IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\DGIJDAFCFH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKEGDAKEHJDHIDHJJDAE
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\BAKEBAFIIECBGCAAAAFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DAECFIJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\JDAEHJJECAEGCAAAAEGIEBKEBK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JEBGCBAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JEBGCBAFCGDAAKFIDGIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJKJDAEBFCBKECBGDBFCFBKKKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\84c8e42e-5b68-47bc-8f9f-97bca71aaa85.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\84e5d6ad-a26c-4d27-89c0-0d3a6bb015ac.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8c40770a-64e9-4164-8554-1feeba293966.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6755AF61-1868.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39461.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39471.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a0d5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a0e4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d7778a8b-feda-4ff9-b734-8772d3733d18.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e7f62c93-93d5-49e3-b42a-bac035e4d556.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 82
ASCII text, with very long lines (8329)
downloaded
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 86
SVG Scalable Vector Graphics image
downloaded
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=2040,i,4991592399884390181,5857060329787244527,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=2128,i,7367324743723620747,13671765739896702745,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=2044,i,3168558762679559794,18055959168976227557,262144 /prefetch:3
malicious
C:\Users\user\Documents\DGIJDAFCFH.exe
"C:\Users\user\Documents\DGIJDAFCFH.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\DGIJDAFCFH.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
http://185.215.113.16/mine/random.exeS;$
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.phpY
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dlla
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://185.215.113.206c4becf79229cb002.phpge
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.43/Zu7JuNko/index.phpB
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.68
http://185.215.113.206ta
unknown
http://185.215.113.43/Zu7JuNko/index.php1
unknown
http://www.sqlite.org/copyright.html.
unknown
185.215.113.206/c4becf79229cb002.php
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.206/c4becf79229cb002.phpge
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/c4becf79229cb002.php#
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.68
http://185.215.113.206/68b591d6548ec281/msvcp140.dllo=k
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.68
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.68
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/c4becf79229cb002.phpd6f94fcd407bc03e2fac64c2fd51Extension
unknown
http://185.215.113.206/c4becf79229cb002.phpG
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://185.215.113.43/Zu7JuNko/index.phpe
unknown
http://185.215.113.206/c4becf79229cb002.phpO
unknown
https://support.mozilla.org
unknown
http://185.215.113.43/Zu7JuNko/index.phpg
unknown
http://185.215.113.206
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllW
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B11000
unkown
page execute and read and write
malicious
B11000
unkown
page execute and read and write
malicious
B11000
unkown
page execute and read and write
malicious
8C1000
unkown
page execute and read and write
malicious
107E000
heap
page read and write
malicious
4CC0000
direct allocation
page read and write
malicious
2E1000
unkown
page execute and read and write
malicious
340E000
stack
page read and write
394E000
stack
page read and write
B7B000
unkown
page execute and write copy
DA0000
unkown
page execute and write copy
8A0000
heap
page read and write
E2B000
unkown
page execute and read and write
42F1000
heap
page read and write
4840000
direct allocation
page execute and read and write
744000
heap
page read and write
560000
direct allocation
page read and write
4B00000
direct allocation
page execute and read and write
397E000
stack
page read and write
38CF000
stack
page read and write
8B0000
direct allocation
page read and write
CF2000
unkown
page execute and read and write
75E000
stack
page read and write
2DA000
stack
page read and write
40BF000
stack
page read and write
944000
heap
page read and write
4630000
trusted library allocation
page read and write
744000
heap
page read and write
E14000
unkown
page execute and write copy
408F000
stack
page read and write
5637000
heap
page read and write
4841000
heap
page read and write
744000
heap
page read and write
B72000
unkown
page execute and read and write
429E000
stack
page read and write
5641000
heap
page read and write
5610000
heap
page read and write
3CCE000
stack
page read and write
D8C000
unkown
page execute and write copy
2BB0000
heap
page read and write
4531000
heap
page read and write
4DA1000
heap
page read and write
539000
unkown
page execute and read and write
D78000
unkown
page execute and read and write
E2C000
unkown
page execute and write copy
60E0000
heap
page read and write
489F000
stack
page read and write
3BBF000
stack
page read and write
570000
unkown
page execute and write copy
42F1000
heap
page read and write
5D6000
unkown
page execute and write copy
42F1000
heap
page read and write
475F000
stack
page read and write
433F000
stack
page read and write
4531000
heap
page read and write
E2B000
unkown
page execute and write copy
A30000
heap
page read and write
98C000
unkown
page execute and read and write
DC7000
unkown
page execute and write copy
2CCE000
stack
page read and write
4DA1000
heap
page read and write
68E000
stack
page read and write
944000
heap
page read and write
564E000
heap
page read and write
5641000
heap
page read and write
4900000
direct allocation
page execute and read and write
333E000
stack
page read and write
42F1000
heap
page read and write
DC7000
unkown
page execute and write copy
744000
heap
page read and write
6FE0000
heap
page read and write
DA0000
unkown
page execute and write copy
6E48000
heap
page read and write
5740000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
E2C000
unkown
page execute and write copy
4841000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
4531000
heap
page read and write
534000
unkown
page execute and write copy
5627000
heap
page read and write
1165000
heap
page read and write
26A7000
heap
page read and write
406E000
stack
page read and write
4531000
heap
page read and write
24CE000
heap
page read and write
264E000
stack
page read and write
4870000
direct allocation
page execute and read and write
784000
heap
page read and write
4531000
heap
page read and write
42F1000
heap
page read and write
4841000
heap
page read and write
5E6000
unkown
page execute and write copy
4841000
heap
page read and write
944000
heap
page read and write
D79000
unkown
page execute and write copy
4EA000
unkown
page execute and read and write
784000
heap
page read and write
6CB6F000
unkown
page readonly
5633000
heap
page read and write
565A000
heap
page read and write
86E000
heap
page read and write
B728000
heap
page read and write
944000
heap
page read and write
4531000
heap
page read and write
4860000
direct allocation
page execute and read and write
DC7000
unkown
page execute and write copy
4530000
heap
page read and write
4841000
heap
page read and write
744000
heap
page read and write
D1A000
unkown
page execute and read and write
4B10000
direct allocation
page execute and read and write
E1B000
unkown
page execute and read and write
744000
heap
page read and write
5641000
heap
page read and write
4C9E000
stack
page read and write
342000
unkown
page execute and read and write
49EC000
stack
page read and write
D9C000
unkown
page execute and write copy
4E7E000
stack
page read and write
3D9E000
stack
page read and write
4531000
heap
page read and write
5629000
heap
page read and write
5641000
heap
page read and write
8B0000
direct allocation
page read and write
41D1000
heap
page read and write
41CF000
stack
page read and write
560000
direct allocation
page read and write
42F1000
heap
page read and write
349000
unkown
page write copy
48BF000
stack
page read and write
461F000
stack
page read and write
6FD0000
heap
page read and write
14C4000
heap
page read and write
361E000
stack
page read and write
42F1000
heap
page read and write
744000
heap
page read and write
565C000
heap
page read and write
944000
heap
page read and write
D0E000
stack
page read and write
4531000
heap
page read and write
8B0000
direct allocation
page read and write
42F1000
heap
page read and write
3F4F000
stack
page read and write
352E000
stack
page read and write
D3C000
unkown
page execute and write copy
744000
heap
page read and write
6C930000
unkown
page readonly
588000
unkown
page execute and read and write
B87000
heap
page read and write
42E0000
direct allocation
page read and write
34B000
unkown
page execute and write copy
784000
heap
page read and write
D05000
unkown
page execute and write copy
8B0000
direct allocation
page read and write
744000
heap
page read and write
D64000
unkown
page execute and write copy
5641000
heap
page read and write
42F1000
heap
page read and write
CFC000
unkown
page execute and write copy
8B0000
direct allocation
page read and write
BCE000
heap
page read and write
42F1000
heap
page read and write
3BFE000
stack
page read and write
4531000
heap
page read and write
4841000
heap
page read and write
4531000
heap
page read and write
53C0000
direct allocation
page execute and read and write
562B000
heap
page read and write
42F1000
heap
page read and write
4531000
heap
page read and write
2E1000
unkown
page execute and write copy
4841000
heap
page read and write
5659000
heap
page read and write
4E10000
direct allocation
page execute and read and write
744000
heap
page read and write
4660000
direct allocation
page read and write
8B0000
direct allocation
page read and write
4B40000
direct allocation
page execute and read and write
BE7000
heap
page read and write
6C9C2000
unkown
page readonly
4841000
heap
page read and write
42F1000
heap
page read and write
5641000
heap
page read and write
4531000
heap
page read and write
4841000
heap
page read and write
744000
heap
page read and write
4531000
heap
page read and write
564E000
heap
page read and write
4531000
heap
page read and write
4841000
heap
page read and write
5633000
heap
page read and write
3A7F000
stack
page read and write
744000
heap
page read and write
3B8F000
stack
page read and write
4531000
heap
page read and write
B11000
unkown
page execute and write copy
5BA000
unkown
page execute and read and write
B90000
heap
page read and write
3B4F000
stack
page read and write
4D7000
unkown
page execute and read and write
B10000
unkown
page readonly
5CF000
unkown
page execute and write copy
548000
unkown
page execute and read and write
784000
heap
page read and write
4841000
heap
page read and write
3E3F000
stack
page read and write
E1D000
unkown
page execute and write copy
944000
heap
page read and write
3B6E000
stack
page read and write
4841000
heap
page read and write
14C4000
heap
page read and write
744000
heap
page read and write
597000
unkown
page execute and write copy
4990000
direct allocation
page execute and read and write
B0A000
unkown
page write copy
42F1000
heap
page read and write
4841000
heap
page read and write
4841000
heap
page read and write
304E000
stack
page read and write
E00000
unkown
page execute and read and write
60AF000
stack
page read and write
43DE000
stack
page read and write
42F1000
heap
page read and write
4531000
heap
page read and write
2F4E000
stack
page read and write
4FF000
unkown
page execute and read and write
744000
heap
page read and write
E16000
unkown
page execute and write copy
DA1000
unkown
page execute and write copy
744000
heap
page read and write
4841000
heap
page read and write
5641000
heap
page read and write
274F000
stack
page read and write
944000
heap
page read and write
4841000
heap
page read and write
859000
heap
page read and write
5F6F000
stack
page read and write
784000
heap
page read and write
BF0000
heap
page read and write
DB8000
unkown
page execute and read and write
127E1000
heap
page read and write
3A2E000
stack
page read and write
E14000
unkown
page execute and write copy
1DB000
stack
page read and write
B710000
heap
page read and write
2A4E000
stack
page read and write
560000
direct allocation
page read and write
944000
heap
page read and write
DB8000
unkown
page execute and read and write
B6D0000
heap
page read and write
DA8000
unkown
page execute and read and write
3D3E000
stack
page read and write
784000
heap
page read and write
ABE000
stack
page read and write
D79000
unkown
page execute and write copy
5650000
heap
page read and write
2E80000
heap
page read and write
CE1000
unkown
page execute and read and write
BAE000
heap
page read and write
944000
heap
page read and write
33EE000
stack
page read and write
4841000
heap
page read and write
BF8000
heap
page read and write
48A7000
heap
page read and write
5FC000
unkown
page execute and write copy
565A000
heap
page read and write
61ED4000
direct allocation
page readonly
260F000
stack
page read and write
48D0000
direct allocation
page execute and read and write
5240000
direct allocation
page read and write
136B000
heap
page read and write
AE0000
direct allocation
page read and write
944000
heap
page read and write
4531000
heap
page read and write
41D1000
heap
page read and write
D69000
unkown
page execute and read and write
2F0F000
stack
page read and write
4D3E000
stack
page read and write
6C9AD000
unkown
page readonly
B87000
unkown
page execute and write copy
8B0000
direct allocation
page read and write
E1B000
unkown
page execute and read and write
31FE000
stack
page read and write
4531000
heap
page read and write
740000
heap
page read and write
5430000
direct allocation
page execute and read and write
4841000
heap
page read and write
784000
heap
page read and write
318E000
stack
page read and write
5653000
heap
page read and write
3F0F000
stack
page read and write
343F000
stack
page read and write
28CF000
stack
page read and write
5653000
heap
page read and write
5653000
heap
page read and write
5641000
heap
page read and write
5641000
heap
page read and write
CFC000
unkown
page execute and read and write
4531000
heap
page read and write
944000
heap
page read and write
5637000
heap
page read and write
49A0000
direct allocation
page execute and read and write
CE1000
unkown
page execute and read and write
527E000
stack
page read and write
CF2000
unkown
page execute and read and write
CE1000
unkown
page execute and read and write
4531000
heap
page read and write
587000
unkown
page execute and write copy
29AF000
stack
page read and write
975000
unkown
page execute and read and write
307F000
stack
page read and write
4660000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
4841000
heap
page read and write
50FD000
stack
page read and write
784000
heap
page read and write
944000
heap
page read and write
32FF000
stack
page read and write
4940000
trusted library allocation
page read and write
CE4000
unkown
page execute and write copy
4920000
direct allocation
page execute and read and write
5D0000
unkown
page execute and read and write
B783000
heap
page read and write
418F000
stack
page read and write
126E000
stack
page read and write
2BA0000
direct allocation
page execute and read and write
944000
heap
page read and write
950000
heap
page read and write
42F1000
heap
page read and write
E2B000
unkown
page execute and write copy
533E000
stack
page read and write
944000
heap
page read and write
4AB0000
heap
page read and write
BDE000
heap
page read and write
2FDE000
stack
page read and write
31BF000
stack
page read and write
55D000
unkown
page execute and read and write
4550000
heap
page read and write
358E000
stack
page read and write
4841000
heap
page read and write
2C6E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
340F000
stack
page read and write
42F1000
heap
page read and write
B6E000
heap
page read and write
10C4000
heap
page read and write
32CF000
stack
page read and write
944000
heap
page read and write
D8C000
unkown
page execute and write copy
4841000
heap
page read and write
D19000
unkown
page execute and write copy
39DE000
stack
page read and write
4EA0000
direct allocation
page read and write
D4A000
unkown
page execute and read and write
E14000
unkown
page execute and write copy
14C4000
heap
page read and write
4841000
heap
page read and write
784000
heap
page read and write
14C4000
heap
page read and write
6FE0000
heap
page read and write
43F0000
trusted library allocation
page read and write
560000
direct allocation
page read and write
4B60000
direct allocation
page execute and read and write
42F1000
heap
page read and write
357F000
stack
page read and write
B87000
unkown
page execute and write copy
5641000
heap
page read and write
42E0000
direct allocation
page read and write
4BFC000
stack
page read and write
42F1000
heap
page read and write
4301000
heap
page read and write
2B8B000
stack
page read and write
48E0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4531000
heap
page read and write
3DAE000
stack
page read and write
AFE000
stack
page read and write
5627000
heap
page read and write
4841000
heap
page read and write
B95000
heap
page read and write
5460000
direct allocation
page execute and read and write
450000
heap
page read and write
E14000
unkown
page execute and write copy
5E4000
unkown
page execute and write copy
2DFF000
stack
page read and write
56B000
unkown
page execute and read and write
8C0000
unkown
page read and write
DFF000
unkown
page execute and write copy
5636000
heap
page read and write
339E000
stack
page read and write
5641000
heap
page read and write
D79000
unkown
page execute and write copy
AE0000
direct allocation
page read and write
60B0000
heap
page read and write
42F1000
heap
page read and write
744000
heap
page read and write
6FD000
stack
page read and write
2C4F000
stack
page read and write
342000
unkown
page execute and write copy
BBD000
heap
page read and write
744000
heap
page read and write
42F1000
heap
page read and write
8C1000
unkown
page execute and write copy
53C0000
direct allocation
page execute and read and write
B7B0000
trusted library allocation
page read and write
D95000
unkown
page execute and write copy
4FBE000
stack
page read and write
61EB4000
direct allocation
page read and write
563A000
heap
page read and write
DA0000
unkown
page execute and write copy
ABF000
stack
page read and write
D9C000
unkown
page execute and write copy
D1E000
unkown
page execute and write copy
6FE000
stack
page read and write
4EA0000
direct allocation
page read and write
B714000
heap
page read and write
565C000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
784000
heap
page read and write
2EEE000
stack
page read and write
4841000
heap
page read and write
55C000
unkown
page execute and write copy
53C0000
direct allocation
page execute and read and write
149E000
stack
page read and write
560000
direct allocation
page read and write
42F1000
heap
page read and write
760000
heap
page read and write
BC0000
heap
page read and write
3A8E000
stack
page read and write
944000
heap
page read and write
561D000
heap
page read and write
744000
heap
page read and write
42E0000
direct allocation
page read and write
354F000
stack
page read and write
744000
heap
page read and write
4900000
direct allocation
page execute and read and write
4531000
heap
page read and write
784000
heap
page read and write
318F000
stack
page read and write
D64000
unkown
page execute and write copy
264E000
stack
page read and write
1050000
direct allocation
page read and write
560000
direct allocation
page read and write
944000
heap
page read and write
3D0E000
stack
page read and write
260E000
stack
page read and write
4841000
heap
page read and write
42E0000
direct allocation
page read and write
D8D000
unkown
page execute and read and write
4EA0000
direct allocation
page read and write
B53000
heap
page read and write
4531000
heap
page read and write
944000
heap
page read and write
250E000
stack
page read and write
41D1000
heap
page read and write
42E0000
direct allocation
page read and write
44BE000
stack
page read and write
3F7F000
stack
page read and write
36BF000
stack
page read and write
D1E000
unkown
page execute and write copy
BB11000
heap
page read and write
14C4000
heap
page read and write
B7B000
unkown
page execute and read and write
2E7E000
stack
page read and write
744000
heap
page read and write
D78000
unkown
page execute and read and write
42F1000
heap
page read and write
FBC000
stack
page read and write
42E0000
direct allocation
page read and write
4531000
heap
page read and write
578000
unkown
page execute and read and write
4950000
direct allocation
page execute and read and write
4531000
heap
page read and write
42F1000
heap
page read and write
4531000
heap
page read and write
312F000
stack
page read and write
BAE000
heap
page read and write
4531000
heap
page read and write
B91D000
stack
page read and write
308E000
stack
page read and write
380E000
stack
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
5240000
direct allocation
page read and write
42F0000
heap
page read and write
4531000
heap
page read and write
2D8F000
stack
page read and write
B10000
unkown
page read and write
6C9BE000
unkown
page read and write
61EB7000
direct allocation
page readonly
2F3F000
stack
page read and write
4531000
heap
page read and write
D20000
unkown
page execute and read and write
784000
heap
page read and write
5D65000
heap
page read and write
42F1000
heap
page read and write
48D0000
heap
page read and write
810000
heap
page read and write
B5F000
heap
page read and write
E1D000
unkown
page execute and write copy
944000
heap
page read and write
AE0000
direct allocation
page read and write
4531000
heap
page read and write
5FB000
unkown
page execute and write copy
4841000
heap
page read and write
29CF000
stack
page read and write
4531000
heap
page read and write
DB7000
unkown
page execute and write copy
2DCF000
stack
page read and write
565A000
heap
page read and write
41D1000
heap
page read and write
4CC000
unkown
page execute and write copy
8B0000
direct allocation
page read and write
61E01000
direct allocation
page execute read
E16000
unkown
page execute and write copy
2D6F000
stack
page read and write
362F000
stack
page read and write
885C000
stack
page read and write
B72000
unkown
page execute and read and write
42D0000
heap
page read and write
BB0B000
heap
page read and write
42F1000
heap
page read and write
5641000
heap
page read and write
2C2F000
stack
page read and write
442E000
stack
page read and write
D9B000
unkown
page execute and read and write
5636000
heap
page read and write
744000
heap
page read and write
3A4F000
stack
page read and write
42F1000
heap
page read and write
4D5000
unkown
page execute and write copy
BBD000
heap
page read and write
B96E000
stack
page read and write
B76B000
heap
page read and write
5637000
heap
page read and write
560000
direct allocation
page read and write
BB03000
heap
page read and write
60D2000
heap
page read and write
42F1000
heap
page read and write
564E000
heap
page read and write
42F1000
heap
page read and write
24C7000
heap
page read and write
42F1000
heap
page read and write
30BE000
stack
page read and write
784000
heap
page read and write
4841000
heap
page read and write
E2B000
unkown
page execute and read and write
744000
heap
page read and write
D9F000
unkown
page execute and read and write
B6B0000
trusted library allocation
page read and write
B79000
unkown
page write copy
60D3000
heap
page read and write
4841000
heap
page read and write
34EF000
stack
page read and write
42F1000
heap
page read and write
AFE000
stack
page read and write
4841000
heap
page read and write
368F000
stack
page read and write
4869000
heap
page read and write
3EDE000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
27AF000
stack
page read and write
38AF000
stack
page read and write
3CCF000
stack
page read and write
944000
heap
page read and write
744000
heap
page read and write
6FD1000
heap
page read and write
3C6F000
stack
page read and write
83AE000
stack
page read and write
4860000
heap
page read and write
41CE000
stack
page read and write
14C4000
heap
page read and write
4841000
heap
page read and write
4900000
direct allocation
page execute and read and write
4531000
heap
page read and write
42F1000
heap
page read and write
6C9D0000
unkown
page readonly
944000
heap
page read and write
B79000
unkown
page write copy
944000
heap
page read and write
4FBE000
stack
page read and write
2CBF000
stack
page read and write
354E000
stack
page read and write
447F000
stack
page read and write
390E000
stack
page read and write
4531000
heap
page read and write
399F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
AE0000
direct allocation
page read and write
288F000
stack
page read and write
940000
heap
page read and write
2BB7000
heap
page read and write
4841000
heap
page read and write
2690000
direct allocation
page execute and read and write
5E4000
unkown
page execute and write copy
B00000
direct allocation
page read and write
14C4000
heap
page read and write
42CF000
stack
page read and write
BD7000
heap
page read and write
316E000
stack
page read and write
944000
heap
page read and write
4850000
heap
page read and write
BCE000
heap
page read and write
BDB000
heap
page read and write
1360000
heap
page read and write
B11000
unkown
page execute and write copy
437E000
stack
page read and write
8B0000
direct allocation
page read and write
479E000
stack
page read and write
D20000
unkown
page execute and read and write
5625000
heap
page read and write
3BCE000
stack
page read and write
D8D000
unkown
page execute and read and write
4531000
heap
page read and write
E15000
unkown
page execute and read and write
2E3E000
stack
page read and write
4F7F000
stack
page read and write
B00000
heap
page read and write
25CF000
stack
page read and write
D9C000
unkown
page execute and write copy
4780000
direct allocation
page read and write
B79000
unkown
page write copy
41D0000
heap
page read and write
53C0000
direct allocation
page execute and read and write
42E0000
direct allocation
page read and write
4841000
heap
page read and write
410000
heap
page read and write
5658000
heap
page read and write
26CF000
stack
page read and write
800000
heap
page read and write
D9F000
unkown
page execute and read and write
42F1000
heap
page read and write
4841000
heap
page read and write
2F7E000
stack
page read and write
A37000
heap
page read and write
28CE000
stack
page read and write
375E000
stack
page read and write
42E0000
direct allocation
page read and write
D05000
unkown
page execute and write copy
D9B000
unkown
page execute and read and write
2A0E000
stack
page read and write
2B4E000
stack
page read and write
4AB4000
heap
page read and write
DFF000
unkown
page execute and write copy
47E0000
direct allocation
page execute and read and write
56F000
unkown
page execute and read and write
560000
direct allocation
page read and write
4841000
heap
page read and write
5653000
heap
page read and write
3D5F000
stack
page read and write
55BC000
stack
page read and write
CFC000
unkown
page execute and write copy
400000
heap
page read and write
385F000
stack
page read and write
B85000
unkown
page execute and write copy
B86000
unkown
page execute and read and write
42F1000
heap
page read and write
784000
heap
page read and write
47E0000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
4CC000
unkown
page execute and read and write
8B0000
direct allocation
page read and write
E2B000
unkown
page execute and read and write
42F1000
heap
page read and write
4841000
heap
page read and write
AE0000
direct allocation
page read and write
BAE000
heap
page read and write
5440000
direct allocation
page execute and read and write
6FDE000
heap
page read and write
944000
heap
page read and write
4970000
direct allocation
page execute and read and write
CFC000
unkown
page execute and write copy
8B0000
direct allocation
page read and write
42E0000
direct allocation
page read and write
51FF000
stack
page read and write
4841000
heap
page read and write
47E0000
direct allocation
page execute and read and write
4531000
heap
page read and write
4841000
heap
page read and write
53C0000
direct allocation
page execute and read and write
3C5E000
stack
page read and write
533F000
stack
page read and write
42F1000
heap
page read and write
D7F000
unkown
page execute and read and write
14C4000
heap
page read and write
30DF000
stack
page read and write
565C000
heap
page read and write
E1D000
unkown
page execute and write copy
544000
unkown
page execute and write copy
4EA0000
direct allocation
page read and write
D4A000
unkown
page execute and read and write
BB0B000
heap
page read and write
3DCF000
stack
page read and write
5400000
direct allocation
page execute and read and write
42F1000
heap
page read and write
4C5F000
stack
page read and write
B716000
heap
page read and write
D8C000
unkown
page execute and write copy
4531000
heap
page read and write
BAE000
heap
page read and write
14C4000
heap
page read and write
564E000
heap
page read and write
744000
heap
page read and write
4B10000
direct allocation
page execute and read and write
BAE000
heap
page read and write
E00000
unkown
page execute and read and write
2B8E000
stack
page read and write
4EA0000
direct allocation
page read and write
5641000
heap
page read and write
169F000
stack
page read and write
2E0E000
stack
page read and write
784000
heap
page read and write
CF2000
unkown
page execute and read and write
4841000
heap
page read and write
439F000
stack
page read and write
4820000
direct allocation
page execute and read and write
944000
heap
page read and write
537D000
stack
page read and write
D69000
unkown
page execute and read and write
4AF0000
direct allocation
page execute and read and write
DB7000
unkown
page execute and write copy
127DD000
stack
page read and write
41D1000
heap
page read and write
DA8000
unkown
page execute and read and write
570000
heap
page read and write
452F000
stack
page read and write
41D1000
heap
page read and write
560000
direct allocation
page read and write
D9B000
unkown
page execute and read and write
BD0000
heap
page read and write
3E9F000
stack
page read and write
D69000
unkown
page execute and read and write
465E000
stack
page read and write
B71C000
heap
page read and write
D20000
unkown
page execute and read and write
42F1000
heap
page read and write
547D000
stack
page read and write
D65000
unkown
page execute and read and write
4841000
heap
page read and write
416F000
stack
page read and write
41FF000
stack
page read and write
347E000
stack
page read and write
B8E000
heap
page read and write
537D000
stack
page read and write
4780000
direct allocation
page read and write
4EA0000
direct allocation
page read and write
E14000
unkown
page execute and write copy
4E10000
direct allocation
page execute and read and write
40FE000
stack
page read and write
6C9D1000
unkown
page execute read
4910000
direct allocation
page execute and read and write
401E000
stack
page read and write
6CBAE000
unkown
page read and write
5637000
heap
page read and write
44DF000
stack
page read and write
944000
heap
page read and write
14C4000
heap
page read and write
4531000
heap
page read and write
744000
heap
page read and write
564E000
heap
page read and write
45FE000
stack
page read and write
D19000
unkown
page execute and write copy
3DEE000
stack
page read and write
784000
heap
page read and write
4841000
heap
page read and write
26A0000
heap
page read and write
DA2000
unkown
page execute and write copy
5D60000
heap
page read and write
61ECC000
direct allocation
page read and write
42E0000
direct allocation
page read and write
50FE000
stack
page read and write
4B30000
direct allocation
page execute and read and write
E2C000
unkown
page execute and write copy
14C4000
heap
page read and write
6F7000
stack
page read and write
BC1000
heap
page read and write
B7B000
unkown
page execute and read and write
42F1000
heap
page read and write
784000
heap
page read and write
4531000
heap
page read and write
2BBB000
heap
page read and write
5641000
heap
page read and write
5390000
direct allocation
page execute and read and write
7CE000
stack
page read and write
784000
heap
page read and write
784000
heap
page read and write
3FDF000
stack
page read and write
4B50000
direct allocation
page execute and read and write
2E97000
heap
page read and write
32CE000
stack
page read and write
B85000
unkown
page execute and write copy
349F000
stack
page read and write
425F000
stack
page read and write
42F1000
heap
page read and write
744000
heap
page read and write
4B90000
direct allocation
page execute and read and write
12FD000
stack
page read and write
D3C000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
5ED000
unkown
page execute and write copy
D95000
unkown
page execute and write copy
42F1000
heap
page read and write
784000
heap
page read and write
126D0000
heap
page read and write
42F1000
heap
page read and write
330E000
stack
page read and write
356000
unkown
page execute and read and write
42F1000
heap
page read and write
4531000
heap
page read and write
B69000
heap
page read and write
AE0000
direct allocation
page read and write
BF8000
heap
page read and write
36FE000
stack
page read and write
42F1000
heap
page read and write
2B0F000
stack
page read and write
B7B000
unkown
page execute and read and write
4980000
direct allocation
page execute and read and write
4531000
heap
page read and write
47BE000
stack
page read and write
E16000
unkown
page execute and write copy
9BE000
stack
page read and write
4D9F000
stack
page read and write
4531000
heap
page read and write
4531000
heap
page read and write
4841000
heap
page read and write
350F000
stack
page read and write
1264B000
stack
page read and write
560000
direct allocation
page read and write
564E000
heap
page read and write
4900000
direct allocation
page execute and read and write
42F1000
heap
page read and write
6640000
trusted library allocation
page read and write
5D8000
unkown
page execute and write copy
CFC000
unkown
page execute and read and write
4880000
direct allocation
page execute and read and write
B751000
heap
page read and write
355000
unkown
page execute and write copy
49DF000
stack
page read and write
4B1000
unkown
page execute and read and write
BB13000
heap
page read and write
2CFE000
stack
page read and write
F34000
unkown
page execute and read and write
B731000
heap
page read and write
53E0000
direct allocation
page execute and read and write
944000
heap
page read and write
137C000
heap
page read and write
473E000
stack
page read and write
4DA0000
heap
page read and write
42F1000
heap
page read and write
B72000
unkown
page execute and write copy
E06000
unkown
page execute and write copy
2BBE000
heap
page read and write
AE0000
direct allocation
page read and write
744000
heap
page read and write
9C000
stack
page read and write
D7F000
unkown
page execute and read and write
B00000
direct allocation
page read and write
42F1000
heap
page read and write
335F000
stack
page read and write
5450000
direct allocation
page execute and read and write
42F1000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
24CF000
stack
page read and write
3CAE000
stack
page read and write
DFF000
unkown
page execute and write copy
3E0000
heap
page read and write
2B4F000
stack
page read and write
944000
heap
page read and write
54F000
unkown
page execute and read and write
4531000
heap
page read and write
41D1000
heap
page read and write
784000
heap
page read and write
876000
heap
page read and write
B79000
unkown
page write copy
4531000
heap
page read and write
B72E000
heap
page read and write
564E000
heap
page read and write
2B2E000
stack
page read and write
DEA000
unkown
page execute and read and write
B86000
unkown
page execute and read and write
744000
heap
page read and write
DA1000
unkown
page execute and read and write
AE0000
direct allocation
page read and write
42F1000
heap
page read and write
E1D000
unkown
page execute and write copy
D1E000
unkown
page execute and write copy
3A0F000
stack
page read and write
42F1000
heap
page read and write
E1D000
unkown
page execute and write copy
944000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
D9F000
unkown
page execute and read and write
46FF000
stack
page read and write
48DE000
stack
page read and write
53F0000
direct allocation
page execute and read and write
4841000
heap
page read and write
47D0000
direct allocation
page execute and read and write
BBD000
heap
page read and write
4531000
heap
page read and write
4E3F000
stack
page read and write
302E000
stack
page read and write
4841000
heap
page read and write
42F1000
heap
page read and write
744000
heap
page read and write
60C0000
heap
page read and write
575000
heap
page read and write
53D0000
direct allocation
page execute and read and write
60CB000
heap
page read and write
A7E000
stack
page read and write
42F1000
heap
page read and write
3C8F000
stack
page read and write
5636000
heap
page read and write
2A0F000
stack
page read and write
4531000
heap
page read and write
875C000
stack
page read and write
B72000
unkown
page execute and write copy
E14000
unkown
page execute and write copy
4531000
heap
page read and write
4531000
heap
page read and write
42F1000
heap
page read and write
D8D000
unkown
page execute and read and write
565C000
heap
page read and write
40CE000
stack
page read and write
47E0000
direct allocation
page execute and read and write
860000
heap
page read and write
563D000
heap
page read and write
47B0000
direct allocation
page execute and read and write
DB7000
unkown
page execute and write copy
2F0E000
stack
page read and write
D74000
unkown
page execute and write copy
B10000
unkown
page read and write
2DCE000
stack
page read and write
744000
heap
page read and write
4531000
heap
page read and write
81B000
heap
page read and write
393F000
stack
page read and write
84AE000
stack
page read and write
AE0000
direct allocation
page read and write
47E0000
direct allocation
page execute and read and write
D7F000
unkown
page execute and read and write
408E000
stack
page read and write
33CF000
stack
page read and write
4EA0000
direct allocation
page read and write
378F000
stack
page read and write
10C1000
heap
page read and write
D4A000
unkown
page execute and read and write
4970000
heap
page read and write
3ABE000
stack
page read and write
42F1000
heap
page read and write
D78000
unkown
page execute and read and write
469E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
4531000
heap
page read and write
4841000
heap
page read and write
37FF000
stack
page read and write
E08000
unkown
page execute and write copy
944000
heap
page read and write
565000
unkown
page execute and write copy
D05000
unkown
page execute and write copy
300F000
stack
page read and write
4841000
heap
page read and write
4940000
direct allocation
page execute and read and write
4531000
heap
page read and write
E06000
unkown
page execute and write copy
42F1000
heap
page read and write
B725000
heap
page read and write
D07000
unkown
page execute and read and write
744000
heap
page read and write
42F1000
heap
page read and write
3EC000
stack
page read and write
5627000
heap
page read and write
784000
heap
page read and write
B712000
heap
page read and write
42F1000
heap
page read and write
565C000
heap
page read and write
944000
heap
page read and write
547D000
stack
page read and write
B87000
unkown
page execute and write copy
D07000
unkown
page execute and read and write
4841000
heap
page read and write
107A000
heap
page read and write
DCB000
unkown
page execute and read and write
563B000
heap
page read and write
4EA0000
direct allocation
page read and write
4841000
heap
page read and write
4B70000
direct allocation
page execute and read and write
B0A000
unkown
page read and write
BDE000
heap
page read and write
42F1000
heap
page read and write
565C000
heap
page read and write
5641000
heap
page read and write
6F2000
stack
page read and write
6CBB0000
unkown
page read and write
D07000
unkown
page execute and read and write
483F000
stack
page read and write
4531000
heap
page read and write
D1A000
unkown
page execute and read and write
944000
heap
page read and write
328F000
stack
page read and write
B6D000
heap
page read and write
364F000
stack
page read and write
1350000
heap
page read and write
4EA0000
direct allocation
page read and write
45E000
heap
page read and write
42F1000
heap
page read and write
B6F0000
heap
page read and write
B81E000
stack
page read and write
5E5000
unkown
page execute and read and write
944000
heap
page read and write
45BF000
stack
page read and write
944000
heap
page read and write
D64000
unkown
page execute and write copy
4930000
direct allocation
page execute and read and write
E08000
unkown
page execute and write copy
3E7D000
stack
page read and write
42F1000
heap
page read and write
4B20000
direct allocation
page execute and read and write
4531000
heap
page read and write
42F1000
heap
page read and write
B72000
unkown
page execute and read and write
C89000
unkown
page execute and read and write
4B5E000
stack
page read and write
4531000
heap
page read and write
CE4000
unkown
page execute and write copy
4531000
heap
page read and write
613F000
heap
page read and write
4810000
direct allocation
page execute and read and write
4531000
heap
page read and write
42F1000
heap
page read and write
AE0000
direct allocation
page read and write
1070000
heap
page read and write
37CE000
stack
page read and write
1050000
direct allocation
page read and write
4841000
heap
page read and write
42E0000
direct allocation
page read and write
4531000
heap
page read and write
34DE000
stack
page read and write
14C4000
heap
page read and write
42F1000
heap
page read and write
4302000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
D3C000
unkown
page execute and write copy
944000
heap
page read and write
D8B000
unkown
page execute and read and write
744000
heap
page read and write
371F000
stack
page read and write
51FE000
stack
page read and write
4A1E000
stack
page read and write
4841000
heap
page read and write
60DE000
heap
page read and write
DA8000
unkown
page execute and read and write
784000
heap
page read and write
ADE000
stack
page read and write
42F1000
heap
page read and write
8B0000
direct allocation
page read and write
42F1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
3FBE000
stack
page read and write
4540000
heap
page read and write
37AE000
stack
page read and write
AF8000
unkown
page execute and read and write
DCB000
unkown
page execute and read and write
DCB000
unkown
page execute and read and write
613C000
heap
page read and write
B40000
heap
page read and write
35BE000
stack
page read and write
404F000
stack
page read and write
944000
heap
page read and write
402F000
stack
page read and write
E00000
unkown
page execute and read and write
5639000
heap
page read and write
E06000
unkown
page execute and write copy
744000
heap
page read and write
537F000
stack
page read and write
E2B000
unkown
page execute and write copy
4830000
direct allocation
page execute and read and write
47F0000
direct allocation
page execute and read and write
423E000
stack
page read and write
BFA000
heap
page read and write
4DA1000
heap
page read and write
4B4000
unkown
page execute and write copy
4531000
heap
page read and write
43EF000
stack
page read and write
479F000
stack
page read and write
523D000
stack
page read and write
42F1000
heap
page read and write
37C000
stack
page read and write
5612000
heap
page read and write
BE2000
heap
page read and write
32AE000
stack
page read and write
4531000
heap
page read and write
D74000
unkown
page execute and write copy
4EA0000
direct allocation
page read and write
3EEF000
stack
page read and write
5657000
heap
page read and write
BE7000
heap
page read and write
6C931000
unkown
page execute read
DEA000
unkown
page execute and read and write
B79000
unkown
page write copy
321F000
stack
page read and write
314F000
stack
page read and write
42EE000
stack
page read and write
4841000
heap
page read and write
41AE000
stack
page read and write
33AF000
stack
page read and write
4B10000
direct allocation
page execute and read and write
744000
heap
page read and write
3F4E000
stack
page read and write
B771000
heap
page read and write
42F1000
heap
page read and write
3A4E000
stack
page read and write
42F1000
heap
page read and write
BCE000
heap
page read and write
48F0000
direct allocation
page execute and read and write
5D66000
heap
page read and write
4E9000
unkown
page execute and write copy
14C4000
heap
page read and write
10D9000
heap
page read and write
42F1000
heap
page read and write
944000
heap
page read and write
4531000
heap
page read and write
4531000
heap
page read and write
311E000
stack
page read and write
6CBAF000
unkown
page write copy
415E000
stack
page read and write
BE2000
heap
page read and write
5ED000
unkown
page execute and write copy
1320000
heap
page read and write
B10000
unkown
page readonly
4C2000
unkown
page execute and read and write
4BA0000
direct allocation
page execute and read and write
47E0000
direct allocation
page execute and read and write
4EA0000
direct allocation
page read and write
5E6F000
stack
page read and write
784000
heap
page read and write
8B0000
direct allocation
page read and write
390F000
stack
page read and write
103E000
stack
page read and write
4531000
heap
page read and write
AE0000
direct allocation
page read and write
2C8E000
stack
page read and write
4841000
heap
page read and write
744000
heap
page read and write
565A000
heap
page read and write
B10000
unkown
page read and write
2EAF000
stack
page read and write
349000
unkown
page write copy
19D000
stack
page read and write
14C4000
heap
page read and write
B0C000
unkown
page execute and read and write
B10000
heap
page read and write
5639000
heap
page read and write
54BE000
stack
page read and write
42AF000
stack
page read and write
784000
heap
page read and write
784000
heap
page read and write
6CBB5000
unkown
page readonly
523E000
stack
page read and write
4E7E000
stack
page read and write
89E000
stack
page read and write
B6B0000
trusted library allocation
page read and write
4531000
heap
page read and write
2A4E000
stack
page read and write
14C4000
heap
page read and write
944000
heap
page read and write
3F0000
heap
page read and write
BF1000
heap
page read and write
4900000
direct allocation
page execute and read and write
560000
direct allocation
page read and write
4531000
heap
page read and write
28AF000
stack
page read and write
4841000
heap
page read and write
61ED3000
direct allocation
page read and write
944000
heap
page read and write
14C4000
heap
page read and write
B7B000
unkown
page execute and write copy
4531000
heap
page read and write
565C000
heap
page read and write
366E000
stack
page read and write
2FEF000
stack
page read and write
D1A000
unkown
page execute and read and write
5410000
direct allocation
page execute and read and write
549000
unkown
page execute and write copy
560000
direct allocation
page read and write
42F1000
heap
page read and write
1050000
direct allocation
page read and write
2B90000
direct allocation
page execute and read and write
42F1000
heap
page read and write
8B0000
direct allocation
page read and write
4900000
direct allocation
page execute and read and write
42F1000
heap
page read and write
560000
direct allocation
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
5637000
heap
page read and write
39EF000
stack
page read and write
744000
heap
page read and write
2B90000
heap
page read and write
51A000
unkown
page execute and read and write
2E90000
heap
page read and write
42F1000
heap
page read and write
D92000
unkown
page execute and read and write
42F1000
heap
page read and write
4531000
heap
page read and write
47C0000
direct allocation
page execute and read and write
3F8E000
stack
page read and write
42E0000
direct allocation
page read and write
2B4F000
stack
page read and write
A27000
unkown
page execute and read and write
BA70000
trusted library allocation
page read and write
3B2F000
stack
page read and write
4531000
heap
page read and write
4800000
direct allocation
page execute and read and write
944000
heap
page read and write
42F1000
heap
page read and write
5633000
heap
page read and write
CE4000
unkown
page execute and write copy
42E0000
direct allocation
page read and write
451E000
stack
page read and write
BA6F000
stack
page read and write
56C000
unkown
page execute and write copy
4EA0000
trusted library allocation
page read and write
A0E000
stack
page read and write
2ECF000
stack
page read and write
4531000
heap
page read and write
4841000
heap
page read and write
AE0000
direct allocation
page read and write
4CFB000
stack
page read and write
561B000
heap
page read and write
29EE000
stack
page read and write
326F000
stack
page read and write
278E000
stack
page read and write
4DFF000
stack
page read and write
59B000
unkown
page execute and read and write
85EC000
stack
page read and write
BCF000
heap
page read and write
31CE000
stack
page read and write
5EB000
unkown
page execute and read and write
B6B0000
heap
page read and write
BD6000
heap
page read and write
B7B000
unkown
page execute and write copy
45A000
heap
page read and write
784000
heap
page read and write
CFC000
unkown
page execute and read and write
42D0000
trusted library allocation
page read and write
5741000
heap
page read and write
2AEF000
stack
page read and write
3F2E000
stack
page read and write
784000
heap
page read and write
4841000
heap
page read and write
B11000
unkown
page execute and write copy
5641000
heap
page read and write
3E0E000
stack
page read and write
4531000
heap
page read and write
389E000
stack
page read and write
564E000
heap
page read and write
B1E000
heap
page read and write
26AD000
heap
page read and write
4EA0000
direct allocation
page read and write
42F1000
heap
page read and write
744000
heap
page read and write
61ED0000
direct allocation
page read and write
8C0000
unkown
page readonly
36CE000
stack
page read and write
4841000
heap
page read and write
E1D000
unkown
page execute and write copy
5635000
heap
page read and write
A10000
heap
page read and write
E1B000
unkown
page execute and read and write
38EE000
stack
page read and write
944000
heap
page read and write
3CFF000
stack
page read and write
4FE000
unkown
page execute and write copy
944000
heap
page read and write
B5C000
heap
page read and write
564F000
heap
page read and write
4531000
heap
page read and write
61ECD000
direct allocation
page readonly
10F5000
heap
page read and write
4B10000
direct allocation
page execute and read and write
784000
heap
page read and write
4531000
heap
page read and write
5CEE000
stack
page read and write
5637000
heap
page read and write
DB8000
unkown
page execute and read and write
4531000
heap
page read and write
AE0000
direct allocation
page read and write
784000
heap
page read and write
744000
heap
page read and write
42E0000
direct allocation
page read and write
4531000
heap
page read and write
42F1000
heap
page read and write
5FB000
unkown
page execute and read and write
88C000
heap
page read and write
4EA0000
direct allocation
page read and write
4841000
heap
page read and write
BDE000
heap
page read and write
3C1F000
stack
page read and write
42F1000
heap
page read and write
944000
heap
page read and write
368E000
stack
page read and write
27CF000
stack
page read and write
3B1E000
stack
page read and write
304F000
stack
page read and write
4841000
heap
page read and write
B86000
unkown
page execute and read and write
944000
unkown
page execute and read and write
4B10000
direct allocation
page execute and read and write
4531000
heap
page read and write
744000
heap
page read and write
3B8E000
stack
page read and write
3ADF000
stack
page read and write
383E000
stack
page read and write
4841000
heap
page read and write
B72000
unkown
page execute and write copy
344E000
stack
page read and write
7D0000
heap
page read and write
376F000
stack
page read and write
5625000
heap
page read and write
5D2E000
stack
page read and write
D95000
unkown
page execute and write copy
42F1000
heap
page read and write
B79000
unkown
page write copy
3E4E000
stack
page read and write
784000
heap
page read and write
50C000
unkown
page execute and write copy
2E0000
unkown
page read and write
35DF000
stack
page read and write
E15000
unkown
page execute and read and write
784000
heap
page read and write
2DAE000
stack
page read and write
42F1000
heap
page read and write
AE0000
direct allocation
page read and write
411F000
stack
page read and write
4B10000
direct allocation
page execute and read and write
744000
heap
page read and write
4EA0000
direct allocation
page read and write
2F9F000
stack
page read and write
B85000
unkown
page execute and write copy
4841000
heap
page read and write
4F0000
unkown
page execute and read and write
4B1F000
stack
page read and write
744000
heap
page read and write
563D000
heap
page read and write
4841000
heap
page read and write
4535000
heap
page read and write
BCE000
heap
page read and write
50BF000
stack
page read and write
780000
heap
page read and write
744000
heap
page read and write
4531000
heap
page read and write
4AEF000
stack
page read and write
24C0000
heap
page read and write
42F1000
heap
page read and write
4850000
direct allocation
page execute and read and write
14C0000
heap
page read and write
D2F000
unkown
page execute and read and write
4840000
heap
page read and write
9CE000
stack
page read and write
E08000
unkown
page execute and write copy
B8C000
heap
page read and write
268C000
stack
page read and write
4CFC000
stack
page read and write
4841000
heap
page read and write
4531000
heap
page read and write
84EB000
stack
page read and write
944000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
4841000
heap
page read and write
2E0000
unkown
page readonly
53B0000
direct allocation
page execute and read and write
34B000
unkown
page execute and read and write
357000
unkown
page execute and write copy
5FAE000
stack
page read and write
5627000
heap
page read and write
6E40000
heap
page read and write
DEA000
unkown
page execute and read and write
290E000
stack
page read and write
42F1000
heap
page read and write
127E0000
heap
page read and write
4841000
heap
page read and write
4F7F000
stack
page read and write
D19000
unkown
page execute and write copy
60D1000
heap
page read and write
944000
heap
page read and write
784000
heap
page read and write
50BF000
stack
page read and write
4EE000
unkown
page execute and write copy
42F1000
heap
page read and write
5420000
direct allocation
page execute and read and write
53A0000
direct allocation
page execute and read and write
744000
heap
page read and write
325E000
stack
page read and write
78F000
stack
page read and write
744000
heap
page read and write
42F1000
heap
page read and write
D2E000
unkown
page execute and write copy
784000
heap
page read and write
E15000
unkown
page execute and read and write
B10000
unkown
page readonly
D74000
unkown
page execute and write copy
2C8F000
stack
page read and write
560000
direct allocation
page read and write
565A000
heap
page read and write
37CF000
stack
page read and write
744000
heap
page read and write
There are 1404 hidden memdumps, click here to show them.