IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\GCGHCBKFCF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFCBKFHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BFBGHDGCFHIDBGDGIIIEHIJDAF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EHIJJDGDHDGDAKFIECFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBFCGIDAKECGCBGDBAFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJDHCFCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\HJJJDAEGIDHCBFHJJJEG
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\IEBAAFCAFCBKFHJJJKKFHIDAAK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\39682f62-8d23-402a-920c-984481f11481.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3d74f55a-9705-4a97-998a-447dd4605174.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\61303d48-4f8d-4bb3-b32b-081d82fac3b2.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8bf21bdd-621d-4c04-8f73-a8378b210888.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6753FC99-E44.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3686f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF375be.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF375cd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b7bf2a3e-fe71-4205-847c-1489c99491b0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 06:43:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 06:43:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 06:43:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 06:43:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Dec 7 06:43:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 105
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (770)
downloaded
Chrome Cache Entry: 107
ASCII text
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 110
SVG Scalable Vector Graphics image
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2188,i,6661159212943075951,5732538178884373032,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2544 --field-trial-handle=2460,i,15555307753456093971,14081396310423305561,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=2304,i,17772783766471260241,16238618650825771522,262144 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\GCGHCBKFCF.exe"
malicious
C:\Users\user\Documents\GCGHCBKFCF.exe
"C:\Users\user\Documents\GCGHCBKFCF.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dllN
unknown
http://185.215.113.43/Zu7JuNko/index.phpbr
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll$
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206667a4575905acade638069a92d17dc9f4fa8303beaac8eb89
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://185.215.113.16/mine/random.exe#
unknown
http://185.215.113.206/Z
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
https://apis.google.com
unknown
http://185.215.113.206/c4becf79229cb002.phpAUr
unknown
http://185.215.113.43/Zu7JuNko/index.phpJr
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/c4becf79229cb002.phpSU
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dllb
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
http://185.215.113.206/c4becf79229cb002.php0
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
https://play.google.com/log?format=json&hasfast=true
unknown
http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dllp
unknown
http://185.215.113.43/Zu7JuNko/index.phpO#
unknown
http://185.215.113.43/Zu7JuNko/index.php~r
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://185.215.113.43/FX
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/c4becf79229cb002.phpDE
unknown
http://185.215.113.206/c4becf79229cb002.phpH
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.43/Zu7JuNko/index.phpo
unknown
There are 52 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www3.l.google.com
142.250.181.142
plus.l.google.com
142.250.181.110
www.google.com
142.250.181.100
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.181.142
www3.l.google.com
United States
185.215.113.16
unknown
Portugal
142.250.181.110
plus.l.google.com
United States
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
571000
unkown
page execute and read and write
malicious
DD1000
unkown
page execute and read and write
malicious
571000
unkown
page execute and read and write
malicious
17FE000
heap
page read and write
malicious
571000
unkown
page execute and read and write
malicious
A21000
unkown
page execute and read and write
malicious
4CDF000
stack
page read and write
141A000
heap
page read and write
78A0000
heap
page read and write
560000
direct allocation
page read and write
3BEE000
stack
page read and write
4BF1000
heap
page read and write
296E000
stack
page read and write
1374000
heap
page read and write
E07000
unkown
page execute and read and write
560000
direct allocation
page read and write
345F000
stack
page read and write
5320000
heap
page read and write
C98000
unkown
page execute and write copy
686E000
stack
page read and write
C8E000
unkown
page execute and write copy
839000
unkown
page execute and read and write
7BC000
unkown
page execute and read and write
4F61000
heap
page read and write
6DFA000
heap
page read and write
4C00000
direct allocation
page execute and read and write
1DB58000
heap
page read and write
4231000
heap
page read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
261F000
stack
page read and write
1DB62000
heap
page read and write
554000
heap
page read and write
C5E000
heap
page read and write
4BF1000
heap
page read and write
1249000
unkown
page execute and read and write
440000
heap
page read and write
BFE000
unkown
page execute and read and write
455F000
stack
page read and write
4BF1000
heap
page read and write
2405D000
heap
page read and write
C7E000
stack
page read and write
14FB000
heap
page read and write
12AC000
unkown
page execute and read and write
839000
unkown
page execute and read and write
4A2E000
stack
page read and write
13F0000
direct allocation
page read and write
1DB39000
heap
page read and write
5D9000
unkown
page write copy
1DB70000
heap
page read and write
1DB42000
heap
page read and write
245E000
stack
page read and write
9FB000
heap
page read and write
C72000
unkown
page execute and read and write
4F60000
heap
page read and write
4BF1000
heap
page read and write
11B2000
unkown
page execute and write copy
27BF000
stack
page read and write
4BF1000
heap
page read and write
61EB7000
direct allocation
page readonly
4B2F000
stack
page read and write
14DD000
heap
page read and write
14D9000
heap
page read and write
4F61000
heap
page read and write
4231000
heap
page read and write
1DB6D000
heap
page read and write
3A1F000
stack
page read and write
4AAE000
stack
page read and write
7E0000
unkown
page execute and read and write
4F61000
heap
page read and write
1841000
heap
page read and write
4231000
heap
page read and write
4BF1000
heap
page read and write
C4C000
stack
page read and write
1374000
heap
page read and write
4231000
heap
page read and write
3AAF000
stack
page read and write
1DB55000
heap
page read and write
1DB62000
heap
page read and write
61E00000
direct allocation
page execute and read and write
3A6F000
stack
page read and write
D48000
stack
page read and write
1374000
heap
page read and write
40EF000
stack
page read and write
13F0000
direct allocation
page read and write
1210000
heap
page read and write
570000
unkown
page read and write
554000
heap
page read and write
1250000
heap
page read and write
12AD000
unkown
page execute and write copy
4211000
heap
page read and write
14F9000
heap
page read and write
5220000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
2A6F000
stack
page read and write
4BF1000
heap
page read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
2CEF000
stack
page read and write
146D000
heap
page read and write
570000
unkown
page readonly
4231000
heap
page read and write
4BF1000
heap
page read and write
87F000
unkown
page execute and write copy
2A6F000
stack
page read and write
1DB62000
heap
page read and write
1DB62000
heap
page read and write
382F000
stack
page read and write
1DB70000
heap
page read and write
382E000
stack
page read and write
4231000
heap
page read and write
1DB4F000
heap
page read and write
3E1E000
stack
page read and write
1374000
heap
page read and write
4CAE000
stack
page read and write
4820000
direct allocation
page execute and read and write
3B9F000
stack
page read and write
4F61000
heap
page read and write
4231000
heap
page read and write
7B9000
unkown
page execute and write copy
4231000
heap
page read and write
4BF1000
heap
page read and write
C50000
heap
page read and write
1DB3D000
heap
page read and write
4BF1000
heap
page read and write
6D9C000
heap
page read and write
C6D000
unkown
page execute and write copy
17E0000
direct allocation
page read and write
1D35F000
stack
page read and write
1DB6B000
heap
page read and write
4BF1000
heap
page read and write
32DF000
stack
page read and write
412E000
stack
page read and write
34AE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
BEF000
stack
page read and write
3AEE000
stack
page read and write
3B9E000
stack
page read and write
4200000
direct allocation
page read and write
17E0000
direct allocation
page read and write
4231000
heap
page read and write
3C2E000
stack
page read and write
75B000
unkown
page execute and write copy
3D6E000
stack
page read and write
1DB3B000
heap
page read and write
4200000
direct allocation
page read and write
7C9000
unkown
page execute and write copy
1374000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
3CEF000
stack
page read and write
283C000
stack
page read and write
4200000
direct allocation
page read and write
4880000
direct allocation
page execute and read and write
11AD000
unkown
page execute and read and write
A97000
unkown
page execute and write copy
18B6000
heap
page read and write
4BF1000
heap
page read and write
7EE000
unkown
page execute and write copy
F37000
unkown
page execute and read and write
7E0000
unkown
page execute and read and write
7EE000
unkown
page execute and write copy
80B000
unkown
page execute and write copy
17F0000
heap
page read and write
4A0000
heap
page read and write
4EFF000
stack
page read and write
5250000
direct allocation
page execute and read and write
2ACC0000
heap
page read and write
4231000
heap
page read and write
61E01000
direct allocation
page execute read
4F61000
heap
page read and write
129E000
stack
page read and write
1DB55000
heap
page read and write
1DB55000
heap
page read and write
51AF000
stack
page read and write
79F000
unkown
page execute and read and write
5D2000
unkown
page execute and write copy
1246000
unkown
page execute and write copy
65E5000
heap
page read and write
2DDF000
stack
page read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
867000
unkown
page execute and write copy
25E7000
heap
page read and write
14FE000
heap
page read and write
1209000
unkown
page execute and read and write
355F000
stack
page read and write
3F5F000
stack
page read and write
554000
heap
page read and write
1374000
heap
page read and write
1506000
heap
page read and write
2850000
direct allocation
page execute and read and write
75F000
unkown
page execute and read and write
47C000
stack
page read and write
412E000
stack
page read and write
45F1000
heap
page read and write
49EB000
stack
page read and write
540000
heap
page read and write
570000
unkown
page readonly
4BF1000
heap
page read and write
8D45000
heap
page read and write
4231000
heap
page read and write
2ACC1000
heap
page read and write
99C000
stack
page read and write
DD0000
unkown
page readonly
7ED000
unkown
page execute and read and write
30AF000
stack
page read and write
4231000
heap
page read and write
6F851000
unkown
page execute read
5D9000
unkown
page write copy
41EF000
stack
page read and write
4840000
direct allocation
page execute and read and write
4231000
heap
page read and write
123E000
unkown
page execute and write copy
4231000
heap
page read and write
4231000
heap
page read and write
1DB4F000
heap
page read and write
4BF1000
heap
page read and write
B7E000
stack
page read and write
14E0000
heap
page read and write
1DB55000
heap
page read and write
86E000
unkown
page execute and write copy
1028000
unkown
page execute and write copy
5E6000
unkown
page execute and read and write
4BF1000
heap
page read and write
2F70000
heap
page read and write
4233000
heap
page read and write
2850000
direct allocation
page execute and read and write
14AF000
heap
page read and write
1DB33000
heap
page read and write
2A5E000
stack
page read and write
508E000
stack
page read and write
7B9000
unkown
page execute and write copy
1400000
direct allocation
page read and write
E85000
unkown
page execute and read and write
793000
unkown
page execute and write copy
1D61E000
stack
page read and write
4BF1000
heap
page read and write
7CC000
unkown
page execute and read and write
5530000
direct allocation
page execute and read and write
4F61000
heap
page read and write
23D71000
heap
page read and write
560000
direct allocation
page read and write
4211000
heap
page read and write
1222000
unkown
page execute and read and write
550000
heap
page read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
4231000
heap
page read and write
101C000
unkown
page execute and write copy
436E000
stack
page read and write
4BF1000
heap
page read and write
61EB4000
direct allocation
page read and write
1374000
heap
page read and write
1DB55000
heap
page read and write
4810000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
7B8000
unkown
page execute and read and write
1374000
heap
page read and write
1374000
heap
page read and write
441F000
stack
page read and write
1DB53000
heap
page read and write
446F000
stack
page read and write
14FB000
heap
page read and write
1DB70000
heap
page read and write
1DB0D000
stack
page read and write
4840000
direct allocation
page execute and read and write
868000
unkown
page execute and read and write
51F0000
direct allocation
page execute and read and write
48C0000
direct allocation
page execute and read and write
11DE000
unkown
page execute and write copy
1DC70000
trusted library allocation
page read and write
4F4D000
stack
page read and write
1DB70000
heap
page read and write
2A1F000
stack
page read and write
2850000
direct allocation
page execute and read and write
52E000
stack
page read and write
74E000
unkown
page execute and read and write
4B9F000
stack
page read and write
E9C000
unkown
page execute and read and write
4BF1000
heap
page read and write
5070000
direct allocation
page read and write
4231000
heap
page read and write
853000
unkown
page execute and read and write
1DB6D000
heap
page read and write
5DB000
unkown
page execute and write copy
2FA0000
heap
page read and write
CA9000
unkown
page execute and write copy
4200000
direct allocation
page read and write
43AE000
stack
page read and write
560000
direct allocation
page read and write
7C9000
unkown
page execute and write copy
3FAF000
stack
page read and write
27EF000
stack
page read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
4E0000
heap
page read and write
4200000
direct allocation
page read and write
4231000
heap
page read and write
C26000
unkown
page execute and read and write
5324000
heap
page read and write
1DB70000
heap
page read and write
3E2F000
stack
page read and write
61ECC000
direct allocation
page read and write
75F000
unkown
page execute and read and write
4F61000
heap
page read and write
4A5000
heap
page read and write
CA1000
unkown
page execute and read and write
4BF1000
heap
page read and write
255F000
stack
page read and write
4F61000
heap
page read and write
45F1000
heap
page read and write
9AF000
heap
page read and write
D1E000
unkown
page execute and write copy
51F0000
direct allocation
page execute and read and write
2FA7000
heap
page read and write
14B3000
heap
page read and write
1374000
heap
page read and write
980000
heap
page read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
4231000
heap
page read and write
31EF000
stack
page read and write
3E6F000
stack
page read and write
80D000
unkown
page execute and read and write
765000
unkown
page execute and read and write
851000
unkown
page execute and write copy
1DB70000
heap
page read and write
560000
direct allocation
page read and write
851000
unkown
page execute and write copy
87E000
unkown
page execute and read and write
6BFF000
stack
page read and write
560000
direct allocation
page read and write
2510000
heap
page read and write
396F000
stack
page read and write
4BF1000
heap
page read and write
C0F000
unkown
page execute and read and write
332E000
stack
page read and write
3C9F000
stack
page read and write
118E000
unkown
page execute and read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
4B5000
heap
page read and write
2BEE000
stack
page read and write
4231000
heap
page read and write
5560000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
5520000
direct allocation
page execute and read and write
11A0000
unkown
page execute and read and write
560000
direct allocation
page read and write
1374000
heap
page read and write
86C000
unkown
page execute and read and write
2CEF000
stack
page read and write
4BF1000
heap
page read and write
6C785000
unkown
page readonly
4BF1000
heap
page read and write
7CC000
unkown
page execute and read and write
554000
heap
page read and write
4200000
direct allocation
page read and write
40AF000
stack
page read and write
4BF1000
heap
page read and write
6AFE000
stack
page read and write
A8B000
unkown
page execute and read and write
4BF1000
heap
page read and write
41DF000
stack
page read and write
A8B000
unkown
page execute and write copy
560000
direct allocation
page read and write
1DB43000
heap
page read and write
1DA0E000
stack
page read and write
1DB47000
heap
page read and write
3EAE000
stack
page read and write
4A5F000
stack
page read and write
13F0000
direct allocation
page read and write
554000
heap
page read and write
4BF1000
heap
page read and write
3D6E000
stack
page read and write
4231000
heap
page read and write
5D2000
unkown
page execute and write copy
4230000
heap
page read and write
3CDE000
stack
page read and write
4F61000
heap
page read and write
319F000
stack
page read and write
14E9000
heap
page read and write
A96000
unkown
page execute and read and write
17CE000
stack
page read and write
DD0000
unkown
page read and write
5E5000
unkown
page execute and write copy
1374000
heap
page read and write
2BEE000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
18A5000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
396F000
stack
page read and write
1DB70000
heap
page read and write
D43000
stack
page read and write
1374000
heap
page read and write
960000
heap
page read and write
4A30000
trusted library allocation
page read and write
45F0000
heap
page read and write
342F000
stack
page read and write
504C000
stack
page read and write
4F61000
heap
page read and write
776000
unkown
page execute and read and write
4231000
heap
page read and write
1255000
heap
page read and write
4BF1000
heap
page read and write
37EF000
stack
page read and write
4BF1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
1DB32000
heap
page read and write
2CDE000
stack
page read and write
775000
unkown
page execute and write copy
1DB70000
heap
page read and write
4231000
heap
page read and write
1DB31000
heap
page read and write
141E000
heap
page read and write
1DB70000
heap
page read and write
86C000
unkown
page execute and read and write
2E2F000
stack
page read and write
1506000
heap
page read and write
853000
unkown
page execute and read and write
1DB49000
heap
page read and write
341F000
stack
page read and write
1DB6B000
heap
page read and write
372E000
stack
page read and write
1DB51000
heap
page read and write
4BF1000
heap
page read and write
1D71F000
stack
page read and write
3E5E000
stack
page read and write
7700000
heap
page read and write
9E0000
heap
page read and write
2404F000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
7E8000
unkown
page execute and write copy
1DB6B000
heap
page read and write
381E000
stack
page read and write
7B8000
unkown
page execute and read and write
571000
unkown
page execute and write copy
6C77F000
unkown
page write copy
148E000
heap
page read and write
4231000
heap
page read and write
1400000
direct allocation
page read and write
46DE000
stack
page read and write
7E0000
unkown
page execute and read and write
41E0000
heap
page read and write
4670000
trusted library allocation
page read and write
C7C000
unkown
page execute and read and write
146D000
heap
page read and write
86C000
unkown
page execute and read and write
5550000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
7BD000
unkown
page execute and write copy
4F61000
heap
page read and write
DC000
stack
page read and write
80B000
unkown
page execute and write copy
27FE000
stack
page read and write
560000
direct allocation
page read and write
C43000
unkown
page execute and write copy
3FAE000
stack
page read and write
1DB4F000
heap
page read and write
1DB4B000
heap
page read and write
D2E000
unkown
page execute and write copy
1374000
heap
page read and write
4C30000
direct allocation
page execute and read and write
422D000
stack
page read and write
14D2000
heap
page read and write
F1F000
stack
page read and write
11AD000
unkown
page execute and write copy
3D2F000
stack
page read and write
D19000
unkown
page execute and write copy
14E0000
heap
page read and write
75B000
unkown
page execute and write copy
4F61000
heap
page read and write
789E000
heap
page read and write
4BF1000
heap
page read and write
1DB55000
heap
page read and write
1027000
unkown
page execute and read and write
51F0000
direct allocation
page execute and read and write
7BD000
unkown
page execute and write copy
672E000
stack
page read and write
2850000
direct allocation
page execute and read and write
4F61000
heap
page read and write
4231000
heap
page read and write
101C000
unkown
page execute and read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
3A5E000
stack
page read and write
2F6F000
stack
page read and write
5580000
direct allocation
page execute and read and write
9C5000
heap
page read and write
3BEF000
stack
page read and write
4211000
heap
page read and write
1374000
heap
page read and write
1206000
unkown
page execute and write copy
4BF1000
heap
page read and write
48A0000
direct allocation
page execute and read and write
C3C000
unkown
page execute and read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
2860000
heap
page read and write
4860000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
7DE000
unkown
page execute and write copy
23DD1000
heap
page read and write
4AEE000
stack
page read and write
7891000
heap
page read and write
7E8000
unkown
page execute and write copy
7FC000
unkown
page execute and read and write
41DE000
stack
page read and write
75C000
unkown
page execute and read and write
320E000
stack
page read and write
1374000
heap
page read and write
4BF1000
heap
page read and write
69BB000
stack
page read and write
1506000
heap
page read and write
4820000
direct allocation
page execute and read and write
1DB4E000
heap
page read and write
5E7000
unkown
page execute and write copy
1400000
direct allocation
page read and write
31DE000
stack
page read and write
3AAF000
stack
page read and write
839000
unkown
page execute and read and write
13DE000
stack
page read and write
2ABB0000
heap
page read and write
560000
direct allocation
page read and write
9F0000
heap
page read and write
4F5F000
stack
page read and write
32EF000
stack
page read and write
87E000
unkown
page execute and write copy
2BAF000
stack
page read and write
386E000
stack
page read and write
30EE000
stack
page read and write
1400000
direct allocation
page read and write
1DB55000
heap
page read and write
2FAE000
heap
page read and write
4840000
direct allocation
page execute and read and write
4231000
heap
page read and write
39AE000
stack
page read and write
379F000
stack
page read and write
4231000
heap
page read and write
30EE000
stack
page read and write
45AF000
stack
page read and write
1D8AE000
stack
page read and write
14E6000
heap
page read and write
4231000
heap
page read and write
554000
heap
page read and write
560000
direct allocation
page read and write
4211000
heap
page read and write
120E000
unkown
page execute and read and write
867000
unkown
page execute and write copy
146E000
heap
page read and write
4BF1000
heap
page read and write
560000
direct allocation
page read and write
44AE000
stack
page read and write
1DC79000
heap
page read and write
4F61000
heap
page read and write
7C2000
unkown
page execute and read and write
4BF1000
heap
page read and write
49AE000
stack
page read and write
1370000
heap
page read and write
560000
direct allocation
page read and write
459D000
stack
page read and write
A89000
unkown
page write copy
409F000
stack
page read and write
1DB4B000
heap
page read and write
1DB62000
heap
page read and write
23DFF000
heap
page read and write
853000
unkown
page execute and read and write
1DB55000
heap
page read and write
7709000
heap
page read and write
1374000
heap
page read and write
35AE000
stack
page read and write
4231000
heap
page read and write
C4F000
unkown
page execute and read and write
4BF1000
heap
page read and write
86E000
unkown
page execute and write copy
6E0E000
heap
page read and write
4840000
direct allocation
page execute and read and write
23EAE000
stack
page read and write
4200000
direct allocation
page read and write
4BF1000
heap
page read and write
391E000
stack
page read and write
7CC000
unkown
page execute and read and write
1374000
heap
page read and write
14AF000
heap
page read and write
4850000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4F61000
heap
page read and write
7F9000
unkown
page execute and write copy
C0B000
unkown
page execute and write copy
3FEE000
stack
page read and write
1374000
heap
page read and write
560000
direct allocation
page read and write
4F61000
heap
page read and write
4890000
direct allocation
page execute and read and write
50AE000
stack
page read and write
6C5A1000
unkown
page execute read
4BF1000
heap
page read and write
5270000
direct allocation
page execute and read and write
9E0000
direct allocation
page read and write
FC000
stack
page read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
1374000
heap
page read and write
7FC000
unkown
page execute and read and write
1217000
unkown
page execute and read and write
14DA000
heap
page read and write
1374000
heap
page read and write
324E000
stack
page read and write
3B5F000
stack
page read and write
4810000
direct allocation
page execute and read and write
4231000
heap
page read and write
4BF1000
heap
page read and write
4B0000
heap
page read and write
4EE000
stack
page read and write
6970000
heap
page read and write
554000
heap
page read and write
7DE000
unkown
page execute and write copy
73A000
unkown
page execute and write copy
2D2E000
stack
page read and write
56E000
stack
page read and write
4231000
heap
page read and write
12B2000
unkown
page execute and write copy
5E5000
unkown
page execute and write copy
4231000
heap
page read and write
4231000
heap
page read and write
48A0000
direct allocation
page execute and read and write
7B7000
unkown
page execute and write copy
5D9000
unkown
page write copy
61ED0000
direct allocation
page read and write
47DF000
stack
page read and write
4231000
heap
page read and write
554000
heap
page read and write
40DE000
stack
page read and write
2867000
heap
page read and write
5D9000
unkown
page write copy
1400000
direct allocation
page read and write
189F000
heap
page read and write
13F0000
direct allocation
page read and write
1400000
direct allocation
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
1DB4F000
heap
page read and write
1DB69000
heap
page read and write
4231000
heap
page read and write
D4E000
stack
page read and write
1374000
heap
page read and write
4820000
direct allocation
page execute and read and write
24CE000
stack
page read and write
13F0000
direct allocation
page read and write
4231000
heap
page read and write
C40000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
7F1000
unkown
page execute and read and write
14E7000
heap
page read and write
3E6E000
stack
page read and write
1DB70000
heap
page read and write
4F61000
heap
page read and write
14DA000
heap
page read and write
4BF1000
heap
page read and write
4880000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
12C1000
unkown
page execute and read and write
7C9000
unkown
page execute and write copy
2EEF000
stack
page read and write
C69000
unkown
page execute and write copy
7F9000
unkown
page execute and write copy
869000
unkown
page execute and write copy
4231000
heap
page read and write
551F000
stack
page read and write
4200000
direct allocation
page read and write
5540000
direct allocation
page execute and read and write
1D25E000
stack
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
331E000
stack
page read and write
7F9000
unkown
page execute and write copy
1220000
unkown
page execute and write copy
7DE000
unkown
page execute and write copy
9DE000
heap
page read and write
12A0000
unkown
page execute and write copy
7F1000
unkown
page execute and read and write
75B000
unkown
page execute and write copy
87F000
unkown
page execute and write copy
4F61000
heap
page read and write
325E000
heap
page read and write
1DB2F000
heap
page read and write
1DB3B000
heap
page read and write
7FC000
unkown
page execute and read and write
37DE000
stack
page read and write
571000
unkown
page execute and write copy
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4C6F000
stack
page read and write
1DB43000
heap
page read and write
6F00000
trusted library allocation
page read and write
4BF1000
heap
page read and write
5550000
direct allocation
page execute and read and write
1DB4D000
heap
page read and write
79F000
unkown
page execute and read and write
4F61000
heap
page read and write
87E000
unkown
page execute and write copy
1DB4B000
heap
page read and write
3AEE000
stack
page read and write
160E000
stack
page read and write
4231000
heap
page read and write
571000
unkown
page execute and write copy
554000
heap
page read and write
2517000
heap
page read and write
DB0000
heap
page read and write
4200000
direct allocation
page read and write
13DE000
stack
page read and write
419F000
stack
page read and write
86E000
unkown
page execute and write copy
1D4DE000
stack
page read and write
5260000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
560000
direct allocation
page read and write
5570000
direct allocation
page execute and read and write
1DB6C000
heap
page read and write
4BF1000
heap
page read and write
554000
heap
page read and write
146F000
heap
page read and write
45F1000
heap
page read and write
4BF1000
heap
page read and write
481E000
stack
page read and write
560000
direct allocation
page read and write
5240000
direct allocation
page execute and read and write
1DB33000
heap
page read and write
23BEE000
heap
page read and write
2F5E000
stack
page read and write
1DB6B000
heap
page read and write
4840000
direct allocation
page execute and read and write
A95000
unkown
page execute and write copy
4BF1000
heap
page read and write
9DE000
stack
page read and write
2B9E000
stack
page read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
78B000
unkown
page execute and write copy
7ED000
unkown
page execute and read and write
46A0000
direct allocation
page read and write
560000
direct allocation
page read and write
51C0000
direct allocation
page execute and read and write
4231000
heap
page read and write
4F61000
heap
page read and write
65E6000
heap
page read and write
4231000
heap
page read and write
C67000
unkown
page execute and write copy
14AF000
heap
page read and write
189A000
heap
page read and write
560000
direct allocation
page read and write
61ED3000
direct allocation
page read and write
4F61000
heap
page read and write
5070000
direct allocation
page read and write
431E000
stack
page read and write
395E000
stack
page read and write
14E0000
heap
page read and write
6E06000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
775000
unkown
page execute and write copy
2FAE000
stack
page read and write
345E000
stack
page read and write
4830000
direct allocation
page execute and read and write
D03000
unkown
page execute and read and write
560000
direct allocation
page read and write
36AF000
stack
page read and write
CBD000
unkown
page execute and read and write
4F61000
heap
page read and write
87E000
unkown
page execute and read and write
30AF000
stack
page read and write
35EE000
stack
page read and write
14FD000
heap
page read and write
560000
direct allocation
page read and write
1280000
unkown
page execute and read and write
4F61000
heap
page read and write
761000
unkown
page execute and write copy
25ED000
heap
page read and write
4AAF000
stack
page read and write
6D8C000
stack
page read and write
1400000
direct allocation
page read and write
322E000
stack
page read and write
4231000
heap
page read and write
346E000
stack
page read and write
5DB000
unkown
page execute and write copy
422F000
stack
page read and write
2ACC3000
heap
page read and write
422F000
stack
page read and write
4BF1000
heap
page read and write
305F000
stack
page read and write
12C1000
unkown
page execute and write copy
86E000
unkown
page execute and write copy
9CE000
stack
page read and write
2FAE000
stack
page read and write
1DB32000
heap
page read and write
1DB4F000
heap
page read and write
36DE000
stack
page read and write
391F000
stack
page read and write
98B000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
31EE000
stack
page read and write
31EF000
stack
page read and write
867000
unkown
page execute and write copy
4211000
heap
page read and write
1374000
heap
page read and write
74E000
unkown
page execute and read and write
4BF1000
heap
page read and write
1DB42000
heap
page read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
554000
heap
page read and write
1DB70000
heap
page read and write
9F0000
direct allocation
page execute and read and write
CE9000
unkown
page execute and read and write
CAC000
unkown
page execute and read and write
554000
heap
page read and write
4231000
heap
page read and write
5D9000
unkown
page write copy
4231000
heap
page read and write
1374000
heap
page read and write
867000
unkown
page execute and write copy
1026000
unkown
page execute and write copy
5E7000
unkown
page execute and write copy
460000
heap
page read and write
4231000
heap
page read and write
13F0000
direct allocation
page read and write
12AB000
unkown
page execute and write copy
4BF1000
heap
page read and write
23D30000
heap
page read and write
13F0000
heap
page read and write
4FAB000
heap
page read and write
3D2E000
stack
page read and write
46C0000
direct allocation
page read and write
1DB54000
heap
page read and write
868000
unkown
page execute and read and write
78C000
unkown
page execute and read and write
1DB3B000
heap
page read and write
1DB4A000
heap
page read and write
125C000
unkown
page execute and read and write
4200000
direct allocation
page read and write
125A000
unkown
page execute and write copy
1DB3B000
heap
page read and write
3BDE000
stack
page read and write
A20000
unkown
page read and write
4F61000
heap
page read and write
1374000
heap
page read and write
35AF000
stack
page read and write
570000
unkown
page readonly
25EB000
heap
page read and write
1400000
direct allocation
page read and write
136D000
stack
page read and write
8D46000
heap
page read and write
869000
unkown
page execute and write copy
356F000
stack
page read and write
145F000
heap
page read and write
282E000
stack
page read and write
365F000
stack
page read and write
4BF1000
heap
page read and write
382F000
stack
page read and write
4BF1000
heap
page read and write
1DB62000
heap
page read and write
4BF1000
heap
page read and write
14DA000
heap
page read and write
570000
unkown
page read and write
761000
unkown
page execute and write copy
4211000
heap
page read and write
3CDF000
stack
page read and write
560000
direct allocation
page read and write
48E0000
direct allocation
page execute and read and write
359E000
stack
page read and write
4F61000
heap
page read and write
1459000
heap
page read and write
4890000
direct allocation
page execute and read and write
2840000
direct allocation
page execute and read and write
4F61000
heap
page read and write
5D2000
unkown
page execute and read and write
1374000
heap
page read and write
51E000
stack
page read and write
4850000
direct allocation
page execute and read and write
D01000
unkown
page execute and write copy
426E000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
4231000
heap
page read and write
4800000
direct allocation
page execute and read and write
1DB51000
heap
page read and write
D17000
unkown
page execute and write copy
1DB70000
heap
page read and write
3BAF000
stack
page read and write
682F000
stack
page read and write
24059000
heap
page read and write
1400000
direct allocation
page read and write
1D86D000
stack
page read and write
4BF1000
heap
page read and write
A82000
unkown
page execute and write copy
2850000
direct allocation
page execute and read and write
4F70000
heap
page read and write
87E000
unkown
page execute and write copy
332F000
stack
page read and write
13F0000
direct allocation
page read and write
12B2000
unkown
page execute and write copy
4231000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
1DB47000
heap
page read and write
554000
heap
page read and write
C0C000
unkown
page execute and read and write
4250000
heap
page read and write
1843000
heap
page read and write
4F61000
heap
page read and write
48B0000
direct allocation
page execute and read and write
44EE000
stack
page read and write
761000
unkown
page execute and write copy
4BF1000
heap
page read and write
1DB4B000
heap
page read and write
3D1E000
stack
page read and write
14E7000
heap
page read and write
4231000
heap
page read and write
6C5A0000
unkown
page readonly
5520000
heap
page read and write
1DB55000
heap
page read and write
5DB000
unkown
page execute and read and write
355F000
stack
page read and write
1DB31000
heap
page read and write
4F61000
heap
page read and write
1130000
heap
page read and write
5210000
direct allocation
page execute and read and write
405F000
stack
page read and write
1506000
heap
page read and write
14AF000
heap
page read and write
5DB000
unkown
page execute and read and write
1374000
heap
page read and write
775000
unkown
page execute and write copy
3F9E000
stack
page read and write
46AC000
stack
page read and write
1410000
heap
page read and write
765000
unkown
page execute and read and write
4200000
direct allocation
page read and write
4820000
direct allocation
page execute and read and write
12AB000
unkown
page execute and write copy
46EF000
stack
page read and write
281F000
stack
page read and write
46A0000
direct allocation
page read and write
4F61000
heap
page read and write
4231000
heap
page read and write
1374000
heap
page read and write
271F000
stack
page read and write
4DFE000
stack
page read and write
47FF000
stack
page read and write
518E000
stack
page read and write
46C0000
direct allocation
page read and write
4BF1000
heap
page read and write
C68000
unkown
page execute and read and write
738000
unkown
page execute and read and write
13F0000
direct allocation
page read and write
486E000
stack
page read and write
1374000
heap
page read and write
4B6E000
stack
page read and write
46FB000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
24051000
heap
page read and write
13F0000
direct allocation
page read and write
2D2E000
stack
page read and write
D1C000
unkown
page execute and read and write
51D0000
direct allocation
page execute and read and write
13F0000
direct allocation
page read and write
120A000
unkown
page execute and write copy
A82000
unkown
page execute and read and write
14E7000
heap
page read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
4231000
heap
page read and write
560000
direct allocation
page read and write
75C000
unkown
page execute and read and write
101A000
unkown
page write copy
696F000
stack
page read and write
5030000
trusted library allocation
page read and write
1FD000
stack
page read and write
6C77E000
unkown
page read and write
793000
unkown
page execute and write copy
1374000
heap
page read and write
369F000
stack
page read and write
4231000
heap
page read and write
DCB000
stack
page read and write
A0A000
heap
page read and write
14B3000
heap
page read and write
4BF1000
heap
page read and write
BEA000
unkown
page execute and write copy
259C000
stack
page read and write
D18000
unkown
page execute and read and write
78A0000
heap
page read and write
332F000
stack
page read and write
4231000
heap
page read and write
1374000
heap
page read and write
3EAE000
stack
page read and write
2AAE000
stack
page read and write
14E7000
heap
page read and write
1DB47000
heap
page read and write
14B3000
heap
page read and write
560000
direct allocation
page read and write
4F61000
heap
page read and write
61ECD000
direct allocation
page readonly
98D000
stack
page read and write
19EE000
stack
page read and write
2E1E000
stack
page read and write
1DB4B000
heap
page read and write
C15000
unkown
page execute and read and write
4820000
direct allocation
page execute and read and write
5D2000
unkown
page execute and read and write
CBB000
unkown
page execute and write copy
3D2F000
stack
page read and write
4860000
direct allocation
page execute and read and write
13F0000
direct allocation
page read and write
5D2000
unkown
page execute and read and write
868000
unkown
page execute and read and write
4BF1000
heap
page read and write
45EE000
stack
page read and write
309E000
stack
page read and write
346F000
stack
page read and write
74E000
unkown
page execute and read and write
3C2E000
stack
page read and write
4231000
heap
page read and write
86E000
unkown
page execute and write copy
5E5000
unkown
page execute and write copy
1DB70000
heap
page read and write
4F61000
heap
page read and write
7B7000
unkown
page execute and write copy
14E9000
heap
page read and write
2F6E000
stack
page read and write
17FA000
heap
page read and write
386E000
stack
page read and write
7B9000
unkown
page execute and write copy
4F0000
heap
page read and write
D17000
unkown
page execute and write copy
2E6E000
stack
page read and write
4BF1000
heap
page read and write
78C000
unkown
page execute and read and write
23E30000
trusted library allocation
page read and write
250E000
stack
page read and write
3DDF000
stack
page read and write
7890000
heap
page read and write
51F0000
direct allocation
page execute and read and write
25E0000
heap
page read and write
1DB4A000
heap
page read and write
4F61000
heap
page read and write
570000
unkown
page read and write
4BF1000
heap
page read and write
51F0000
direct allocation
page execute and read and write
372E000
stack
page read and write
51F0000
direct allocation
page execute and read and write
7ED000
unkown
page execute and read and write
4231000
heap
page read and write
23D30000
trusted library allocation
page read and write
4231000
heap
page read and write
1D39E000
stack
page read and write
4200000
direct allocation
page read and write
86E000
unkown
page execute and write copy
14FB000
heap
page read and write
291F000
stack
page read and write
1374000
heap
page read and write
776000
unkown
page execute and read and write
11F0000
unkown
page execute and read and write
851000
unkown
page execute and write copy
4C0000
heap
page read and write
1374000
heap
page read and write
30AF000
stack
page read and write
4BF1000
heap
page read and write
1DB6B000
heap
page read and write
4BF1000
heap
page read and write
23D30000
trusted library allocation
page read and write
2850000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
7F1000
unkown
page execute and read and write
1DB4F000
heap
page read and write
1DB70000
heap
page read and write
6F850000
unkown
page readonly
8D2C000
stack
page read and write
4BDE000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
496F000
stack
page read and write
4A9E000
stack
page read and write
23D50000
heap
page read and write
541B000
stack
page read and write
47DF000
stack
page read and write
1DB39000
heap
page read and write
4F61000
heap
page read and write
14E0000
heap
page read and write
1DB58000
heap
page read and write
14E4000
heap
page read and write
14B3000
heap
page read and write
9CA000
heap
page read and write
2DEE000
stack
page read and write
13F0000
direct allocation
page read and write
E54000
unkown
page execute and read and write
1400000
direct allocation
page read and write
65CE000
stack
page read and write
4BF1000
heap
page read and write
7BC000
unkown
page execute and read and write
1DB51000
heap
page read and write
1190000
unkown
page execute and write copy
4820000
direct allocation
page execute and read and write
4231000
heap
page read and write
296F000
stack
page read and write
75E000
unkown
page execute and write copy
34AE000
stack
page read and write
80D000
unkown
page execute and read and write
1400000
direct allocation
page read and write
4231000
heap
page read and write
3F1F000
stack
page read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4231000
heap
page read and write
C11000
unkown
page execute and write copy
1DB23000
heap
page read and write
4BF1000
heap
page read and write
2F2B000
stack
page read and write
C90000
unkown
page execute and read and write
4231000
heap
page read and write
6C780000
unkown
page read and write
436F000
stack
page read and write
C6C000
unkown
page execute and read and write
4BF1000
heap
page read and write
3A5F000
stack
page read and write
4820000
direct allocation
page execute and read and write
4231000
heap
page read and write
1DB70000
heap
page read and write
26EF000
stack
page read and write
14E9000
heap
page read and write
554000
heap
page read and write
80B000
unkown
page execute and write copy
776000
unkown
page execute and read and write
65E0000
heap
page read and write
D2E000
unkown
page execute and read and write
867000
unkown
page execute and write copy
4231000
heap
page read and write
4BF1000
heap
page read and write
3AAE000
stack
page read and write
75F000
unkown
page execute and read and write
4C10000
direct allocation
page execute and read and write
A20000
unkown
page readonly
4BF1000
heap
page read and write
73A000
unkown
page execute and write copy
122E000
unkown
page execute and read and write
188B000
heap
page read and write
1374000
heap
page read and write
336E000
stack
page read and write
13F0000
direct allocation
page read and write
4BF1000
heap
page read and write
5280000
direct allocation
page execute and read and write
2AB9C000
stack
page read and write
31CC000
stack
page read and write
3E1F000
stack
page read and write
4BF1000
heap
page read and write
73A000
unkown
page execute and write copy
61ED4000
direct allocation
page readonly
346F000
stack
page read and write
D2F000
unkown
page execute and write copy
D1E000
unkown
page execute and write copy
1DB70000
heap
page read and write
4BF1000
heap
page read and write
75E000
unkown
page execute and write copy
2E6E000
stack
page read and write
DD1000
unkown
page execute and write copy
3BEF000
stack
page read and write
66EF000
stack
page read and write
1374000
heap
page read and write
C3B000
unkown
page execute and write copy
4BF1000
heap
page read and write
560000
direct allocation
page read and write
87E000
unkown
page execute and read and write
2F1F000
stack
page read and write
4F61000
heap
page read and write
1DB70000
heap
page read and write
14E6000
heap
page read and write
4231000
heap
page read and write
39AE000
stack
page read and write
1DB26000
heap
page read and write
369E000
stack
page read and write
4BF1000
heap
page read and write
38DF000
stack
page read and write
1DB32000
heap
page read and write
4DAF000
stack
page read and write
560000
direct allocation
page read and write
4BF1000
heap
page read and write
1506000
heap
page read and write
23C98000
heap
page read and write
18AC000
heap
page read and write
4BF1000
heap
page read and write
1D76E000
stack
page read and write
23FAF000
stack
page read and write
248F000
stack
page read and write
4231000
heap
page read and write
325B000
heap
page read and write
5060000
trusted library allocation
page read and write
C3E000
stack
page read and write
392F000
stack
page read and write
A89000
unkown
page write copy
4BF0000
heap
page read and write
7BC000
unkown
page execute and read and write
793000
unkown
page execute and write copy
495E000
stack
page read and write
7B7000
unkown
page execute and write copy
75E000
unkown
page execute and write copy
490000
heap
page read and write
44AF000
stack
page read and write
7BD000
unkown
page execute and write copy
4F61000
heap
page read and write
396E000
stack
page read and write
2F6F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
5D2000
unkown
page execute and write copy
322E000
stack
page read and write
23FB0000
trusted library allocation
page read and write
4830000
direct allocation
page execute and read and write
13F0000
direct allocation
page read and write
C0E000
unkown
page execute and write copy
2AAE000
stack
page read and write
4BEF000
stack
page read and write
4BF1000
heap
page read and write
7C2000
unkown
page execute and read and write
560000
direct allocation
page read and write
335F000
stack
page read and write
36EF000
stack
page read and write
1DB55000
heap
page read and write
1DB55000
heap
page read and write
36EF000
stack
page read and write
4BF1000
heap
page read and write
1DB3B000
heap
page read and write
336E000
stack
page read and write
C9D000
unkown
page execute and read and write
738000
unkown
page execute and read and write
148B000
heap
page read and write
3F5E000
stack
page read and write
1DB31000
heap
page read and write
4840000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
292F000
stack
page read and write
4BF1000
heap
page read and write
13E0000
heap
page read and write
11B4000
unkown
page execute and read and write
48B0000
direct allocation
page execute and read and write
18D6000
heap
page read and write
40EF000
stack
page read and write
1374000
heap
page read and write
4F61000
heap
page read and write
4BF1000
heap
page read and write
7E8000
unkown
page execute and write copy
2BAF000
stack
page read and write
4AE000
stack
page read and write
9C7000
heap
page read and write
1008000
unkown
page execute and read and write
5D9000
unkown
page write copy
869000
unkown
page execute and write copy
4C01000
heap
page read and write
9F9000
heap
page read and write
1374000
heap
page read and write
491F000
stack
page read and write
4E1F000
stack
page read and write
4870000
direct allocation
page execute and read and write
DC0000
heap
page read and write
738000
unkown
page execute and read and write
46DE000
stack
page read and write
C9E000
unkown
page execute and write copy
6C73F000
unkown
page readonly
1506000
heap
page read and write
4240000
heap
page read and write
482F000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
4F61000
heap
page read and write
3FAF000
stack
page read and write
14E0000
heap
page read and write
C5A000
heap
page read and write
469F000
stack
page read and write
1374000
heap
page read and write
4210000
heap
page read and write
2B5F000
stack
page read and write
1400000
direct allocation
page read and write
36EE000
stack
page read and write
4200000
direct allocation
page read and write
3F6F000
stack
page read and write
560000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
1DB62000
heap
page read and write
765000
unkown
page execute and read and write
37DF000
stack
page read and write
1DB3B000
heap
page read and write
7C2000
unkown
page execute and read and write
5DB000
unkown
page execute and read and write
4231000
heap
page read and write
1D49F000
stack
page read and write
5E6000
unkown
page execute and read and write
3A9E000
stack
page read and write
1DB4C000
heap
page read and write
4F61000
heap
page read and write
6D91000
heap
page read and write
3250000
heap
page read and write
4BF1000
heap
page read and write
48C0000
direct allocation
page execute and read and write
24057000
heap
page read and write
4BF1000
heap
page read and write
3FEE000
stack
page read and write
31AF000
stack
page read and write
4F61000
heap
page read and write
42DF000
stack
page read and write
35EE000
stack
page read and write
4BF1000
heap
page read and write
472E000
stack
page read and write
4E5E000
stack
page read and write
6F8E2000
unkown
page readonly
5E6000
unkown
page execute and read and write
18B2000
heap
page read and write
6ABC000
stack
page read and write
139E000
stack
page read and write
867000
unkown
page execute and write copy
2ACBC000
stack
page read and write
550000
heap
page read and write
1400000
direct allocation
page read and write
47F0000
direct allocation
page execute and read and write
1DB59000
heap
page read and write
87F000
unkown
page execute and write copy
1374000
heap
page read and write
1871000
heap
page read and write
3257000
heap
page read and write
1DB20000
heap
page read and write
78B000
unkown
page execute and write copy
1DB55000
heap
page read and write
4BF1000
heap
page read and write
78C000
unkown
page execute and read and write
2E2F000
stack
page read and write
C79000
unkown
page execute and write copy
1374000
heap
page read and write
4BF1000
heap
page read and write
40EE000
stack
page read and write
4BF1000
heap
page read and write
1DB4D000
heap
page read and write
4BAF000
stack
page read and write
4F61000
heap
page read and write
4D1E000
stack
page read and write
4231000
heap
page read and write
BE8000
unkown
page execute and read and write
4F61000
heap
page read and write
4F61000
heap
page read and write
1DB4F000
heap
page read and write
14E9000
heap
page read and write
48D0000
direct allocation
page execute and read and write
5200000
direct allocation
page execute and read and write
4F61000
heap
page read and write
1893000
heap
page read and write
1DB4F000
heap
page read and write
560000
direct allocation
page read and write
4650000
trusted library allocation
page read and write
122A000
unkown
page execute and write copy
1DB55000
heap
page read and write
1400000
direct allocation
page read and write
132E000
stack
page read and write
1210000
unkown
page execute and write copy
6F8DE000
unkown
page read and write
4231000
heap
page read and write
4200000
direct allocation
page read and write
4BF1000
heap
page read and write
2C9F000
stack
page read and write
101A000
unkown
page write copy
4BF1000
heap
page read and write
A21000
unkown
page execute and write copy
554000
heap
page read and write
5DB000
unkown
page execute and write copy
1440000
heap
page read and write
1DB4B000
heap
page read and write
1856000
heap
page read and write
14D3000
heap
page read and write
4C00000
heap
page read and write
10FA000
stack
page read and write
5E7000
unkown
page execute and write copy
4BF1000
heap
page read and write
4F61000
heap
page read and write
4231000
heap
page read and write
409E000
stack
page read and write
80D000
unkown
page execute and read and write
78B000
unkown
page execute and write copy
4840000
direct allocation
page execute and read and write
432E000
stack
page read and write
35AF000
stack
page read and write
C25000
unkown
page execute and write copy
1496000
heap
page read and write
1DB54000
heap
page read and write
6F8CD000
unkown
page readonly
4BF1000
heap
page read and write
8D30000
heap
page read and write
25DE000
stack
page read and write
9E0000
direct allocation
page read and write
79F000
unkown
page execute and read and write
445E000
stack
page read and write
1D5DE000
stack
page read and write
4231000
heap
page read and write
1D9AD000
stack
page read and write
1374000
heap
page read and write
1DB70000
heap
page read and write
7B8000
unkown
page execute and read and write
75C000
unkown
page execute and read and write
1DD000
stack
page read and write
7EE000
unkown
page execute and write copy
4870000
direct allocation
page execute and read and write
123F000
unkown
page execute and read and write
45EF000
stack
page read and write
1DB62000
heap
page read and write
4BF1000
heap
page read and write
12C2000
unkown
page execute and write copy
There are 1406 hidden memdumps, click here to show them.