IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\EBAEBFIIEC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAAEBAFBGIDHCBFHIECFCBGHIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BFHDAEHDAKECGCAKFCFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBFCFIEBKEGHIDGCAFBFBFHDBA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FCFBFHIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIJECAEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HCBGDGCAAKJEBFIDBAAA
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\JKEBFBFIEHIDAAAAFHCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9c487cbe-b364-4fda-8e24-f19d0adea170.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67538334-1970.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67538334-F38.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF251ee.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2520e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF25d68.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF25d78.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\aac6791c-1e1a-46ef-8e38-6bf9278c302a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c8de3d69-b2ac-4956-bce8-2835cdd320f0.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\dc31c7db-be72-40a7-8b75-860f2100b968.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\fe36fb28-7403-4cfe-b268-dfde15f0d985.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 87
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (775)
downloaded
Chrome Cache Entry: 89
ASCII text
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 92
SVG Scalable Vector Graphics image
downloaded
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 --field-trial-handle=2176,i,4764351343650713281,6497553949614997489,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2612 --field-trial-handle=2308,i,12718116921398558821,8893583066330882150,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=2028,i,7342813088449255443,16590771341194468237,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\EBAEBFIIEC.exe"
malicious
C:\Users\user\Documents\EBAEBFIIEC.exe
"C:\Users\user\Documents\EBAEBFIIEC.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/freebl3.dllN
unknown
malicious
http://185.215.113.206/c4becf79229cb002.phpsystem32;C:
unknown
malicious
http://185.215.113.206/68b591d6548ec281/sqlite3.dll6
unknown
malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.16/mine/random.exeE
unknown
http://www.broofa.com
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.43/Zu7JuNko/index.phpF
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll2
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phps
unknown
http://185.215.113.43/Zu7JuNko/index.phpO
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.43/Zu7JuNko/index.php7
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://185.215.113.206/4c
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.68
https://apis.google.com
unknown
http://185.215.113.206/c4becf79229cb002.phpdge
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206AAARoaming
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php(
unknown
http://185.215.113.206/c4becf79229cb002.php&
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.68
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206ata
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.68
http://185.215.113.206/cc$
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://185.215.113.206/c4becf79229cb002.php?
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.68
http://185.215.113.206/c4becf79229cb002.phpbe549d9ff8f62368f1a7573402b3ult-release
unknown
http://185.215.113.206/c4becf79229cb002.phpzXl
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://185.215.113.206/c4becf79229cb002.php.X
unknown
http://185.215.113.206/c4becf79229cb002.phpK
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dllK
unknown
http://185.215.113.43/Zu7JuNko/index.phpk
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 58 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www3.l.google.com
172.217.19.206
plus.l.google.com
142.250.181.110
play.google.com
172.217.19.206
www.google.com
142.250.181.68
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.7
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.19.206
www3.l.google.com
United States
142.250.181.110
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
231000
unkown
page execute and read and write
malicious
8C1000
unkown
page execute and read and write
malicious
8C1000
unkown
page execute and read and write
malicious
D2E000
heap
page read and write
malicious
DE1000
unkown
page execute and read and write
malicious
8C1000
unkown
page execute and read and write
malicious
D74000
heap
page read and write
4571000
heap
page read and write
5130000
direct allocation
page execute and read and write
D74000
heap
page read and write
4A01000
heap
page read and write
675F000
stack
page read and write
5100000
direct allocation
page execute and read and write
47C000
unkown
page execute and write copy
3CCE000
stack
page read and write
4571000
heap
page read and write
13C7000
heap
page read and write
B20000
heap
page read and write
CBE000
stack
page read and write
5060000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
E6C000
stack
page read and write
1040000
heap
page read and write
ABA000
unkown
page execute and read and write
6CF6F000
unkown
page readonly
BF0000
heap
page read and write
45E1000
heap
page read and write
B87000
unkown
page execute and read and write
10DE000
heap
page read and write
106A000
unkown
page execute and write copy
4571000
heap
page read and write
B3C000
unkown
page execute and read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
10D9000
unkown
page execute and read and write
418F000
stack
page read and write
4571000
heap
page read and write
45E1000
heap
page read and write
1391000
heap
page read and write
10EE000
unkown
page execute and read and write
45E1000
heap
page read and write
70E000
unkown
page execute and read and write
45E1000
heap
page read and write
38CF000
stack
page read and write
D74000
heap
page read and write
824000
heap
page read and write
8A0000
direct allocation
page read and write
4B70000
direct allocation
page execute and read and write
4A01000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4FBF000
stack
page read and write
1D0A1000
heap
page read and write
B22000
unkown
page execute and write copy
AAC000
unkown
page execute and write copy
D74000
heap
page read and write
8B31000
heap
page read and write
45E1000
heap
page read and write
23150000
heap
page read and write
CF0000
direct allocation
page read and write
D0B000
heap
page read and write
B7C000
unkown
page execute and write copy
FDA000
unkown
page execute and read and write
5EF000
unkown
page execute and write copy
13B6000
heap
page read and write
40FE000
stack
page read and write
4B60000
direct allocation
page execute and read and write
4A01000
heap
page read and write
681000
unkown
page execute and write copy
C6D000
heap
page read and write
231DA000
heap
page read and write
1D085000
heap
page read and write
4A01000
heap
page read and write
41BF000
stack
page read and write
50C0000
direct allocation
page execute and read and write
1CB1E000
stack
page read and write
3A2F000
stack
page read and write
4A01000
heap
page read and write
937000
unkown
page execute and write copy
1D098000
heap
page read and write
BBF000
unkown
page execute and write copy
2CCE000
stack
page read and write
104B000
unkown
page execute and write copy
824000
heap
page read and write
2D70000
heap
page read and write
D74000
heap
page read and write
50F0000
direct allocation
page execute and read and write
45E1000
heap
page read and write
8A0000
direct allocation
page read and write
4A00000
heap
page read and write
2F7F000
stack
page read and write
FD0000
heap
page read and write
4571000
heap
page read and write
1370000
heap
page read and write
13E4000
heap
page read and write
4571000
heap
page read and write
1004000
heap
page read and write
4571000
heap
page read and write
12E0000
direct allocation
page execute and read and write
4571000
heap
page read and write
1004000
heap
page read and write
444E000
stack
page read and write
3B8E000
stack
page read and write
8B20000
heap
page read and write
47C000
unkown
page execute and read and write
13D1000
heap
page read and write
50D0000
direct allocation
page execute and read and write
810000
heap
page read and write
CF0000
direct allocation
page read and write
D2A000
heap
page read and write
483E000
stack
page read and write
1D0BC000
heap
page read and write
1D0AE000
heap
page read and write
45E1000
heap
page read and write
D70000
heap
page read and write
D74000
heap
page read and write
AA1000
unkown
page execute and read and write
1042000
unkown
page execute and write copy
1031000
unkown
page execute and read and write
45E1000
heap
page read and write
2F7E000
stack
page read and write
4A01000
heap
page read and write
1038000
unkown
page execute and write copy
42FF000
stack
page read and write
4A7F000
stack
page read and write
FD9000
unkown
page execute and write copy
45E1000
heap
page read and write
4F4E000
stack
page read and write
7013D000
unkown
page readonly
1D00D000
stack
page read and write
27FE000
stack
page read and write
4A01000
heap
page read and write
5040000
direct allocation
page execute and read and write
4571000
heap
page read and write
13D2000
heap
page read and write
41AF000
stack
page read and write
CF0000
direct allocation
page read and write
61EB4000
direct allocation
page read and write
B7D000
unkown
page execute and read and write
1D0AE000
heap
page read and write
1D087000
heap
page read and write
40BE000
stack
page read and write
F1E000
stack
page read and write
824000
heap
page read and write
231000
unkown
page execute and write copy
3BAE000
stack
page read and write
343E000
stack
page read and write
824000
heap
page read and write
45E1000
heap
page read and write
35FF000
stack
page read and write
45E1000
heap
page read and write
3DEF000
stack
page read and write
2D4E000
stack
page read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
488000
unkown
page execute and write copy
62D5000
heap
page read and write
611000
unkown
page execute and read and write
5070000
direct allocation
page execute and read and write
4571000
heap
page read and write
10C0000
direct allocation
page read and write
824000
heap
page read and write
4EF0000
direct allocation
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
824000
heap
page read and write
922000
unkown
page execute and write copy
4571000
heap
page read and write
4A01000
heap
page read and write
45E1000
heap
page read and write
3C7E000
stack
page read and write
DC0000
direct allocation
page read and write
45E1000
heap
page read and write
1D0AE000
heap
page read and write
BBA000
unkown
page execute and write copy
487000
unkown
page execute and read and write
42EF000
stack
page read and write
1D098000
heap
page read and write
D74000
heap
page read and write
D73000
heap
page read and write
307F000
stack
page read and write
B4A000
unkown
page execute and write copy
B3E000
unkown
page execute and write copy
3EFE000
stack
page read and write
4A01000
heap
page read and write
1D0B8000
heap
page read and write
45E1000
heap
page read and write
1D0A1000
heap
page read and write
45E1000
heap
page read and write
E4B000
unkown
page execute and write copy
1004000
heap
page read and write
1D0B1000
heap
page read and write
4A01000
heap
page read and write
4571000
heap
page read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
BBF000
unkown
page execute and write copy
443F000
stack
page read and write
10B0000
direct allocation
page read and write
10C0000
direct allocation
page read and write
1D093000
heap
page read and write
4A01000
heap
page read and write
DC0000
direct allocation
page read and write
1D09B000
heap
page read and write
1C99F000
stack
page read and write
36FE000
stack
page read and write
62A000
unkown
page execute and read and write
3A0F000
stack
page read and write
4A01000
heap
page read and write
D74000
heap
page read and write
3A7F000
stack
page read and write
4A01000
heap
page read and write
B0D000
unkown
page execute and write copy
D74000
heap
page read and write
B5E000
unkown
page execute and write copy
B11000
unkown
page execute and read and write
A88000
unkown
page execute and read and write
3A3F000
stack
page read and write
4A01000
heap
page read and write
4571000
heap
page read and write
723000
unkown
page execute and write copy
4571000
heap
page read and write
A8B000
stack
page read and write
13C7000
heap
page read and write
1012000
unkown
page execute and read and write
4B50000
heap
page read and write
7BC000
stack
page read and write
10B0000
direct allocation
page read and write
442F000
stack
page read and write
2D77000
heap
page read and write
4A4F000
stack
page read and write
10EF000
unkown
page execute and write copy
DA6000
heap
page read and write
1D096000
heap
page read and write
34BF000
stack
page read and write
1D07B000
heap
page read and write
10EE000
unkown
page execute and write copy
10C0000
direct allocation
page read and write
2CBF000
stack
page read and write
45E1000
heap
page read and write
BB6000
unkown
page execute and write copy
12C0000
direct allocation
page read and write
929000
unkown
page write copy
4A01000
heap
page read and write
267000
unkown
page execute and read and write
70F000
unkown
page execute and write copy
616000
unkown
page execute and read and write
BBD000
unkown
page execute and read and write
8A0000
direct allocation
page read and write
437E000
stack
page read and write
937000
unkown
page execute and write copy
3DFF000
stack
page read and write
1D097000
heap
page read and write
4571000
heap
page read and write
4A01000
heap
page read and write
CF0000
direct allocation
page read and write
CF0000
direct allocation
page read and write
45E1000
heap
page read and write
E49000
unkown
page write copy
68AC000
stack
page read and write
1CECC000
stack
page read and write
10C0000
direct allocation
page read and write
29EF000
stack
page read and write
4571000
heap
page read and write
E49000
unkown
page write copy
306E000
stack
page read and write
4A01000
heap
page read and write
45E1000
heap
page read and write
824000
heap
page read and write
10B0000
direct allocation
page read and write
10DA000
unkown
page execute and write copy
4A01000
heap
page read and write
1D0AE000
heap
page read and write
2D60000
direct allocation
page execute and read and write
33BE000
stack
page read and write
2E7F000
stack
page read and write
4E40000
heap
page read and write
D74000
heap
page read and write
B30000
unkown
page execute and read and write
63C000
stack
page read and write
BA7000
unkown
page execute and write copy
8C1000
unkown
page execute and write copy
4BD0000
direct allocation
page execute and read and write
4B60000
direct allocation
page execute and read and write
1D0A1000
heap
page read and write
45E1000
heap
page read and write
523F000
stack
page read and write
463F000
stack
page read and write
4A01000
heap
page read and write
37FE000
stack
page read and write
373F000
stack
page read and write
6CFB5000
unkown
page readonly
2CEE000
stack
page read and write
73D000
stack
page read and write
1004000
heap
page read and write
45E1000
heap
page read and write
1D0AE000
heap
page read and write
6CFB0000
unkown
page read and write
23380000
heap
page read and write
5080000
direct allocation
page execute and read and write
4571000
heap
page read and write
23618000
heap
page read and write
824000
heap
page read and write
28FF000
stack
page read and write
AA1000
unkown
page execute and read and write
4BC0000
direct allocation
page execute and read and write
1004000
heap
page read and write
1D098000
heap
page read and write
45E1000
heap
page read and write
2CC7000
heap
page read and write
44FF000
stack
page read and write
AE0000
unkown
page execute and read and write
60D000
unkown
page execute and read and write
1D190000
trusted library allocation
page read and write
45E1000
heap
page read and write
5244000
heap
page read and write
B1B000
unkown
page execute and read and write
46FE000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
477F000
stack
page read and write
2D50000
direct allocation
page execute and read and write
824000
heap
page read and write
13D8000
heap
page read and write
41FE000
stack
page read and write
824000
heap
page read and write
1D0A1000
heap
page read and write
354E000
stack
page read and write
626000
unkown
page execute and write copy
37EE000
stack
page read and write
D60000
heap
page read and write
1D08B000
heap
page read and write
4A01000
heap
page read and write
5FF000
unkown
page execute and read and write
387F000
stack
page read and write
922000
unkown
page execute and write copy
4571000
heap
page read and write
1342000
heap
page read and write
B5E000
unkown
page execute and write copy
4571000
heap
page read and write
4F8F000
stack
page read and write
824000
heap
page read and write
27E0000
heap
page read and write
4A01000
heap
page read and write
32BF000
stack
page read and write
4571000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
824000
heap
page read and write
1D0B3000
heap
page read and write
4A01000
heap
page read and write
40BF000
stack
page read and write
AF2000
unkown
page execute and read and write
E4B000
unkown
page execute and read and write
DC0000
direct allocation
page read and write
45E1000
heap
page read and write
8A0000
direct allocation
page read and write
3E2E000
stack
page read and write
32CE000
stack
page read and write
700C1000
unkown
page execute read
1D09D000
heap
page read and write
B12000
unkown
page execute and write copy
4A81000
heap
page read and write
B12000
unkown
page execute and write copy
5060000
direct allocation
page execute and read and write
10AE000
stack
page read and write
80E000
stack
page read and write
4571000
heap
page read and write
AE9000
unkown
page execute and write copy
D20000
heap
page read and write
1D088000
heap
page read and write
32EE000
stack
page read and write
4590000
heap
page read and write
5020000
direct allocation
page execute and read and write
314F000
stack
page read and write
45E0000
heap
page read and write
6BF0000
heap
page read and write
6760000
heap
page read and write
1004000
heap
page read and write
4571000
heap
page read and write
B7D000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
4571000
heap
page read and write
AAC000
unkown
page execute and read and write
824000
heap
page read and write
8A0000
direct allocation
page read and write
1004000
heap
page read and write
4A01000
heap
page read and write
23170000
heap
page read and write
4A01000
heap
page read and write
6A3000
unkown
page execute and read and write
1D0AF000
heap
page read and write
10C0000
direct allocation
page read and write
2BBE000
stack
page read and write
1D0A1000
heap
page read and write
32FE000
stack
page read and write
433E000
stack
page read and write
36BF000
stack
page read and write
28EF000
stack
page read and write
1D0AE000
heap
page read and write
D70000
heap
page read and write
8C1000
unkown
page execute and write copy
45E1000
heap
page read and write
293B000
stack
page read and write
2D60000
direct allocation
page execute and read and write
3E3E000
stack
page read and write
1D0A1000
heap
page read and write
AE0000
unkown
page execute and read and write
45E1000
heap
page read and write
824000
heap
page read and write
70D000
unkown
page execute and write copy
383E000
stack
page read and write
23100000
trusted library allocation
page read and write
4A01000
heap
page read and write
824000
heap
page read and write
4571000
heap
page read and write
45E1000
heap
page read and write
2DAF000
stack
page read and write
50F0000
direct allocation
page execute and read and write
D74000
heap
page read and write
45E1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4571000
heap
page read and write
13BC000
heap
page read and write
BCE000
unkown
page execute and write copy
103B000
unkown
page execute and read and write
1062000
unkown
page execute and read and write
B87000
unkown
page execute and read and write
50CF000
stack
page read and write
1D099000
heap
page read and write
D74000
heap
page read and write
4A01000
heap
page read and write
B3C000
unkown
page execute and read and write
BB9000
unkown
page execute and read and write
B7C000
unkown
page execute and write copy
4571000
heap
page read and write
1D0A1000
heap
page read and write
4A01000
heap
page read and write
1050000
unkown
page execute and read and write
4D4E000
stack
page read and write
4571000
heap
page read and write
45E1000
heap
page read and write
406F000
stack
page read and write
3CFF000
stack
page read and write
FE0000
heap
page read and write
23100000
trusted library allocation
page read and write
639000
unkown
page execute and read and write
47CF000
stack
page read and write
42CF000
stack
page read and write
1351000
heap
page read and write
628000
unkown
page execute and write copy
D74000
heap
page read and write
1070000
heap
page read and write
408D000
stack
page read and write
8A0000
direct allocation
page read and write
337F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
D74000
heap
page read and write
45E1000
heap
page read and write
3F0F000
stack
page read and write
B11000
unkown
page execute and read and write
3F6E000
stack
page read and write
CE0000
heap
page read and write
4571000
heap
page read and write
468000
unkown
page execute and read and write
101E000
stack
page read and write
1080000
heap
page read and write
D74000
heap
page read and write
2A2DC000
stack
page read and write
B2B000
unkown
page execute and write copy
233AE000
heap
page read and write
1D0A1000
heap
page read and write
FBE000
stack
page read and write
4BEE000
stack
page read and write
4A01000
heap
page read and write
4571000
heap
page read and write
302F000
stack
page read and write
10D6000
unkown
page execute and write copy
AAC000
unkown
page execute and read and write
4571000
heap
page read and write
610000
unkown
page execute and write copy
8C0000
unkown
page read and write
10B0000
direct allocation
page read and write
5070000
direct allocation
page execute and read and write
2C7E000
stack
page read and write
45BF000
stack
page read and write
10B0000
direct allocation
page read and write
39FE000
stack
page read and write
684000
unkown
page execute and read and write
350F000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
1085000
heap
page read and write
13BC000
heap
page read and write
45E1000
heap
page read and write
10B0000
direct allocation
page read and write
67F000
unkown
page execute and write copy
1D0BC000
heap
page read and write
6B8B000
heap
page read and write
4A01000
heap
page read and write
B23000
unkown
page execute and read and write
1C9DE000
stack
page read and write
136D000
heap
page read and write
45E1000
heap
page read and write
CF0000
direct allocation
page read and write
D74000
heap
page read and write
5080000
direct allocation
page execute and read and write
10C0000
direct allocation
page read and write
6FD000
unkown
page execute and read and write
2CC0000
heap
page read and write
D74000
heap
page read and write
824000
heap
page read and write
45C0000
heap
page read and write
2B4000
unkown
page execute and read and write
824000
heap
page read and write
10B0000
direct allocation
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
47BE000
stack
page read and write
1D0AF000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
B22000
unkown
page execute and write copy
8C0000
unkown
page readonly
3F4E000
stack
page read and write
45E1000
heap
page read and write
ABA000
unkown
page execute and read and write
2327E000
stack
page read and write
10DA000
heap
page read and write
109D000
unkown
page execute and read and write
CD0000
heap
page read and write
357F000
stack
page read and write
2E5000
unkown
page execute and read and write
45E1000
heap
page read and write
74FA000
heap
page read and write
307E000
stack
page read and write
FC1000
unkown
page execute and read and write
494E000
stack
page read and write
1D0B3000
heap
page read and write
2CFE000
stack
page read and write
FCC000
unkown
page execute and read and write
B18000
unkown
page execute and write copy
318E000
stack
page read and write
2C8F000
stack
page read and write
46CE000
stack
page read and write
D74000
heap
page read and write
1CC8E000
stack
page read and write
B3A000
unkown
page execute and write copy
4A01000
heap
page read and write
40AE000
stack
page read and write
A88000
unkown
page execute and read and write
4B50000
trusted library allocation
page read and write
63C000
unkown
page execute and write copy
1CC1F000
stack
page read and write
4A01000
heap
page read and write
3FFF000
stack
page read and write
ADE000
unkown
page execute and write copy
929000
unkown
page write copy
4571000
heap
page read and write
BAA000
unkown
page execute and write copy
824000
heap
page read and write
1009000
unkown
page execute and write copy
74F0000
heap
page read and write
B4D000
unkown
page execute and read and write
8A0000
direct allocation
page read and write
824000
heap
page read and write
824000
heap
page read and write
1D0A4000
heap
page read and write
8C0000
unkown
page read and write
7014E000
unkown
page read and write
45F0000
heap
page read and write
1D0BC000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
3ABE000
stack
page read and write
92B000
unkown
page execute and read and write
BCE000
unkown
page execute and write copy
62AE000
stack
page read and write
D74000
heap
page read and write
4A01000
heap
page read and write
703000
unkown
page execute and write copy
B18000
unkown
page execute and write copy
4571000
heap
page read and write
B0D000
unkown
page execute and write copy
4BC0000
direct allocation
page execute and read and write
B7C000
unkown
page execute and write copy
824000
heap
page read and write
8C0000
unkown
page readonly
12FE000
heap
page read and write
824000
heap
page read and write
824000
heap
page read and write
BCF000
unkown
page execute and write copy
F6D000
stack
page read and write
BCF000
unkown
page execute and write copy
D07000
heap
page read and write
5090000
direct allocation
page execute and read and write
FAA000
unkown
page execute and write copy
4571000
heap
page read and write
4A01000
heap
page read and write
10B0000
direct allocation
page read and write
4A80000
heap
page read and write
2C6F000
stack
page read and write
824000
heap
page read and write
4571000
heap
page read and write
4EF0000
direct allocation
page read and write
33EF000
stack
page read and write
5090000
direct allocation
page execute and read and write
2B2F000
stack
page read and write
4571000
heap
page read and write
2B7F000
stack
page read and write
4571000
heap
page read and write
1D09A000
heap
page read and write
62D6000
heap
page read and write
27E7000
heap
page read and write
CF0000
direct allocation
page read and write
824000
heap
page read and write
45E1000
heap
page read and write
D74000
heap
page read and write
DC0000
direct allocation
page read and write
FD0000
heap
page read and write
2F2E000
stack
page read and write
AC8000
unkown
page execute and write copy
13C7000
heap
page read and write
1004000
heap
page read and write
70D000
unkown
page execute and write copy
4571000
heap
page read and write
38EF000
stack
page read and write
169F000
stack
page read and write
45E1000
heap
page read and write
3F7F000
stack
page read and write
3BFE000
stack
page read and write
8C1000
unkown
page execute and write copy
AAC000
unkown
page execute and read and write
4A2B000
stack
page read and write
4A10000
heap
page read and write
E42000
unkown
page execute and write copy
537D000
stack
page read and write
397E000
stack
page read and write
45E1000
heap
page read and write
824000
heap
page read and write
2C6F000
stack
page read and write
4A51000
heap
page read and write
1D097000
heap
page read and write
CF0000
direct allocation
page read and write
3C8F000
stack
page read and write
DC0000
direct allocation
page read and write
45E1000
heap
page read and write
AC9000
unkown
page execute and read and write
12BE000
stack
page read and write
43FE000
stack
page read and write
47A000
unkown
page write copy
4A01000
heap
page read and write
105E000
stack
page read and write
1D0B9000
heap
page read and write
E1E000
heap
page read and write
BCE000
unkown
page execute and read and write
676000
unkown
page execute and read and write
5070000
direct allocation
page execute and read and write
456F000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
23110000
heap
page read and write
13B7000
heap
page read and write
30BE000
stack
page read and write
13DB000
heap
page read and write
BFB000
heap
page read and write
D74000
heap
page read and write
368E000
stack
page read and write
4571000
heap
page read and write
10C0000
direct allocation
page read and write
D0E000
heap
page read and write
D74000
heap
page read and write
AFE000
stack
page read and write
45E1000
heap
page read and write
1CD8F000
stack
page read and write
824000
heap
page read and write
4A60000
direct allocation
page read and write
2A3F000
stack
page read and write
3A7E000
stack
page read and write
3F7E000
stack
page read and write
4E8E000
stack
page read and write
23622000
heap
page read and write
13AF000
heap
page read and write
31AE000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
DE0000
unkown
page readonly
1D0BC000
heap
page read and write
4A01000
heap
page read and write
3D7F000
stack
page read and write
AC9000
unkown
page execute and read and write
3B4F000
stack
page read and write
48BF000
stack
page read and write
DC0000
direct allocation
page read and write
4B50000
direct allocation
page execute and read and write
45E1000
heap
page read and write
39BF000
stack
page read and write
1D0B2000
heap
page read and write
4571000
heap
page read and write
4A01000
heap
page read and write
4571000
heap
page read and write
4A01000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
2DEE000
stack
page read and write
527D000
stack
page read and write
10D0000
heap
page read and write
4A01000
heap
page read and write
613000
unkown
page execute and write copy
4571000
heap
page read and write
BA7000
unkown
page execute and write copy
5090000
direct allocation
page execute and read and write
824000
heap
page read and write
393F000
stack
page read and write
CF0000
direct allocation
page read and write
2D60000
direct allocation
page execute and read and write
328F000
stack
page read and write
4A01000
heap
page read and write
BB6000
unkown
page execute and write copy
4BF0000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
DB1000
heap
page read and write
B4D000
unkown
page execute and read and write
423E000
stack
page read and write
46BF000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4571000
heap
page read and write
D74000
heap
page read and write
922000
unkown
page execute and write copy
61E00000
direct allocation
page execute and read and write
4571000
heap
page read and write
61ED4000
direct allocation
page readonly
4571000
heap
page read and write
10DA000
heap
page read and write
4A01000
heap
page read and write
B1B000
unkown
page execute and read and write
50C0000
direct allocation
page execute and read and write
4571000
heap
page read and write
504F000
stack
page read and write
11FE000
stack
page read and write
4B2F000
stack
page read and write
340E000
stack
page read and write
1391000
heap
page read and write
BB6000
unkown
page execute and write copy
13BC000
heap
page read and write
BAA000
unkown
page execute and write copy
D89000
heap
page read and write
6C00000
heap
page read and write
92B000
unkown
page execute and read and write
45E1000
heap
page read and write
2F0E000
stack
page read and write
BA7000
unkown
page execute and write copy
1D099000
heap
page read and write
2CBE000
stack
page read and write
B1B000
unkown
page execute and read and write
1CDCE000
stack
page read and write
4571000
heap
page read and write
1D0A1000
heap
page read and write
AF3000
stack
page read and write
1D093000
heap
page read and write
3D3E000
stack
page read and write
1D0AF000
heap
page read and write
4B80000
direct allocation
page execute and read and write
1D0BC000
heap
page read and write
4571000
heap
page read and write
45E1000
heap
page read and write
B42000
unkown
page execute and read and write
4A51000
heap
page read and write
4571000
heap
page read and write
4A01000
heap
page read and write
FA8000
unkown
page execute and read and write
CF0000
direct allocation
page read and write
4F2E000
stack
page read and write
4A01000
heap
page read and write
42BE000
stack
page read and write
5040000
direct allocation
page execute and read and write
824000
heap
page read and write
13C2000
heap
page read and write
1D093000
heap
page read and write
1D0A1000
heap
page read and write
D74000
heap
page read and write
10CA000
unkown
page execute and write copy
4A01000
heap
page read and write
BB9000
unkown
page execute and read and write
2361E000
heap
page read and write
4A51000
heap
page read and write
1D0B3000
heap
page read and write
6CFAE000
unkown
page read and write
C5E000
heap
page read and write
B4A000
unkown
page execute and write copy
DC0000
direct allocation
page read and write
13B7000
heap
page read and write
342E000
stack
page read and write
393E000
stack
page read and write
B3E000
unkown
page execute and write copy
1D098000
heap
page read and write
DE0000
unkown
page read and write
1004000
heap
page read and write
1CADF000
stack
page read and write
B8A000
stack
page read and write
13B0000
heap
page read and write
45E1000
heap
page read and write
2E3E000
stack
page read and write
3F3F000
stack
page read and write
13BC000
heap
page read and write
1CF0D000
stack
page read and write
4B80000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
69EE000
stack
page read and write
6B7B000
stack
page read and write
45E1000
heap
page read and write
1351000
heap
page read and write
105C000
unkown
page execute and read and write
4A01000
heap
page read and write
6C08000
heap
page read and write
BCE000
unkown
page execute and read and write
4A01000
heap
page read and write
497E000
stack
page read and write
4A01000
heap
page read and write
BBA000
unkown
page execute and write copy
2DCF000
stack
page read and write
38FF000
stack
page read and write
134F000
heap
page read and write
2A1D0000
heap
page read and write
C38000
heap
page read and write
1D0A1000
heap
page read and write
4A01000
heap
page read and write
50B0000
direct allocation
page execute and read and write
62D0000
heap
page read and write
4A01000
heap
page read and write
5010000
direct allocation
page execute and read and write
45E1000
heap
page read and write
1D087000
heap
page read and write
BB6000
unkown
page execute and write copy
4571000
heap
page read and write
7A0000
heap
page read and write
929000
unkown
page write copy
4A01000
heap
page read and write
8A0000
direct allocation
page read and write
DC0000
direct allocation
page read and write
AF8000
stack
page read and write
2B6E000
stack
page read and write
FCC000
unkown
page execute and write copy
D74000
heap
page read and write
4A01000
heap
page read and write
692000
unkown
page execute and write copy
3CEE000
stack
page read and write
45E1000
heap
page read and write
109C000
unkown
page execute and write copy
10C7000
unkown
page execute and write copy
6A0000
unkown
page execute and write copy
1D097000
heap
page read and write
3B6F000
stack
page read and write
D74000
heap
page read and write
B17000
unkown
page execute and read and write
8B1C000
stack
page read and write
4571000
heap
page read and write
BCE000
unkown
page execute and write copy
23580000
trusted library allocation
page read and write
5240000
heap
page read and write
4571000
heap
page read and write
4A01000
heap
page read and write
13A2000
heap
page read and write
820000
heap
page read and write
41CE000
stack
page read and write
1004000
heap
page read and write
3AFF000
stack
page read and write
3F2F000
stack
page read and write
1090000
heap
page read and write
1D072000
heap
page read and write
4B90000
direct allocation
page execute and read and write
3FBE000
stack
page read and write
4A01000
heap
page read and write
4A50000
heap
page read and write
1391000
heap
page read and write
BAA000
unkown
page execute and write copy
1000000
unkown
page execute and read and write
714000
unkown
page execute and write copy
45E1000
heap
page read and write
4571000
heap
page read and write
44BE000
stack
page read and write
922000
unkown
page execute and read and write
4571000
heap
page read and write
824000
heap
page read and write
1043000
unkown
page execute and read and write
45E1000
heap
page read and write
672000
unkown
page execute and write copy
10B0000
direct allocation
page read and write
3A4E000
stack
page read and write
7681000
heap
page read and write
824000
heap
page read and write
DC0000
direct allocation
page read and write
937000
unkown
page execute and write copy
2D0E000
stack
page read and write
5070000
direct allocation
page execute and read and write
366F000
stack
page read and write
BCE000
unkown
page execute and read and write
38BE000
stack
page read and write
1D0BC000
heap
page read and write
B2B000
unkown
page execute and write copy
4B00000
trusted library allocation
page read and write
4A81000
heap
page read and write
4FCD000
stack
page read and write
824000
heap
page read and write
4A51000
heap
page read and write
12D0000
direct allocation
page execute and read and write
4571000
heap
page read and write
4EBE000
stack
page read and write
4A01000
heap
page read and write
D74000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
6CFAF000
unkown
page write copy
440F000
stack
page read and write
3E3F000
stack
page read and write
B87000
unkown
page execute and read and write
B3E000
unkown
page execute and write copy
4BE0000
direct allocation
page execute and read and write
4A81000
heap
page read and write
B4A000
unkown
page execute and write copy
4A01000
heap
page read and write
13C7000
heap
page read and write
10DF000
unkown
page execute and write copy
105E000
unkown
page execute and write copy
493F000
stack
page read and write
824000
heap
page read and write
397000
unkown
page execute and read and write
417E000
stack
page read and write
C4E000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
AB9000
unkown
page execute and write copy
357E000
stack
page read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
2A2E000
stack
page read and write
680000
unkown
page execute and read and write
4A9C000
stack
page read and write
5120000
direct allocation
page execute and read and write
107F000
unkown
page execute and read and write
92B000
unkown
page execute and write copy
4571000
heap
page read and write
32AF000
stack
page read and write
34FE000
stack
page read and write
B30000
unkown
page execute and read and write
4A01000
heap
page read and write
45E1000
heap
page read and write
32FF000
stack
page read and write
A88000
unkown
page execute and read and write
127B000
stack
page read and write
1D098000
heap
page read and write
4A01000
heap
page read and write
12F0000
heap
page read and write
4CFB000
stack
page read and write
AC8000
unkown
page execute and write copy
2F3F000
stack
page read and write
10C0000
direct allocation
page read and write
45E1000
heap
page read and write
4571000
heap
page read and write
4A20000
trusted library allocation
page read and write
31BE000
stack
page read and write
4A01000
heap
page read and write
123E000
stack
page read and write
45E1000
heap
page read and write
2362A000
heap
page read and write
5090000
direct allocation
page execute and read and write
5070000
direct allocation
page execute and read and write
378F000
stack
page read and write
353F000
stack
page read and write
C20000
heap
page read and write
EBF000
stack
page read and write
B3C000
unkown
page execute and read and write
403E000
stack
page read and write
B23000
unkown
page execute and read and write
67AB000
stack
page read and write
37BE000
stack
page read and write
458E000
stack
page read and write
4A01000
heap
page read and write
316F000
stack
page read and write
B30000
unkown
page execute and read and write
4B9F000
stack
page read and write
3CAE000
stack
page read and write
CF0000
direct allocation
page read and write
824000
heap
page read and write
1D070000
heap
page read and write
4A01000
heap
page read and write
FE8000
unkown
page execute and write copy
5100000
direct allocation
page execute and read and write
671000
unkown
page execute and read and write
2DFF000
stack
page read and write
1D087000
heap
page read and write
BBA000
unkown
page execute and write copy
3E0E000
stack
page read and write
C7E000
stack
page read and write
5110000
direct allocation
page execute and read and write
B18000
unkown
page execute and write copy
45E1000
heap
page read and write
BBF000
unkown
page execute and write copy
D74000
heap
page read and write
DE1000
unkown
page execute and write copy
8A0000
direct allocation
page read and write
C56000
heap
page read and write
35BE000
stack
page read and write
31BE000
stack
page read and write
36AE000
stack
page read and write
824000
heap
page read and write
343F000
stack
page read and write
AE0000
unkown
page execute and read and write
7690000
heap
page read and write
37AF000
stack
page read and write
33CF000
stack
page read and write
45E1000
heap
page read and write
3A6E000
stack
page read and write
BCF000
unkown
page execute and write copy
B5F000
unkown
page execute and read and write
CF0000
direct allocation
page read and write
DC0000
direct allocation
page read and write
10B0000
direct allocation
page read and write
4A60000
direct allocation
page read and write
45E1000
heap
page read and write
50D0000
direct allocation
page execute and read and write
890000
heap
page read and write
327F000
stack
page read and write
10B0000
direct allocation
page read and write
2D60000
direct allocation
page execute and read and write
D74000
heap
page read and write
92B000
unkown
page execute and write copy
3DBE000
stack
page read and write
13B7000
heap
page read and write
2D7E000
heap
page read and write
31FE000
stack
page read and write
4670000
trusted library allocation
page read and write
824000
heap
page read and write
BF0000
heap
page read and write
4A81000
heap
page read and write
824000
heap
page read and write
CF0000
direct allocation
page read and write
5000000
direct allocation
page execute and read and write
468F000
stack
page read and write
2DFF000
stack
page read and write
47A000
unkown
page write copy
C25000
heap
page read and write
6AC000
unkown
page execute and read and write
45E1000
heap
page read and write
6CDD0000
unkown
page readonly
364F000
stack
page read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
D74000
heap
page read and write
A8A000
unkown
page execute and write copy
4A01000
heap
page read and write
768E000
heap
page read and write
413E000
stack
page read and write
6CF0000
trusted library allocation
page read and write
4A01000
heap
page read and write
2CAE000
stack
page read and write
4571000
heap
page read and write
49B0000
heap
page read and write
61ECC000
direct allocation
page read and write
B12000
unkown
page execute and write copy
824000
heap
page read and write
5090000
direct allocation
page execute and read and write
B11000
unkown
page execute and read and write
4A01000
heap
page read and write
4571000
heap
page read and write
B3A000
unkown
page execute and write copy
AB9000
unkown
page execute and write copy
10DD000
unkown
page execute and read and write
1004000
heap
page read and write
B5F000
unkown
page execute and read and write
1D0AE000
heap
page read and write
824000
heap
page read and write
4580000
heap
page read and write
4A01000
heap
page read and write
4571000
heap
page read and write
10C0000
direct allocation
page read and write
929000
unkown
page write copy
4570000
heap
page read and write
1D0BC000
heap
page read and write
467E000
stack
page read and write
10B0000
direct allocation
page read and write
AF2000
unkown
page execute and read and write
53BD000
stack
page read and write
513E000
stack
page read and write
B5F000
unkown
page execute and read and write
4FF0000
direct allocation
page execute and read and write
CF0000
direct allocation
page read and write
824000
heap
page read and write
627000
unkown
page execute and read and write
6FC000
unkown
page execute and write copy
FE9000
unkown
page execute and read and write
B0D000
unkown
page execute and write copy
929000
unkown
page write copy
4571000
heap
page read and write
45E1000
heap
page read and write
103E000
stack
page read and write
23130000
heap
page read and write
61EB7000
direct allocation
page readonly
45E1000
heap
page read and write
1D0A1000
heap
page read and write
4A81000
heap
page read and write
4A01000
heap
page read and write
4B60000
direct allocation
page execute and read and write
AC9000
unkown
page execute and read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
D74000
heap
page read and write
6BF3000
heap
page read and write
50A0000
direct allocation
page execute and read and write
23100000
heap
page read and write
4571000
heap
page read and write
4B6C000
stack
page read and write
4A01000
heap
page read and write
13D8000
heap
page read and write
407F000
stack
page read and write
12C0000
direct allocation
page read and write
457F000
stack
page read and write
23610000
heap
page read and write
432E000
stack
page read and write
4A01000
heap
page read and write
392E000
stack
page read and write
4A01000
heap
page read and write
45E1000
heap
page read and write
3EBF000
stack
page read and write
D74000
heap
page read and write
B7D000
unkown
page execute and read and write
2FC000
unkown
page execute and read and write
3CFE000
stack
page read and write
300F000
stack
page read and write
10D6000
unkown
page execute and write copy
714000
unkown
page execute and write copy
41FF000
stack
page read and write
B22000
unkown
page execute and write copy
4B30000
direct allocation
page execute and read and write
1D095000
heap
page read and write
DBE000
stack
page read and write
BBF000
unkown
page execute and write copy
B4D000
unkown
page execute and read and write
BB6000
unkown
page execute and write copy
453E000
stack
page read and write
4571000
heap
page read and write
D74000
heap
page read and write
4B60000
direct allocation
page execute and read and write
8A0000
direct allocation
page read and write
AF2000
unkown
page execute and read and write
45E1000
heap
page read and write
E42000
unkown
page execute and read and write
45E1000
heap
page read and write
4A01000
heap
page read and write
D00000
heap
page read and write
1004000
heap
page read and write
AB9000
unkown
page execute and write copy
4A01000
heap
page read and write
10C0000
direct allocation
page read and write
5050000
direct allocation
page execute and read and write
3BBE000
stack
page read and write
50E0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
367F000
stack
page read and write
230000
unkown
page read and write
5030000
direct allocation
page execute and read and write
BBD000
unkown
page execute and read and write
651E000
stack
page read and write
5050000
direct allocation
page execute and read and write
2EFF000
stack
page read and write
347E000
stack
page read and write
4A01000
heap
page read and write
724000
unkown
page execute and write copy
43BF000
stack
page read and write
2ECF000
stack
page read and write
824000
heap
page read and write
10A7000
unkown
page execute and read and write
454F000
stack
page read and write
2B6E000
stack
page read and write
317F000
stack
page read and write
41EE000
stack
page read and write
54BF000
stack
page read and write
86E000
stack
page read and write
638000
unkown
page execute and write copy
B3A000
unkown
page execute and write copy
45E1000
heap
page read and write
1032000
unkown
page execute and write copy
70152000
unkown
page readonly
307F000
stack
page read and write
10B0000
direct allocation
page read and write
ADE000
unkown
page execute and write copy
2A7E000
stack
page read and write
E6C000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
BE0000
direct allocation
page read and write
1D0A5000
heap
page read and write
10C0000
direct allocation
page read and write
B5E000
unkown
page execute and write copy
8B32000
heap
page read and write
23386000
heap
page read and write
64E000
unkown
page execute and read and write
BBF000
unkown
page execute and write copy
700C0000
unkown
page readonly
1391000
heap
page read and write
45E1000
heap
page read and write
D74000
heap
page read and write
1D0A1000
heap
page read and write
D74000
heap
page read and write
4571000
heap
page read and write
45E1000
heap
page read and write
92B000
unkown
page execute and read and write
1378000
heap
page read and write
824000
heap
page read and write
D74000
heap
page read and write
2F3E000
stack
page read and write
4571000
heap
page read and write
5090000
direct allocation
page execute and read and write
304E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
48FE000
stack
page read and write
D74000
heap
page read and write
4571000
heap
page read and write
723000
unkown
page execute and read and write
68EE000
stack
page read and write
D74000
heap
page read and write
45E1000
heap
page read and write
8C0000
unkown
page readonly
446E000
stack
page read and write
10C0000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
447E000
stack
page read and write
824000
heap
page read and write
699000
unkown
page execute and read and write
49FF000
stack
page read and write
6B97000
heap
page read and write
2D60000
direct allocation
page execute and read and write
AAC000
unkown
page execute and write copy
92B000
unkown
page execute and write copy
DC0000
direct allocation
page read and write
5110000
direct allocation
page execute and read and write
105A000
unkown
page execute and write copy
B17000
unkown
page execute and read and write
BB6000
unkown
page execute and write copy
37FF000
stack
page read and write
2A16C000
stack
page read and write
824000
heap
page read and write
107E000
unkown
page execute and write copy
1D0B5000
heap
page read and write
BB9000
unkown
page execute and read and write
480E000
stack
page read and write
4A01000
heap
page read and write
356E000
stack
page read and write
1D089000
heap
page read and write
2CAE000
stack
page read and write
665000
unkown
page execute and write copy
50E0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
8A0000
direct allocation
page read and write
4A01000
heap
page read and write
427F000
stack
page read and write
27EC000
heap
page read and write
1037000
unkown
page execute and read and write
6CDD1000
unkown
page execute read
10C0000
direct allocation
page read and write
45E1000
heap
page read and write
2CF7000
heap
page read and write
4A01000
heap
page read and write
13A1000
heap
page read and write
13E5000
heap
page read and write
404F000
stack
page read and write
2D60000
direct allocation
page execute and read and write
4A01000
heap
page read and write
B23000
unkown
page execute and read and write
FFE000
unkown
page execute and write copy
C00000
heap
page read and write
1004000
heap
page read and write
2337F000
stack
page read and write
139F000
stack
page read and write
7680000
heap
page read and write
4F10000
direct allocation
page read and write
4A01000
heap
page read and write
665E000
stack
page read and write
3E7E000
stack
page read and write
6E6000
unkown
page execute and read and write
4571000
heap
page read and write
4A01000
heap
page read and write
4B60000
direct allocation
page execute and read and write
8A0000
direct allocation
page read and write
D74000
heap
page read and write
B17000
unkown
page execute and read and write
7690000
heap
page read and write
D74000
heap
page read and write
4600000
heap
page read and write
1D0A1000
heap
page read and write
486000
unkown
page execute and write copy
3B7F000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
64DF000
stack
page read and write
1004000
heap
page read and write
4571000
heap
page read and write
3B3E000
stack
page read and write
B2B000
unkown
page execute and write copy
4A51000
heap
page read and write
10C0000
direct allocation
page read and write
F6D000
stack
page read and write
1D085000
heap
page read and write
36BE000
stack
page read and write
4A81000
heap
page read and write
1004000
heap
page read and write
10B0000
direct allocation
page read and write
430E000
stack
page read and write
377E000
stack
page read and write
D74000
heap
page read and write
279E000
stack
page read and write
352F000
stack
page read and write
363E000
stack
page read and write
1D0A4000
heap
page read and write
45E1000
heap
page read and write
463D000
heap
page read and write
8A0000
direct allocation
page read and write
10C0000
heap
page read and write
2CF0000
heap
page read and write
BBD000
unkown
page execute and read and write
8A0000
direct allocation
page read and write
138F000
stack
page read and write
AAC000
unkown
page execute and write copy
106D000
unkown
page execute and read and write
4E4F000
stack
page read and write
27DC000
stack
page read and write
317F000
stack
page read and write
5ED000
unkown
page execute and read and write
23200000
trusted library allocation
page read and write
AA1000
unkown
page execute and read and write
447F000
stack
page read and write
33FF000
stack
page read and write
DC0000
direct allocation
page read and write
61E01000
direct allocation
page execute read
DC0000
direct allocation
page read and write
1D0BC000
heap
page read and write
433F000
stack
page read and write
4F10000
direct allocation
page read and write
1D194000
heap
page read and write
824000
heap
page read and write
13C3000
heap
page read and write
10CB000
heap
page read and write
D74000
heap
page read and write
ADE000
unkown
page execute and write copy
231000
unkown
page execute and write copy
1D0A1000
heap
page read and write
10DF000
unkown
page execute and write copy
3C3F000
stack
page read and write
3DCF000
stack
page read and write
AE9000
unkown
page execute and write copy
4571000
heap
page read and write
B42000
unkown
page execute and read and write
4A01000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
45E1000
heap
page read and write
333E000
stack
page read and write
6AB000
unkown
page execute and write copy
AE9000
unkown
page execute and write copy
4A01000
heap
page read and write
5070000
direct allocation
page execute and read and write
1D0A1000
heap
page read and write
DC0000
direct allocation
page read and write
D3E000
stack
page read and write
1D09D000
heap
page read and write
5090000
direct allocation
page execute and read and write
824000
heap
page read and write
4571000
heap
page read and write
102D000
unkown
page execute and write copy
390E000
stack
page read and write
303F000
stack
page read and write
922000
unkown
page execute and read and write
490F000
stack
page read and write
4571000
heap
page read and write
BBF000
unkown
page execute and write copy
1000000
heap
page read and write
5070000
direct allocation
page execute and read and write
4A01000
heap
page read and write
8C0000
unkown
page read and write
4A01000
heap
page read and write
A8A000
unkown
page execute and write copy
AC8000
unkown
page execute and write copy
824000
heap
page read and write
4A01000
heap
page read and write
824000
heap
page read and write
D74000
heap
page read and write
1D087000
heap
page read and write
37CE000
stack
page read and write
47FF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
922000
unkown
page execute and read and write
3BBF000
stack
page read and write
B42000
unkown
page execute and read and write
ABA000
unkown
page execute and read and write
230000
unkown
page readonly
3CBF000
stack
page read and write
502F000
stack
page read and write
45BE000
stack
page read and write
BE0000
direct allocation
page read and write
4A01000
heap
page read and write
661F000
stack
page read and write
4A81000
heap
page read and write
4571000
heap
page read and write
13C3000
heap
page read and write
4A01000
heap
page read and write
929000
unkown
page write copy
61ECD000
direct allocation
page readonly
A8A000
unkown
page execute and write copy
60D000
unkown
page execute and write copy
E57000
unkown
page execute and write copy
4571000
heap
page read and write
There are 1396 hidden memdumps, click here to show them.