IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\CGIJJKEHCA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFIDGDAKFHIEHJKFHDHD
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\CAAEBKEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\FHDAFIIDAKJDGDHIDAKJJJEHCF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDBAKKKFBGDHJKFHJJJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIIDAKJDHJKFHIEBFCGHCGHDGC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJJJKEHCAKFBFHJKEHCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJEBKJDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\078a3574-6c31-4307-a42f-efaa712a7eee.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\94a94157-1d7f-4fdc-bc96-b6dbc5a08b63.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6753DED4-84C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF369b7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3765a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37669.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c30ab31f-3ada-4d73-a872-e9c6ab6a98f1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cf352649-d7e6-4c07-b2f5-6dfa09b26a07.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d8395e56-6f8d-4023-8e62-068c6ec4d157.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 04:36:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 04:36:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 04:36:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 04:36:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 04:36:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 104
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (779)
downloaded
Chrome Cache Entry: 106
ASCII text
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 109
SVG Scalable Vector Graphics image
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2176,i,6427236878911995188,11500000191225371756,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2508 --field-trial-handle=2440,i,8134589097916336708,15596232207538210716,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=2172,i,10057986528569312970,15334188584561366258,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\CGIJJKEHCA.exe"
malicious
C:\Users\user\Documents\CGIJJKEHCA.exe
"C:\Users\user\Documents\CGIJJKEHCA.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.206/c4becf79229cb002.phpf2?
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/c4becf79229cb002.phpp
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/softokn3.dllpC
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dlloD
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll%D
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
https://apis.google.com
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dllqE
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
http://185.215.113.206EGIming
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/c4becf79229cb002.php9385fe1508908b7216d4e0e91d0b-release
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://185.215.113.16/mine/random.exeb
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://185.215.113.206/c4becf79229cb002.php)Xi
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.206/c4becf79229cb002.php%Xu
unknown
http://185.215.113.206/c4becf79229cb002.phpW
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www3.l.google.com
142.250.181.142
plus.l.google.com
142.250.181.110
www.google.com
142.250.181.100
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.181.142
www3.l.google.com
United States
142.250.181.110
plus.l.google.com
United States
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D1000
unkown
page execute and read and write
malicious
871000
unkown
page execute and read and write
malicious
14BE000
heap
page read and write
malicious
871000
unkown
page execute and read and write
malicious
961000
unkown
page execute and read and write
malicious
871000
unkown
page execute and read and write
malicious
4381000
heap
page read and write
4711000
heap
page read and write
4B81000
heap
page read and write
6C55E000
unkown
page read and write
423F000
stack
page read and write
514F000
stack
page read and write
4711000
heap
page read and write
337E000
stack
page read and write
6C562000
unkown
page readonly
4510000
direct allocation
page read and write
4381000
heap
page read and write
4700000
direct allocation
page read and write
854000
heap
page read and write
4A91000
heap
page read and write
238DD000
heap
page read and write
5E5000
unkown
page execute and write copy
2CFF000
stack
page read and write
14A0000
direct allocation
page read and write
3D9F000
stack
page read and write
4381000
heap
page read and write
1D672000
heap
page read and write
328E000
stack
page read and write
4381000
heap
page read and write
2C4E000
stack
page read and write
1D695000
heap
page read and write
2BBE000
stack
page read and write
8AA1000
heap
page read and write
4381000
heap
page read and write
518E000
stack
page read and write
D04000
heap
page read and write
4381000
heap
page read and write
4711000
heap
page read and write
268F000
stack
page read and write
301E000
stack
page read and write
B7E000
unkown
page execute and write copy
D70000
heap
page read and write
4711000
heap
page read and write
2D0000
unkown
page read and write
39BE000
stack
page read and write
854000
heap
page read and write
4B90000
trusted library allocation
page read and write
AEC000
unkown
page execute and write copy
4D7000
unkown
page execute and read and write
B0B000
unkown
page execute and read and write
961000
unkown
page execute and write copy
B7D000
unkown
page execute and read and write
DA7000
unkown
page execute and read and write
2FBE000
stack
page read and write
1D679000
heap
page read and write
D04000
heap
page read and write
AEF000
unkown
page execute and read and write
B4F000
unkown
page execute and read and write
D04000
heap
page read and write
238B1000
heap
page read and write
55E000
unkown
page execute and write copy
B70000
unkown
page execute and write copy
4381000
heap
page read and write
C3A000
heap
page read and write
33CE000
stack
page read and write
C47000
heap
page read and write
B08000
unkown
page execute and write copy
1170000
direct allocation
page read and write
3E7E000
stack
page read and write
DB6000
unkown
page execute and write copy
8E6000
unkown
page execute and read and write
B7D000
unkown
page execute and read and write
A6E000
unkown
page execute and write copy
850000
heap
page read and write
33AF000
stack
page read and write
BCF000
heap
page read and write
D1C000
unkown
page execute and read and write
4A90000
heap
page read and write
2C97000
heap
page read and write
6C74E000
unkown
page read and write
4A91000
heap
page read and write
4521000
heap
page read and write
3B6F000
stack
page read and write
568000
unkown
page execute and write copy
1D12E000
stack
page read and write
4A91000
heap
page read and write
C33000
heap
page read and write
50A0000
direct allocation
page execute and read and write
1D68F000
heap
page read and write
A45000
unkown
page execute and write copy
D7B000
heap
page read and write
A60000
unkown
page execute and read and write
510000
unkown
page execute and read and write
ADC000
unkown
page execute and write copy
42DE000
stack
page read and write
2E3F000
stack
page read and write
1D68F000
heap
page read and write
4711000
heap
page read and write
994000
heap
page read and write
A70000
unkown
page execute and write copy
343F000
stack
page read and write
34AF000
stack
page read and write
360F000
stack
page read and write
54F000
unkown
page execute and read and write
994000
heap
page read and write
5E3000
unkown
page execute and read and write
1D6B0000
heap
page read and write
4711000
heap
page read and write
4B80000
direct allocation
page execute and read and write
5070000
direct allocation
page execute and read and write
4392000
heap
page read and write
4711000
heap
page read and write
2D9F000
stack
page read and write
5090000
direct allocation
page execute and read and write
4381000
heap
page read and write
8AA5000
heap
page read and write
4711000
heap
page read and write
D04000
heap
page read and write
AEB000
unkown
page execute and read and write
B1B000
unkown
page execute and read and write
28DF000
stack
page read and write
2A81C000
stack
page read and write
3C8E000
stack
page read and write
26D0000
direct allocation
page read and write
4A91000
heap
page read and write
14A0000
direct allocation
page read and write
AEB000
unkown
page execute and read and write
4A91000
heap
page read and write
325F000
stack
page read and write
4A91000
heap
page read and write
383F000
stack
page read and write
61EB4000
direct allocation
page read and write
4A91000
heap
page read and write
BCE000
heap
page read and write
62DB000
stack
page read and write
4381000
heap
page read and write
1D67B000
heap
page read and write
4A6F000
stack
page read and write
4990000
direct allocation
page execute and read and write
49A0000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
870000
unkown
page read and write
1D67B000
heap
page read and write
4970000
trusted library allocation
page read and write
DA6000
unkown
page execute and write copy
4381000
heap
page read and write
4381000
heap
page read and write
4B90000
direct allocation
page execute and read and write
4381000
heap
page read and write
5090000
direct allocation
page execute and read and write
2A7C000
stack
page read and write
AC5000
unkown
page execute and write copy
361F000
stack
page read and write
994000
heap
page read and write
3DEF000
stack
page read and write
5150000
direct allocation
page execute and read and write
D04000
heap
page read and write
D04000
heap
page read and write
4711000
heap
page read and write
3ECF000
stack
page read and write
854000
heap
page read and write
2E9F000
stack
page read and write
4B60000
heap
page read and write
405E000
stack
page read and write
14A0000
direct allocation
page read and write
6170000
heap
page read and write
4A91000
heap
page read and write
D04000
heap
page read and write
5D55000
heap
page read and write
375F000
stack
page read and write
A61000
unkown
page execute and write copy
1D695000
heap
page read and write
4711000
heap
page read and write
2DFF000
stack
page read and write
A77000
unkown
page execute and read and write
3B5E000
stack
page read and write
4C20000
heap
page read and write
4B20000
direct allocation
page execute and read and write
4B5F000
stack
page read and write
1170000
direct allocation
page read and write
CEF000
stack
page read and write
392E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
D04000
heap
page read and write
23850000
heap
page read and write
26D0000
direct allocation
page read and write
1D6B0000
heap
page read and write
4700000
direct allocation
page read and write
3C3E000
stack
page read and write
4381000
heap
page read and write
4711000
heap
page read and write
47C0000
trusted library allocation
page read and write
4B81000
heap
page read and write
4711000
heap
page read and write
AEF000
unkown
page execute and read and write
14F8000
heap
page read and write
1D687000
heap
page read and write
61ED0000
direct allocation
page read and write
4AEF000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
870000
unkown
page readonly
4B60000
direct allocation
page execute and read and write
D04000
heap
page read and write
994000
heap
page read and write
4711000
heap
page read and write
3CEE000
stack
page read and write
291E000
stack
page read and write
B94000
unkown
page execute and write copy
1D22F000
stack
page read and write
4A91000
heap
page read and write
8E7000
unkown
page execute and write copy
4E6000
unkown
page execute and write copy
B85000
unkown
page execute and write copy
4700000
direct allocation
page read and write
1D682000
heap
page read and write
1285000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4980000
direct allocation
page execute and read and write
BB8000
unkown
page execute and write copy
D98000
unkown
page execute and read and write
4980000
direct allocation
page execute and read and write
554F000
stack
page read and write
4521000
heap
page read and write
8A32000
heap
page read and write
5D0000
unkown
page execute and write copy
414F000
stack
page read and write
4381000
heap
page read and write
4BDE000
stack
page read and write
D04000
heap
page read and write
8E5000
unkown
page execute and write copy
4711000
heap
page read and write
4F7000
unkown
page execute and write copy
BBC000
heap
page read and write
8F0000
heap
page read and write
4391000
heap
page read and write
1D673000
heap
page read and write
4B40000
direct allocation
page execute and read and write
14A0000
direct allocation
page read and write
4A91000
heap
page read and write
6C74F000
unkown
page write copy
1D695000
heap
page read and write
BAC000
unkown
page execute and write copy
4A91000
heap
page read and write
4711000
heap
page read and write
1D6AD000
heap
page read and write
DC0000
heap
page read and write
284F000
stack
page read and write
2BFE000
stack
page read and write
2D0000
unkown
page readonly
1D68B000
heap
page read and write
1CFCE000
stack
page read and write
432E000
stack
page read and write
39DF000
stack
page read and write
B7D000
unkown
page execute and write copy
B7D000
unkown
page execute and write copy
1D67D000
heap
page read and write
4A91000
heap
page read and write
3ABE000
stack
page read and write
404E000
stack
page read and write
4D2C000
stack
page read and write
4381000
heap
page read and write
4A91000
heap
page read and write
D5A000
unkown
page execute and write copy
4B81000
heap
page read and write
D04000
heap
page read and write
4711000
heap
page read and write
BF7000
heap
page read and write
4381000
heap
page read and write
4950000
heap
page read and write
D5B000
heap
page read and write
6C570000
unkown
page readonly
A15000
unkown
page execute and read and write
2920000
heap
page read and write
1D68D000
heap
page read and write
8E0000
heap
page read and write
4A91000
heap
page read and write
B08000
unkown
page execute and write copy
4A3000
unkown
page execute and read and write
D04000
heap
page read and write
6C4D0000
unkown
page readonly
1D672000
heap
page read and write
960000
unkown
page readonly
CAD000
stack
page read and write
B01000
unkown
page execute and read and write
61E01000
direct allocation
page execute read
4711000
heap
page read and write
433F000
stack
page read and write
C33000
heap
page read and write
DC6000
unkown
page execute and read and write
23871000
heap
page read and write
1D699000
heap
page read and write
ADC000
unkown
page execute and write copy
DAD000
unkown
page execute and read and write
2F4F000
stack
page read and write
1D55E000
stack
page read and write
45FE000
stack
page read and write
144E000
stack
page read and write
3F7F000
stack
page read and write
35BF000
stack
page read and write
D6C000
unkown
page execute and read and write
400F000
stack
page read and write
D04000
heap
page read and write
4F0E000
stack
page read and write
B93000
unkown
page execute and read and write
4980000
direct allocation
page execute and read and write
994000
heap
page read and write
4711000
heap
page read and write
1D3BD000
stack
page read and write
4A91000
heap
page read and write
5160000
direct allocation
page execute and read and write
1D68E000
heap
page read and write
1170000
direct allocation
page read and write
23B40000
heap
page read and write
4A91000
heap
page read and write
E01000
unkown
page execute and read and write
A87000
unkown
page execute and read and write
D0D000
unkown
page execute and write copy
456F000
stack
page read and write
1D691000
heap
page read and write
338F000
stack
page read and write
B94000
unkown
page execute and write copy
23B5A000
heap
page read and write
31AF000
stack
page read and write
4510000
direct allocation
page read and write
4710000
heap
page read and write
4A91000
heap
page read and write
428F000
stack
page read and write
B0B000
unkown
page execute and read and write
D04000
heap
page read and write
854000
heap
page read and write
D04000
heap
page read and write
1D67B000
heap
page read and write
63C000
stack
page read and write
B70000
unkown
page execute and write copy
994000
heap
page read and write
95E000
stack
page read and write
34BE000
stack
page read and write
A86000
unkown
page execute and write copy
5200000
direct allocation
page execute and read and write
491E000
stack
page read and write
3E7F000
stack
page read and write
994000
heap
page read and write
95D000
stack
page read and write
2A710000
heap
page read and write
1490000
heap
page read and write
1D68C000
heap
page read and write
5F4000
unkown
page execute and write copy
1D6A2000
heap
page read and write
1D6AB000
heap
page read and write
1D6A2000
heap
page read and write
E43000
unkown
page execute and write copy
52E000
unkown
page execute and write copy
49F0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
4711000
heap
page read and write
4700000
direct allocation
page read and write
4381000
heap
page read and write
2C0000
heap
page read and write
3F0E000
stack
page read and write
2379A000
heap
page read and write
26D0000
direct allocation
page read and write
4510000
direct allocation
page read and write
1D66F000
heap
page read and write
1D6B0000
heap
page read and write
5DE000
unkown
page execute and write copy
4B50000
trusted library allocation
page read and write
B93000
unkown
page execute and read and write
49E0000
direct allocation
page execute and read and write
C5D000
heap
page read and write
3A2F000
stack
page read and write
4AA2000
heap
page read and write
46AF000
stack
page read and write
26D0000
direct allocation
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
61E00000
direct allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4381000
heap
page read and write
4381000
heap
page read and write
509E000
stack
page read and write
2B7F000
stack
page read and write
49FE000
stack
page read and write
4711000
heap
page read and write
4A91000
heap
page read and write
1180000
heap
page read and write
1D6A2000
heap
page read and write
423E000
stack
page read and write
397E000
stack
page read and write
38EF000
stack
page read and write
4381000
heap
page read and write
30BE000
stack
page read and write
994000
heap
page read and write
4980000
direct allocation
page execute and read and write
2C3E000
stack
page read and write
1D68F000
heap
page read and write
1D6AD000
heap
page read and write
437F000
stack
page read and write
2E7E000
stack
page read and write
133E000
stack
page read and write
525000
unkown
page execute and write copy
AE9000
unkown
page execute and write copy
4A91000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4F4C000
stack
page read and write
4B10000
direct allocation
page execute and read and write
AC5000
unkown
page execute and write copy
2D1000
unkown
page execute and write copy
A6E000
unkown
page execute and write copy
E42000
unkown
page execute and read and write
389F000
stack
page read and write
4711000
heap
page read and write
4510000
direct allocation
page read and write
ACE000
unkown
page execute and write copy
1D695000
heap
page read and write
994000
heap
page read and write
2BBF000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
BA0000
heap
page read and write
26FE000
heap
page read and write
5080000
direct allocation
page execute and read and write
26EF000
stack
page read and write
770000
heap
page read and write
1D68F000
heap
page read and write
4381000
heap
page read and write
61ED4000
direct allocation
page readonly
4A5E000
stack
page read and write
3D3E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
1D666000
heap
page read and write
4A70000
heap
page read and write
415F000
stack
page read and write
4B81000
heap
page read and write
990000
heap
page read and write
4C0000
unkown
page execute and read and write
2C0F000
stack
page read and write
14A0000
direct allocation
page read and write
C5D000
heap
page read and write
4A91000
heap
page read and write
4381000
heap
page read and write
8A48000
heap
page read and write
D04000
heap
page read and write
D8B000
unkown
page execute and read and write
504F000
stack
page read and write
C39000
heap
page read and write
4700000
direct allocation
page read and write
4381000
heap
page read and write
E1F000
unkown
page execute and write copy
1D27D000
stack
page read and write
6C4D1000
unkown
page execute read
D04000
heap
page read and write
258E000
stack
page read and write
4381000
heap
page read and write
C67000
heap
page read and write
D2F000
unkown
page execute and read and write
AC7000
unkown
page execute and read and write
3EDF000
stack
page read and write
1D67B000
heap
page read and write
1D0CE000
stack
page read and write
4711000
heap
page read and write
A45000
unkown
page execute and write copy
1D6B0000
heap
page read and write
63DC000
stack
page read and write
4A91000
heap
page read and write
B85000
unkown
page execute and write copy
2FA0000
heap
page read and write
4700000
direct allocation
page read and write
4A91000
heap
page read and write
527000
unkown
page execute and read and write
2E4E000
stack
page read and write
1170000
direct allocation
page read and write
413E000
stack
page read and write
36AF000
stack
page read and write
DE2000
unkown
page execute and write copy
A43000
unkown
page execute and read and write
239AE000
stack
page read and write
4381000
heap
page read and write
4D30000
direct allocation
page execute and read and write
1D4BC000
stack
page read and write
B7E000
unkown
page execute and write copy
994000
heap
page read and write
994000
heap
page read and write
1D694000
heap
page read and write
38CE000
stack
page read and write
418E000
stack
page read and write
4711000
heap
page read and write
492F000
stack
page read and write
10FD000
stack
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
4A91000
heap
page read and write
1D6AB000
heap
page read and write
D6A000
heap
page read and write
A70000
unkown
page execute and write copy
4700000
direct allocation
page read and write
13BE000
stack
page read and write
994000
heap
page read and write
32FF000
stack
page read and write
1170000
direct allocation
page read and write
C66000
heap
page read and write
DB5000
unkown
page execute and read and write
7000000
heap
page read and write
B6B000
unkown
page execute and write copy
ADB000
unkown
page execute and read and write
994000
heap
page read and write
26D0000
direct allocation
page read and write
B0B000
unkown
page execute and read and write
35BE000
stack
page read and write
1D695000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
26D0000
direct allocation
page read and write
4381000
heap
page read and write
1D6A2000
heap
page read and write
41FF000
stack
page read and write
D04000
heap
page read and write
A45000
unkown
page execute and write copy
14B0000
heap
page read and write
4381000
heap
page read and write
2A68B000
stack
page read and write
4A91000
heap
page read and write
4381000
heap
page read and write
1D671000
heap
page read and write
1D695000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
44BE000
stack
page read and write
7170000
heap
page read and write
364E000
stack
page read and write
3A0E000
stack
page read and write
ADC000
unkown
page execute and write copy
8E6000
unkown
page execute and read and write
3DCE000
stack
page read and write
D42000
unkown
page execute and read and write
4A91000
heap
page read and write
AD7000
unkown
page execute and write copy
2F8E000
stack
page read and write
C0F000
heap
page read and write
B01000
unkown
page execute and read and write
C40000
heap
page read and write
4A91000
heap
page read and write
B70000
unkown
page execute and write copy
2FAE000
heap
page read and write
994000
heap
page read and write
37AF000
stack
page read and write
FBE000
stack
page read and write
5DD000
unkown
page execute and read and write
8DB000
unkown
page execute and write copy
4B50000
heap
page read and write
347000
unkown
page execute and write copy
A60000
unkown
page execute and read and write
2D8E000
stack
page read and write
4711000
heap
page read and write
1D695000
heap
page read and write
AB0000
unkown
page execute and read and write
1D698000
heap
page read and write
238FC000
heap
page read and write
1D691000
heap
page read and write
441E000
stack
page read and write
43CF000
stack
page read and write
4A91000
heap
page read and write
113E000
stack
page read and write
4711000
heap
page read and write
4A91000
heap
page read and write
994000
heap
page read and write
AC7000
unkown
page execute and read and write
49C0000
direct allocation
page execute and read and write
4CDF000
stack
page read and write
1D6A2000
heap
page read and write
1D67B000
heap
page read and write
26F0000
heap
page read and write
4D40000
direct allocation
page execute and read and write
503000
unkown
page execute and write copy
D04000
heap
page read and write
4A91000
heap
page read and write
1D6B0000
heap
page read and write
4711000
heap
page read and write
1505000
heap
page read and write
329E000
stack
page read and write
4A91000
heap
page read and write
2A3F000
stack
page read and write
4381000
heap
page read and write
C66000
heap
page read and write
12FE000
stack
page read and write
AFE000
unkown
page execute and write copy
2FDF000
stack
page read and write
1D663000
heap
page read and write
854000
heap
page read and write
23891000
heap
page read and write
1D67B000
heap
page read and write
4381000
heap
page read and write
61ECD000
direct allocation
page readonly
4381000
heap
page read and write
3CAF000
stack
page read and write
5EDE000
stack
page read and write
870000
unkown
page read and write
8D9000
unkown
page write copy
994000
heap
page read and write
D95000
unkown
page execute and write copy
37EE000
stack
page read and write
BB7000
unkown
page execute and read and write
D04000
heap
page read and write
4B40000
direct allocation
page execute and read and write
1D6B0000
heap
page read and write
8DB000
unkown
page execute and write copy
4711000
heap
page read and write
1D68A000
heap
page read and write
854000
heap
page read and write
528F000
stack
page read and write
4381000
heap
page read and write
1170000
direct allocation
page read and write
2A7F000
stack
page read and write
5DD000
unkown
page execute and write copy
AA3000
unkown
page execute and write copy
4B81000
heap
page read and write
994000
heap
page read and write
BAA000
unkown
page write copy
8D2000
unkown
page execute and write copy
1D68B000
heap
page read and write
DC4000
unkown
page execute and write copy
BAC000
unkown
page execute and read and write
B1B000
unkown
page execute and read and write
4510000
direct allocation
page read and write
4E7000
unkown
page execute and read and write
2CFE000
stack
page read and write
641D000
stack
page read and write
297E000
stack
page read and write
AA3000
unkown
page execute and write copy
4A91000
heap
page read and write
41EE000
stack
page read and write
A43000
unkown
page execute and read and write
4381000
heap
page read and write
616E000
heap
page read and write
4711000
heap
page read and write
2F7F000
stack
page read and write
4A91000
heap
page read and write
D04000
heap
page read and write
AFE000
unkown
page execute and write copy
DE4000
unkown
page execute and read and write
339F000
stack
page read and write
3D7E000
stack
page read and write
1D6AB000
heap
page read and write
3A1E000
stack
page read and write
4CE000
unkown
page execute and read and write
274E000
stack
page read and write
4FC0000
trusted library allocation
page read and write
4A91000
heap
page read and write
2C90000
heap
page read and write
4A91000
heap
page read and write
4381000
heap
page read and write
145F000
stack
page read and write
B1B000
unkown
page execute and read and write
5000000
direct allocation
page read and write
4700000
direct allocation
page read and write
D00000
heap
page read and write
4711000
heap
page read and write
C66000
heap
page read and write
1D695000
heap
page read and write
4A91000
heap
page read and write
37FF000
stack
page read and write
406F000
stack
page read and write
3B4D000
stack
page read and write
3B1F000
stack
page read and write
3FBE000
stack
page read and write
33B000
unkown
page execute and write copy
4381000
heap
page read and write
3F1E000
stack
page read and write
A86000
unkown
page execute and write copy
4D10000
direct allocation
page execute and read and write
BB6000
unkown
page execute and write copy
994000
heap
page read and write
994000
heap
page read and write
1D695000
heap
page read and write
1D687000
heap
page read and write
994000
heap
page read and write
BEB000
heap
page read and write
36BF000
stack
page read and write
447F000
stack
page read and write
C5D000
heap
page read and write
4711000
heap
page read and write
373E000
stack
page read and write
D04000
heap
page read and write
465F000
stack
page read and write
4381000
heap
page read and write
4F10000
direct allocation
page read and write
4711000
heap
page read and write
2FA7000
heap
page read and write
1170000
direct allocation
page read and write
1D695000
heap
page read and write
B94000
unkown
page execute and write copy
B19000
unkown
page execute and write copy
429E000
stack
page read and write
4381000
heap
page read and write
49B0000
direct allocation
page execute and read and write
4A00000
direct allocation
page execute and read and write
4381000
heap
page read and write
4510000
direct allocation
page read and write
1D6B0000
heap
page read and write
14A0000
direct allocation
page read and write
3C5F000
stack
page read and write
26F7000
heap
page read and write
4381000
heap
page read and write
2E3E000
stack
page read and write
B93000
unkown
page execute and read and write
4B40000
direct allocation
page execute and read and write
315E000
stack
page read and write
298F000
stack
page read and write
3E3E000
stack
page read and write
3F2F000
stack
page read and write
54B000
unkown
page execute and read and write
4711000
heap
page read and write
238EA000
heap
page read and write
D4E000
stack
page read and write
DBA000
heap
page read and write
4711000
heap
page read and write
D04000
heap
page read and write
994000
heap
page read and write
4381000
heap
page read and write
6800000
trusted library allocation
page read and write
5E5000
unkown
page execute and write copy
4A91000
heap
page read and write
994000
heap
page read and write
1280000
heap
page read and write
4381000
heap
page read and write
357F000
stack
page read and write
23B48000
heap
page read and write
4381000
heap
page read and write
C5F000
heap
page read and write
32AF000
stack
page read and write
77C000
stack
page read and write
2D4F000
stack
page read and write
ACE000
unkown
page execute and write copy
994000
heap
page read and write
BCE000
heap
page read and write
388F000
stack
page read and write
23B52000
heap
page read and write
4381000
heap
page read and write
3AFE000
stack
page read and write
4A91000
heap
page read and write
236F5000
heap
page read and write
4A91000
heap
page read and write
4520000
heap
page read and write
871000
unkown
page execute and write copy
8E7000
unkown
page execute and write copy
4B40000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
C66000
heap
page read and write
47DE000
stack
page read and write
871000
unkown
page execute and write copy
D04000
heap
page read and write
AA3000
unkown
page execute and write copy
26F0000
heap
page read and write
FFB000
stack
page read and write
51E0000
direct allocation
page execute and read and write
BAA000
unkown
page write copy
1D693000
heap
page read and write
51F0000
direct allocation
page execute and read and write
346000
unkown
page execute and read and write
1170000
direct allocation
page read and write
8DB000
unkown
page execute and read and write
B7E000
heap
page read and write
D04000
heap
page read and write
14BA000
heap
page read and write
14A0000
direct allocation
page read and write
45BF000
stack
page read and write
4700000
direct allocation
page read and write
4381000
heap
page read and write
4711000
heap
page read and write
854000
heap
page read and write
3E2E000
stack
page read and write
4381000
heap
page read and write
4A91000
heap
page read and write
4620000
heap
page read and write
383E000
stack
page read and write
4381000
heap
page read and write
1530000
heap
page read and write
351E000
stack
page read and write
440E000
stack
page read and write
4960000
direct allocation
page execute and read and write
347E000
stack
page read and write
994000
heap
page read and write
4B80000
heap
page read and write
4381000
heap
page read and write
2D3E000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
347F000
stack
page read and write
5000000
direct allocation
page read and write
C67000
heap
page read and write
35FE000
stack
page read and write
5180000
direct allocation
page execute and read and write
D04000
heap
page read and write
52F000
unkown
page execute and read and write
ACE000
unkown
page execute and write copy
AB0000
unkown
page execute and read and write
4A91000
heap
page read and write
4381000
heap
page read and write
994000
heap
page read and write
23830000
heap
page read and write
854000
heap
page read and write
323E000
stack
page read and write
994000
heap
page read and write
A60000
unkown
page execute and read and write
5CB000
unkown
page execute and write copy
D2E000
unkown
page execute and write copy
158E000
heap
page read and write
2ECE000
stack
page read and write
3C9E000
stack
page read and write
4381000
heap
page read and write
ADB000
unkown
page execute and read and write
1D687000
heap
page read and write
BEC000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
BEA000
heap
page read and write
4A91000
heap
page read and write
6130000
heap
page read and write
AEC000
unkown
page execute and write copy
D27000
unkown
page execute and read and write
26D0000
direct allocation
page read and write
34CF000
stack
page read and write
469E000
stack
page read and write
49C0000
direct allocation
page read and write
4381000
heap
page read and write
B85000
unkown
page execute and write copy
8D9000
unkown
page write copy
238E8000
heap
page read and write
AEF000
unkown
page execute and read and write
BEE000
stack
page read and write
4380000
heap
page read and write
4711000
heap
page read and write
B83000
unkown
page execute and read and write
1D6A2000
heap
page read and write
A6E000
unkown
page execute and read and write
B08000
unkown
page execute and write copy
493F000
stack
page read and write
26D0000
direct allocation
page read and write
5E9F000
stack
page read and write
450F000
stack
page read and write
3F6E000
stack
page read and write
1517000
heap
page read and write
4711000
heap
page read and write
23AB0000
trusted library allocation
page read and write
513F000
stack
page read and write
4711000
heap
page read and write
4D0000
unkown
page execute and write copy
994000
heap
page read and write
15A6000
heap
page read and write
C40000
heap
page read and write
350E000
stack
page read and write
1D6B0000
heap
page read and write
3A7F000
stack
page read and write
6C755000
unkown
page readonly
29CE000
stack
page read and write
48DF000
stack
page read and write
30FE000
stack
page read and write
4950000
direct allocation
page execute and read and write
1D6B0000
heap
page read and write
4510000
direct allocation
page read and write
2E8F000
stack
page read and write
26D0000
direct allocation
page read and write
4AFF000
stack
page read and write
B7A000
heap
page read and write
537000
unkown
page execute and write copy
1170000
direct allocation
page read and write
57B000
unkown
page execute and read and write
A30000
unkown
page execute and read and write
A6E000
unkown
page execute and read and write
61ECC000
direct allocation
page read and write
A63000
unkown
page execute and read and write
994000
heap
page read and write
35AF000
stack
page read and write
DD0000
heap
page read and write
994000
heap
page read and write
4A91000
heap
page read and write
B85000
unkown
page execute and write copy
DBD000
unkown
page execute and read and write
4711000
heap
page read and write
1D68B000
heap
page read and write
4B81000
heap
page read and write
B7D000
unkown
page execute and read and write
1D68F000
heap
page read and write
4711000
heap
page read and write
4381000
heap
page read and write
BF3000
heap
page read and write
994000
heap
page read and write
5180000
direct allocation
page execute and read and write
B4F000
unkown
page execute and read and write
387E000
stack
page read and write
601E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4711000
heap
page read and write
47EF000
stack
page read and write
C9D000
stack
page read and write
4C3000
unkown
page execute and read and write
D84000
unkown
page execute and write copy
E2C000
unkown
page execute and write copy
1D6A2000
heap
page read and write
479F000
stack
page read and write
D0B000
unkown
page execute and read and write
870000
unkown
page read and write
994000
heap
page read and write
891B000
stack
page read and write
4700000
direct allocation
page read and write
549000
unkown
page execute and write copy
40FF000
stack
page read and write
4BA0000
direct allocation
page read and write
D5C000
stack
page read and write
339000
unkown
page write copy
4C24000
heap
page read and write
4521000
heap
page read and write
D76000
heap
page read and write
427E000
stack
page read and write
1CE8E000
stack
page read and write
8D9000
unkown
page write copy
1D68A000
heap
page read and write
3DDE000
stack
page read and write
52FE000
stack
page read and write
ACF000
unkown
page execute and read and write
314E000
stack
page read and write
4381000
heap
page read and write
AE9000
unkown
page execute and write copy
4510000
direct allocation
page read and write
73D000
stack
page read and write
D04000
heap
page read and write
4A91000
heap
page read and write
339000
unkown
page write copy
C5E000
heap
page read and write
D04000
heap
page read and write
4A91000
heap
page read and write
374F000
stack
page read and write
CEE000
stack
page read and write
8D9000
unkown
page write copy
4BE0000
direct allocation
page execute and read and write
8D2000
unkown
page execute and read and write
4381000
heap
page read and write
1D6B0000
heap
page read and write
1170000
direct allocation
page read and write
B83000
unkown
page execute and read and write
AC7000
unkown
page execute and read and write
4A91000
heap
page read and write
A77000
unkown
page execute and read and write
4A91000
heap
page read and write
BEC000
heap
page read and write
33B000
unkown
page execute and read and write
4510000
direct allocation
page read and write
4510000
direct allocation
page read and write
31FE000
stack
page read and write
39CF000
stack
page read and write
DB7000
unkown
page execute and read and write
446E000
stack
page read and write
4381000
heap
page read and write
4A91000
heap
page read and write
C0F000
heap
page read and write
A70000
unkown
page execute and write copy
1D6AB000
heap
page read and write
C3D000
heap
page read and write
3FFE000
stack
page read and write
1D6B0000
heap
page read and write
5180000
direct allocation
page execute and read and write
4711000
heap
page read and write
CF0000
heap
page read and write
36FE000
stack
page read and write
960000
unkown
page read and write
B6B000
unkown
page execute and write copy
D04000
heap
page read and write
4B70000
direct allocation
page execute and read and write
994000
heap
page read and write
A61000
unkown
page execute and write copy
700A000
heap
page read and write
4A91000
heap
page read and write
994000
heap
page read and write
544E000
stack
page read and write
6C54D000
unkown
page readonly
8E7000
unkown
page execute and write copy
AEC000
unkown
page execute and write copy
5FDF000
stack
page read and write
AD7000
unkown
page execute and write copy
1D68F000
heap
page read and write
30AF000
stack
page read and write
994000
heap
page read and write
A43000
unkown
page execute and read and write
6160000
heap
page read and write
D5E000
stack
page read and write
2B0E000
stack
page read and write
A87000
unkown
page execute and read and write
878000
stack
page read and write
667E000
stack
page read and write
994000
heap
page read and write
4711000
heap
page read and write
1D683000
heap
page read and write
B19000
unkown
page execute and write copy
8D2000
unkown
page execute and write copy
34DF000
stack
page read and write
3BBF000
stack
page read and write
1D672000
heap
page read and write
2F3F000
stack
page read and write
4BA0000
direct allocation
page read and write
26D0000
direct allocation
page read and write
41AF000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
401F000
stack
page read and write
3B0F000
stack
page read and write
5180000
direct allocation
page execute and read and write
5F3000
unkown
page execute and read and write
2EDE000
stack
page read and write
B98000
unkown
page execute and read and write
D91000
unkown
page execute and write copy
E2D000
unkown
page execute and write copy
DA8000
unkown
page execute and write copy
4711000
heap
page read and write
3D3F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
293F000
stack
page read and write
3BAE000
stack
page read and write
4381000
heap
page read and write
4A1F000
stack
page read and write
C47000
heap
page read and write
5220000
direct allocation
page execute and read and write
5170000
direct allocation
page execute and read and write
1170000
direct allocation
page read and write
4711000
heap
page read and write
4381000
heap
page read and write
AE1000
unkown
page execute and read and write
1D682000
heap
page read and write
14A0000
direct allocation
page read and write
4711000
heap
page read and write
26D0000
direct allocation
page read and write
332000
unkown
page execute and write copy
365E000
stack
page read and write
854000
heap
page read and write
46EE000
stack
page read and write
483E000
stack
page read and write
500F000
stack
page read and write
1D691000
heap
page read and write
D04000
heap
page read and write
4970000
direct allocation
page execute and read and write
4381000
heap
page read and write
1D695000
heap
page read and write
D3B000
unkown
page execute and write copy
D1F000
unkown
page execute and read and write
103F000
stack
page read and write
1D780000
trusted library allocation
page read and write
4510000
direct allocation
page read and write
ACF000
unkown
page execute and read and write
D04000
heap
page read and write
3A6E000
stack
page read and write
42CE000
stack
page read and write
2ABE000
stack
page read and write
4711000
heap
page read and write
8D9000
unkown
page write copy
AB0000
unkown
page execute and read and write
4381000
heap
page read and write
D50000
heap
page read and write
1D6B0000
heap
page read and write
9E4000
unkown
page execute and read and write
26D0000
direct allocation
page read and write
4980000
direct allocation
page execute and read and write
1D68D000
heap
page read and write
13C0000
heap
page read and write
B7D000
unkown
page execute and write copy
8E6000
unkown
page execute and read and write
4A91000
heap
page read and write
1D6AC000
heap
page read and write
14A0000
direct allocation
page read and write
DB8000
unkown
page execute and write copy
4A5000
unkown
page execute and write copy
1D6A9000
heap
page read and write
1CF8F000
stack
page read and write
4381000
heap
page read and write
332000
unkown
page execute and read and write
118A000
heap
page read and write
4A91000
heap
page read and write
26CE000
stack
page read and write
871000
unkown
page execute and write copy
DA9000
unkown
page execute and read and write
379E000
stack
page read and write
1D68F000
heap
page read and write
1170000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
419D000
stack
page read and write
4A91000
heap
page read and write
118E000
heap
page read and write
504E000
stack
page read and write
3BFE000
stack
page read and write
854000
heap
page read and write
23B4E000
heap
page read and write
6C750000
unkown
page read and write
4A91000
heap
page read and write
4A91000
heap
page read and write
31FF000
stack
page read and write
994000
heap
page read and write
1D68B000
heap
page read and write
1D698000
heap
page read and write
156E000
heap
page read and write
4711000
heap
page read and write
AE1000
unkown
page execute and read and write
4D20000
direct allocation
page execute and read and write
1D6B0000
heap
page read and write
611F000
stack
page read and write
2A820000
heap
page read and write
4700000
direct allocation
page read and write
87B000
stack
page read and write
13C5000
heap
page read and write
333F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
4B30000
direct allocation
page execute and read and write
4381000
heap
page read and write
4381000
heap
page read and write
30BF000
stack
page read and write
D04000
heap
page read and write
B83000
unkown
page execute and read and write
4711000
heap
page read and write
1D695000
heap
page read and write
1D6B0000
heap
page read and write
A63000
unkown
page execute and read and write
378E000
stack
page read and write
3CFF000
stack
page read and write
5AF000
unkown
page execute and read and write
4D90000
direct allocation
page execute and read and write
5D56000
heap
page read and write
5EC000
stack
page read and write
1D671000
heap
page read and write
B01000
unkown
page execute and read and write
2C7E000
stack
page read and write
A6E000
unkown
page execute and write copy
4AB0000
heap
page read and write
53FF000
stack
page read and write
2F7E000
stack
page read and write
C47000
heap
page read and write
1160000
heap
page read and write
496E000
stack
page read and write
870000
unkown
page readonly
3C4F000
stack
page read and write
1D6B0000
heap
page read and write
E33000
unkown
page execute and write copy
3D8F000
stack
page read and write
AD7000
unkown
page execute and write copy
4381000
heap
page read and write
4381000
heap
page read and write
4A91000
heap
page read and write
8FA000
stack
page read and write
4A91000
heap
page read and write
D25000
unkown
page execute and write copy
854000
heap
page read and write
4711000
heap
page read and write
D04000
heap
page read and write
994000
heap
page read and write
B4F000
unkown
page execute and read and write
5F3000
unkown
page execute and write copy
D04000
heap
page read and write
23AAF000
stack
page read and write
4711000
heap
page read and write
4A91000
heap
page read and write
51D0000
direct allocation
page execute and read and write
B70000
heap
page read and write
4510000
direct allocation
page read and write
5210000
direct allocation
page execute and read and write
4381000
heap
page read and write
4A91000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4AA0000
heap
page read and write
1D68B000
heap
page read and write
4800000
direct allocation
page read and write
6C571000
unkown
page execute read
283E000
stack
page read and write
BC0000
heap
page read and write
46FF000
stack
page read and write
994000
heap
page read and write
4F10000
direct allocation
page read and write
651E000
stack
page read and write
D04000
heap
page read and write
3FBF000
stack
page read and write
4381000
heap
page read and write
33DE000
stack
page read and write
AFE000
unkown
page execute and write copy
F6E000
stack
page read and write
B93000
unkown
page execute and write copy
4381000
heap
page read and write
23830000
trusted library allocation
page read and write
482E000
stack
page read and write
333E000
stack
page read and write
238D1000
heap
page read and write
DAE000
stack
page read and write
541000
unkown
page execute and read and write
D04000
heap
page read and write
4510000
direct allocation
page read and write
437E000
stack
page read and write
1170000
direct allocation
page read and write
B85000
unkown
page execute and write copy
61ED3000
direct allocation
page read and write
345000
unkown
page execute and write copy
5D9E000
stack
page read and write
B7E000
unkown
page execute and write copy
C45000
heap
page read and write
4A91000
heap
page read and write
980000
heap
page read and write
8D2000
unkown
page execute and read and write
2FAB000
heap
page read and write
D04000
heap
page read and write
1D660000
heap
page read and write
A61000
unkown
page execute and write copy
8DB000
unkown
page execute and read and write
AC5000
unkown
page execute and write copy
31BF000
stack
page read and write
1D6B0000
heap
page read and write
4381000
heap
page read and write
4381000
heap
page read and write
1D679000
heap
page read and write
8DB000
unkown
page execute and read and write
4381000
heap
page read and write
4A91000
heap
page read and write
4381000
heap
page read and write
56B000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
503E000
stack
page read and write
D04000
heap
page read and write
43DF000
stack
page read and write
4F8000
unkown
page execute and read and write
873000
stack
page read and write
4A91000
heap
page read and write
23830000
trusted library allocation
page read and write
1D689000
heap
page read and write
3BFF000
stack
page read and write
5D50000
heap
page read and write
26F7000
heap
page read and write
4CE000
unkown
page execute and write copy
3EBE000
stack
page read and write
2B0000
heap
page read and write
54C000
unkown
page execute and write copy
4711000
heap
page read and write
324F000
stack
page read and write
8A3A000
heap
page read and write
8DB000
unkown
page execute and write copy
4381000
heap
page read and write
C3A000
heap
page read and write
D04000
heap
page read and write
1D695000
heap
page read and write
B19000
unkown
page execute and write copy
4A20000
direct allocation
page execute and read and write
1500000
heap
page read and write
27FF000
stack
page read and write
5180000
direct allocation
page execute and read and write
4530000
heap
page read and write
994000
heap
page read and write
854000
heap
page read and write
4D00000
direct allocation
page execute and read and write
AEB000
unkown
page execute and read and write
D04000
heap
page read and write
49C0000
direct allocation
page read and write
561000
unkown
page execute and read and write
D04000
heap
page read and write
A87000
unkown
page execute and read and write
2930000
heap
page read and write
854000
heap
page read and write
4C1000
unkown
page execute and write copy
51A0000
direct allocation
page execute and read and write
4980000
direct allocation
page execute and read and write
4381000
heap
page read and write
2937000
heap
page read and write
23930000
trusted library allocation
page read and write
36FF000
stack
page read and write
D04000
heap
page read and write
1CE4F000
stack
page read and write
24B000
stack
page read and write
D1D000
unkown
page execute and write copy
4381000
heap
page read and write
2CBF000
stack
page read and write
4381000
heap
page read and write
1170000
direct allocation
page read and write
442F000
stack
page read and write
311F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
D94000
unkown
page execute and read and write
1D6AB000
heap
page read and write
4A91000
heap
page read and write
D04000
heap
page read and write
397F000
stack
page read and write
ADB000
unkown
page execute and read and write
4381000
heap
page read and write
1D694000
heap
page read and write
38DE000
stack
page read and write
4A91000
heap
page read and write
1D78E000
heap
page read and write
4381000
heap
page read and write
14A0000
direct allocation
page read and write
42EF000
stack
page read and write
850000
heap
page read and write
45AE000
stack
page read and write
4D20000
direct allocation
page execute and read and write
6C70F000
unkown
page readonly
14A0000
direct allocation
page read and write
137E000
stack
page read and write
C40000
heap
page read and write
677E000
stack
page read and write
5190000
direct allocation
page execute and read and write
4A91000
heap
page read and write
1D683000
heap
page read and write
4A91000
heap
page read and write
870000
unkown
page readonly
B6E000
stack
page read and write
4711000
heap
page read and write
D04000
heap
page read and write
8E5000
unkown
page execute and write copy
4A91000
heap
page read and write
B85000
unkown
page execute and write copy
994000
heap
page read and write
4D20000
direct allocation
page execute and read and write
4700000
direct allocation
page read and write
4ECC000
stack
page read and write
4D20000
direct allocation
page execute and read and write
14A0000
direct allocation
page read and write
4D20000
direct allocation
page execute and read and write
4381000
heap
page read and write
8A1C000
stack
page read and write
4381000
heap
page read and write
140E000
stack
page read and write
2FCF000
stack
page read and write
307F000
stack
page read and write
4381000
heap
page read and write
288E000
stack
page read and write
E33000
unkown
page execute and write copy
300E000
stack
page read and write
14A0000
direct allocation
page read and write
A6E000
unkown
page execute and read and write
4711000
heap
page read and write
B93000
unkown
page execute and write copy
40AD000
stack
page read and write
1D6A2000
heap
page read and write
4381000
heap
page read and write
3ABF000
stack
page read and write
49D0000
direct allocation
page execute and read and write
D04000
heap
page read and write
26D0000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
994000
heap
page read and write
E2C000
unkown
page execute and read and write
BEE000
heap
page read and write
4711000
heap
page read and write
ACF000
unkown
page execute and read and write
5180000
direct allocation
page execute and read and write
E42000
unkown
page execute and write copy
AE1000
unkown
page execute and read and write
4510000
direct allocation
page read and write
DB4000
unkown
page execute and write copy
4800000
direct allocation
page read and write
579000
unkown
page execute and write copy
4711000
heap
page read and write
40FE000
stack
page read and write
4381000
heap
page read and write
4711000
heap
page read and write
8D9000
unkown
page write copy
4700000
direct allocation
page read and write
4A91000
heap
page read and write
C5D000
heap
page read and write
310F000
stack
page read and write
A77000
unkown
page execute and read and write
4381000
heap
page read and write
4381000
heap
page read and write
14A0000
direct allocation
page read and write
BD0000
heap
page read and write
C0F000
heap
page read and write
455E000
stack
page read and write
4700000
direct allocation
page read and write
4A91000
heap
page read and write
AE9000
unkown
page execute and write copy
4381000
heap
page read and write
4381000
heap
page read and write
DAA000
unkown
page execute and write copy
D04000
heap
page read and write
854000
heap
page read and write
6161000
heap
page read and write
4A91000
heap
page read and write
4711000
heap
page read and write
CF0000
heap
page read and write
A86000
unkown
page execute and write copy
B6B000
unkown
page execute and write copy
393F000
stack
page read and write
6170000
heap
page read and write
1D37D000
stack
page read and write
1D671000
heap
page read and write
1D6B0000
heap
page read and write
40BF000
stack
page read and write
4381000
heap
page read and write
26D0000
direct allocation
page read and write
AC7000
unkown
page execute and read and write
D04000
heap
page read and write
8D2000
unkown
page execute and write copy
51B0000
direct allocation
page execute and read and write
4381000
heap
page read and write
997000
unkown
page execute and read and write
148E000
stack
page read and write
8D2000
unkown
page execute and read and write
53C000
unkown
page execute and write copy
4381000
heap
page read and write
451F000
stack
page read and write
1D68F000
heap
page read and write
8E5000
unkown
page execute and write copy
B93000
unkown
page execute and write copy
A34000
unkown
page execute and read and write
53B000
unkown
page execute and read and write
C0F000
heap
page read and write
4711000
heap
page read and write
2ACF000
stack
page read and write
4A91000
heap
page read and write
1D6B0000
heap
page read and write
4381000
heap
page read and write
854000
heap
page read and write
994000
heap
page read and write
1D68B000
heap
page read and write
D04000
heap
page read and write
A63000
unkown
page execute and read and write
1D65D000
stack
page read and write
There are 1400 hidden memdumps, click here to show them.