IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1012783001\5762ea743c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\KJJJKFIIIJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBAKEBGIIDAFIDHIIECF
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\CFBFCGID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DAEGIDHDHIDGIEBGIJEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBFHJEGDAFHIJKECFBKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDHCGDAFBKFIDHJJJDHCBFBGHD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJDHIDBFBFHIJKFHCGIEGIDAEH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJJEBGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3439a686-fe1b-410a-be69-d0719436c47f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\73ca78f6-7a42-4407-8faa-44bfc1fea2d1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\744fddfa-5af4-409c-95c5-a47224f9081d.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675355FC-1E38.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675355FC-D60.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF273de.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF273ee.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF27f57.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF27f67.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\abadaef3-e639-4d9e-abff-da1553887207.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ce802594-fc29-4d6e-beff-ea7971ae8120.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 6 18:52:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 6 18:52:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 6 18:52:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 6 18:52:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 6 18:52:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 105
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (837)
downloaded
Chrome Cache Entry: 107
ASCII text
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 110
SVG Scalable Vector Graphics image
downloaded
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=2084,i,15082746672518523759,5591991654557497421,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2440 --field-trial-handle=2236,i,13354329722629723967,17457331017763836313,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2304 --field-trial-handle=2272,i,9092242746492624172,9017713632823041127,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\KJJJKFIIIJ.exe"
malicious
C:\Users\user\Documents\KJJJKFIIIJ.exe
"C:\Users\user\Documents\KJJJKFIIIJ.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1012783001\5762ea743c.exe
"C:\Users\user\AppData\Local\Temp\1012783001\5762ea743c.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.phpS
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://185.215.113.43/Zu7JuNko/index.php_
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.206/68b591d6548ec281/msvcp140.dll.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/c4becf79229cb002.phpp
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.16/luma/random.exe
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
http://185.215.113.206/c4becf79229cb002.phpLy
unknown
https://apis.google.com
unknown
http://185.215.113.206/=
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
http://185.215.113.206/_
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.16/luma/random.exec61395d7
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dllk
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
http://185.215.113.16/mine/random.exee
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/c4becf79229cb002.phpDI
unknown
http://185.215.113.206/c4becf79229cb002.php423177b60194262422f8d727cf88
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.16/luma/random.exelencoded
unknown
https://support.mozilla.org
unknown
http://185.215.113.206AKKming
unknown
http://185.215.113.206
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dllu
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 49 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
www3.l.google.com
142.250.181.142
plus.l.google.com
172.217.17.78
play.google.com
172.217.19.206
www.google.com
142.250.181.100
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.8
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.17.78
plus.l.google.com
United States
142.250.181.142
www3.l.google.com
United States
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A11000
unkown
page execute and read and write
malicious
F2E000
heap
page read and write
malicious
A11000
unkown
page execute and read and write
malicious
951000
unkown
page execute and read and write
malicious
A11000
unkown
page execute and read and write
malicious
3A1000
unkown
page execute and read and write
malicious
4BB1000
heap
page read and write
2F10000
direct allocation
page read and write
47FE000
stack
page read and write
1D27E000
stack
page read and write
A11000
unkown
page execute and write copy
1D410000
heap
page read and write
3D0000
unkown
page readonly
3ECF000
stack
page read and write
1120000
heap
page read and write
3EFF000
stack
page read and write
392E000
stack
page read and write
C6A000
unkown
page execute and read and write
496F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
1470000
heap
page read and write
4931000
heap
page read and write
4920000
direct allocation
page read and write
2D50000
direct allocation
page read and write
1D37C000
stack
page read and write
2C7E000
heap
page read and write
5270000
direct allocation
page execute and read and write
CFD000
unkown
page execute and write copy
4BF1000
heap
page read and write
2382F000
stack
page read and write
C88000
unkown
page execute and read and write
5FFF000
stack
page read and write
4BF1000
heap
page read and write
C62000
unkown
page execute and read and write
C5A000
unkown
page execute and read and write
2D50000
direct allocation
page read and write
59FC000
stack
page read and write
288E000
stack
page read and write
42FE000
stack
page read and write
35AE000
stack
page read and write
1D3FF000
heap
page read and write
5EFE000
stack
page read and write
B1D000
unkown
page execute and write copy
43D1000
heap
page read and write
8CE000
heap
page read and write
4A30000
direct allocation
page execute and read and write
43D1000
heap
page read and write
C3B000
unkown
page execute and write copy
3F6E000
stack
page read and write
43D1000
heap
page read and write
1D403000
heap
page read and write
1D40A000
heap
page read and write
79E000
unkown
page execute and read and write
C83000
unkown
page execute and write copy
4BF1000
heap
page read and write
FA4000
heap
page read and write
33CE000
stack
page read and write
A72000
unkown
page execute and read and write
C02000
unkown
page execute and read and write
2D50000
direct allocation
page read and write
1D411000
heap
page read and write
43D1000
heap
page read and write
797000
unkown
page execute and write copy
4BF1000
heap
page read and write
820000
direct allocation
page execute and read and write
C17000
unkown
page execute and read and write
C90000
unkown
page execute and read and write
1D42C000
heap
page read and write
6FE52000
unkown
page readonly
C5A000
unkown
page execute and read and write
10F5000
heap
page read and write
148F000
stack
page read and write
C74000
unkown
page execute and read and write
4BF1000
heap
page read and write
F74000
heap
page read and write
820000
unkown
page execute and write copy
1240000
heap
page read and write
C43000
unkown
page execute and read and write
30AE000
stack
page read and write
45AE000
stack
page read and write
A87000
unkown
page execute and write copy
C7B000
unkown
page execute and read and write
2D40000
heap
page read and write
4BF1000
heap
page read and write
10FD000
stack
page read and write
BC3000
unkown
page execute and write copy
2EFE000
stack
page read and write
9C7000
unkown
page execute and write copy
75D000
unkown
page execute and write copy
38EF000
stack
page read and write
1D41E000
heap
page read and write
4BF1000
heap
page read and write
5210000
direct allocation
page execute and read and write
810000
direct allocation
page read and write
D22000
unkown
page execute and read and write
2E27000
heap
page read and write
4DC0000
direct allocation
page read and write
C59000
unkown
page execute and write copy
4BF1000
heap
page read and write
D0C000
unkown
page execute and write copy
1D3FF000
heap
page read and write
5190000
direct allocation
page execute and read and write
901000
heap
page read and write
1D42C000
heap
page read and write
873000
unkown
page execute and write copy
7F7000
heap
page read and write
43D1000
heap
page read and write
8CE000
heap
page read and write
1CE4F000
stack
page read and write
BF4000
unkown
page execute and read and write
47EF000
stack
page read and write
492F000
stack
page read and write
6CCD5000
unkown
page readonly
1D427000
heap
page read and write
C6A000
unkown
page execute and read and write
1D411000
heap
page read and write
4931000
heap
page read and write
CF9000
unkown
page execute and write copy
3A0000
unkown
page read and write
327F000
stack
page read and write
43D1000
heap
page read and write
3C4F000
stack
page read and write
C39000
unkown
page execute and write copy
1D406000
heap
page read and write
1D410000
heap
page read and write
A10000
unkown
page read and write
3A6F000
stack
page read and write
BA1000
unkown
page execute and write copy
4931000
heap
page read and write
4AEE000
stack
page read and write
316F000
stack
page read and write
4BF1000
heap
page read and write
D13000
unkown
page execute and write copy
432F000
stack
page read and write
C17000
unkown
page execute and read and write
781000
unkown
page execute and read and write
4BF1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
36AE000
stack
page read and write
486E000
stack
page read and write
453F000
stack
page read and write
4931000
heap
page read and write
43D1000
heap
page read and write
BD8000
unkown
page execute and write copy
8AE000
heap
page read and write
406F000
stack
page read and write
3A6E000
stack
page read and write
BB4000
unkown
page execute and read and write
1D3F5000
heap
page read and write
45AF000
stack
page read and write
284F000
stack
page read and write
C20000
unkown
page execute and read and write
D13000
unkown
page execute and write copy
F2A000
heap
page read and write
3DEF000
stack
page read and write
43D1000
heap
page read and write
7E0000
direct allocation
page read and write
1D42C000
heap
page read and write
88F000
heap
page read and write
61EB7000
direct allocation
page readonly
456F000
stack
page read and write
4F70000
direct allocation
page execute and read and write
12B5000
heap
page read and write
1134000
heap
page read and write
5CB0000
heap
page read and write
2E0F000
stack
page read and write
12A0000
direct allocation
page read and write
781000
unkown
page execute and write copy
4BF0000
heap
page read and write
4931000
heap
page read and write
51F0000
direct allocation
page execute and read and write
36AE000
stack
page read and write
149F000
stack
page read and write
46B000
stack
page read and write
61A0000
heap
page read and write
1D41E000
heap
page read and write
1D40D000
heap
page read and write
750000
heap
page read and write
4BF1000
heap
page read and write
740000
heap
page read and write
3F3E000
stack
page read and write
3DFE000
stack
page read and write
A72000
unkown
page execute and write copy
4940000
heap
page read and write
79E000
stack
page read and write
43D1000
heap
page read and write
50AE000
stack
page read and write
4931000
heap
page read and write
C98000
unkown
page execute and write copy
4931000
heap
page read and write
482F000
stack
page read and write
754000
heap
page read and write
7EF000
unkown
page execute and write copy
C17000
unkown
page execute and read and write
517F000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
C0B000
unkown
page execute and write copy
1D3F7000
heap
page read and write
4BF1000
heap
page read and write
43D1000
heap
page read and write
8A0000
unkown
page execute and write copy
565E000
stack
page read and write
306F000
stack
page read and write
12F4000
heap
page read and write
12A0000
direct allocation
page read and write
A79000
unkown
page write copy
1D3E0000
heap
page read and write
1D40D000
heap
page read and write
43D1000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4931000
heap
page read and write
C99000
unkown
page execute and read and write
890000
heap
page read and write
4931000
heap
page read and write
D11000
unkown
page execute and read and write
CF9000
unkown
page execute and write copy
428F000
stack
page read and write
4BF1000
heap
page read and write
41AF000
stack
page read and write
BB5000
unkown
page execute and write copy
F88000
heap
page read and write
4931000
heap
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
298F000
stack
page read and write
754000
heap
page read and write
12B9000
heap
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
CFD000
unkown
page execute and write copy
754000
heap
page read and write
56A000
stack
page read and write
407E000
stack
page read and write
BBB000
unkown
page execute and read and write
5D3C000
stack
page read and write
3E2E000
stack
page read and write
4990000
direct allocation
page execute and read and write
32AF000
stack
page read and write
4920000
direct allocation
page read and write
950000
unkown
page readonly
4BB0000
heap
page read and write
5220000
direct allocation
page execute and read and write
2C7E000
stack
page read and write
1140000
heap
page read and write
5210000
direct allocation
page execute and read and write
46AF000
stack
page read and write
350E000
stack
page read and write
4810000
trusted library allocation
page read and write
1D40F000
heap
page read and write
C5A000
unkown
page execute and read and write
C43000
unkown
page execute and read and write
3B6F000
stack
page read and write
816000
unkown
page execute and write copy
4BE0000
direct allocation
page read and write
507E000
stack
page read and write
422E000
stack
page read and write
754000
heap
page read and write
12A0000
direct allocation
page read and write
15CE000
stack
page read and write
BC8000
unkown
page execute and read and write
40AE000
stack
page read and write
4BF1000
heap
page read and write
C9A000
unkown
page execute and write copy
3A2F000
stack
page read and write
4920000
direct allocation
page read and write
2FCF000
stack
page read and write
5270000
direct allocation
page execute and read and write
D11000
unkown
page execute and read and write
CE0000
unkown
page execute and read and write
4931000
heap
page read and write
C85000
unkown
page execute and read and write
754000
heap
page read and write
4BE0000
direct allocation
page read and write
2C0F000
stack
page read and write
4BE0000
direct allocation
page read and write
4BE0000
direct allocation
page read and write
4BF1000
heap
page read and write
274B000
stack
page read and write
14CE000
stack
page read and write
4931000
heap
page read and write
42EF000
stack
page read and write
754000
heap
page read and write
3D1000
unkown
page execute and write copy
CFB000
unkown
page execute and write copy
51B0000
direct allocation
page execute and read and write
C16000
unkown
page execute and write copy
823000
unkown
page execute and read and write
1145000
heap
page read and write
BF7000
unkown
page execute and read and write
754000
heap
page read and write
4931000
heap
page read and write
2360D000
heap
page read and write
1134000
heap
page read and write
C1C000
unkown
page execute and read and write
754000
heap
page read and write
D0B000
unkown
page execute and write copy
8926000
heap
page read and write
1D40A000
heap
page read and write
7E5000
unkown
page execute and read and write
43D1000
heap
page read and write
886000
unkown
page execute and read and write
4BAF000
stack
page read and write
D11000
unkown
page execute and read and write
C61000
unkown
page execute and write copy
754000
heap
page read and write
5D8000
unkown
page execute and read and write
5CFE000
stack
page read and write
43D1000
heap
page read and write
C0B000
unkown
page execute and write copy
43D0000
heap
page read and write
1D42C000
heap
page read and write
4BF1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
2E6F000
stack
page read and write
37BE000
stack
page read and write
CA1000
unkown
page execute and read and write
4920000
direct allocation
page read and write
5040000
direct allocation
page read and write
F20000
heap
page read and write
1D428000
heap
page read and write
7B5000
unkown
page execute and write copy
1D40D000
heap
page read and write
2F2F000
stack
page read and write
C66000
unkown
page execute and write copy
DBC000
stack
page read and write
7E0000
direct allocation
page read and write
346E000
stack
page read and write
43D1000
heap
page read and write
2C7B000
heap
page read and write
C86000
unkown
page execute and write copy
A72000
unkown
page execute and read and write
1D407000
heap
page read and write
5040000
direct allocation
page read and write
482E000
stack
page read and write
5200000
direct allocation
page execute and read and write
12F2000
heap
page read and write
4931000
heap
page read and write
235F3000
heap
page read and write
5230000
direct allocation
page execute and read and write
37EE000
stack
page read and write
33EF000
stack
page read and write
2CBE000
stack
page read and write
43D1000
heap
page read and write
60FC000
stack
page read and write
4BF1000
heap
page read and write
662C000
stack
page read and write
4931000
heap
page read and write
CF9000
unkown
page execute and write copy
43D1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
754000
heap
page read and write
12A0000
direct allocation
page read and write
754000
heap
page read and write
43D1000
heap
page read and write
4BF1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
4DC0000
direct allocation
page read and write
754000
heap
page read and write
306E000
stack
page read and write
42BF000
stack
page read and write
9B9000
unkown
page write copy
4931000
heap
page read and write
43D1000
heap
page read and write
4B44000
heap
page read and write
4BF1000
heap
page read and write
5F8000
unkown
page execute and write copy
5C7E000
stack
page read and write
4F4E000
stack
page read and write
1D407000
heap
page read and write
B34000
unkown
page execute and read and write
C88000
unkown
page execute and read and write
918000
heap
page read and write
830000
heap
page read and write
4BF1000
heap
page read and write
432E000
stack
page read and write
43D1000
heap
page read and write
BF7000
unkown
page execute and read and write
D0B000
unkown
page execute and read and write
7E0000
direct allocation
page read and write
A79000
unkown
page write copy
C0C000
unkown
page execute and read and write
1D407000
heap
page read and write
1D405000
heap
page read and write
81E000
unkown
page execute and write copy
1150000
heap
page read and write
C31000
unkown
page execute and write copy
353E000
stack
page read and write
2F6F000
stack
page read and write
2DDE000
stack
page read and write
4920000
direct allocation
page read and write
1D411000
heap
page read and write
4BF1000
heap
page read and write
37AF000
stack
page read and write
4931000
heap
page read and write
2D50000
direct allocation
page read and write
B80000
heap
page read and write
575F000
stack
page read and write
472E000
stack
page read and write
C0C000
unkown
page execute and read and write
754000
heap
page read and write
446E000
stack
page read and write
754000
heap
page read and write
2F6E000
stack
page read and write
39CF000
stack
page read and write
4B40000
heap
page read and write
3BAE000
stack
page read and write
148C000
heap
page read and write
43D1000
heap
page read and write
4BF1000
heap
page read and write
7E0000
direct allocation
page read and write
4C00000
heap
page read and write
2B1E000
stack
page read and write
235D0000
heap
page read and write
1D411000
heap
page read and write
1D41E000
heap
page read and write
1D427000
heap
page read and write
5250000
direct allocation
page execute and read and write
4F40000
direct allocation
page execute and read and write
45EE000
stack
page read and write
8CE000
heap
page read and write
1D500000
trusted library allocation
page read and write
125E000
stack
page read and write
A87000
unkown
page execute and write copy
4BF1000
heap
page read and write
4931000
heap
page read and write
800000
unkown
page execute and write copy
A10000
unkown
page readonly
7F5000
unkown
page execute and write copy
1D429000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
41EF000
stack
page read and write
754000
heap
page read and write
4F40000
direct allocation
page execute and read and write
5240000
direct allocation
page execute and read and write
316F000
stack
page read and write
BF5000
unkown
page execute and write copy
1D42C000
heap
page read and write
41EE000
stack
page read and write
88F000
unkown
page execute and write copy
4BEF000
stack
page read and write
C99000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
51E0000
direct allocation
page execute and read and write
235F5000
heap
page read and write
1140000
heap
page read and write
3F2F000
stack
page read and write
34FF000
stack
page read and write
C7B000
unkown
page execute and read and write
3F6F000
stack
page read and write
2FFF000
stack
page read and write
53DE000
stack
page read and write
306F000
stack
page read and write
328E000
stack
page read and write
1134000
heap
page read and write
4931000
heap
page read and write
2D67000
heap
page read and write
4BF1000
heap
page read and write
342F000
stack
page read and write
356E000
stack
page read and write
1D41E000
heap
page read and write
5240000
direct allocation
page execute and read and write
C53000
unkown
page execute and write copy
2F10000
direct allocation
page read and write
B5C000
unkown
page execute and read and write
A10000
unkown
page readonly
43D1000
heap
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
810000
direct allocation
page read and write
C83000
unkown
page execute and write copy
10FD000
stack
page read and write
950000
unkown
page read and write
43D1000
heap
page read and write
3CBE000
stack
page read and write
BDB000
unkown
page execute and read and write
4BF1000
heap
page read and write
364E000
stack
page read and write
4920000
direct allocation
page read and write
1D411000
heap
page read and write
875000
unkown
page execute and read and write
235FB000
heap
page read and write
A79000
unkown
page write copy
2D50000
direct allocation
page read and write
C71000
unkown
page execute and write copy
236B0000
trusted library allocation
page read and write
51AF000
stack
page read and write
238D6000
heap
page read and write
1D411000
heap
page read and write
235F1000
heap
page read and write
613F000
stack
page read and write
4BB1000
heap
page read and write
88F000
unkown
page execute and write copy
43D1000
heap
page read and write
4931000
heap
page read and write
C02000
unkown
page execute and read and write
1285000
heap
page read and write
455000
unkown
page execute and read and write
51BF000
stack
page read and write
51C0000
direct allocation
page execute and read and write
7E3000
unkown
page execute and write copy
3B0F000
stack
page read and write
51C0000
direct allocation
page execute and read and write
1CFFE000
stack
page read and write
7F4000
unkown
page execute and read and write
4BF1000
heap
page read and write
1130000
heap
page read and write
49A0000
direct allocation
page execute and read and write
34CF000
stack
page read and write
1D408000
heap
page read and write
43D1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
4BE0000
direct allocation
page read and write
8928000
heap
page read and write
655F000
stack
page read and write
43D1000
heap
page read and write
2C5C000
stack
page read and write
2E20000
heap
page read and write
C64000
unkown
page execute and read and write
4931000
heap
page read and write
23478000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4FF0000
trusted library allocation
page read and write
BDD000
unkown
page execute and write copy
8B5000
heap
page read and write
6FE4E000
unkown
page read and write
4810000
heap
page read and write
2D60000
heap
page read and write
DBC000
stack
page read and write
43D1000
heap
page read and write
6CAF1000
unkown
page execute read
4BF1000
heap
page read and write
A72000
unkown
page execute and write copy
424000
unkown
page execute and read and write
754000
heap
page read and write
89F000
unkown
page execute and write copy
44AE000
stack
page read and write
6CCD0000
unkown
page read and write
4BF1000
heap
page read and write
4BE0000
direct allocation
page read and write
EF3000
stack
page read and write
43CF000
stack
page read and write
4A10000
direct allocation
page execute and read and write
1D3EE000
heap
page read and write
43D1000
heap
page read and write
443E000
stack
page read and write
37EE000
stack
page read and write
10F0000
heap
page read and write
754000
heap
page read and write
631B000
stack
page read and write
7E6000
unkown
page execute and write copy
CE0000
unkown
page execute and read and write
754000
heap
page read and write
C16000
unkown
page execute and write copy
51C0000
direct allocation
page execute and read and write
11DE000
heap
page read and write
43D1000
heap
page read and write
3F0E000
stack
page read and write
1D3E2000
heap
page read and write
43D1000
heap
page read and write
A7B000
unkown
page execute and read and write
3CAF000
stack
page read and write
4BF1000
heap
page read and write
BA4000
unkown
page execute and read and write
C7B000
unkown
page execute and read and write
754000
heap
page read and write
43D1000
heap
page read and write
9B9000
unkown
page write copy
238C7000
heap
page read and write
4931000
heap
page read and write
C98000
unkown
page execute and write copy
6FE3D000
unkown
page readonly
6FDC1000
unkown
page execute read
5FFC000
stack
page read and write
43D1000
heap
page read and write
C01000
unkown
page execute and write copy
C6A000
unkown
page execute and read and write
C66000
unkown
page execute and write copy
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
235B0000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
2A41B000
stack
page read and write
1D409000
heap
page read and write
A72000
unkown
page execute and read and write
4BC0000
heap
page read and write
4BF1000
heap
page read and write
43D1000
heap
page read and write
EF8000
stack
page read and write
51E0000
direct allocation
page execute and read and write
906000
heap
page read and write
898F000
heap
page read and write
342E000
stack
page read and write
7FA000
unkown
page execute and read and write
1D41E000
heap
page read and write
456F000
stack
page read and write
9BB000
unkown
page execute and read and write
5EBF000
stack
page read and write
754000
heap
page read and write
CA1000
unkown
page execute and read and write
2D50000
direct allocation
page read and write
C43000
unkown
page execute and read and write
43D1000
heap
page read and write
23650000
heap
page read and write
43D1000
heap
page read and write
B35000
unkown
page execute and write copy
6CCCF000
unkown
page write copy
4BF1000
heap
page read and write
BF7000
unkown
page execute and read and write
BF4000
unkown
page execute and read and write
5210000
direct allocation
page execute and read and write
1D3EF000
heap
page read and write
58AF000
stack
page read and write
43D1000
heap
page read and write
4A30000
trusted library allocation
page read and write
C90000
unkown
page execute and read and write
4931000
heap
page read and write
87A000
unkown
page execute and write copy
819000
unkown
page execute and read and write
360F000
stack
page read and write
4BF1000
heap
page read and write
754000
heap
page read and write
406F000
stack
page read and write
754000
heap
page read and write
BAA000
unkown
page execute and read and write
8FE000
heap
page read and write
4DFC000
stack
page read and write
43D1000
heap
page read and write
3F2F000
stack
page read and write
138E000
stack
page read and write
4931000
heap
page read and write
754000
heap
page read and write
D22000
unkown
page execute and read and write
8EF000
heap
page read and write
4BAF000
stack
page read and write
1D42C000
heap
page read and write
1D42C000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
1D42C000
heap
page read and write
61A1000
heap
page read and write
3CEE000
stack
page read and write
8CE000
heap
page read and write
58FD000
stack
page read and write
50BB000
stack
page read and write
47BF000
stack
page read and write
46AF000
stack
page read and write
61ED3000
direct allocation
page read and write
2C4E000
stack
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
D0B000
unkown
page execute and read and write
3E2F000
stack
page read and write
32AF000
stack
page read and write
400F000
stack
page read and write
2D50000
direct allocation
page read and write
C64000
unkown
page execute and read and write
43D1000
heap
page read and write
1D40A000
heap
page read and write
4931000
heap
page read and write
23604000
heap
page read and write
4BF1000
heap
page read and write
338F000
stack
page read and write
C75000
unkown
page execute and write copy
C8F000
unkown
page execute and write copy
1D42C000
heap
page read and write
302F000
stack
page read and write
1D3F9000
heap
page read and write
4931000
heap
page read and write
1290000
heap
page read and write
382E000
stack
page read and write
4BF1000
heap
page read and write
7FE000
heap
page read and write
23610000
heap
page read and write
B1C000
stack
page read and write
43D1000
heap
page read and write
1D42C000
heap
page read and write
D13000
unkown
page execute and write copy
4F60000
direct allocation
page execute and read and write
4931000
heap
page read and write
61B0000
heap
page read and write
81F000
unkown
page execute and read and write
8DE000
heap
page read and write
C8F000
unkown
page execute and write copy
C75000
unkown
page execute and write copy
1CF8F000
stack
page read and write
5EC000
unkown
page execute and read and write
1CD4E000
stack
page read and write
1D40A000
heap
page read and write
5EC000
unkown
page execute and write copy
457E000
stack
page read and write
4920000
direct allocation
page read and write
B1B000
unkown
page execute and read and write
7F0000
heap
page read and write
4BE0000
direct allocation
page read and write
37AF000
stack
page read and write
314E000
stack
page read and write
51C0000
direct allocation
page execute and read and write
57AE000
stack
page read and write
918000
heap
page read and write
C31000
unkown
page execute and write copy
A11000
unkown
page execute and write copy
4BF1000
heap
page read and write
12A0000
direct allocation
page read and write
43D1000
heap
page read and write
4931000
heap
page read and write
342E000
stack
page read and write
BDD000
unkown
page execute and write copy
C4B000
unkown
page execute and read and write
906000
heap
page read and write
5250000
direct allocation
page execute and read and write
5CB5000
heap
page read and write
5200000
direct allocation
page execute and read and write
951000
unkown
page execute and write copy
4931000
heap
page read and write
BF5000
unkown
page execute and write copy
1D411000
heap
page read and write
5200000
direct allocation
page execute and read and write
54DF000
stack
page read and write
4BF1000
heap
page read and write
83E000
heap
page read and write
238CE000
heap
page read and write
33BF000
stack
page read and write
3A6E000
stack
page read and write
BC5000
unkown
page execute and read and write
3DBF000
stack
page read and write
A10000
unkown
page read and write
43D1000
heap
page read and write
367E000
stack
page read and write
3E2E000
stack
page read and write
4BF1000
heap
page read and write
1D411000
heap
page read and write
918000
heap
page read and write
C62000
unkown
page execute and write copy
2A560000
heap
page read and write
A7B000
unkown
page execute and write copy
43D1000
heap
page read and write
51F0000
direct allocation
page execute and read and write
C01000
unkown
page execute and write copy
4BF1000
heap
page read and write
43D1000
heap
page read and write
12A0000
direct allocation
page read and write
C64000
unkown
page execute and read and write
D22000
unkown
page execute and read and write
12A0000
direct allocation
page read and write
32BE000
stack
page read and write
C85000
unkown
page execute and read and write
A72000
unkown
page execute and write copy
43D1000
heap
page read and write
507000
unkown
page execute and read and write
377F000
stack
page read and write
2CFE000
stack
page read and write
1D0FF000
stack
page read and write
61AE000
heap
page read and write
4BB0000
heap
page read and write
A7B000
unkown
page execute and read and write
754000
heap
page read and write
B4B000
unkown
page execute and write copy
43D1000
heap
page read and write
CFD000
unkown
page execute and write copy
754000
heap
page read and write
7E0000
direct allocation
page read and write
41EE000
stack
page read and write
4BF1000
heap
page read and write
2372E000
stack
page read and write
8926000
heap
page read and write
1D411000
heap
page read and write
5260000
direct allocation
page execute and read and write
5CB6000
heap
page read and write
B56000
unkown
page execute and write copy
378E000
stack
page read and write
29CE000
stack
page read and write
CA1000
unkown
page execute and read and write
352F000
stack
page read and write
4931000
heap
page read and write
5E3A000
stack
page read and write
7F6000
unkown
page execute and read and write
1120000
heap
page read and write
754000
heap
page read and write
4A00000
direct allocation
page execute and read and write
930000
direct allocation
page execute and read and write
51C0000
direct allocation
page execute and read and write
A10000
unkown
page readonly
C3D000
unkown
page execute and write copy
4990000
direct allocation
page execute and read and write
1D427000
heap
page read and write
4BF1000
heap
page read and write
1D23D000
stack
page read and write
5200000
direct allocation
page execute and read and write
51F0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
235B0000
heap
page read and write
2D50000
direct allocation
page read and write
C1C000
unkown
page execute and read and write
51A0000
direct allocation
page execute and read and write
754000
heap
page read and write
C75000
unkown
page execute and write copy
1D411000
heap
page read and write
5230000
direct allocation
page execute and read and write
B57000
unkown
page execute and read and write
11AE000
stack
page read and write
4990000
direct allocation
page execute and read and write
DDC000
stack
page read and write
796000
unkown
page execute and read and write
BDA000
unkown
page execute and write copy
1D403000
heap
page read and write
6140000
heap
page read and write
1D3F7000
heap
page read and write
46EF000
stack
page read and write
C1C000
unkown
page execute and read and write
892E000
heap
page read and write
892D000
heap
page read and write
13BF000
stack
page read and write
313F000
stack
page read and write
13FE000
stack
page read and write
6ED0000
heap
page read and write
43D1000
heap
page read and write
12C9000
heap
page read and write
43D1000
heap
page read and write
396E000
stack
page read and write
49E0000
direct allocation
page execute and read and write
903000
heap
page read and write
EFE000
stack
page read and write
1134000
heap
page read and write
4931000
heap
page read and write
9B2000
unkown
page execute and write copy
881000
heap
page read and write
43D1000
heap
page read and write
2C77000
heap
page read and write
A10000
unkown
page read and write
4931000
heap
page read and write
36EE000
stack
page read and write
37EF000
stack
page read and write
4990000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
5A3E000
stack
page read and write
C53000
unkown
page execute and write copy
4AAE000
stack
page read and write
4931000
heap
page read and write
1D41E000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1D502000
heap
page read and write
49AE000
stack
page read and write
5260000
direct allocation
page execute and read and write
3D8F000
stack
page read and write
1D411000
heap
page read and write
4BF1000
heap
page read and write
3C7F000
stack
page read and write
2E1C000
stack
page read and write
4931000
heap
page read and write
1D42C000
heap
page read and write
422000
unkown
page write copy
49F0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
4920000
direct allocation
page read and write
C71000
unkown
page execute and write copy
C98000
unkown
page execute and write copy
4BF1000
heap
page read and write
4BE0000
direct allocation
page read and write
3CEE000
stack
page read and write
4990000
direct allocation
page execute and read and write
366F000
stack
page read and write
1D3F5000
heap
page read and write
645E000
stack
page read and write
46BE000
stack
page read and write
4BF6000
heap
page read and write
4931000
heap
page read and write
3BAF000
stack
page read and write
C0B000
unkown
page execute and write copy
388F000
stack
page read and write
43D1000
heap
page read and write
5EA000
unkown
page write copy
C86000
unkown
page execute and write copy
235B0000
trusted library allocation
page read and write
89F000
unkown
page execute and read and write
8910000
heap
page read and write
754000
heap
page read and write
43D1000
heap
page read and write
4920000
direct allocation
page read and write
51D0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
6FDC0000
unkown
page readonly
CFB000
unkown
page execute and write copy
C31000
unkown
page execute and write copy
6CB000
unkown
page execute and write copy
4BF1000
heap
page read and write
789000
unkown
page execute and write copy
2EBF000
stack
page read and write
4931000
heap
page read and write
61EB4000
direct allocation
page read and write
7C7000
unkown
page execute and read and write
470000
unkown
page execute and read and write
801000
unkown
page execute and read and write
885000
unkown
page execute and write copy
4BF1000
heap
page read and write
C4C000
unkown
page execute and write copy
4920000
direct allocation
page read and write
4F50000
direct allocation
page execute and read and write
4A6F000
stack
page read and write
128A000
heap
page read and write
4920000
direct allocation
page read and write
6B0000
heap
page read and write
4931000
heap
page read and write
43D1000
heap
page read and write
4931000
heap
page read and write
32EE000
stack
page read and write
10FD000
stack
page read and write
310F000
stack
page read and write
2D8E000
stack
page read and write
46EE000
stack
page read and write
42CE000
stack
page read and write
D0B000
unkown
page execute and write copy
36AF000
stack
page read and write
1D409000
heap
page read and write
3FAE000
stack
page read and write
2C70000
heap
page read and write
C90000
unkown
page execute and read and write
81D000
unkown
page execute and read and write
41BE000
stack
page read and write
4BF1000
heap
page read and write
1134000
heap
page read and write
43D1000
heap
page read and write
BE1000
unkown
page execute and read and write
32EE000
stack
page read and write
C51000
unkown
page execute and read and write
3BEE000
stack
page read and write
887000
unkown
page execute and write copy
6CC8F000
unkown
page readonly
9BB000
unkown
page execute and write copy
5200000
direct allocation
page execute and read and write
C8F000
unkown
page execute and write copy
332E000
stack
page read and write
3DCE000
stack
page read and write
7E0000
direct allocation
page read and write
7E0000
direct allocation
page read and write
66D0000
trusted library allocation
page read and write
492F000
stack
page read and write
BA6000
unkown
page execute and write copy
317E000
stack
page read and write
4BF1000
heap
page read and write
29DD000
stack
page read and write
754000
heap
page read and write
C85000
unkown
page execute and read and write
2E2B000
heap
page read and write
1134000
heap
page read and write
4BF1000
heap
page read and write
366F000
stack
page read and write
404E000
stack
page read and write
482E000
stack
page read and write
1134000
heap
page read and write
4BF1000
heap
page read and write
A79000
unkown
page write copy
23607000
heap
page read and write
1D42C000
heap
page read and write
1D40A000
heap
page read and write
4A20000
direct allocation
page execute and read and write
43D1000
heap
page read and write
B41000
unkown
page execute and write copy
1D42C000
heap
page read and write
23830000
trusted library allocation
page read and write
E6E000
stack
page read and write
795000
unkown
page execute and write copy
4BF1000
heap
page read and write
885000
unkown
page execute and write copy
1D3F7000
heap
page read and write
43D1000
heap
page read and write
4BF1000
heap
page read and write
3B4E000
stack
page read and write
4950000
heap
page read and write
446F000
stack
page read and write
4BF1000
heap
page read and write
603E000
stack
page read and write
BF4000
unkown
page execute and read and write
5D0000
heap
page read and write
3A1000
unkown
page execute and write copy
43D1000
heap
page read and write
2F0F000
stack
page read and write
1D13D000
stack
page read and write
754000
heap
page read and write
754000
heap
page read and write
BDB000
unkown
page execute and read and write
61ECC000
direct allocation
page read and write
1D429000
heap
page read and write
12FD000
heap
page read and write
B4C000
unkown
page execute and read and write
32EF000
stack
page read and write
43D1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
1D427000
heap
page read and write
4BE0000
direct allocation
page read and write
61ECD000
direct allocation
page readonly
CE0000
unkown
page execute and read and write
2A55C000
stack
page read and write
31AF000
stack
page read and write
374F000
stack
page read and write
C18000
unkown
page execute and write copy
43D1000
heap
page read and write
5200000
direct allocation
page execute and read and write
4931000
heap
page read and write
3B7E000
stack
page read and write
33EF000
stack
page read and write
235F0000
heap
page read and write
300E000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
40AF000
stack
page read and write
363F000
stack
page read and write
238D5000
heap
page read and write
43D1000
heap
page read and write
906000
heap
page read and write
4F20000
direct allocation
page execute and read and write
5030000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
2F20000
heap
page read and write
3D0000
unkown
page readonly
B83000
unkown
page execute and read and write
488E000
stack
page read and write
754000
heap
page read and write
1D3FE000
heap
page read and write
403F000
stack
page read and write
4931000
heap
page read and write
1D3EE000
heap
page read and write
D13000
unkown
page execute and write copy
43E1000
heap
page read and write
1CE8E000
stack
page read and write
43D1000
heap
page read and write
7E0000
direct allocation
page read and write
1CD0F000
stack
page read and write
352F000
stack
page read and write
BD9000
unkown
page execute and read and write
6ED9000
heap
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
81B000
unkown
page execute and write copy
BC6000
unkown
page execute and write copy
8AC000
heap
page read and write
2D50000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
2D4F000
stack
page read and write
C9A000
unkown
page execute and write copy
4BE0000
direct allocation
page read and write
4920000
direct allocation
page read and write
4BE0000
direct allocation
page read and write
815000
unkown
page execute and read and write
4BF1000
heap
page read and write
754000
heap
page read and write
1D3FE000
heap
page read and write
442F000
stack
page read and write
4BF1000
heap
page read and write
356E000
stack
page read and write
6CB000
unkown
page execute and write copy
BDB000
unkown
page execute and read and write
11DA000
heap
page read and write
4920000
direct allocation
page read and write
8DF000
heap
page read and write
2DBE000
stack
page read and write
5200000
direct allocation
page execute and read and write
61E01000
direct allocation
page execute read
4931000
heap
page read and write
11D0000
heap
page read and write
418E000
stack
page read and write
4931000
heap
page read and write
43D1000
heap
page read and write
1D407000
heap
page read and write
1134000
heap
page read and write
12A0000
direct allocation
page read and write
1D42C000
heap
page read and write
4931000
heap
page read and write
43D1000
heap
page read and write
2C60000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
5080000
direct allocation
page read and write
8F6000
heap
page read and write
1440000
heap
page read and write
4BF1000
heap
page read and write
38EF000
stack
page read and write
8EF000
heap
page read and write
496E000
stack
page read and write
1134000
heap
page read and write
3A0000
unkown
page readonly
C16000
unkown
page execute and write copy
754000
heap
page read and write
5260000
direct allocation
page execute and read and write
49C0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
506C000
stack
page read and write
51D0000
direct allocation
page execute and read and write
1D415000
heap
page read and write
4931000
heap
page read and write
C4B000
unkown
page execute and write copy
4BF1000
heap
page read and write
4A6F000
stack
page read and write
7E0000
direct allocation
page read and write
12A0000
direct allocation
page read and write
A79000
unkown
page write copy
2D7F000
stack
page read and write
4931000
heap
page read and write
D22000
unkown
page execute and write copy
BF5000
unkown
page execute and write copy
4931000
heap
page read and write
38BF000
stack
page read and write
641C000
stack
page read and write
4931000
heap
page read and write
12A0000
direct allocation
page read and write
3E6E000
stack
page read and write
4F30000
direct allocation
page execute and read and write
5220000
direct allocation
page execute and read and write
7E0000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
1D42C000
heap
page read and write
A7B000
unkown
page execute and write copy
4931000
heap
page read and write
147B000
heap
page read and write
7E0000
direct allocation
page read and write
CFB000
unkown
page execute and write copy
392F000
stack
page read and write
1134000
heap
page read and write
3CEF000
stack
page read and write
392E000
stack
page read and write
754000
heap
page read and write
7E0000
direct allocation
page read and write
561E000
stack
page read and write
C0C000
unkown
page execute and read and write
78E000
unkown
page execute and read and write
551E000
stack
page read and write
43D1000
heap
page read and write
5080000
direct allocation
page read and write
4990000
direct allocation
page execute and read and write
31EE000
stack
page read and write
83A000
heap
page read and write
87C000
heap
page read and write
5220000
direct allocation
page execute and read and write
124B000
heap
page read and write
4BF1000
heap
page read and write
61ED0000
direct allocation
page read and write
D0C000
unkown
page execute and write copy
4931000
heap
page read and write
12A0000
direct allocation
page read and write
3A0D000
stack
page read and write
356F000
stack
page read and write
5BFE000
stack
page read and write
754000
heap
page read and write
C66000
unkown
page execute and write copy
B99000
unkown
page execute and write copy
2A450000
heap
page read and write
903000
heap
page read and write
43D1000
heap
page read and write
4931000
heap
page read and write
4BF1000
heap
page read and write
8CA000
heap
page read and write
51E0000
direct allocation
page execute and read and write
1D403000
heap
page read and write
3D7000
unkown
page execute and read and write
4931000
heap
page read and write
4BE0000
direct allocation
page read and write
43D1000
heap
page read and write
38CE000
stack
page read and write
39FF000
stack
page read and write
467F000
stack
page read and write
C86000
unkown
page execute and write copy
4931000
heap
page read and write
33FE000
stack
page read and write
3AAE000
stack
page read and write
3BAE000
stack
page read and write
1134000
heap
page read and write
422000
unkown
page write copy
43D1000
heap
page read and write
6CAF0000
unkown
page readonly
3C8E000
stack
page read and write
2ADE000
stack
page read and write
45AE000
stack
page read and write
754000
heap
page read and write
1D40A000
heap
page read and write
754000
heap
page read and write
43FF000
stack
page read and write
D0C000
unkown
page execute and write copy
8917000
heap
page read and write
D22000
unkown
page execute and write copy
C74000
unkown
page execute and read and write
2E8F000
stack
page read and write
4BF1000
heap
page read and write
5FB0000
heap
page read and write
414F000
stack
page read and write
474000
unkown
page execute and read and write
4BE0000
direct allocation
page read and write
46EE000
stack
page read and write
23678000
heap
page read and write
47EF000
stack
page read and write
5030000
trusted library allocation
page read and write
85D000
unkown
page execute and read and write
1D40A000
heap
page read and write
3D2E000
stack
page read and write
C59000
unkown
page execute and write copy
BFD000
stack
page read and write
91B000
heap
page read and write
2D3E000
stack
page read and write
1D407000
heap
page read and write
D13000
unkown
page execute and write copy
8A9000
heap
page read and write
C18000
unkown
page execute and write copy
2ECE000
stack
page read and write
43D1000
heap
page read and write
BD0000
unkown
page execute and read and write
4C10000
heap
page read and write
B71000
unkown
page execute and write copy
4931000
heap
page read and write
31AE000
stack
page read and write
2B0E000
stack
page read and write
436E000
stack
page read and write
4BF1000
heap
page read and write
446E000
stack
page read and write
31AE000
stack
page read and write
48FF000
stack
page read and write
2F27000
heap
page read and write
B58000
unkown
page execute and write copy
43D1000
heap
page read and write
4BF1000
heap
page read and write
75B000
unkown
page execute and read and write
1D427000
heap
page read and write
51E0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
3F6E000
stack
page read and write
D6E000
stack
page read and write
43D1000
heap
page read and write
754000
heap
page read and write
4931000
heap
page read and write
4930000
heap
page read and write
43D1000
heap
page read and write
2D50000
direct allocation
page read and write
12A0000
direct allocation
page read and write
51C0000
direct allocation
page execute and read and write
1D425000
heap
page read and write
3CAF000
stack
page read and write
129E000
heap
page read and write
43D1000
heap
page read and write
1134000
heap
page read and write
498E000
heap
page read and write
C59000
unkown
page execute and write copy
5240000
direct allocation
page execute and read and write
432E000
stack
page read and write
B42000
unkown
page execute and read and write
43D1000
heap
page read and write
1134000
heap
page read and write
1D3EB000
heap
page read and write
51E0000
direct allocation
page execute and read and write
D0B000
unkown
page execute and read and write
498F000
stack
page read and write
B90000
heap
page read and write
940000
direct allocation
page execute and read and write
1D3F7000
heap
page read and write
7E0000
direct allocation
page read and write
A7B000
unkown
page execute and read and write
4931000
heap
page read and write
7F7000
unkown
page execute and write copy
43D1000
heap
page read and write
49D0000
direct allocation
page execute and read and write
1D3EE000
heap
page read and write
3D1000
unkown
page execute and write copy
15D0000
heap
page read and write
324F000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
1D40A000
heap
page read and write
4BF1000
heap
page read and write
1134000
heap
page read and write
4920000
direct allocation
page read and write
12B0000
heap
page read and write
42EE000
stack
page read and write
7EE000
unkown
page execute and read and write
4BE0000
direct allocation
page read and write
539B000
stack
page read and write
754000
heap
page read and write
2C1F000
stack
page read and write
BB1000
unkown
page execute and write copy
A79000
unkown
page write copy
C99000
unkown
page execute and read and write
5280000
direct allocation
page execute and read and write
754000
heap
page read and write
1D41E000
heap
page read and write
B9A000
unkown
page execute and read and write
4BB1000
heap
page read and write
A7B000
unkown
page execute and write copy
61B0000
heap
page read and write
1260000
heap
page read and write
23515000
heap
page read and write
C61000
unkown
page execute and write copy
C83000
unkown
page execute and write copy
C9A000
unkown
page execute and write copy
8980000
heap
page read and write
49B0000
direct allocation
page execute and read and write
12A0000
direct allocation
page read and write
8F6000
heap
page read and write
4934000
heap
page read and write
8F6000
heap
page read and write
2D50000
direct allocation
page read and write
43D1000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
7DE000
stack
page read and write
5EA000
unkown
page write copy
51C0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
303E000
stack
page read and write
4900000
heap
page read and write
4BF1000
heap
page read and write
1D411000
heap
page read and write
43D1000
heap
page read and write
9B2000
unkown
page execute and read and write
D0B000
unkown
page execute and write copy
C71000
unkown
page execute and write copy
4BF1000
heap
page read and write
1134000
heap
page read and write
BDD000
unkown
page execute and write copy
43D1000
heap
page read and write
4931000
heap
page read and write
238CF000
heap
page read and write
2D50000
direct allocation
page read and write
754000
heap
page read and write
43D1000
heap
page read and write
C01000
unkown
page execute and write copy
43D1000
heap
page read and write
43E2000
heap
page read and write
40AE000
stack
page read and write
38FE000
stack
page read and write
41AF000
stack
page read and write
D22000
unkown
page execute and write copy
7E0000
direct allocation
page read and write
1D42C000
heap
page read and write
4AAF000
stack
page read and write
12A0000
direct allocation
page read and write
A11000
unkown
page execute and write copy
4931000
heap
page read and write
4AAE000
stack
page read and write
C74000
unkown
page execute and read and write
C18000
unkown
page execute and write copy
4EFF000
stack
page read and write
442F000
stack
page read and write
890C000
stack
page read and write
6CCCE000
unkown
page read and write
4BF1000
heap
page read and write
2D50000
direct allocation
page read and write
43D1000
heap
page read and write
496E000
stack
page read and write
5B3D000
stack
page read and write
71E000
stack
page read and write
2ACF000
stack
page read and write
270F000
stack
page read and write
23630000
heap
page read and write
3A2F000
stack
page read and write
11FE000
stack
page read and write
40EE000
stack
page read and write
417F000
stack
page read and write
143E000
stack
page read and write
810000
unkown
page execute and write copy
43D1000
heap
page read and write
C61000
unkown
page execute and write copy
3A3E000
stack
page read and write
4931000
heap
page read and write
BCF000
unkown
page execute and write copy
A87000
unkown
page execute and write copy
C02000
unkown
page execute and read and write
4931000
heap
page read and write
2D50000
direct allocation
page read and write
C88000
unkown
page execute and read and write
4931000
heap
page read and write
775000
unkown
page execute and read and write
1D42C000
heap
page read and write
D13000
unkown
page execute and write copy
4BF1000
heap
page read and write
1D406000
heap
page read and write
4BF0000
heap
page read and write
5200000
direct allocation
page execute and read and write
B37000
unkown
page execute and read and write
43D1000
heap
page read and write
4931000
heap
page read and write
3B6F000
stack
page read and write
3B3F000
stack
page read and write
4BF1000
heap
page read and write
4931000
heap
page read and write
3DEF000
stack
page read and write
There are 1379 hidden memdumps, click here to show them.