500000
direct allocation
page execute and read and write
404F000
stack
page read and write
C80000
heap
page read and write
4D6E000
stack
page read and write
CA5000
heap
page read and write
F27000
unkown
page execute and read and write
51B1000
heap
page read and write
420F000
stack
page read and write
1584000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
11F0000
heap
page read and write
514D000
stack
page read and write
4D6C000
direct allocation
page read and write
2AB2B000
stack
page read and write
1468000
heap
page read and write
1DC7E000
heap
page read and write
492E000
stack
page read and write
3560000
heap
page read and write
4E61000
heap
page read and write
1950000
direct allocation
page read and write
1570000
direct allocation
page read and write
55F0000
trusted library allocation
page read and write
341F000
stack
page read and write
302F000
stack
page read and write
354E000
stack
page read and write
4E61000
heap
page read and write
532B000
stack
page read and write
4422000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4E61000
heap
page read and write
4E6F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
4411000
heap
page read and write
1B6E000
stack
page read and write
CD0000
direct allocation
page read and write
3E0E000
stack
page read and write
1DC6A000
heap
page read and write
A50000
heap
page read and write
1584000
heap
page read and write
4411000
heap
page read and write
4D30000
direct allocation
page read and write
ED0000
unkown
page readonly
410E000
stack
page read and write
ADE000
heap
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
344F000
stack
page read and write
288F000
stack
page read and write
4411000
heap
page read and write
FA0000
unkown
page execute and write copy
3CCE000
stack
page read and write
4B90000
direct allocation
page read and write
434000
unkown
page execute and read and write
1570000
direct allocation
page read and write
48B1000
heap
page read and write
4E90000
direct allocation
page execute and read and write
5351000
direct allocation
page read and write
448F000
stack
page read and write
6CBB5000
unkown
page readonly
3A6E000
stack
page read and write
45AE000
stack
page read and write
42AE000
stack
page read and write
4411000
heap
page read and write
5460000
direct allocation
page execute and read and write
4931000
heap
page read and write
49E0000
direct allocation
page execute and read and write
23D31000
heap
page read and write
510000
heap
page read and write
1560000
direct allocation
page read and write
1560000
direct allocation
page read and write
4EA0000
heap
page read and write
1DC5B000
heap
page read and write
B91000
unkown
page execute and write copy
1DC70000
heap
page read and write
1584000
heap
page read and write
B80000
direct allocation
page read and write
606000
heap
page read and write
1D56F000
stack
page read and write
45EE000
stack
page read and write
38EF000
stack
page read and write
1560000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
AC8000
heap
page read and write
4E61000
heap
page read and write
6C931000
unkown
page execute read
4711000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
4DFE000
stack
page read and write
5CF000
heap
page read and write
51B1000
heap
page read and write
4711000
heap
page read and write
2C5F000
stack
page read and write
1570000
direct allocation
page read and write
1DC59000
heap
page read and write
51B1000
heap
page read and write
4F30000
direct allocation
page execute and read and write
EA2000
unkown
page execute and write copy
A64000
heap
page read and write
30EF000
stack
page read and write
23D48000
heap
page read and write
14A9000
heap
page read and write
51B1000
heap
page read and write
143E000
stack
page read and write
CD0000
direct allocation
page read and write
32DF000
stack
page read and write
10CA000
heap
page read and write
1584000
heap
page read and write
37DF000
stack
page read and write
61ECD000
direct allocation
page readonly
3B4F000
stack
page read and write
2F8E000
stack
page read and write
3B2E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
47AF000
stack
page read and write
4411000
heap
page read and write
456E000
stack
page read and write
970000
heap
page read and write
5470000
direct allocation
page execute and read and write
CEE000
heap
page read and write
4A40000
direct allocation
page execute and read and write
6F0000
heap
page read and write
5ED000
heap
page read and write
1570000
direct allocation
page read and write
4E61000
heap
page read and write
4711000
heap
page read and write
31BB000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
627C000
stack
page read and write
1474000
heap
page read and write
4411000
heap
page read and write
1474000
heap
page read and write
11D0000
heap
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
54D0000
direct allocation
page execute and read and write
BF9000
unkown
page read and write
1549000
unkown
page execute and write copy
2ABE000
stack
page read and write
108C000
stack
page read and write
5FD000
heap
page read and write
1DC83000
heap
page read and write
340E000
stack
page read and write
9CF000
stack
page read and write
6F4000
heap
page read and write
15CE000
stack
page read and write
51B1000
heap
page read and write
5500000
direct allocation
page execute and read and write
42EF000
stack
page read and write
5480000
direct allocation
page execute and read and write
51B1000
heap
page read and write
1570000
direct allocation
page read and write
103E000
unkown
page execute and read and write
48B1000
heap
page read and write
4D70000
trusted library allocation
page read and write
2940000
heap
page read and write
4411000
heap
page read and write
48B1000
heap
page read and write
3A0F000
stack
page read and write
4E61000
heap
page read and write
1950000
direct allocation
page read and write
4711000
heap
page read and write
381E000
stack
page read and write
47EF000
stack
page read and write
518E000
stack
page read and write
352F000
stack
page read and write
1570000
direct allocation
page read and write
4BE3000
direct allocation
page read and write
1DC88000
heap
page read and write
6F4000
heap
page read and write
3E8E000
stack
page read and write
CEA000
heap
page read and write
51B1000
heap
page read and write
566B000
stack
page read and write
28CE000
stack
page read and write
AD9000
heap
page read and write
4411000
heap
page read and write
6F4000
heap
page read and write
4F40000
direct allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
51B1000
heap
page read and write
C68000
unkown
page execute and read and write
471E000
stack
page read and write
1DC8C000
heap
page read and write
4411000
heap
page read and write
5FD000
heap
page read and write
1584000
heap
page read and write
36CF000
stack
page read and write
4E61000
heap
page read and write
10D3000
unkown
page execute and read and write
4E61000
heap
page read and write
1420000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
5A5E000
stack
page read and write
5A8000
heap
page read and write
51AF000
stack
page read and write
CD0000
direct allocation
page read and write
4D60000
direct allocation
page execute and read and write
1584000
heap
page read and write
6F4000
heap
page read and write
3D2E000
stack
page read and write
129D000
unkown
page execute and read and write
50AE000
stack
page read and write
4AAF000
stack
page read and write
C5C000
unkown
page execute and read and write
520000
direct allocation
page read and write
1DC83000
heap
page read and write
4711000
heap
page read and write
446F000
stack
page read and write
1560000
direct allocation
page read and write
1560000
direct allocation
page read and write
15F5000
heap
page read and write
A90000
heap
page read and write
4D20000
remote allocation
page read and write
4411000
heap
page read and write
1DC8C000
heap
page read and write
9A0000
heap
page read and write
83C000
stack
page read and write
1570000
direct allocation
page read and write
1D5AE000
stack
page read and write
1950000
direct allocation
page read and write
2ACFC000
stack
page read and write
4411000
heap
page read and write
51B1000
heap
page read and write
380F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
DF8000
stack
page read and write
4711000
heap
page read and write
10B000
stack
page read and write
5460000
direct allocation
page execute and read and write
BF9000
unkown
page read and write
1474000
heap
page read and write
1584000
heap
page read and write
1DC63000
heap
page read and write
57D0000
direct allocation
page execute and read and write
3F5F000
stack
page read and write
52B0000
trusted library allocation
page read and write
4411000
heap
page read and write
54A0000
direct allocation
page execute and read and write
500D000
stack
page read and write
51B1000
heap
page read and write
61ED4000
direct allocation
page readonly
4411000
heap
page read and write
EA3000
unkown
page execute and write copy
418F000
stack
page read and write
6C9AD000
unkown
page readonly
DBA000
unkown
page execute and read and write
2B4E000
stack
page read and write
3B8E000
stack
page read and write
51B1000
heap
page read and write
396E000
stack
page read and write
5FD000
heap
page read and write
4A9F000
stack
page read and write
4F00000
direct allocation
page execute and read and write
616000
heap
page read and write
93D000
stack
page read and write
2CCF000
stack
page read and write
6F4000
heap
page read and write
520000
direct allocation
page read and write
4931000
heap
page read and write
400000
unkown
page readonly
4411000
heap
page read and write
48CE000
stack
page read and write
3E4F000
stack
page read and write
46EE000
stack
page read and write
5F5000
heap
page read and write
4411000
heap
page read and write
C30000
direct allocation
page read and write
54B0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
B59000
unkown
page read and write
51B1000
heap
page read and write
435E000
stack
page read and write
3C6E000
stack
page read and write
582000
heap
page read and write
53CF000
stack
page read and write
4BEC000
stack
page read and write
EA2000
unkown
page execute and read and write
1584000
heap
page read and write
10B0000
direct allocation
page read and write
391F000
stack
page read and write
10D4000
unkown
page execute and write copy
54A0000
direct allocation
page execute and read and write
5B9D000
stack
page read and write
EA3000
unkown
page execute and write copy
ED0000
unkown
page read and write
3BCF000
stack
page read and write
51B1000
heap
page read and write
61E01000
direct allocation
page execute read
4DEF000
stack
page read and write
52FF000
stack
page read and write
6F4000
heap
page read and write
1474000
heap
page read and write
6F4000
heap
page read and write
5B6000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
C40000
unkown
page read and write
2F4E000
stack
page read and write
1DC71000
heap
page read and write
80E000
unkown
page write copy
ACC000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
31DD000
heap
page read and write
61ED3000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
42EE000
stack
page read and write
290E000
stack
page read and write
B80000
direct allocation
page read and write
3F9E000
stack
page read and write
4711000
heap
page read and write
A64000
heap
page read and write
62BE000
stack
page read and write
197A000
heap
page read and write
6F4000
heap
page read and write
6F4000
heap
page read and write
1950000
direct allocation
page read and write
D09000
heap
page execute and read and write
386F000
stack
page read and write
51B1000
heap
page read and write
1440000
heap
page read and write
616000
heap
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
1584000
heap
page read and write
5770000
direct allocation
page execute and read and write
37AF000
stack
page read and write
51B1000
heap
page read and write
496F000
stack
page read and write
2C9E000
stack
page read and write
3C2F000
stack
page read and write
1DC57000
heap
page read and write
E03000
unkown
page execute and write copy
317F000
stack
page read and write
3F6D000
stack
page read and write
5B5F000
stack
page read and write
3D1E000
stack
page read and write
C7D000
unkown
page execute and read and write
4711000
heap
page read and write
4FEE000
stack
page read and write
6CBAE000
unkown
page read and write
4411000
heap
page read and write
40AF000
stack
page read and write
1589000
heap
page read and write
4711000
heap
page read and write
48B1000
heap
page read and write
401000
unkown
page execute and write copy
B90000
unkown
page read and write
4411000
heap
page read and write
1584000
heap
page read and write
1DC67000
heap
page read and write
2E2F000
stack
page read and write
4930000
heap
page read and write
37EE000
stack
page read and write
F35000
unkown
page execute and write copy
4E61000
heap
page read and write
3B6F000
stack
page read and write
1DC71000
heap
page read and write
4B90000
direct allocation
page read and write
3EEE000
stack
page read and write
4411000
heap
page read and write
4FAF000
stack
page read and write
4411000
heap
page read and write
51B1000
heap
page read and write
23CF0000
heap
page read and write
3FCE000
stack
page read and write
1108000
unkown
page execute and read and write
4BBE000
direct allocation
page read and write
4411000
heap
page read and write
4411000
heap
page read and write
2D20000
heap
page read and write
4411000
heap
page read and write
4711000
heap
page read and write
4411000
heap
page read and write
330F000
stack
page read and write
1474000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4931000
heap
page read and write
5B3000
heap
page read and write
4411000
heap
page read and write
331E000
stack
page read and write
4711000
heap
page read and write
35CE000
stack
page read and write
1950000
direct allocation
page read and write
E93000
unkown
page execute and read and write
4E61000
heap
page read and write
48C0000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4FC0000
direct allocation
page execute and read and write
C30000
direct allocation
page read and write
1DA9C000
stack
page read and write
23E0E000
stack
page read and write
2FCE000
stack
page read and write
3B9F000
stack
page read and write
1584000
heap
page read and write
23D50000
heap
page read and write
4850000
trusted library allocation
page read and write
3CAE000
stack
page read and write
4711000
heap
page read and write
38EE000
stack
page read and write
1584000
heap
page read and write
3F2E000
stack
page read and write
1560000
direct allocation
page read and write
1584000
heap
page read and write
4711000
heap
page read and write
108C000
stack
page read and write
6D0000
direct allocation
page read and write
49B0000
trusted library allocation
page read and write
6F4000
heap
page read and write
42AF000
stack
page read and write
520000
direct allocation
page read and write
1040000
unkown
page execute and write copy
495F000
stack
page read and write
32CE000
stack
page read and write
1570000
heap
page read and write
AF0000
unkown
page readonly
4E61000
heap
page read and write
189E000
stack
page read and write
4411000
heap
page read and write
3E2E000
stack
page read and write
37EF000
stack
page read and write
3F6F000
stack
page read and write
2E0F000
stack
page read and write
6F4000
heap
page read and write
4411000
heap
page read and write
4D2F000
stack
page read and write
4A50000
direct allocation
page execute and read and write
4411000
heap
page read and write
39AF000
stack
page read and write
3027000
heap
page read and write
4411000
heap
page read and write
4E61000
heap
page read and write
591000
heap
page read and write
4711000
heap
page read and write
6C9BE000
unkown
page read and write
6F4000
heap
page read and write
4F6E000
stack
page read and write
C30000
direct allocation
page read and write
4E71000
heap
page read and write
3B2F000
stack
page read and write
51B1000
heap
page read and write
356B000
heap
page read and write
5780000
direct allocation
page execute and read and write
B90000
unkown
page readonly
C30000
direct allocation
page read and write
5361000
direct allocation
page read and write
4F30000
direct allocation
page execute and read and write
4711000
heap
page read and write
4E61000
heap
page read and write
1DC80000
heap
page read and write
6F4000
heap
page read and write
1584000
heap
page read and write
3DEF000
stack
page read and write
8A8C000
stack
page read and write
6CE000
heap
page read and write
1DC57000
heap
page read and write
4411000
heap
page read and write
714C000
stack
page read and write
46AF000
stack
page read and write
4411000
heap
page read and write
4FF0000
heap
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
4F00000
direct allocation
page execute and read and write
1560000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
A64000
heap
page read and write
156E000
stack
page read and write
1584000
heap
page read and write
4411000
heap
page read and write
D78000
unkown
page execute and read and write
1C6E000
stack
page read and write
E93000
unkown
page execute and read and write
23CD0000
trusted library allocation
page read and write
3EAF000
stack
page read and write
B80000
direct allocation
page read and write
1DC6A000
heap
page read and write
4D30000
direct allocation
page read and write
6F4000
heap
page read and write
61ECC000
direct allocation
page read and write
1584000
heap
page read and write
1DC71000
heap
page read and write
4411000
heap
page read and write
23DB9000
heap
page read and write
C5D000
unkown
page execute and write copy
442F000
stack
page read and write
29CF000
stack
page read and write
1DC67000
heap
page read and write
1DC7E000
heap
page read and write
51B1000
heap
page read and write
4411000
heap
page read and write
4C1E000
stack
page read and write
6F7E000
stack
page read and write
6D0000
direct allocation
page read and write
4411000
heap
page read and write
4E70000
heap
page read and write
1950000
direct allocation
page read and write
2B20000
heap
page read and write
2E6F000
stack
page read and write
416E000
stack
page read and write
707E000
stack
page read and write
40DE000
stack
page read and write
46AE000
stack
page read and write
314F000
stack
page read and write
AFF000
heap
page read and write
4931000
heap
page read and write
9C000
stack
page read and write
40EE000
stack
page read and write
4BB0000
direct allocation
page read and write
103E000
unkown
page execute and read and write
506F000
stack
page read and write
4711000
heap
page read and write
4E61000
heap
page read and write
5A8000
heap
page read and write
601000
heap
page read and write
482E000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4411000
heap
page read and write
1950000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
8ABA000
heap
page read and write
4711000
heap
page read and write
48B1000
heap
page read and write
476F000
stack
page read and write
C30000
direct allocation
page read and write
C30000
direct allocation
page read and write
1584000
heap
page read and write
1DC67000
heap
page read and write
4E61000
heap
page read and write
576F000
stack
page read and write
1DC71000
heap
page read and write
ABA000
unkown
page execute and write copy
51B1000
heap
page read and write
5CF000
heap
page read and write
4E11000
direct allocation
page read and write
1584000
heap
page read and write
52E0000
direct allocation
page read and write
1DD6C000
heap
page read and write
EA3000
unkown
page execute and write copy
4E61000
heap
page read and write
4E61000
heap
page read and write
499E000
stack
page read and write
F35000
unkown
page execute and read and write
4E71000
heap
page read and write
2D2F000
stack
page read and write
15F0000
heap
page read and write
406F000
stack
page read and write
5DDE000
stack
page read and write
AAB000
unkown
page execute and read and write
5CF000
heap
page read and write
44AE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
13B5000
unkown
page execute and read and write
F9C000
unkown
page execute and read and write
2A8C000
stack
page read and write
AF1000
unkown
page execute and write copy
6C9C2000
unkown
page readonly
6F4000
heap
page read and write
2D8F000
stack
page read and write
C8E000
unkown
page read and write
3CEF000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
6AE000
stack
page read and write
57AE000
stack
page read and write
A64000
heap
page read and write
C30000
direct allocation
page read and write
3F4E000
stack
page read and write
6CD0000
heap
page read and write
1DC7D000
heap
page read and write
4411000
heap
page read and write
1DC87000
heap
page read and write
4C14000
heap
page read and write
1584000
heap
page read and write
821000
unkown
page execute and read and write
460E000
stack
page read and write
111A000
unkown
page write copy
B80000
direct allocation
page read and write
1474000
heap
page read and write
48B1000
heap
page read and write
4411000
heap
page read and write
B80000
direct allocation
page read and write
2FEE000
stack
page read and write
48B1000
heap
page read and write
2CDE000
stack
page read and write
4F2F000
stack
page read and write
369F000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
605E000
stack
page read and write
4411000
heap
page read and write
47AE000
stack
page read and write
4411000
heap
page read and write
51B1000
heap
page read and write
B91000
unkown
page execute and write copy
4E5F000
stack
page read and write
4BE1000
direct allocation
page read and write
49F0000
direct allocation
page execute and read and write
CD0000
direct allocation
page read and write
445F000
stack
page read and write
1950000
direct allocation
page read and write
DFE000
stack
page read and write
3ACE000
stack
page read and write
43AF000
stack
page read and write
111A000
unkown
page write copy
4FA000
stack
page read and write
3D4E000
stack
page read and write
5F1E000
stack
page read and write
6CC1000
heap
page read and write
4E61000
heap
page read and write
48B1000
heap
page read and write
45AE000
stack
page read and write
53A000
heap
page read and write
4D70000
direct allocation
page execute and read and write
438E000
stack
page read and write
6B68000
heap
page read and write
A64000
heap
page read and write
1DC6B000
heap
page read and write
1DC8C000
heap
page read and write
52F0000
direct allocation
page read and write
446E000
stack
page read and write
37CE000
stack
page read and write
459F000
stack
page read and write
E5A000
unkown
page execute and read and write
5CF000
heap
page read and write
4421000
heap
page read and write
4860000
heap
page read and write
1DC65000
heap
page read and write
1DC71000
heap
page read and write
4E60000
heap
page read and write
1570000
direct allocation
page read and write
4411000
heap
page read and write
B5B000
unkown
page execute and read and write
1584000
heap
page read and write
4411000
heap
page read and write
4D20000
remote allocation
page read and write
4C2E000
stack
page read and write
EA2000
unkown
page execute and write copy
E5A000
unkown
page execute and read and write
BF2000
unkown
page execute and read and write
23FF6000
heap
page read and write
1D7EE000
stack
page read and write
6F4000
heap
page read and write
3FEF000
stack
page read and write
6F4000
heap
page read and write
51B1000
heap
page read and write
38AF000
stack
page read and write
49D0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
F07000
unkown
page execute and read and write
2DCE000
stack
page read and write
4E61000
heap
page read and write
1D85E000
stack
page read and write
ACF000
stack
page read and write
157B000
heap
page read and write
1DC71000
heap
page read and write
356E000
heap
page read and write
A9E000
heap
page read and write
3D6F000
stack
page read and write
51B1000
heap
page read and write
6F4000
heap
page read and write
4E7F000
stack
page read and write
4411000
heap
page read and write
1584000
heap
page read and write
3FAE000
stack
page read and write
4711000
heap
page read and write
307E000
stack
page read and write
4D30000
direct allocation
page execute and read and write
CD0000
direct allocation
page read and write
4411000
heap
page read and write
19C000
stack
page read and write
5EE000
heap
page read and write
384E000
stack
page read and write
5450000
direct allocation
page execute and read and write
1950000
direct allocation
page read and write
6CBAF000
unkown
page write copy
606000
heap
page read and write
368E000
stack
page read and write
316F000
stack
page read and write
2F0E000
stack
page read and write
B80000
direct allocation
page read and write
B59000
unkown
page write copy
38AE000
stack
page read and write
48B1000
heap
page read and write
356F000
stack
page read and write
6D0000
direct allocation
page read and write
44EF000
stack
page read and write
32EE000
stack
page read and write
108E000
stack
page read and write
1DC71000
heap
page read and write
51B1000
heap
page read and write
CA0000
heap
page read and write
1DC71000
heap
page read and write
62DF000
stack
page read and write
51B1000
heap
page read and write
3BEE000
stack
page read and write
364F000
stack
page read and write
49E0000
direct allocation
page execute and read and write
52CE000
stack
page read and write
4411000
heap
page read and write
2F2F000
stack
page read and write
533E000
stack
page read and write
51B1000
heap
page read and write
462F000
stack
page read and write
520000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
6F4000
heap
page read and write
51B1000
heap
page read and write
23F0D000
stack
page read and write
3DCF000
stack
page read and write
1DC71000
heap
page read and write
D78000
unkown
page execute and read and write
1D95F000
stack
page read and write
64DF000
stack
page read and write
1950000
direct allocation
page read and write
1DC4D000
heap
page read and write
4E61000
heap
page read and write
51B1000
heap
page read and write
51B0000
heap
page read and write
4411000
heap
page read and write
3550000
direct allocation
page read and write
4711000
heap
page read and write
1580000
heap
page read and write
1DC66000
heap
page read and write
3E2F000
stack
page read and write
5510000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
6CC0000
heap
page read and write
4411000
heap
page read and write
CFC000
stack
page read and write
B80000
direct allocation
page read and write
CC0000
heap
page read and write
51B1000
heap
page read and write
4411000
heap
page read and write
48F1000
direct allocation
page read and write
AE0000
direct allocation
page execute and read and write
49E0000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
2947000
heap
page read and write
1950000
direct allocation
page read and write
35EF000
stack
page read and write
4F20000
direct allocation
page execute and read and write
1560000
direct allocation
page read and write
AF0000
unkown
page read and write
1037000
unkown
page execute and read and write
3E6E000
stack
page read and write
1DC6D000
heap
page read and write
C30000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
576F000
stack
page read and write
6CCE000
heap
page read and write
1DC67000
heap
page read and write
4411000
heap
page read and write
394F000
stack
page read and write
61EB4000
direct allocation
page read and write
31CF000
stack
page read and write
6F4000
heap
page read and write
5470000
direct allocation
page execute and read and write
1560000
direct allocation
page read and write
E88000
unkown
page execute and read and write
48B1000
heap
page read and write
A64000
heap
page read and write
51B1000
heap
page read and write
4E61000
heap
page read and write
52F0000
direct allocation
page read and write
EA2000
unkown
page execute and read and write
1DC8C000
heap
page read and write
49AE000
stack
page read and write
158E000
stack
page read and write
63DC000
stack
page read and write
3F0F000
stack
page read and write
4E61000
heap
page read and write
51B1000
heap
page read and write
51B1000
heap
page read and write
5440000
direct allocation
page execute and read and write
58EE000
stack
page read and write
41EF000
stack
page read and write
C30000
direct allocation
page read and write
41AE000
stack
page read and write
CD0000
direct allocation
page read and write
1570000
direct allocation
page read and write
B80000
direct allocation
page read and write
1584000
heap
page read and write
4411000
heap
page read and write
A64000
heap
page read and write
520000
direct allocation
page read and write
1438000
heap
page read and write
A64000
heap
page read and write
334E000
stack
page read and write
49CF000
stack
page read and write
1560000
direct allocation
page read and write
B80000
direct allocation
page read and write
4711000
heap
page read and write
43EE000
stack
page read and write
1584000
heap
page read and write
35AE000
stack
page read and write
466F000
stack
page read and write
1560000
direct allocation
page read and write
AC0000
heap
page read and write
51B1000
heap
page read and write
6F4000
heap
page read and write
51B1000
heap
page read and write
452E000
stack
page read and write
8A90000
heap
page read and write
51B1000
heap
page read and write
6F4000
heap
page read and write
EA2000
unkown
page execute and read and write
4411000
heap
page read and write
59EF000
stack
page read and write
4E61000
heap
page read and write
3CAF000
stack
page read and write
4E61000
heap
page read and write
5D95000
heap
page read and write
2B0F000
stack
page read and write
520000
direct allocation
page read and write
345E000
stack
page read and write
2FAF000
stack
page read and write
1DC40000
heap
page read and write
1570000
direct allocation
page read and write
1DD60000
trusted library allocation
page read and write
BFB000
unkown
page execute and read and write
1584000
heap
page read and write
1090000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
33CF000
stack
page read and write
3567000
heap
page read and write
4411000
heap
page read and write
E60000
heap
page read and write
4411000
heap
page read and write
1474000
heap
page read and write
472E000
stack
page read and write
BFB000
unkown
page execute and read and write
4411000
heap
page read and write
6F4000
heap
page read and write
B4E000
stack
page read and write
51B1000
heap
page read and write
E5A000
unkown
page execute and read and write
520000
direct allocation
page read and write
4711000
heap
page read and write
6F4000
heap
page read and write
48B1000
heap
page read and write
37AE000
stack
page read and write
6F4000
heap
page read and write
4411000
heap
page read and write
23D59000
heap
page read and write
2D0E000
stack
page read and write
6CBB0000
unkown
page read and write
4411000
heap
page read and write
4711000
heap
page read and write
12BF000
stack
page read and write
4CF0000
heap
page read and write
B80000
direct allocation
page read and write
5CF000
heap
page read and write
5450000
direct allocation
page execute and read and write
619000
heap
page read and write
23D3F000
heap
page read and write
5C9E000
stack
page read and write
49E0000
direct allocation
page execute and read and write
312E000
stack
page read and write
4411000
heap
page read and write
51B1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
41CE000
stack
page read and write
4E61000
heap
page read and write
2AD01000
heap
page read and write
5D96000
heap
page read and write
4711000
heap
page read and write
409F000
stack
page read and write
1DC63000
heap
page read and write
48B1000
heap
page read and write
392F000
stack
page read and write
1584000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
6F4000
heap
page read and write
DE8000
unkown
page execute and read and write
1DC71000
heap
page read and write
DF3000
unkown
page execute and read and write
4411000
heap
page read and write
4E61000
heap
page read and write
46DF000
stack
page read and write
4ADE000
stack
page read and write
57AE000
stack
page read and write
46EF000
stack
page read and write
5FD000
heap
page read and write
4C10000
heap
page read and write
3C6F000
stack
page read and write
6C9D0000
unkown
page readonly
51B1000
heap
page read and write
BF2000
unkown
page execute and read and write
D2C000
heap
page read and write
1584000
heap
page read and write
51B1000
heap
page read and write
4F30000
direct allocation
page execute and read and write
49E0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
318E000
stack
page read and write
1DC7F000
heap
page read and write
4D7E000
stack
page read and write
4E2E000
stack
page read and write
6190000
heap
page read and write
5B2000
heap
page read and write
CD0000
direct allocation
page read and write
1DC71000
heap
page read and write
8CE000
stack
page read and write
AB9000
unkown
page execute and write copy
1950000
direct allocation
page read and write
362E000
stack
page read and write
23FEE000
heap
page read and write
F85000
unkown
page execute and read and write
1DC8C000
heap
page read and write
61E00000
direct allocation
page execute and read and write
15D0000
heap
page read and write
B0E000
stack
page read and write
3B6E000
stack
page read and write
5520000
direct allocation
page execute and read and write
13A6000
unkown
page execute and read and write
CD0000
direct allocation
page read and write
4E80000
heap
page read and write
48AF000
stack
page read and write
5F9D000
stack
page read and write
51B1000
heap
page read and write
2D6E000
stack
page read and write
3C8F000
stack
page read and write
3BDE000
stack
page read and write
4E61000
heap
page read and write
5B6000
heap
page read and write
BF9000
unkown
page write copy
4EF0000
direct allocation
page execute and read and write
51B1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4411000
heap
page read and write
520000
direct allocation
page read and write
B80000
direct allocation
page read and write
23CD0000
trusted library allocation
page read and write
48B1000
heap
page read and write
CD8000
unkown
page execute and read and write
52E0000
direct allocation
page read and write
58AF000
stack
page read and write
4411000
heap
page read and write
3550000
direct allocation
page read and write
300E000
stack
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
B60000
heap
page read and write
4D1F000
stack
page read and write
5510000
direct allocation
page execute and read and write
BF9000
unkown
page write copy
154A000
unkown
page execute and write copy
1549000
unkown
page execute and read and write
19D9000
heap
page read and write
4710000
heap
page read and write
1490000
heap
page read and write
4F30000
direct allocation
page execute and read and write
52F0000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
3DAE000
stack
page read and write
4711000
heap
page read and write
51B1000
heap
page read and write
402E000
stack
page read and write
EA2000
unkown
page execute and write copy
51B1000
heap
page read and write
440F000
stack
page read and write
4F70000
direct allocation
page execute and read and write
366F000
stack
page read and write
51B1000
heap
page read and write
2A4F000
stack
page read and write
44CE000
stack
page read and write
1474000
heap
page read and write
406E000
stack
page read and write
62D0000
heap
page read and write
1584000
heap
page read and write
5490000
direct allocation
page execute and read and write
1474000
heap
page read and write
4B6F000
stack
page read and write
33AE000
stack
page read and write
600000
heap
page read and write
1DC71000
heap
page read and write
3DEE000
stack
page read and write
481F000
stack
page read and write
6C0000
heap
page read and write
4DEE000
stack
page read and write
4411000
heap
page read and write
2B27000
heap
page read and write
530000
heap
page read and write
4711000
heap
page read and write
C40000
unkown
page readonly
1DC56000
heap
page read and write
A64000
heap
page read and write
2D27000
heap
page read and write
1970000
heap
page read and write
ED1000
unkown
page execute and write copy
4E61000
heap
page read and write
4BAE000
stack
page read and write
5470000
direct allocation
page execute and read and write
1DC67000
heap
page read and write
AF0000
heap
page read and write
1560000
direct allocation
page read and write
51B1000
heap
page read and write
34EE000
stack
page read and write
4411000
heap
page read and write
A64000
heap
page read and write
1DC42000
heap
page read and write
2AD00000
heap
page read and write
395E000
stack
page read and write
332F000
stack
page read and write
4E61000
heap
page read and write
322F000
stack
page read and write
4711000
heap
page read and write
1584000
heap
page read and write
1950000
direct allocation
page read and write
C30000
direct allocation
page read and write
C8E000
unkown
page write copy
AE6000
heap
page read and write
51B1000
heap
page read and write
4931000
heap
page read and write
40AE000
stack
page read and write
4D5E000
stack
page read and write
4CEE000
stack
page read and write
1584000
heap
page read and write
3A6F000
stack
page read and write
4E61000
heap
page read and write
4411000
heap
page read and write
41AE000
stack
page read and write
4EEF000
stack
page read and write
6E3C000
stack
page read and write
1584000
heap
page read and write
5E9E000
stack
page read and write
66E000
stack
page read and write
31D0000
heap
page read and write
51B1000
heap
page read and write
278C000
stack
page read and write
118D000
stack
page read and write
1DC57000
heap
page read and write
A64000
heap
page read and write
4411000
heap
page read and write
4F11000
trusted library allocation
page read and write
30CE000
stack
page read and write
492F000
stack
page read and write
A64000
heap
page read and write
4411000
heap
page read and write
176F000
stack
page read and write
40CF000
stack
page read and write
4711000
heap
page read and write
1DC71000
heap
page read and write
F54000
unkown
page execute and read and write
48B1000
heap
page read and write
51B1000
heap
page read and write
6CD0000
heap
page read and write
4E61000
heap
page read and write
4711000
heap
page read and write
C1E000
stack
page read and write
3A4E000
stack
page read and write
BF2000
unkown
page execute and read and write
3D0F000
stack
page read and write
466E000
stack
page read and write
4E61000
heap
page read and write
5480000
direct allocation
page execute and read and write
2ECF000
stack
page read and write
175E000
stack
page read and write
47ED000
stack
page read and write
390E000
stack
page read and write
CD0000
direct allocation
page read and write
B52000
unkown
page execute and read and write
43EF000
stack
page read and write
4711000
heap
page read and write
CD0000
direct allocation
page read and write
51B6000
heap
page read and write
2F8E000
stack
page read and write
32AF000
stack
page read and write
470F000
stack
page read and write
1D99D000
stack
page read and write
1584000
heap
page read and write
4411000
heap
page read and write
A80000
heap
page read and write
1DC5F000
heap
page read and write
53E000
heap
page read and write
2AFE000
stack
page read and write
38CF000
stack
page read and write
4411000
heap
page read and write
1DC5B000
heap
page read and write
45CF000
stack
page read and write
4E7E000
stack
page read and write
456F000
stack
page read and write
4411000
heap
page read and write
4411000
heap
page read and write
EF5000
unkown
page execute and read and write
566E000
stack
page read and write
194C000
stack
page read and write
5490000
direct allocation
page execute and read and write
6F4000
heap
page read and write
370E000
stack
page read and write
4411000
heap
page read and write
4BDF000
stack
page read and write
601F000
stack
page read and write
3A8F000
stack
page read and write
4411000
heap
page read and write
51B1000
heap
page read and write
482F000
stack
page read and write
4411000
heap
page read and write
4411000
heap
page read and write
3BAF000
stack
page read and write
B80000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
B90000
unkown
page read and write
57B0000
direct allocation
page execute and read and write
A9A000
heap
page read and write
11C0000
heap
page read and write
E88000
unkown
page execute and read and write
4E61000
heap
page read and write
1A37000
heap
page read and write
4411000
heap
page read and write
5A8000
heap
page read and write
1DBDE000
stack
page read and write
4B90000
direct allocation
page read and write
54B0000
direct allocation
page execute and read and write
1D6EE000
stack
page read and write
C41000
unkown
page execute and read and write
57A0000
direct allocation
page execute and read and write
432000
unkown
page execute and read and write
DA9000
heap
page read and write
306E000
stack
page read and write
C30000
direct allocation
page read and write
33EF000
stack
page read and write
6F4000
heap
page read and write
1DC4B000
heap
page read and write
2E4E000
stack
page read and write
54E0000
direct allocation
page execute and read and write
23FF6000
heap
page read and write
6F4000
heap
page read and write
103E000
unkown
page execute and read and write
13BF000
stack
page read and write
FEF000
stack
page read and write
A64000
heap
page read and write
5470000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
3CEE000
stack
page read and write
1DC53000
heap
page read and write
424E000
stack
page read and write
5470000
direct allocation
page execute and read and write
52A0000
heap
page read and write
DC6000
heap
page read and write
6C7000
heap
page read and write
4E61000
heap
page read and write
23CD0000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
1584000
heap
page read and write
434F000
stack
page read and write
355F000
stack
page read and write
3A2E000
stack
page read and write
51B1000
heap
page read and write
5CF000
heap
page read and write
3E5E000
stack
page read and write
402F000
stack
page read and write
528E000
stack
page read and write
1584000
heap
page read and write
51B1000
heap
page read and write
B90000
unkown
page read and write
322F000
stack
page read and write
561B000
stack
page read and write
4411000
heap
page read and write
139D000
unkown
page execute and read and write
5666000
direct allocation
page read and write
4711000
heap
page read and write
50FF000
stack
page read and write
1DC66000
heap
page read and write
51B1000
heap
page read and write
1DC69000
heap
page read and write
378F000
stack
page read and write
1584000
heap
page read and write
520000
direct allocation
page read and write
51B1000
heap
page read and write
356E000
stack
page read and write
2C8E000
stack
page read and write
4411000
heap
page read and write
1DC8C000
heap
page read and write
1DC7F000
heap
page read and write
601000
heap
page read and write
1584000
heap
page read and write
51B1000
heap
page read and write
4711000
heap
page read and write
13B6000
unkown
page execute and write copy
1584000
heap
page read and write
11DF000
stack
page read and write
1A6B000
heap
page read and write
1DC80000
heap
page read and write
F9E000
unkown
page execute and read and write
4D30000
direct allocation
page read and write
A64000
heap
page read and write
23D42000
heap
page read and write
19BF000
heap
page read and write
4E71000
heap
page read and write
CD0000
direct allocation
page read and write
442E000
stack
page read and write
51B1000
heap
page read and write
42CF000
stack
page read and write
408E000
stack
page read and write
1430000
heap
page read and write
EEE000
stack
page read and write
80E000
unkown
page read and write
4E61000
heap
page read and write
There are 1561 hidden memdumps, click here to show them.