IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013180001\60949160aa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\JJECFIECBG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAEBFIIECBGCBGDHCAFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBFBFBGDBKJJKFIEHJDB
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\DHJJEGHIIDAFIDHJDHJEBAEGHC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EBFHJEGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GCGDHJDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KEGIDHJKKJDGCBGCGIJKKECAAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKJDGDHIDBGIECBGHJDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\0856415d-b821-49e4-83c1-3edc7c85c904.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\42c89907-2fe3-420a-8603-64ea9c45a7f3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\50c42de7-60e8-4354-a916-aaf20b4203a9.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675591A6-22E4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a615.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a624.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3b036.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a3a711c4-5593-45e6-8943-4c60a4b4dabf.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f11ad4de-4f76-4b53-bff2-ab970f96e0dc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 181
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 182
ASCII text, with very long lines (788)
downloaded
Chrome Cache Entry: 183
ASCII text
downloaded
Chrome Cache Entry: 184
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 185
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 186
SVG Scalable Vector Graphics image
downloaded
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=2200,i,1340459741847875032,4804373366831485818,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2324 --field-trial-handle=2136,i,6607113195327049386,14986448368606126655,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=2092,i,10298190665720480491,4854320900994786694,262144 /prefetch:3
malicious
C:\Users\user\Documents\JJECFIECBG.exe
"C:\Users\user\Documents\JJECFIECBG.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1013180001\60949160aa.exe
"C:\Users\user\AppData\Local\Temp\1013180001\60949160aa.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\JJECFIECBG.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dllH
unknown
http://185.215.113.206/c4becf79229cb002.phpe
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.206M=U
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://185.215.113.16/luma/random.exe
unknown
http://185.215.113.206/(
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239401719378_1QE5OGFYA33L2ZPDG&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://tse1.mm.bing.net/th?id=OADD2.10239385875220_1FZJ7DDRUSKY0IVFA&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.217.21.36
https://apis.google.com
unknown
http://185.215.113.206ta
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239401719379_1QJHVIFGU1A436B66&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://www.sqlite.org/copyright.html.
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239399230509_1P8TI1N52GIEG4TVD&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
172.217.21.36
https://atten-supporse.biz/api
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239399230510_1EL19IE1YUCVQBSJB&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://tse1.mm.bing.net/th?id=OADD2.10239356819466_1PN1118HHI92HRAXE&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/c4becf79229cb002.php----GV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206/c4becf79229cb002.php4
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239356819467_11XRGHD2R08E7TNPP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
172.217.21.36
https://play.google.com/log?format=json&hasfast=true
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239399109665_1344PV668L57B53FJ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.217.21.36
http://185.215.113.206/c4becf79229cb002.phpDA
unknown
http://185.215.113.16/luma/random.exe613
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239385875217_1AS9NW8J4VEXSVA8E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dllX
unknown
http://185.215.113.206c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
https://atten-supporse.biz:443/api
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
https://atten-supporse.biz/
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239399109664_12R6JVR4SJZQSTHCV&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllV
unknown
http://185.215.113.43/Zu7JuNko/index.phpp
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.16.9
www3.l.google.com
142.250.181.142
plus.l.google.com
172.217.17.78
www.google.com
172.217.21.36
ax-0001.ax-msedge.net
150.171.28.10
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.17.78
plus.l.google.com
United States
142.250.181.142
www3.l.google.com
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
104.21.16.9
atten-supporse.biz
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
701000
unkown
page execute and read and write
malicious
621000
unkown
page execute and read and write
malicious
FC1000
unkown
page execute and read and write
malicious
184E000
heap
page read and write
malicious
701000
unkown
page execute and read and write
malicious
5440000
direct allocation
page read and write
malicious
4A40000
direct allocation
page execute and read and write
596F000
stack
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
31DE000
stack
page read and write
BD0000
direct allocation
page read and write
600000
heap
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
ECE000
heap
page read and write
13CF000
stack
page read and write
4FC1000
heap
page read and write
357E000
stack
page read and write
43C1000
heap
page read and write
390E000
stack
page read and write
4AB1000
heap
page read and write
55C0000
direct allocation
page execute and read and write
6C9DD000
unkown
page readonly
901000
unkown
page execute and read and write
5EC9000
heap
page read and write
5ACF000
stack
page read and write
EB0000
direct allocation
page read and write
5F00000
heap
page read and write
FC0000
unkown
page readonly
5EB4000
heap
page read and write
1000000
heap
page read and write
689000
unkown
page write copy
433E000
stack
page read and write
4FC1000
heap
page read and write
11A0000
heap
page read and write
5EF3000
heap
page read and write
BD0000
direct allocation
page read and write
959000
unkown
page execute and read and write
5EDC000
heap
page read and write
8A9000
unkown
page execute and write copy
76B000
unkown
page execute and write copy
43C1000
heap
page read and write
12E0C000
stack
page read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
5EF2000
heap
page read and write
343F000
stack
page read and write
33BE000
stack
page read and write
BD4000
heap
page read and write
4FC1000
heap
page read and write
447F000
stack
page read and write
BD4000
heap
page read and write
50CE000
stack
page read and write
B1C000
stack
page read and write
14AF000
unkown
page execute and write copy
83E000
unkown
page execute and write copy
4AB1000
heap
page read and write
858B000
heap
page read and write
F16000
heap
page read and write
47D1000
heap
page read and write
BD4000
heap
page read and write
BD4000
heap
page read and write
49F0000
direct allocation
page execute and read and write
5EC1000
heap
page read and write
C2B5000
heap
page read and write
4E20000
direct allocation
page execute and read and write
1190000
direct allocation
page read and write
1004000
heap
page read and write
2CBE000
stack
page read and write
47D1000
heap
page read and write
BD4000
heap
page read and write
4F30000
direct allocation
page execute and read and write
BD0000
direct allocation
page read and write
FC0000
unkown
page read and write
354E000
stack
page read and write
481F000
stack
page read and write
47D1000
heap
page read and write
4A30000
direct allocation
page execute and read and write
454F000
stack
page read and write
47D1000
heap
page read and write
1004000
heap
page read and write
FE0000
direct allocation
page read and write
47E1000
heap
page read and write
5F00000
heap
page read and write
700000
unkown
page readonly
A0C000
unkown
page execute and write copy
EB0000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
4AA0000
direct allocation
page read and write
F13000
heap
page read and write
57BB000
stack
page read and write
43C1000
heap
page read and write
347E000
stack
page read and write
43C1000
heap
page read and write
6CB9F000
unkown
page readonly
35BE000
stack
page read and write
2A5E000
stack
page read and write
364F000
stack
page read and write
EB0000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
4E60000
direct allocation
page execute and read and write
47D1000
heap
page read and write
975000
unkown
page execute and read and write
41FF000
stack
page read and write
37DF000
stack
page read and write
47FF000
stack
page read and write
4AB1000
heap
page read and write
47D1000
heap
page read and write
5EE5000
heap
page read and write
4D7E000
stack
page read and write
41BF000
stack
page read and write
4FC1000
heap
page read and write
4FD0000
heap
page read and write
C220000
trusted library allocation
page read and write
357F000
stack
page read and write
8E8000
unkown
page execute and write copy
6086000
heap
page read and write
6C9F2000
unkown
page readonly
BD0000
direct allocation
page read and write
BD0000
direct allocation
page read and write
5ECF000
heap
page read and write
98B000
unkown
page execute and read and write
5EE5000
heap
page read and write
4FC1000
heap
page read and write
340E000
stack
page read and write
43C1000
heap
page read and write
18C1000
heap
page read and write
43D5000
heap
page read and write
4FC1000
heap
page read and write
3B9F000
stack
page read and write
4AB1000
heap
page read and write
39FE000
stack
page read and write
47D1000
heap
page read and write
5EE5000
heap
page read and write
3FFF000
stack
page read and write
6CBE5000
unkown
page readonly
3230000
heap
page read and write
4AB1000
heap
page read and write
5EDC000
heap
page read and write
C45000
heap
page read and write
BFE0000
heap
page read and write
A4E000
stack
page read and write
47D1000
heap
page read and write
41DF000
stack
page read and write
2A87000
heap
page read and write
654F000
stack
page read and write
5EE5000
heap
page read and write
FE0000
direct allocation
page read and write
1004000
heap
page read and write
26FF000
stack
page read and write
393F000
stack
page read and write
50D0000
direct allocation
page execute and read and write
6585000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
4941000
heap
page read and write
92D000
unkown
page execute and read and write
1020000
heap
page read and write
42BE000
stack
page read and write
5EB0000
heap
page read and write
48C000
stack
page read and write
2BFF000
stack
page read and write
3DCF000
stack
page read and write
BEB000
heap
page read and write
5EC8000
heap
page read and write
43C1000
heap
page read and write
39BF000
stack
page read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
9FC000
unkown
page execute and write copy
5EDD000
heap
page read and write
BD0000
direct allocation
page read and write
96A000
unkown
page execute and read and write
29DE000
stack
page read and write
32DF000
stack
page read and write
3C3F000
stack
page read and write
915000
unkown
page execute and write copy
61CE000
stack
page read and write
11F5000
heap
page read and write
4FC1000
heap
page read and write
2F5F000
stack
page read and write
BD4000
heap
page read and write
10BE000
stack
page read and write
6CBDF000
unkown
page write copy
47D1000
heap
page read and write
F62000
heap
page read and write
43C1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4D3F000
stack
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
5EFD000
heap
page read and write
61EB4000
direct allocation
page read and write
11F0000
heap
page read and write
F7B000
heap
page read and write
47D1000
heap
page read and write
4FC1000
heap
page read and write
32FE000
stack
page read and write
5EF2000
heap
page read and write
7E3000
unkown
page execute and read and write
47D1000
heap
page read and write
4840000
direct allocation
page read and write
45FE000
stack
page read and write
2B8F000
stack
page read and write
56EF000
stack
page read and write
4F0000
unkown
page readonly
8E4000
unkown
page execute and write copy
3220000
direct allocation
page read and write
4BFF000
stack
page read and write
46DF000
stack
page read and write
762000
unkown
page execute and write copy
5EDB000
heap
page read and write
1127000
unkown
page execute and read and write
43C1000
heap
page read and write
37FE000
stack
page read and write
C5A000
heap
page read and write
1111000
heap
page read and write
4DFE000
stack
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
4FC1000
heap
page read and write
43C1000
heap
page read and write
534E000
stack
page read and write
F75000
heap
page read and write
989000
unkown
page execute and write copy
4941000
heap
page read and write
BD4000
heap
page read and write
879000
unkown
page execute and read and write
C042000
heap
page read and write
558F000
stack
page read and write
885000
unkown
page execute and write copy
43C1000
heap
page read and write
44BE000
stack
page read and write
5C5D000
stack
page read and write
4FC1000
heap
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
7E6000
unkown
page execute and write copy
C2BD000
heap
page read and write
C3E000
heap
page read and write
4A60000
direct allocation
page execute and read and write
43C1000
heap
page read and write
5EF7000
heap
page read and write
3CBF000
stack
page read and write
F3D000
heap
page read and write
32CE000
stack
page read and write
46CE000
stack
page read and write
81E000
unkown
page execute and write copy
95E000
unkown
page execute and read and write
3D3E000
stack
page read and write
4F30000
direct allocation
page execute and read and write
37FF000
stack
page read and write
4FC1000
heap
page read and write
EAE000
stack
page read and write
4F2F000
stack
page read and write
3CCE000
stack
page read and write
8EA000
unkown
page execute and read and write
5F00000
heap
page read and write
2A80000
heap
page read and write
4F80000
direct allocation
page execute and read and write
328F000
stack
page read and write
1004000
heap
page read and write
92D000
unkown
page execute and read and write
FA0000
heap
page read and write
5EE1000
heap
page read and write
38CF000
stack
page read and write
4BB0000
heap
page read and write
4FC1000
heap
page read and write
50D0000
direct allocation
page execute and read and write
47D1000
heap
page read and write
3BBF000
stack
page read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
572E000
stack
page read and write
10E8000
heap
page read and write
50D0000
direct allocation
page execute and read and write
120A000
unkown
page read and write
BD4000
heap
page read and write
47D1000
heap
page read and write
6B81000
heap
page read and write
7B0000
unkown
page execute and read and write
BFA0000
heap
page read and write
BE0000
heap
page read and write
769000
unkown
page write copy
BD4000
heap
page read and write
4FC1000
heap
page read and write
1820000
direct allocation
page read and write
9E0000
unkown
page execute and write copy
544E000
stack
page read and write
5ECB000
heap
page read and write
3A7F000
stack
page read and write
8E4000
unkown
page execute and write copy
4FC1000
heap
page read and write
C11E000
stack
page read and write
43C1000
heap
page read and write
3FBE000
stack
page read and write
5F00000
heap
page read and write
33CF000
stack
page read and write
BD4000
heap
page read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
43C1000
heap
page read and write
1820000
direct allocation
page read and write
3E5E000
stack
page read and write
49C0000
direct allocation
page execute and read and write
4FC1000
heap
page read and write
4FC1000
heap
page read and write
5EE5000
heap
page read and write
BD4000
heap
page read and write
520D000
stack
page read and write
EB0000
direct allocation
page read and write
1820000
direct allocation
page read and write
1893000
heap
page read and write
5F00000
heap
page read and write
4FC1000
heap
page read and write
900000
unkown
page execute and read and write
473E000
stack
page read and write
BD4000
heap
page read and write
4FC1000
heap
page read and write
C01F000
heap
page read and write
C005000
heap
page read and write
4C60000
direct allocation
page read and write
D95000
heap
page read and write
917000
unkown
page execute and read and write
331E000
stack
page read and write
4FBF000
stack
page read and write
F62000
heap
page read and write
1075000
unkown
page execute and read and write
F62000
heap
page read and write
50DD000
stack
page read and write
4AA0000
direct allocation
page read and write
47D1000
heap
page read and write
6C960000
unkown
page readonly
47D1000
heap
page read and write
945000
unkown
page execute and read and write
80F000
unkown
page execute and read and write
31BE000
stack
page read and write
47D1000
heap
page read and write
41CE000
stack
page read and write
5ECB000
heap
page read and write
4FC0000
heap
page read and write
1004000
heap
page read and write
4AA0000
direct allocation
page read and write
43C1000
heap
page read and write
F8E000
heap
page read and write
108C000
unkown
page execute and read and write
43C1000
heap
page read and write
FE0000
direct allocation
page read and write
989000
unkown
page execute and write copy
47D1000
heap
page read and write
47D1000
heap
page read and write
C2CB000
heap
page read and write
F86000
heap
page read and write
2FBF000
stack
page read and write
5EDC000
heap
page read and write
5F00000
heap
page read and write
14B0000
unkown
page execute and write copy
4AB1000
heap
page read and write
4AB1000
heap
page read and write
945000
unkown
page execute and read and write
6CBE0000
unkown
page read and write
FE0000
direct allocation
page read and write
4AA0000
direct allocation
page read and write
146C000
unkown
page execute and read and write
47D1000
heap
page read and write
108E000
stack
page read and write
C016000
heap
page read and write
BD4000
heap
page read and write
47D1000
heap
page read and write
4F1000
unkown
page execute and read and write
4EFF000
stack
page read and write
307E000
stack
page read and write
6570000
heap
page read and write
544000
unkown
page execute and read and write
3F5F000
stack
page read and write
B90000
heap
page read and write
95A000
unkown
page execute and write copy
815C000
stack
page read and write
F8E000
heap
page read and write
9E1000
unkown
page execute and read and write
FE0000
direct allocation
page read and write
1820000
direct allocation
page read and write
997000
unkown
page execute and read and write
2A60000
heap
page read and write
47D1000
heap
page read and write
7F2000
unkown
page execute and read and write
4DD0000
direct allocation
page execute and read and write
4FC1000
heap
page read and write
5ED7000
heap
page read and write
47D1000
heap
page read and write
820000
unkown
page execute and read and write
508F000
stack
page read and write
9FA000
unkown
page execute and read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
4AA0000
direct allocation
page read and write
3F9E000
stack
page read and write
47D1000
heap
page read and write
369F000
stack
page read and write
520E000
stack
page read and write
4FC1000
heap
page read and write
373F000
stack
page read and write
47D1000
heap
page read and write
3EBF000
stack
page read and write
381E000
stack
page read and write
5EF2000
heap
page read and write
3A9E000
stack
page read and write
319F000
stack
page read and write
B90000
heap
page read and write
2D2E000
stack
page read and write
4941000
heap
page read and write
4AA0000
direct allocation
page read and write
47D1000
heap
page read and write
F9D000
heap
page read and write
1004000
heap
page read and write
4840000
direct allocation
page read and write
47D1000
heap
page read and write
97D000
unkown
page execute and write copy
4FC1000
heap
page read and write
6CBDE000
unkown
page read and write
FC1000
unkown
page execute and write copy
7E3000
unkown
page execute and read and write
6C9EE000
unkown
page read and write
9F5000
unkown
page execute and write copy
50D0000
direct allocation
page execute and read and write
61ED0000
direct allocation
page read and write
5EE1000
heap
page read and write
89D000
unkown
page execute and write copy
4DE9000
stack
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
917000
unkown
page execute and read and write
6CA00000
unkown
page readonly
12F0C000
stack
page read and write
835000
unkown
page execute and write copy
2F3E000
stack
page read and write
BD4000
heap
page read and write
76B000
unkown
page execute and write copy
C085000
heap
page read and write
BF0000
heap
page read and write
49C0000
direct allocation
page execute and read and write
37BF000
stack
page read and write
9A8000
unkown
page execute and write copy
5111000
trusted library allocation
page read and write
C00D000
heap
page read and write
BD4000
heap
page read and write
2DCE000
stack
page read and write
368E000
stack
page read and write
43C1000
heap
page read and write
6CA01000
unkown
page execute read
47D1000
heap
page read and write
61ED3000
direct allocation
page read and write
BD4000
heap
page read and write
47D1000
heap
page read and write
9FA000
unkown
page execute and read and write
4FC1000
heap
page read and write
111D000
heap
page read and write
9A9000
unkown
page execute and read and write
965000
unkown
page execute and write copy
4F30000
direct allocation
page execute and read and write
43C1000
heap
page read and write
34BF000
stack
page read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
9F5000
unkown
page execute and read and write
EF7000
stack
page read and write
4FC1000
heap
page read and write
47D1000
heap
page read and write
B80000
heap
page read and write
345E000
stack
page read and write
33FF000
stack
page read and write
8FE000
unkown
page execute and write copy
2C8F000
stack
page read and write
42CF000
stack
page read and write
47D1000
heap
page read and write
FBE000
stack
page read and write
A0B000
unkown
page execute and write copy
8C9000
unkown
page execute and read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
4AA0000
direct allocation
page read and write
BD4000
heap
page read and write
50B0000
direct allocation
page execute and read and write
BD4000
heap
page read and write
10EC000
heap
page read and write
59CE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
EB0000
direct allocation
page read and write
1820000
direct allocation
page read and write
BD0000
direct allocation
page read and write
273C000
stack
page read and write
BD0000
direct allocation
page read and write
80D000
unkown
page execute and write copy
47D1000
heap
page read and write
FE0000
direct allocation
page read and write
EB0000
direct allocation
page read and write
184A000
heap
page read and write
582F000
stack
page read and write
485E000
stack
page read and write
11FF000
stack
page read and write
2C3E000
stack
page read and write
F8E000
heap
page read and write
2E5F000
stack
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
5D9D000
stack
page read and write
43C1000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
5EE9000
heap
page read and write
F7B000
heap
page read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
F7A000
heap
page read and write
403E000
stack
page read and write
378F000
stack
page read and write
43C1000
heap
page read and write
355F000
stack
page read and write
3EFE000
stack
page read and write
2FFE000
stack
page read and write
916000
unkown
page execute and write copy
BD4000
heap
page read and write
DAD000
stack
page read and write
804000
unkown
page execute and write copy
4F40000
direct allocation
page execute and read and write
487E000
stack
page read and write
47D1000
heap
page read and write
BD4000
heap
page read and write
483C000
stack
page read and write
1004000
heap
page read and write
305F000
stack
page read and write
118E000
stack
page read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
4DEF000
stack
page read and write
287E000
stack
page read and write
6085000
heap
page read and write
43C1000
heap
page read and write
458E000
stack
page read and write
FE0000
direct allocation
page read and write
C06C000
heap
page read and write
5ECB000
heap
page read and write
47D1000
heap
page read and write
BA0000
heap
page read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
4F30000
direct allocation
page execute and read and write
3B4F000
stack
page read and write
6583000
heap
page read and write
397E000
stack
page read and write
B90000
heap
page read and write
4AA0000
direct allocation
page read and write
43C1000
heap
page read and write
47E2000
heap
page read and write
4AA0000
direct allocation
page read and write
9FC000
unkown
page execute and write copy
D80000
heap
page read and write
49C0000
direct allocation
page execute and read and write
430E000
stack
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
1010000
heap
page read and write
3F0F000
stack
page read and write
43C1000
heap
page read and write
46FF000
stack
page read and write
9CA000
unkown
page execute and read and write
4F90000
direct allocation
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
58BC000
stack
page read and write
6080000
heap
page read and write
3A5F000
stack
page read and write
6B90000
heap
page read and write
3ABE000
stack
page read and write
1004000
heap
page read and write
337F000
stack
page read and write
300F000
stack
page read and write
3BBE000
stack
page read and write
C2C3000
heap
page read and write
F7B000
heap
page read and write
4FC1000
heap
page read and write
4F50000
direct allocation
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
4FC1000
heap
page read and write
341F000
stack
page read and write
47D1000
heap
page read and write
4F3D000
stack
page read and write
4FC4000
heap
page read and write
5EDF000
heap
page read and write
5EF2000
heap
page read and write
8E8000
unkown
page execute and write copy
138B000
unkown
page execute and read and write
47D1000
heap
page read and write
5EC9000
heap
page read and write
32BF000
stack
page read and write
18A8000
heap
page read and write
3AFE000
stack
page read and write
5100000
direct allocation
page execute and read and write
4AA0000
direct allocation
page read and write
25C0000
heap
page read and write
4A00000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
BD0000
direct allocation
page read and write
4E50000
direct allocation
page execute and read and write
5F00000
heap
page read and write
2D50000
heap
page read and write
8EA000
unkown
page execute and read and write
40FE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
12D80000
heap
page read and write
5ECD000
heap
page read and write
6CA000
unkown
page execute and read and write
8AB000
unkown
page execute and read and write
B8E000
stack
page read and write
47D1000
heap
page read and write
4FC1000
heap
page read and write
542000
unkown
page write copy
4F30000
direct allocation
page execute and read and write
447E000
stack
page read and write
C022000
heap
page read and write
1044000
unkown
page execute and read and write
5400000
heap
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
46BF000
stack
page read and write
43C1000
heap
page read and write
5F00000
heap
page read and write
47D1000
heap
page read and write
BD0000
direct allocation
page read and write
8C3000
unkown
page execute and read and write
404F000
stack
page read and write
C21F000
stack
page read and write
682000
unkown
page execute and read and write
43C1000
heap
page read and write
55A0000
remote allocation
page read and write
483E000
stack
page read and write
4AB1000
heap
page read and write
4F8E000
stack
page read and write
3CDF000
stack
page read and write
84D000
unkown
page execute and read and write
304E000
stack
page read and write
47D1000
heap
page read and write
40BF000
stack
page read and write
A0C000
unkown
page execute and write copy
3F3F000
stack
page read and write
43C1000
heap
page read and write
BD4000
heap
page read and write
A0B000
unkown
page execute and read and write
557F000
stack
page read and write
D30000
heap
page read and write
C003000
heap
page read and write
8ED000
unkown
page execute and write copy
47D1000
heap
page read and write
47D1000
heap
page read and write
5EF7000
heap
page read and write
47D0000
heap
page read and write
47D1000
heap
page read and write
BD4000
heap
page read and write
4AA0000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
BC0000
heap
page read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
4FC1000
heap
page read and write
49E0000
direct allocation
page execute and read and write
3DFF000
stack
page read and write
25BE000
stack
page read and write
1190000
direct allocation
page read and write
5EE5000
heap
page read and write
4FC1000
heap
page read and write
5EE5000
heap
page read and write
323F000
stack
page read and write
5EF9000
heap
page read and write
468F000
stack
page read and write
2C7F000
stack
page read and write
9F6000
unkown
page execute and write copy
58D000
stack
page read and write
701000
unkown
page execute and write copy
4C60000
direct allocation
page read and write
508F000
stack
page read and write
5EF3000
heap
page read and write
4FC1000
heap
page read and write
4FC1000
heap
page read and write
7F24000
heap
page read and write
47D1000
heap
page read and write
50D0000
direct allocation
page execute and read and write
959000
unkown
page execute and read and write
980000
unkown
page execute and read and write
497F000
stack
page read and write
61ECD000
direct allocation
page readonly
3E7E000
stack
page read and write
47D1000
heap
page read and write
548E000
stack
page read and write
4F50000
direct allocation
page execute and read and write
323B000
heap
page read and write
FE0000
direct allocation
page read and write
47D1000
heap
page read and write
8EA000
unkown
page execute and read and write
769000
unkown
page write copy
393E000
stack
page read and write
CAC000
stack
page read and write
BD4000
heap
page read and write
900000
unkown
page execute and read and write
408E000
stack
page read and write
1004000
heap
page read and write
3CFF000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
47D1000
heap
page read and write
2ABF000
stack
page read and write
61ED4000
direct allocation
page readonly
4F30000
direct allocation
page execute and read and write
55B0000
direct allocation
page execute and read and write
76B000
unkown
page execute and read and write
4E70000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
3E0D000
stack
page read and write
4AB1000
heap
page read and write
1004000
heap
page read and write
55A0000
remote allocation
page read and write
4AB1000
heap
page read and write
FE0000
direct allocation
page read and write
36BF000
stack
page read and write
10F9000
heap
page read and write
49C0000
direct allocation
page execute and read and write
55C0000
direct allocation
page execute and read and write
A0B000
unkown
page execute and read and write
FE0000
direct allocation
page read and write
EB0000
direct allocation
page read and write
9A9000
unkown
page execute and read and write
12F11000
heap
page read and write
3F4E000
stack
page read and write
5EF2000
heap
page read and write
EB0000
direct allocation
page read and write
47D1000
heap
page read and write
2DBF000
stack
page read and write
837000
unkown
page execute and read and write
317F000
stack
page read and write
363E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4AA0000
direct allocation
page read and write
10B0000
heap
page read and write
5EB6000
heap
page read and write
1933000
heap
page read and write
F22000
heap
page read and write
4FC1000
heap
page read and write
F84000
heap
page read and write
51CE000
stack
page read and write
BD0000
heap
page read and write
47D1000
heap
page read and write
421E000
stack
page read and write
2A1C000
stack
page read and write
4FC1000
heap
page read and write
7F7000
unkown
page execute and read and write
2ECF000
stack
page read and write
92C000
unkown
page execute and write copy
43C1000
heap
page read and write
76B000
unkown
page execute and read and write
359E000
stack
page read and write
EF2000
stack
page read and write
11EE000
stack
page read and write
9CA000
unkown
page execute and read and write
47D1000
heap
page read and write
BE7000
heap
page read and write
4940000
heap
page read and write
3237000
heap
page read and write
5D5E000
stack
page read and write
5EF2000
heap
page read and write
6B8E000
heap
page read and write
769000
unkown
page write copy
43C1000
heap
page read and write
87A000
unkown
page execute and write copy
697000
unkown
page execute and write copy
5ED7000
heap
page read and write
BD4000
heap
page read and write
892000
unkown
page execute and write copy
440F000
stack
page read and write
68B000
unkown
page execute and write copy
43C1000
heap
page read and write
5EF3000
heap
page read and write
5E9D000
stack
page read and write
BD4000
heap
page read and write
47D1000
heap
page read and write
9E7000
unkown
page execute and write copy
47D1000
heap
page read and write
EB0000
direct allocation
page read and write
43C1000
heap
page read and write
314F000
stack
page read and write
49C0000
direct allocation
page execute and read and write
5EE5000
heap
page read and write
96A000
unkown
page execute and read and write
2D30000
heap
page read and write
1840000
heap
page read and write
4FE0000
heap
page read and write
98B000
unkown
page execute and read and write
43C1000
heap
page read and write
4C3E000
stack
page read and write
546F000
stack
page read and write
5ECB000
heap
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
91A000
unkown
page execute and read and write
5ED9000
heap
page read and write
55CE000
stack
page read and write
4EBE000
stack
page read and write
499E000
stack
page read and write
49D0000
direct allocation
page execute and read and write
FD0000
heap
page read and write
333F000
stack
page read and write
5EFC000
heap
page read and write
4F0000
unkown
page read and write
5EE5000
heap
page read and write
4FC1000
heap
page read and write
91C000
unkown
page execute and write copy
8FE000
unkown
page execute and write copy
47D1000
heap
page read and write
1820000
direct allocation
page read and write
47D1000
heap
page read and write
4FC1000
heap
page read and write
586E000
stack
page read and write
61EB7000
direct allocation
page readonly
5EE5000
heap
page read and write
907000
unkown
page execute and write copy
407F000
stack
page read and write
4FC1000
heap
page read and write
5EF3000
heap
page read and write
4FC1000
heap
page read and write
900000
unkown
page execute and write copy
4F7A000
stack
page read and write
4AB1000
heap
page read and write
5EDE000
heap
page read and write
805B000
stack
page read and write
43C1000
heap
page read and write
43D0000
heap
page read and write
25F7000
heap
page read and write
777000
unkown
page execute and write copy
8EF000
unkown
page execute and read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
531000
unkown
page execute and read and write
1820000
direct allocation
page read and write
3E3E000
stack
page read and write
4CAF000
stack
page read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
5EC1000
heap
page read and write
47D1000
heap
page read and write
A0B000
unkown
page execute and write copy
5EE5000
heap
page read and write
762000
unkown
page execute and write copy
391F000
stack
page read and write
5EBF000
heap
page read and write
F62000
heap
page read and write
4FC1000
heap
page read and write
9E1000
unkown
page execute and read and write
40BE000
stack
page read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
5C1D000
stack
page read and write
45BE000
stack
page read and write
7F3000
unkown
page execute and write copy
762000
unkown
page execute and read and write
5EF7000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
120A000
unkown
page write copy
10F6000
heap
page read and write
350F000
stack
page read and write
61E01000
direct allocation
page execute read
630E000
stack
page read and write
43BF000
stack
page read and write
4AB1000
heap
page read and write
43E0000
heap
page read and write
8D7000
unkown
page execute and read and write
88A000
unkown
page execute and read and write
7F2000
unkown
page execute and write copy
5F00000
heap
page read and write
395E000
stack
page read and write
4AB1000
heap
page read and write
50C0000
direct allocation
page execute and read and write
3B8E000
stack
page read and write
46FE000
stack
page read and write
700000
unkown
page read and write
43C1000
heap
page read and write
34FE000
stack
page read and write
61ECC000
direct allocation
page read and write
303F000
stack
page read and write
4F50000
direct allocation
page read and write
43C1000
heap
page read and write
EB0000
direct allocation
page read and write
5ECB000
heap
page read and write
1820000
direct allocation
page read and write
43C1000
heap
page read and write
423E000
stack
page read and write
2F0E000
stack
page read and write
3220000
direct allocation
page read and write
387F000
stack
page read and write
F7E000
stack
page read and write
C2C3000
heap
page read and write
808000
unkown
page execute and write copy
443F000
stack
page read and write
4AB1000
heap
page read and write
4ABF000
stack
page read and write
700000
unkown
page read and write
3B7F000
stack
page read and write
5EF2000
heap
page read and write
47D1000
heap
page read and write
1820000
direct allocation
page read and write
4FC1000
heap
page read and write
47D1000
heap
page read and write
3A3F000
stack
page read and write
30FF000
stack
page read and write
5ECB000
heap
page read and write
4E2E000
stack
page read and write
47D1000
heap
page read and write
762000
unkown
page execute and read and write
4FC0000
direct allocation
page execute and read and write
5021000
heap
page read and write
BD4000
heap
page read and write
409F000
stack
page read and write
4CEE000
stack
page read and write
47D1000
heap
page read and write
3D7F000
stack
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
D20000
heap
page read and write
700000
unkown
page readonly
777000
unkown
page execute and write copy
4A10000
direct allocation
page execute and read and write
43C1000
heap
page read and write
5EDE000
heap
page read and write
BD4000
heap
page read and write
8C8000
unkown
page execute and write copy
43C1000
heap
page read and write
9F6000
unkown
page execute and write copy
9FC000
unkown
page execute and write copy
3F7E000
stack
page read and write
4AB1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
2DFE000
stack
page read and write
323E000
heap
page read and write
35FF000
stack
page read and write
4FC1000
heap
page read and write
530D000
stack
page read and write
47D1000
heap
page read and write
F20000
heap
page read and write
941000
unkown
page execute and write copy
4A20000
direct allocation
page execute and read and write
43C1000
heap
page read and write
4990000
direct allocation
page execute and read and write
701000
unkown
page execute and write copy
FE0000
direct allocation
page read and write
4AB1000
heap
page read and write
43C1000
heap
page read and write
483F000
stack
page read and write
459F000
stack
page read and write
6B80000
heap
page read and write
43C1000
heap
page read and write
915000
unkown
page execute and read and write
840B000
stack
page read and write
12F10000
heap
page read and write
FE0000
direct allocation
page read and write
4F00000
direct allocation
page execute and read and write
F4A000
heap
page read and write
47D1000
heap
page read and write
941000
unkown
page execute and write copy
5D5000
heap
page read and write
980000
unkown
page execute and read and write
C007000
heap
page read and write
4941000
heap
page read and write
43C1000
heap
page read and write
47D1000
heap
page read and write
4A9F000
stack
page read and write
47D1000
heap
page read and write
682000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
318E000
stack
page read and write
895000
unkown
page execute and read and write
43C1000
heap
page read and write
8D7000
unkown
page execute and read and write
8519000
heap
page read and write
5B1E000
stack
page read and write
EB0000
direct allocation
page read and write
4FC1000
heap
page read and write
4AA0000
direct allocation
page read and write
43C1000
heap
page read and write
BD0000
direct allocation
page read and write
120C000
unkown
page execute and read and write
97D000
unkown
page execute and write copy
367F000
stack
page read and write
9BB000
stack
page read and write
6030000
trusted library allocation
page read and write
5EF2000
heap
page read and write
3C8F000
stack
page read and write
4FC1000
heap
page read and write
1004000
heap
page read and write
40DE000
stack
page read and write
530C000
stack
page read and write
8C3000
unkown
page execute and read and write
47D1000
heap
page read and write
5EF2000
heap
page read and write
2EFF000
stack
page read and write
F07000
heap
page read and write
321B000
stack
page read and write
F3D000
stack
page read and write
2EBE000
stack
page read and write
4F70000
direct allocation
page execute and read and write
10BE000
heap
page read and write
43C1000
heap
page read and write
D90000
heap
page read and write
10FE000
heap
page read and write
829E000
stack
page read and write
BFA0000
trusted library allocation
page read and write
449E000
stack
page read and write
91E000
unkown
page execute and write copy
4AB1000
heap
page read and write
5EDA000
heap
page read and write
47D1000
heap
page read and write
1820000
direct allocation
page read and write
10FE000
stack
page read and write
965000
unkown
page execute and write copy
1820000
direct allocation
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
283F000
stack
page read and write
4AFE000
stack
page read and write
45DE000
stack
page read and write
542000
unkown
page write copy
5EF4000
heap
page read and write
47D1000
heap
page read and write
644E000
stack
page read and write
1004000
heap
page read and write
4FC1000
heap
page read and write
43C1000
heap
page read and write
BD0000
direct allocation
page read and write
95A000
unkown
page execute and write copy
10BA000
heap
page read and write
4D9F000
stack
page read and write
5EE5000
heap
page read and write
2B7E000
stack
page read and write
29BE000
stack
page read and write
47D1000
heap
page read and write
819D000
stack
page read and write
5EE5000
heap
page read and write
47D1000
heap
page read and write
6583000
heap
page read and write
3A7E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
47CF000
stack
page read and write
4E10000
direct allocation
page execute and read and write
3CFE000
stack
page read and write
43C1000
heap
page read and write
44C0000
trusted library allocation
page read and write
431F000
stack
page read and write
5EE5000
heap
page read and write
4FC1000
heap
page read and write
4FC1000
heap
page read and write
4FC1000
heap
page read and write
9FC000
unkown
page execute and write copy
F8E000
heap
page read and write
3F7F000
stack
page read and write
49A0000
direct allocation
page execute and read and write
4FC1000
heap
page read and write
487C000
stack
page read and write
1004000
heap
page read and write
3220000
direct allocation
page read and write
47D1000
heap
page read and write
C27000
heap
page read and write
4B6B000
stack
page read and write
55A0000
direct allocation
page execute and read and write
861000
unkown
page execute and write copy
4FC1000
heap
page read and write
6B90000
heap
page read and write
1820000
direct allocation
page read and write
43C1000
heap
page read and write
445F000
stack
page read and write
865000
unkown
page execute and read and write
5EF7000
heap
page read and write
BD4000
heap
page read and write
5F00000
heap
page read and write
5EDD000
heap
page read and write
1A3E000
stack
page read and write
B2C000
stack
page read and write
91C000
unkown
page execute and write copy
2E7F000
stack
page read and write
4FC1000
heap
page read and write
47D1000
heap
page read and write
C019000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
ECA000
heap
page read and write
6039000
heap
page read and write
4AB0000
heap
page read and write
47D1000
heap
page read and write
7DC000
unkown
page execute and read and write
4AA0000
direct allocation
page read and write
4FC1000
heap
page read and write
38BE000
stack
page read and write
4BAE000
stack
page read and write
48D0000
trusted library allocation
page read and write
4F20000
direct allocation
page execute and read and write
2B3F000
stack
page read and write
25F0000
heap
page read and write
2D7E000
stack
page read and write
11AE000
heap
page read and write
114F000
stack
page read and write
43C1000
heap
page read and write
F88000
heap
page read and write
1004000
heap
page read and write
43C1000
heap
page read and write
998000
unkown
page execute and write copy
F74000
heap
page read and write
BD4000
heap
page read and write
5590000
direct allocation
page execute and read and write
5EDB000
heap
page read and write
2AFE000
stack
page read and write
BD4000
heap
page read and write
47D1000
heap
page read and write
43C0000
heap
page read and write
47D1000
heap
page read and write
4FC1000
heap
page read and write
55E0000
direct allocation
page execute and read and write
5EF2000
heap
page read and write
C23000
heap
page read and write
BD4000
heap
page read and write
43C1000
heap
page read and write
5EE5000
heap
page read and write
47D1000
heap
page read and write
14AF000
unkown
page execute and read and write
BD4000
heap
page read and write
3BDE000
stack
page read and write
43C1000
heap
page read and write
4F10000
direct allocation
page execute and read and write
1820000
direct allocation
page read and write
55D0000
direct allocation
page execute and read and write
1004000
heap
page read and write
3B3E000
stack
page read and write
427F000
stack
page read and write
47D1000
heap
page read and write
BD0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
383E000
stack
page read and write
413F000
stack
page read and write
47D1000
heap
page read and write
43C1000
heap
page read and write
37CE000
stack
page read and write
2C6E000
stack
page read and write
4F8E000
stack
page read and write
91E000
unkown
page execute and write copy
8511000
heap
page read and write
F42000
heap
page read and write
43C1000
heap
page read and write
3C7E000
stack
page read and write
C084000
heap
page read and write
47D1000
heap
page read and write
769000
unkown
page write copy
47D1000
heap
page read and write
62CF000
stack
page read and write
640F000
stack
page read and write
5EF3000
heap
page read and write
BFA0000
trusted library allocation
page read and write
327E000
stack
page read and write
2D8F000
stack
page read and write
435E000
stack
page read and write
4FC1000
heap
page read and write
444E000
stack
page read and write
4FC1000
heap
page read and write
F88000
heap
page read and write
47D1000
heap
page read and write
F22000
heap
page read and write
BD0000
direct allocation
page read and write
8576000
heap
page read and write
1820000
direct allocation
page read and write
297F000
stack
page read and write
536E000
stack
page read and write
2D57000
heap
page read and write
915000
unkown
page execute and write copy
3E3F000
stack
page read and write
BFC0000
heap
page read and write
CFA000
stack
page read and write
8C6000
unkown
page execute and write copy
5F00000
heap
page read and write
8E5000
unkown
page execute and read and write
4AB1000
heap
page read and write
493F000
stack
page read and write
25FD000
heap
page read and write
164A000
unkown
page execute and read and write
95E000
unkown
page execute and read and write
42FF000
stack
page read and write
497F000
stack
page read and write
BD4000
heap
page read and write
3DBE000
stack
page read and write
8584000
heap
page read and write
5EE8000
heap
page read and write
43C1000
heap
page read and write
F9D000
heap
page read and write
EB0000
direct allocation
page read and write
4F1000
unkown
page execute and write copy
92B000
unkown
page execute and write copy
3D1E000
stack
page read and write
5F00000
heap
page read and write
547C000
stack
page read and write
C0A0000
trusted library allocation
page read and write
972000
unkown
page execute and write copy
4FC1000
heap
page read and write
36DE000
stack
page read and write
EB0000
direct allocation
page read and write
43C1000
heap
page read and write
BD4000
heap
page read and write
87E000
unkown
page execute and read and write
6560000
heap
page read and write
47D1000
heap
page read and write
14A0000
unkown
page execute and read and write
47D1000
heap
page read and write
EFD000
stack
page read and write
620000
unkown
page read and write
43C1000
heap
page read and write
80A000
unkown
page execute and read and write
954000
unkown
page execute and write copy
45BF000
stack
page read and write
9A8000
unkown
page execute and write copy
5EC1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
BD4000
heap
page read and write
620000
unkown
page readonly
50C0000
trusted library allocation
page read and write
8ED000
unkown
page execute and write copy
418F000
stack
page read and write
41FE000
stack
page read and write
5EDB000
heap
page read and write
915000
unkown
page execute and write copy
43C1000
heap
page read and write
8E5000
unkown
page execute and read and write
805000
unkown
page execute and read and write
377E000
stack
page read and write
47D1000
heap
page read and write
47D1000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
5EDC000
heap
page read and write
49C0000
direct allocation
page execute and read and write
6C961000
unkown
page execute read
4FC0000
heap
page read and write
49BE000
stack
page read and write
EB0000
direct allocation
page read and write
3E1F000
stack
page read and write
38FF000
stack
page read and write
47D1000
heap
page read and write
5EE5000
heap
page read and write
61E00000
direct allocation
page execute and read and write
5EE5000
heap
page read and write
BD4000
heap
page read and write
9F5000
unkown
page execute and write copy
4E7F000
stack
page read and write
313E000
stack
page read and write
47D1000
heap
page read and write
36BE000
stack
page read and write
FE0000
direct allocation
page read and write
2D3F000
stack
page read and write
2CAE000
stack
page read and write
92B000
unkown
page execute and read and write
C25000
heap
page read and write
353F000
stack
page read and write
437E000
stack
page read and write
B4F000
stack
page read and write
55A0000
remote allocation
page read and write
DDF000
stack
page read and write
11F8000
unkown
page execute and read and write
1895000
heap
page read and write
471E000
stack
page read and write
181E000
stack
page read and write
11AA000
heap
page read and write
5EDC000
heap
page read and write
343E000
stack
page read and write
9E7000
unkown
page execute and write copy
5EDC000
heap
page read and write
7F20000
heap
page read and write
874000
unkown
page execute and write copy
4A50000
direct allocation
page execute and read and write
457F000
stack
page read and write
8EF000
unkown
page execute and read and write
68B000
unkown
page execute and read and write
104E000
stack
page read and write
433F000
stack
page read and write
4BB0000
trusted library allocation
page read and write
43C1000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
EC0000
heap
page read and write
8A0000
unkown
page execute and read and write
4FC1000
heap
page read and write
417E000
stack
page read and write
689000
unkown
page write copy
309E000
stack
page read and write
9E0000
unkown
page execute and write copy
5EE5000
heap
page read and write
4F50000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
5770000
heap
page read and write
4C9E000
stack
page read and write
C062000
heap
page read and write
4AB1000
heap
page read and write
3A0F000
stack
page read and write
5D0000
heap
page read and write
850C000
stack
page read and write
BD4000
heap
page read and write
954000
unkown
page execute and write copy
47D1000
heap
page read and write
975000
unkown
page execute and read and write
495F000
stack
page read and write
5ED7000
heap
page read and write
BE0000
heap
page read and write
36FE000
stack
page read and write
3A4E000
stack
page read and write
2CEE000
stack
page read and write
1498000
unkown
page execute and read and write
4A40000
trusted library allocation
page read and write
972000
unkown
page execute and write copy
8C6000
unkown
page execute and write copy
5F00000
heap
page read and write
9F5000
unkown
page execute and read and write
621000
unkown
page execute and write copy
There are 1313 hidden memdumps, click here to show them.