IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\ZdGtikR[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013209001\ZdGtikR.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\HIDGCFBFBF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DAECGCGHCGHCAKECBKJKEHJDBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDAEBKJDHDAFIECBAKKJ
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\IEHDBAAFIDGDAAAAAAAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKEHIIJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\KFBAECBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJECFHCBKKEBAKFIJDHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KKFHJDAEHIEHJJKFBGDAKKKKEG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\429172ec-4be6-4b4b-a32a-739e4c125245.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\44d28a7d-870a-436c-b206-4a9d70e2de8b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7761f6ce-efc1-42a5-8397-5e444c27ec66.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6755CD27-1D98.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39e64.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39e83.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a886.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a895.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ceac04f6-a2e9-4396-bdb1-2ca45996fc2f.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f7e28130-682f-4585-8e7e-fe97790b1d59.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 213
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 214
ASCII text, with very long lines (832)
downloaded
Chrome Cache Entry: 215
ASCII text
downloaded
Chrome Cache Entry: 216
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 217
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 218
SVG Scalable Vector Graphics image
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=140 --field-trial-handle=2144,i,16764676859220455128,17652020922788016662,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2220,i,7587504728193492124,3574688987422493380,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1980,i,12647095353753981946,6910227817760874048,262144 /prefetch:3
malicious
C:\Users\user\Documents\HIDGCFBFBF.exe
"C:\Users\user\Documents\HIDGCFBFBF.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\HIDGCFBFBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
https://tse1.mm.bing.net/th?id=OADD2.10239360494466_1NE7RS5P7DA5W3Y3W&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://www.broofa.com
unknown
http://31.41.244.11/files/6554834407/ZdGtikR.exep
unknown
http://185.215.113.43/Zu7JuNko/index.phpAy
unknown
http://185.215.113.206/:
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239381963595_1GOKBHWMF64DQK79Y&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://tse1.mm.bing.net/th?id=OADD2.10239395019081_1G8JFT41D9TYPNUJJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/68b591d6548ec281/sqlite3.dll9
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239381963596_1EZBDO21TSG77E89L&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/c4becf79229cb002.phpe
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239340418601_1XRLHD1YRS9ZZSDWX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://31.41.244.11/
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://31.41.244.11/files/6554834407/ZdGtikR.exe$0
unknown
http://31.41.244.11/ows
unknown
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://31.41.244.11/files/6554834407/ZdGtikR.exe
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://31.41.244.11/files/6554834407/ZdGtikR.exeXYZ0123456789
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
https://apis.google.com
unknown
http://185.215.113.206ta
unknown
http://www.sqlite.org/copyright.html.
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239360494465_1WL11PE3QHWZ3Q9V1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://31.41.244.11/files/6554834407/ZdGtikR.exe5
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll0/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
http://31.41.244.11/kR.exeJuNko/index.php
unknown
https://www.ecosia.org/newtab/
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239360172384_1T8ZHTG4V2CH7K983&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://31.41.244.11/files/6554834407/ZdGtikR.exe:
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/68b591d6548ec281/softokn3.dll_
unknown
http://185.215.113.206/c4becf79229cb002.php2
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239395019080_17DEM3LK5H7QUOJTP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
https://play.google.com/log?format=json&hasfast=true
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239399109665_1344PV668L57B53FJ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239360172398_1SAKF1TLLO2IFUJXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239340418602_13EDNGC3ZL2WGZFXN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/c4becf79229cb002.php3A
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239399109664_12R6JVR4SJZQSTHCV&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://185.215.113.206/68b591d6548ec281/nss3.dllW
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllY
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 68 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www3.l.google.com
142.250.181.142
plus.l.google.com
172.217.17.78
play.google.com
172.217.19.238
www.google.com
142.250.181.100
ax-0001.ax-msedge.net
150.171.27.10
fp2e7a.wpc.phicdn.net
192.229.221.95
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.17.78
plus.l.google.com
United States
142.250.181.142
www3.l.google.com
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8D8000
heap
page read and write
malicious
CC1000
unkown
page execute and read and write
malicious
81000
unkown
page execute and read and write
malicious
FA1000
unkown
page execute and read and write
malicious
4E40000
direct allocation
page read and write
malicious
FA1000
unkown
page execute and read and write
malicious
3BFF000
stack
page read and write
1240000
unkown
page execute and read and write
27DF000
stack
page read and write
4931000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4941000
heap
page read and write
EF8000
unkown
page execute and read and write
4F50000
direct allocation
page execute and read and write
10D9000
heap
page read and write
320000
unkown
page execute and read and write
B94000
heap
page read and write
2840000
direct allocation
page read and write
B94000
heap
page read and write
511E000
stack
page read and write
4F70000
direct allocation
page execute and read and write
1199000
unkown
page execute and read and write
3CBF000
stack
page read and write
4931000
heap
page read and write
49C1000
heap
page read and write
884000
heap
page read and write
366F000
stack
page read and write
49EF000
stack
page read and write
B94000
heap
page read and write
4D70000
trusted library allocation
page read and write
884000
heap
page read and write
1000000
direct allocation
page read and write
48EE000
stack
page read and write
57DA000
heap
page read and write
1010000
heap
page read and write
4941000
heap
page read and write
332000
unkown
page execute and read and write
4421000
heap
page read and write
57D9000
heap
page read and write
4941000
heap
page read and write
120E000
unkown
page execute and write copy
57F0000
heap
page read and write
10D9000
heap
page read and write
1040000
heap
page read and write
57F3000
heap
page read and write
B94000
heap
page read and write
31BE000
stack
page read and write
258000
unkown
page execute and read and write
4931000
heap
page read and write
6C9ED000
unkown
page readonly
6CA02000
unkown
page readonly
119C000
unkown
page execute and write copy
4931000
heap
page read and write
4931000
heap
page read and write
1000000
direct allocation
page read and write
585E000
stack
page read and write
12AE000
unkown
page execute and read and write
D30000
direct allocation
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
2840000
direct allocation
page read and write
FB4000
heap
page read and write
884000
heap
page read and write
57F3000
heap
page read and write
1178000
unkown
page execute and read and write
4941000
heap
page read and write
620000
heap
page read and write
57E1000
heap
page read and write
4941000
heap
page read and write
61ED3000
direct allocation
page read and write
57E1000
heap
page read and write
49C1000
heap
page read and write
2840000
direct allocation
page read and write
B94000
heap
page read and write
38D000
unkown
page execute and write copy
4A80000
direct allocation
page execute and read and write
6CA10000
unkown
page readonly
B94000
heap
page read and write
6CBF5000
unkown
page readonly
1202000
unkown
page execute and write copy
2CD0000
direct allocation
page read and write
F0C000
unkown
page execute and read and write
6CBEF000
unkown
page write copy
2CED000
heap
page read and write
4941000
heap
page read and write
12C4000
unkown
page execute and read and write
10B0000
heap
page read and write
1215000
unkown
page execute and write copy
ABE000
stack
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
3E3E000
stack
page read and write
1238000
unkown
page execute and write copy
FB4000
heap
page read and write
1091000
heap
page read and write
7630000
heap
page read and write
B94000
heap
page read and write
2840000
direct allocation
page read and write
987000
heap
page read and write
57EE000
heap
page read and write
4931000
heap
page read and write
6C970000
unkown
page readonly
F1E000
stack
page read and write
F90000
direct allocation
page read and write
4941000
heap
page read and write
49C1000
heap
page read and write
457F000
stack
page read and write
4941000
heap
page read and write
333F000
stack
page read and write
1205000
unkown
page execute and read and write
3FFE000
stack
page read and write
884000
heap
page read and write
884000
heap
page read and write
4931000
heap
page read and write
BFE000
stack
page read and write
4941000
heap
page read and write
FB4000
heap
page read and write
36AE000
stack
page read and write
11C4000
unkown
page execute and write copy
2EFF000
stack
page read and write
3BBE000
stack
page read and write
57FC000
heap
page read and write
B8E000
stack
page read and write
106E000
heap
page read and write
4941000
heap
page read and write
D4B000
heap
page read and write
57CB000
heap
page read and write
55DF000
stack
page read and write
884000
heap
page read and write
BB76000
heap
page read and write
41BF000
stack
page read and write
CC1000
unkown
page execute and write copy
4941000
heap
page read and write
4941000
heap
page read and write
4931000
heap
page read and write
57FC000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
2DBF000
stack
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
1002000
unkown
page execute and write copy
1205000
unkown
page execute and read and write
100B000
unkown
page execute and write copy
4F50000
direct allocation
page execute and read and write
4931000
heap
page read and write
119E000
unkown
page execute and read and write
FB0000
heap
page read and write
FB4000
heap
page read and write
3CAF000
stack
page read and write
57E1000
heap
page read and write
120E000
unkown
page execute and write copy
4931000
heap
page read and write
2CC0000
direct allocation
page execute and read and write
47FF000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
D30000
direct allocation
page read and write
884000
heap
page read and write
447E000
stack
page read and write
B94000
heap
page read and write
4931000
heap
page read and write
406F000
stack
page read and write
176F000
stack
page read and write
637E000
stack
page read and write
61ED0000
direct allocation
page read and write
4941000
heap
page read and write
B913000
heap
page read and write
11A8000
unkown
page execute and write copy
3DD000
stack
page read and write
37EE000
stack
page read and write
CB0000
direct allocation
page read and write
3C3E000
stack
page read and write
46AF000
stack
page read and write
4941000
heap
page read and write
122F000
unkown
page execute and write copy
49C1000
heap
page read and write
57B0000
heap
page read and write
6CA11000
unkown
page execute read
49C1000
heap
page read and write
49C1000
heap
page read and write
57B2000
heap
page read and write
D44000
unkown
page execute and read and write
49C1000
heap
page read and write
2840000
direct allocation
page read and write
4941000
heap
page read and write
127BC000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4F60000
direct allocation
page execute and read and write
433E000
stack
page read and write
2DFE000
stack
page read and write
B94000
heap
page read and write
2840000
direct allocation
page read and write
49C1000
heap
page read and write
57C7000
heap
page read and write
106B000
heap
page read and write
355E000
stack
page read and write
884000
heap
page read and write
CB0000
direct allocation
page read and write
1017000
unkown
page execute and write copy
3A2F000
stack
page read and write
431E000
stack
page read and write
57DD000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
4941000
heap
page read and write
483E000
stack
page read and write
4941000
heap
page read and write
482E000
stack
page read and write
57D7000
heap
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
CB0000
direct allocation
page read and write
2C7F000
stack
page read and write
4EEF000
stack
page read and write
4931000
heap
page read and write
884000
heap
page read and write
6BA8000
heap
page read and write
FB4000
heap
page read and write
2EEF000
stack
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
49BF000
stack
page read and write
49C1000
heap
page read and write
FB4000
heap
page read and write
116E000
unkown
page execute and read and write
1217000
unkown
page execute and read and write
4931000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4941000
heap
page read and write
4A30000
direct allocation
page execute and read and write
27E000
unkown
page execute and read and write
8AC0000
heap
page read and write
D30000
direct allocation
page read and write
331000
unkown
page execute and write copy
38DF000
stack
page read and write
4941000
heap
page read and write
BB79000
heap
page read and write
283000
unkown
page execute and write copy
4941000
heap
page read and write
FB4000
heap
page read and write
880000
heap
page read and write
4F20000
direct allocation
page execute and read and write
884000
heap
page read and write
329F000
stack
page read and write
B94000
heap
page read and write
4E0E000
stack
page read and write
13CF000
stack
page read and write
934000
heap
page read and write
2CD0000
direct allocation
page read and write
4DEC000
stack
page read and write
49C1000
heap
page read and write
6700000
heap
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
57C7000
heap
page read and write
2840000
direct allocation
page read and write
4931000
heap
page read and write
57D3000
heap
page read and write
1214000
unkown
page execute and read and write
80000
unkown
page readonly
127B000
unkown
page execute and read and write
57E1000
heap
page read and write
10FA000
heap
page read and write
1190000
unkown
page execute and read and write
4941000
heap
page read and write
2CFB000
heap
page read and write
12AD000
unkown
page execute and write copy
352F000
stack
page read and write
650000
heap
page read and write
3B5E000
stack
page read and write
51EF000
stack
page read and write
10E4000
heap
page read and write
108C000
heap
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
4F20000
heap
page read and write
EB000
unkown
page execute and write copy
6CBF0000
unkown
page read and write
306E000
stack
page read and write
4941000
heap
page read and write
3F7E000
stack
page read and write
387E000
stack
page read and write
4931000
heap
page read and write
CB0000
direct allocation
page read and write
4931000
heap
page read and write
B850000
trusted library allocation
page read and write
10E7000
heap
page read and write
4941000
heap
page read and write
6B43000
heap
page read and write
11A3000
unkown
page execute and write copy
57FC000
heap
page read and write
12C5000
unkown
page execute and write copy
305E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
3F2F000
stack
page read and write
5F8000
stack
page read and write
3D3F000
stack
page read and write
427E000
stack
page read and write
30F000
unkown
page execute and write copy
2CD0000
direct allocation
page execute and read and write
3C9F000
stack
page read and write
B8B1000
heap
page read and write
884000
heap
page read and write
884000
heap
page read and write
369E000
stack
page read and write
4941000
heap
page read and write
286000
unkown
page execute and write copy
BB0000
heap
page read and write
D9E000
heap
page read and write
4931000
heap
page read and write
7620000
heap
page read and write
884000
heap
page read and write
2840000
direct allocation
page read and write
884000
heap
page read and write
270000
unkown
page execute and read and write
10D1000
heap
page read and write
4941000
heap
page read and write
423F000
stack
page read and write
4FBE000
stack
page read and write
10D3000
heap
page read and write
342E000
stack
page read and write
FB4000
heap
page read and write
4421000
heap
page read and write
318000
unkown
page execute and write copy
11AF000
unkown
page execute and write copy
4AA0000
direct allocation
page execute and read and write
4DD0000
direct allocation
page read and write
FB4000
heap
page read and write
36BE000
stack
page read and write
4931000
heap
page read and write
B94000
heap
page read and write
4940000
heap
page read and write
317000
unkown
page execute and read and write
12B7000
unkown
page execute and write copy
884000
heap
page read and write
749A000
heap
page read and write
4941000
heap
page read and write
B950000
trusted library allocation
page read and write
4941000
heap
page read and write
684E000
stack
page read and write
11A9000
unkown
page execute and read and write
313000
unkown
page execute and read and write
2DEF000
stack
page read and write
2E1000
unkown
page execute and read and write
129C000
unkown
page execute and write copy
4931000
heap
page read and write
884000
heap
page read and write
B94000
heap
page read and write
119C000
unkown
page execute and write copy
E9000
unkown
page write copy
4F00000
direct allocation
page execute and read and write
F3E000
stack
page read and write
1234000
unkown
page execute and write copy
870000
heap
page read and write
57F0000
heap
page read and write
57E1000
heap
page read and write
4941000
heap
page read and write
4F30000
direct allocation
page execute and read and write
57F7000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
57CB000
heap
page read and write
3A1F000
stack
page read and write
3CEE000
stack
page read and write
49C1000
heap
page read and write
1000000
direct allocation
page read and write
49C1000
heap
page read and write
1017000
unkown
page execute and write copy
D30000
direct allocation
page read and write
4EF0000
direct allocation
page execute and read and write
487F000
stack
page read and write
4941000
heap
page read and write
3A5E000
stack
page read and write
33FF000
stack
page read and write
442F000
stack
page read and write
F7000
unkown
page execute and write copy
1000000
direct allocation
page read and write
4941000
heap
page read and write
57C9000
heap
page read and write
FB4000
heap
page read and write
8B0000
heap
page read and write
4E00000
heap
page read and write
12C4000
unkown
page execute and read and write
2C6F000
stack
page read and write
E27000
unkown
page execute and read and write
4941000
heap
page read and write
FB4000
heap
page read and write
4941000
heap
page read and write
125E000
unkown
page execute and read and write
477E000
stack
page read and write
49C1000
heap
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
561E000
stack
page read and write
D30000
direct allocation
page read and write
337E000
stack
page read and write
129F000
unkown
page execute and write copy
2CBE000
stack
page read and write
B94000
heap
page read and write
B98E000
stack
page read and write
57F3000
heap
page read and write
2DC000
unkown
page execute and write copy
FB4000
heap
page read and write
1000000
direct allocation
page read and write
419F000
stack
page read and write
4931000
heap
page read and write
61ECD000
direct allocation
page readonly
53BE000
stack
page read and write
58EE000
heap
page read and write
FB4000
heap
page read and write
FB4000
heap
page read and write
4DA0000
heap
page read and write
4931000
heap
page read and write
49C1000
heap
page read and write
57DB000
heap
page read and write
11A4000
unkown
page execute and read and write
660000
heap
page read and write
57EE000
heap
page read and write
49C1000
heap
page read and write
353F000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
463E000
stack
page read and write
884000
heap
page read and write
1234000
unkown
page execute and write copy
393E000
stack
page read and write
57C7000
heap
page read and write
1016000
unkown
page execute and read and write
287000
unkown
page execute and read and write
4FA0000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
F0A000
unkown
page write copy
392E000
stack
page read and write
61ECC000
direct allocation
page read and write
3E2E000
stack
page read and write
281E000
stack
page read and write
BB68000
heap
page read and write
FA0000
heap
page read and write
B94000
heap
page read and write
125D000
unkown
page execute and write copy
57E1000
heap
page read and write
10E4000
heap
page read and write
3DEF000
stack
page read and write
B20000
heap
page read and write
B94000
heap
page read and write
1240000
unkown
page execute and read and write
4EF0000
direct allocation
page execute and read and write
3BAE000
stack
page read and write
D1E000
stack
page read and write
D8C000
unkown
page execute and read and write
6CBAF000
unkown
page readonly
FB4000
heap
page read and write
6CBEE000
unkown
page read and write
4EF0000
direct allocation
page execute and read and write
49C1000
heap
page read and write
4941000
heap
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
57FC000
heap
page read and write
2CBC000
stack
page read and write
4941000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4FC0000
direct allocation
page execute and read and write
4DAC000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
884000
heap
page read and write
D40000
heap
page read and write
57FC000
heap
page read and write
27E000
unkown
page execute and write copy
1217000
unkown
page execute and read and write
134F000
unkown
page execute and read and write
2CB0000
direct allocation
page execute and read and write
4FB0000
direct allocation
page execute and read and write
49C1000
heap
page read and write
3A4000
unkown
page execute and write copy
4421000
heap
page read and write
4DD0000
direct allocation
page read and write
4941000
heap
page read and write
FB4000
heap
page read and write
42DF000
stack
page read and write
1000000
direct allocation
page read and write
4950000
heap
page read and write
2F1E000
stack
page read and write
4941000
heap
page read and write
10E7000
heap
page read and write
473F000
stack
page read and write
B94000
heap
page read and write
49C1000
heap
page read and write
4931000
heap
page read and write
307E000
stack
page read and write
301F000
stack
page read and write
105D000
heap
page read and write
12AF000
unkown
page execute and write copy
11AF000
unkown
page execute and read and write
2857000
heap
page read and write
10DD000
heap
page read and write
42EF000
stack
page read and write
4931000
heap
page read and write
49C1000
heap
page read and write
437F000
stack
page read and write
884000
heap
page read and write
11B0000
unkown
page execute and write copy
4931000
heap
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
32FE000
stack
page read and write
49C1000
heap
page read and write
57CB000
heap
page read and write
4421000
heap
page read and write
4421000
heap
page read and write
FB4000
heap
page read and write
2CF7000
heap
page read and write
289000
unkown
page execute and read and write
FB4000
heap
page read and write
674E000
stack
page read and write
1178000
unkown
page execute and read and write
4A20000
direct allocation
page execute and read and write
97B000
heap
page read and write
11A6000
unkown
page execute and write copy
456F000
stack
page read and write
6CA000
heap
page read and write
2D9F000
stack
page read and write
40BE000
stack
page read and write
4931000
heap
page read and write
57E1000
heap
page read and write
698C000
stack
page read and write
10B0000
heap
page read and write
3DDF000
stack
page read and write
38E000
unkown
page execute and read and write
57D5000
heap
page read and write
367F000
stack
page read and write
3A6E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
57DB000
heap
page read and write
A0E000
stack
page read and write
49C1000
heap
page read and write
B94000
heap
page read and write
119E000
unkown
page execute and write copy
49C1000
heap
page read and write
3CFE000
stack
page read and write
1000000
direct allocation
page read and write
4931000
heap
page read and write
49C1000
heap
page read and write
FB4000
heap
page read and write
C9B000
stack
page read and write
B94000
heap
page read and write
49C1000
heap
page read and write
57C3000
heap
page read and write
AFD000
stack
page read and write
57EF000
heap
page read and write
FFE000
stack
page read and write
4941000
heap
page read and write
4F50000
direct allocation
page execute and read and write
5F3000
stack
page read and write
10EB000
heap
page read and write
4F30000
direct allocation
page execute and read and write
38FF000
stack
page read and write
4941000
heap
page read and write
EDE000
stack
page read and write
521F000
stack
page read and write
2A5000
unkown
page execute and read and write
1002000
unkown
page execute and read and write
117B000
unkown
page execute and write copy
4931000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4941000
heap
page read and write
1000000
direct allocation
page read and write
4931000
heap
page read and write
1009000
unkown
page write copy
3A4000
unkown
page execute and read and write
4941000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4934000
heap
page read and write
4941000
heap
page read and write
1190000
unkown
page execute and read and write
2840000
direct allocation
page read and write
49D2000
heap
page read and write
32EE000
stack
page read and write
B94000
heap
page read and write
379F000
stack
page read and write
4F90000
direct allocation
page execute and read and write
6B1B000
stack
page read and write
2850000
heap
page read and write
4941000
heap
page read and write
49C1000
heap
page read and write
1251000
unkown
page execute and write copy
2CB0000
heap
page read and write
574C000
stack
page read and write
2F3E000
stack
page read and write
1233000
unkown
page execute and read and write
11E4000
unkown
page execute and read and write
B850000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
1233000
unkown
page execute and read and write
12C4000
unkown
page execute and write copy
38F000
unkown
page execute and write copy
49C1000
heap
page read and write
4931000
heap
page read and write
49C1000
heap
page read and write
12C5000
unkown
page execute and write copy
D30000
direct allocation
page read and write
33EF000
stack
page read and write
D20000
heap
page read and write
37AF000
stack
page read and write
3DFF000
stack
page read and write
46BF000
stack
page read and write
4941000
heap
page read and write
49C1000
heap
page read and write
127C1000
heap
page read and write
44FE000
stack
page read and write
61E00000
direct allocation
page execute and read and write
F47000
heap
page read and write
409E000
stack
page read and write
1237000
unkown
page execute and read and write
57E1000
heap
page read and write
884000
heap
page read and write
CC0000
unkown
page read and write
4941000
heap
page read and write
57E1000
heap
page read and write
6B0000
heap
page read and write
41EE000
stack
page read and write
2CAE000
stack
page read and write
3A7E000
stack
page read and write
49C1000
heap
page read and write
397000
unkown
page execute and write copy
4FE0000
direct allocation
page execute and read and write
4931000
heap
page read and write
3F1F000
stack
page read and write
4941000
heap
page read and write
11A7000
unkown
page execute and read and write
1000000
direct allocation
page read and write
34BE000
stack
page read and write
4931000
heap
page read and write
41AF000
stack
page read and write
536E000
stack
page read and write
11C4000
unkown
page execute and write copy
1000000
direct allocation
page read and write
884000
heap
page read and write
CA0000
heap
page read and write
532F000
stack
page read and write
FB4000
heap
page read and write
49C1000
heap
page read and write
1099000
heap
page read and write
32DE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
46EE000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
4931000
heap
page read and write
12B5000
unkown
page execute and read and write
F0A000
unkown
page read and write
54DE000
stack
page read and write
B850000
heap
page read and write
CAE000
stack
page read and write
357E000
stack
page read and write
D30000
direct allocation
page read and write
FB4000
heap
page read and write
1070000
heap
page read and write
11A8000
unkown
page execute and write copy
10FC000
heap
page read and write
27E000
unkown
page execute and write copy
122F000
unkown
page execute and write copy
CB0000
direct allocation
page read and write
4930000
heap
page read and write
1000000
direct allocation
page read and write
4941000
heap
page read and write
407F000
stack
page read and write
45AE000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
F5000
unkown
page execute and write copy
49C1000
heap
page read and write
4931000
heap
page read and write
EB000
unkown
page execute and read and write
145E000
stack
page read and write
1002000
unkown
page execute and read and write
2E5000
unkown
page execute and read and write
884000
heap
page read and write
443F000
stack
page read and write
FB4000
heap
page read and write
10B0000
heap
page read and write
688B000
stack
page read and write
12C4000
unkown
page execute and write copy
B94000
heap
page read and write
FB4000
heap
page read and write
347F000
stack
page read and write
2F7000
unkown
page execute and read and write
4941000
heap
page read and write
41DE000
stack
page read and write
D30000
direct allocation
page read and write
32AF000
stack
page read and write
4931000
heap
page read and write
1009000
unkown
page write copy
4931000
heap
page read and write
49C1000
heap
page read and write
F40000
heap
page read and write
57D6000
heap
page read and write
2F2E000
stack
page read and write
4A30000
direct allocation
page execute and read and write
119E000
unkown
page execute and write copy
CB0000
direct allocation
page read and write
57BD000
heap
page read and write
1000000
direct allocation
page read and write
57FC000
heap
page read and write
49C1000
heap
page read and write
CC0000
unkown
page readonly
57E5000
heap
page read and write
2EE000
unkown
page execute and write copy
4941000
heap
page read and write
4931000
heap
page read and write
12B5000
unkown
page execute and read and write
D75000
unkown
page execute and read and write
8D3000
heap
page read and write
4931000
heap
page read and write
CB0000
direct allocation
page read and write
12AF000
unkown
page execute and write copy
33DF000
stack
page read and write
3AFE000
stack
page read and write
CB0000
direct allocation
page read and write
49C1000
heap
page read and write
6236000
heap
page read and write
33E000
unkown
page execute and read and write
2B5F000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
57C3000
heap
page read and write
2840000
direct allocation
page read and write
575D000
stack
page read and write
4941000
heap
page read and write
4F40000
direct allocation
page execute and read and write
8ABC000
stack
page read and write
49C1000
heap
page read and write
D88000
heap
page read and write
10D2000
heap
page read and write
FA0000
unkown
page read and write
884000
heap
page read and write
1015000
unkown
page execute and write copy
564E000
stack
page read and write
57D3000
heap
page read and write
884000
heap
page read and write
37BF000
stack
page read and write
1237000
unkown
page execute and read and write
D30000
direct allocation
page read and write
B939000
heap
page read and write
BA8E000
stack
page read and write
CB0000
direct allocation
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
2C4000
unkown
page execute and read and write
1238000
unkown
page execute and write copy
4EF0000
direct allocation
page execute and read and write
11D1000
unkown
page execute and write copy
49C1000
heap
page read and write
100B000
unkown
page execute and read and write
CB0000
direct allocation
page read and write
10D0000
heap
page read and write
35FE000
stack
page read and write
57D7000
heap
page read and write
7621000
heap
page read and write
4941000
heap
page read and write
F8E000
stack
page read and write
11C5000
unkown
page execute and read and write
FB4000
heap
page read and write
4941000
heap
page read and write
FA0000
unkown
page read and write
B94000
heap
page read and write
11FC000
unkown
page execute and write copy
4A70000
direct allocation
page execute and read and write
4931000
heap
page read and write
884000
heap
page read and write
10E0000
heap
page read and write
4941000
heap
page read and write
4FC000
stack
page read and write
FB4000
heap
page read and write
FA0000
unkown
page readonly
FB4000
heap
page read and write
57FC000
heap
page read and write
57C7000
heap
page read and write
B94000
heap
page read and write
4931000
heap
page read and write
10E0000
heap
page read and write
49C1000
heap
page read and write
FB4000
heap
page read and write
12AE000
unkown
page execute and read and write
4941000
heap
page read and write
57D7000
heap
page read and write
100B000
unkown
page execute and write copy
B94000
heap
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
35BF000
stack
page read and write
8AD9000
heap
page read and write
2840000
direct allocation
page read and write
4941000
heap
page read and write
2CE7000
heap
page read and write
441F000
stack
page read and write
65FE000
stack
page read and write
44BF000
stack
page read and write
2E2000
unkown
page execute and write copy
B94000
heap
page read and write
319E000
stack
page read and write
3B9E000
stack
page read and write
40AE000
stack
page read and write
3B6F000
stack
page read and write
11A7000
unkown
page execute and read and write
57D6000
heap
page read and write
4931000
heap
page read and write
57F9000
heap
page read and write
4931000
heap
page read and write
49C0000
heap
page read and write
B94000
heap
page read and write
40FF000
stack
page read and write
FA1000
unkown
page execute and write copy
4931000
heap
page read and write
54BF000
stack
page read and write
FB4000
heap
page read and write
127C0000
heap
page read and write
37F000
unkown
page execute and write copy
FA1000
unkown
page execute and write copy
3F5E000
stack
page read and write
57BB000
heap
page read and write
F7B000
stack
page read and write
FB4000
heap
page read and write
6C9FE000
unkown
page read and write
3E1E000
stack
page read and write
47EF000
stack
page read and write
4A40000
direct allocation
page execute and read and write
4421000
heap
page read and write
4931000
heap
page read and write
493F000
stack
page read and write
57E1000
heap
page read and write
45BE000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4931000
heap
page read and write
D30000
direct allocation
page read and write
6BAB000
heap
page read and write
365F000
stack
page read and write
395000
unkown
page execute and read and write
884000
heap
page read and write
295F000
stack
page read and write
49C1000
heap
page read and write
33D000
unkown
page execute and write copy
6C90000
trusted library allocation
page read and write
10D0000
heap
page read and write
1251000
unkown
page execute and write copy
4931000
heap
page read and write
125D000
unkown
page execute and write copy
4931000
heap
page read and write
27C000
unkown
page execute and write copy
B90000
heap
page read and write
129C000
unkown
page execute and write copy
560D000
stack
page read and write
2840000
direct allocation
page read and write
4F40000
direct allocation
page execute and read and write
4AC0000
trusted library allocation
page read and write
4950000
heap
page read and write
30FF000
stack
page read and write
49C1000
heap
page read and write
57E1000
heap
page read and write
41FE000
stack
page read and write
413E000
stack
page read and write
B890000
heap
page read and write
4931000
heap
page read and write
884000
heap
page read and write
49C1000
heap
page read and write
492F000
stack
page read and write
10E7000
heap
page read and write
B94000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
66FF000
stack
page read and write
B94000
heap
page read and write
45FF000
stack
page read and write
F3F000
stack
page read and write
1061000
heap
page read and write
FB4000
heap
page read and write
2840000
direct allocation
page read and write
884000
heap
page read and write
12B7000
unkown
page execute and write copy
1016000
unkown
page execute and read and write
284000
unkown
page execute and read and write
1202000
unkown
page execute and write copy
2EDF000
stack
page read and write
127B000
unkown
page execute and read and write
6235000
heap
page read and write
860000
heap
page read and write
49C1000
heap
page read and write
6C0000
heap
page read and write
46FE000
stack
page read and write
4A00000
direct allocation
page execute and read and write
303F000
stack
page read and write
57CC000
heap
page read and write
884000
heap
page read and write
FB4000
heap
page read and write
762E000
heap
page read and write
302F000
stack
page read and write
2FFF000
stack
page read and write
8BE000
heap
page read and write
4A13000
heap
page read and write
49C1000
heap
page read and write
2820000
heap
page read and write
341E000
stack
page read and write
43BE000
stack
page read and write
2DFF000
stack
page read and write
884000
heap
page read and write
4931000
heap
page read and write
57FC000
heap
page read and write
31FF000
stack
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
57D7000
heap
page read and write
317F000
stack
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
373E000
stack
page read and write
903000
heap
page read and write
884000
heap
page read and write
4941000
heap
page read and write
49C1000
heap
page read and write
10E0000
heap
page read and write
37DE000
stack
page read and write
2A4000
unkown
page execute and write copy
383F000
stack
page read and write
4941000
heap
page read and write
11FC000
unkown
page execute and write copy
4931000
heap
page read and write
10E0000
heap
page read and write
4941000
heap
page read and write
EFA000
stack
page read and write
FB4000
heap
page read and write
4931000
heap
page read and write
31AE000
stack
page read and write
3F6E000
stack
page read and write
626000
heap
page read and write
11A3000
unkown
page execute and write copy
11A4000
unkown
page execute and read and write
3A3F000
stack
page read and write
B94000
heap
page read and write
117B000
unkown
page execute and write copy
10EB000
heap
page read and write
B94000
heap
page read and write
61EB4000
direct allocation
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
57F8000
heap
page read and write
49C1000
heap
page read and write
4941000
heap
page read and write
4E7B000
stack
page read and write
2F4000
unkown
page execute and read and write
4931000
heap
page read and write
8ADA000
heap
page read and write
57E1000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
49C1000
heap
page read and write
980000
heap
page read and write
4931000
heap
page read and write
9CE000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4941000
heap
page read and write
B94000
heap
page read and write
38EF000
stack
page read and write
6B50000
heap
page read and write
FB4000
heap
page read and write
4940000
heap
page read and write
3EBE000
stack
page read and write
57E0000
heap
page read and write
976000
heap
page read and write
10D0000
heap
page read and write
108D000
unkown
page execute and read and write
B0E000
stack
page read and write
4931000
heap
page read and write
2B1000
unkown
page execute and write copy
884000
heap
page read and write
647F000
stack
page read and write
E2000
unkown
page execute and write copy
57DA000
heap
page read and write
522E000
stack
page read and write
B94000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
391E000
stack
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
6230000
heap
page read and write
4DA4000
heap
page read and write
39BE000
stack
page read and write
3ABF000
stack
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
4941000
heap
page read and write
FB4000
heap
page read and write
100B000
unkown
page execute and read and write
48B0000
direct allocation
page read and write
343E000
stack
page read and write
2CF0000
heap
page read and write
129F000
unkown
page execute and write copy
FB4000
heap
page read and write
7630000
heap
page read and write
8BA000
heap
page read and write
125E000
unkown
page execute and read and write
4941000
heap
page read and write
4A30000
direct allocation
page execute and read and write
12AD000
unkown
page execute and write copy
4941000
heap
page read and write
2C7E000
stack
page read and write
4941000
heap
page read and write
119E000
unkown
page execute and read and write
1000000
direct allocation
page read and write
1215000
unkown
page execute and write copy
B94000
heap
page read and write
884000
heap
page read and write
57ED000
heap
page read and write
57CF000
heap
page read and write
BB70000
heap
page read and write
57F3000
heap
page read and write
B94000
heap
page read and write
4F80000
direct allocation
page execute and read and write
FB4000
heap
page read and write
1214000
unkown
page execute and read and write
525E000
stack
page read and write
4941000
heap
page read and write
50DF000
stack
page read and write
1002000
unkown
page execute and write copy
38D000
unkown
page execute and write copy
49C1000
heap
page read and write
884000
heap
page read and write
4941000
heap
page read and write
2CFE000
heap
page read and write
12B7000
unkown
page execute and write copy
58E0000
trusted library allocation
page read and write
11A6000
unkown
page execute and write copy
10FA000
heap
page read and write
64BE000
stack
page read and write
49C1000
heap
page read and write
550D000
stack
page read and write
37FE000
stack
page read and write
57FC000
heap
page read and write
405F000
stack
page read and write
397F000
stack
page read and write
C5E000
stack
page read and write
3A5000
unkown
page execute and write copy
61E01000
direct allocation
page execute read
1201000
unkown
page execute and read and write
4931000
heap
page read and write
2C3E000
stack
page read and write
81000
unkown
page execute and write copy
4F50000
direct allocation
page execute and read and write
10D0000
heap
page read and write
80000
unkown
page read and write
EB000
unkown
page execute and write copy
12AD000
unkown
page execute and write copy
B94000
heap
page read and write
11A9000
unkown
page execute and read and write
6C971000
unkown
page execute read
1201000
unkown
page execute and read and write
B94000
heap
page read and write
4941000
heap
page read and write
61ED4000
direct allocation
page readonly
4931000
heap
page read and write
3FBF000
stack
page read and write
E9000
unkown
page write copy
57EF000
heap
page read and write
98D000
heap
page read and write
65BF000
stack
page read and write
F9E000
stack
page read and write
10EB000
heap
page read and write
4941000
heap
page read and write
509B000
stack
page read and write
2EFF000
stack
page read and write
2C9E000
stack
page read and write
884000
heap
page read and write
49C1000
heap
page read and write
B91F000
heap
page read and write
3CDE000
stack
page read and write
316F000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
546F000
stack
page read and write
4420000
heap
page read and write
4941000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
2F5000
unkown
page execute and write copy
11A1000
unkown
page execute and read and write
535E000
stack
page read and write
6B39000
heap
page read and write
1350000
unkown
page execute and write copy
11C5000
unkown
page execute and read and write
1009000
unkown
page write copy
B94000
heap
page read and write
49C1000
heap
page read and write
314000
unkown
page execute and write copy
57EE000
heap
page read and write
918000
heap
page read and write
323E000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
3B7F000
stack
page read and write
4D80000
trusted library allocation
page read and write
4931000
heap
page read and write
4941000
heap
page read and write
FB4000
heap
page read and write
4941000
heap
page read and write
FB4000
heap
page read and write
B4B000
stack
page read and write
2CD0000
direct allocation
page read and write
2A5F000
stack
page read and write
1252000
unkown
page execute and read and write
4F50000
direct allocation
page execute and read and write
1000000
direct allocation
page read and write
57D3000
heap
page read and write
356E000
stack
page read and write
25B000
unkown
page execute and write copy
3E7F000
stack
page read and write
884000
heap
page read and write
884000
heap
page read and write
FA0000
unkown
page readonly
2DDE000
stack
page read and write
446E000
stack
page read and write
37C000
unkown
page execute and write copy
61EB7000
direct allocation
page readonly
2840000
direct allocation
page read and write
1015000
unkown
page execute and write copy
49C1000
heap
page read and write
1009000
unkown
page write copy
49C1000
heap
page read and write
1252000
unkown
page execute and read and write
10E2000
heap
page read and write
B870000
heap
page read and write
4941000
heap
page read and write
D30000
direct allocation
page read and write
48BE000
stack
page read and write
FB4000
heap
page read and write
57D9000
heap
page read and write
4A90000
direct allocation
page execute and read and write
432E000
stack
page read and write
4941000
heap
page read and write
D85000
heap
page read and write
42FF000
stack
page read and write
DBD000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
4F7F000
stack
page read and write
E2000
unkown
page execute and read and write
F6000
unkown
page execute and read and write
BB71000
heap
page read and write
B94000
heap
page read and write
50EE000
stack
page read and write
FB4000
heap
page read and write
36FF000
stack
page read and write
4941000
heap
page read and write
351F000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
32BF000
stack
page read and write
CB0000
direct allocation
page read and write
BB70000
heap
page read and write
FB4000
heap
page read and write
4941000
heap
page read and write
48B0000
direct allocation
page read and write
BBE000
stack
page read and write
11E4000
unkown
page execute and read and write
B94000
heap
page read and write
4F0F000
stack
page read and write
CB0000
direct allocation
page read and write
315F000
stack
page read and write
57D7000
heap
page read and write
CB0000
direct allocation
page read and write
F5E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
4931000
heap
page read and write
D30000
direct allocation
page read and write
D30000
direct allocation
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
57D7000
heap
page read and write
12DF000
stack
page read and write
7490000
heap
page read and write
6CE000
heap
page read and write
F90000
direct allocation
page read and write
35B000
unkown
page execute and read and write
2DC000
stack
page read and write
57E1000
heap
page read and write
4941000
heap
page read and write
12AD000
unkown
page execute and write copy
2C5F000
stack
page read and write
57E1000
heap
page read and write
4931000
heap
page read and write
3F3F000
stack
page read and write
F4E000
heap
page read and write
CB0000
direct allocation
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
10B4000
heap
page read and write
4931000
heap
page read and write
397000
unkown
page execute and write copy
4F20000
direct allocation
page execute and read and write
11D1000
unkown
page execute and write copy
571D000
stack
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
CB0000
heap
page read and write
BAD0000
trusted library allocation
page read and write
12B7000
unkown
page execute and write copy
2CE0000
heap
page read and write
7BC000
stack
page read and write
BC0000
heap
page read and write
101E000
heap
page read and write
D30000
direct allocation
page read and write
8CE000
stack
page read and write
4860000
trusted library allocation
page read and write
126BB000
stack
page read and write
4941000
heap
page read and write
10D9000
heap
page read and write
288000
unkown
page execute and write copy
4931000
heap
page read and write
There are 1209 hidden memdumps, click here to show them.