IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\main[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1013266001\main.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\GIEGHJEGHJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFHJECAAAFHIJKFIJEGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBGHCAKKFBGDHJJJKECF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAFCAAEGDBKJJKECBKFHCBAECA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FCAEBFIJKEBGHIDHIEGI
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\FCFIJEBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HCFCFHJDBKJKEBFHJEHIIIDBGH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKFCFBKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\06c9e9c4-6a6d-425b-8882-5ecb9bc48142.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\6bcd4f3a-9ca6-4306-8170-b12df15b35d4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\71fe7263-a5c6-4a67-a8ea-522ca3981e6b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675608EB-490.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675608EC-CF0.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF23aec.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF23afb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2452d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2453c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ce0c1f15-a17b-4700-a08b-f96f1931fe68.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f2fd4d00-1e0d-42a1-a9ba-76c37dc08768.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 87
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (814)
downloaded
Chrome Cache Entry: 89
ASCII text
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 92
SVG Scalable Vector Graphics image
downloaded
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2452,i,4234675015716763937,3572814526780709202,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=2272,i,10045802254736208142,3736221774440193483,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2276 --field-trial-handle=2232,i,15679206844629657963,4104763474171157004,262144 /prefetch:3
malicious
C:\Users\user\Documents\GIEGHJEGHJ.exe
"C:\Users\user\Documents\GIEGHJEGHJ.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\GIEGHJEGHJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll3
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpme
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://31.41.244.11/files/main.exexaj
unknown
http://31.41.244.11/files/main.exela~
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/sqlite3.dll%
unknown
http://31.41.244.11/
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/msvcp140.dll(2U
unknown
http://185.215.113.206E
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://31.41.244.11/files/main.exep
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
https://apis.google.com
unknown
http://31.41.244.11/files/main.exeX
unknown
http://185.215.113.16/mine/random.exek1
unknown
http://31.41.244.11//Zu7JuNko/index.php$
unknown
http://31.41.244.11/files/main.exea
unknown
http://31.41.244.11/files/main.exec850623
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://31.41.244.11/8
unknown
http://www.sqlite.org/copyright.html.
unknown
185.215.113.206/c4becf79229cb002.php
http://185.215.113.206/68b591d6548ec281/msvcp140.dllu2
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://31.41.244.11/files/main.exe
unknown
http://31.41.244.11/files/main.exex.phpX
unknown
http://185.215.113.206/c4becf79229cb002.php%
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
http://31.41.244.11/files/main.exeZaL
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.206ata
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/d
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
http://31.41.244.11/files/main.exeD~1
unknown
http://185.215.113.206/c4becf79229cb002.php9
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
http://185.215.113.206/c4becf79229cb002.php?
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
http://185.215.113.206/68b591d6548ec281/softokn3.dll92D
unknown
http://185.215.113.206/c4becf79229cb002.php=
unknown
http://185.215.113.206/68b591d6548ec281/softokn3.dll#
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://185.215.113.16/mine/random.exe21J
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
http://185.215.113.206c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll_
unknown
https://support.mozilla.org
unknown
http://31.41.244.11/files/main.exec85062384760_
unknown
http://185.215.113.206
unknown
http://185.215.113.43/Zu7JuNko/index.phph
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dlly
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllU
unknown
http://185.215.113.43/Zu7JuNko/index.phpp
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 71 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www3.l.google.com
172.217.19.206
plus.l.google.com
172.217.17.78
www.google.com
142.250.181.100
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.7
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.19.206
www3.l.google.com
United States
172.217.17.78
plus.l.google.com
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
31.41.244.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B21000
unkown
page execute and read and write
malicious
1F1000
unkown
page execute and read and write
malicious
3F1000
unkown
page execute and read and write
malicious
1F1000
unkown
page execute and read and write
malicious
4DD0000
direct allocation
page read and write
malicious
F7E000
heap
page read and write
malicious
453000
unkown
page execute and read and write
2D30000
direct allocation
page read and write
2FFF000
stack
page read and write
2DBF000
stack
page read and write
D26000
unkown
page execute and read and write
700C0000
unkown
page readonly
37AF000
stack
page read and write
60A2000
heap
page read and write
E3B000
unkown
page execute and write copy
4920000
direct allocation
page execute and read and write
42F1000
heap
page read and write
1409000
heap
page read and write
11AE000
stack
page read and write
4951000
heap
page read and write
63A000
unkown
page write copy
584000
heap
page read and write
454000
unkown
page execute and write copy
558E000
stack
page read and write
4F3000
unkown
page execute and write copy
58D1000
heap
page read and write
B84000
heap
page read and write
42F1000
heap
page read and write
40F000
unkown
page execute and read and write
3F6000
unkown
page execute and write copy
35CF000
stack
page read and write
B9B6000
heap
page read and write
687000
heap
page read and write
40B000
unkown
page execute and read and write
61ED0000
direct allocation
page read and write
58C5000
heap
page read and write
4B12000
heap
page read and write
58E0000
heap
page read and write
2C20000
direct allocation
page read and write
500000
unkown
page execute and write copy
42F1000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1030000
heap
page read and write
37EE000
stack
page read and write
400E000
stack
page read and write
4F40000
direct allocation
page execute and read and write
B95000
unkown
page execute and write copy
502F000
stack
page read and write
51C0000
direct allocation
page execute and read and write
B84000
heap
page read and write
584000
heap
page read and write
58D3000
heap
page read and write
B84000
heap
page read and write
584000
heap
page read and write
1F1000
unkown
page execute and write copy
2CA0000
direct allocation
page read and write
37CF000
stack
page read and write
59C0000
trusted library allocation
page read and write
356E000
stack
page read and write
3B3F000
stack
page read and write
11A0000
heap
page read and write
3A2F000
stack
page read and write
2CA0000
direct allocation
page read and write
584000
heap
page read and write
34CE000
stack
page read and write
F50000
direct allocation
page read and write
BC4A000
heap
page read and write
42F1000
heap
page read and write
2F2E000
stack
page read and write
584000
heap
page read and write
5110000
direct allocation
page execute and read and write
1045000
heap
page read and write
4951000
heap
page read and write
4B11000
heap
page read and write
58C2000
heap
page read and write
344E000
stack
page read and write
5D15000
heap
page read and write
42F1000
heap
page read and write
B9B0000
heap
page read and write
58C5000
heap
page read and write
4B11000
heap
page read and write
58E0000
heap
page read and write
F50000
direct allocation
page read and write
5A0000
direct allocation
page read and write
4951000
heap
page read and write
25B000
unkown
page execute and read and write
61F000
heap
page read and write
58C2000
heap
page read and write
43CE000
stack
page read and write
4A61000
heap
page read and write
51B0000
direct allocation
page execute and read and write
40C000
unkown
page execute and write copy
316F000
stack
page read and write
4B11000
heap
page read and write
7A8C000
stack
page read and write
B20000
unkown
page readonly
502000
unkown
page execute and read and write
580000
heap
page read and write
42BF000
stack
page read and write
2C6F000
stack
page read and write
2D4F000
stack
page read and write
A4E000
stack
page read and write
5D16000
heap
page read and write
584000
heap
page read and write
4B11000
heap
page read and write
7C0F000
heap
page read and write
58AB000
heap
page read and write
4B11000
heap
page read and write
58DD000
heap
page read and write
4F10000
direct allocation
page execute and read and write
4B11000
heap
page read and write
8F4000
unkown
page execute and write copy
3E8000
unkown
page execute and read and write
2B2F000
stack
page read and write
4B11000
heap
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
557000
unkown
page execute and read and write
58C5000
heap
page read and write
58C1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
560000
heap
page read and write
F50000
direct allocation
page read and write
500000
unkown
page execute and write copy
4B11000
heap
page read and write
48F0000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
B84000
heap
page read and write
2D30000
direct allocation
page read and write
2D2E000
stack
page read and write
348F000
stack
page read and write
370F000
stack
page read and write
584000
heap
page read and write
42F1000
heap
page read and write
4A61000
heap
page read and write
4B11000
heap
page read and write
2D4D000
heap
page read and write
48E0000
direct allocation
page execute and read and write
4951000
heap
page read and write
2D30000
direct allocation
page read and write
42F1000
heap
page read and write
B84000
heap
page read and write
D3B000
unkown
page execute and read and write
DA4000
unkown
page execute and write copy
32AF000
stack
page read and write
4B11000
heap
page read and write
42F1000
heap
page read and write
D80000
unkown
page execute and write copy
444F000
stack
page read and write
2EEF000
stack
page read and write
58C5000
heap
page read and write
5A0000
direct allocation
page read and write
43C000
unkown
page execute and read and write
425000
unkown
page execute and read and write
584000
heap
page read and write
2CB0000
heap
page read and write
584000
heap
page read and write
102E000
stack
page read and write
3A8E000
stack
page read and write
68D000
heap
page read and write
A0E000
stack
page read and write
58C5000
heap
page read and write
B9AB000
heap
page read and write
4F0F000
stack
page read and write
3A6E000
stack
page read and write
2CA0000
direct allocation
page read and write
4B11000
heap
page read and write
4F50000
direct allocation
page execute and read and write
5140000
direct allocation
page execute and read and write
584000
heap
page read and write
5110000
direct allocation
page execute and read and write
31CE000
stack
page read and write
417F000
stack
page read and write
497000
unkown
page execute and read and write
398F000
stack
page read and write
5150000
direct allocation
page execute and read and write
128A0000
heap
page read and write
42FE000
stack
page read and write
596D000
stack
page read and write
58C5000
heap
page read and write
58B1000
heap
page read and write
493E000
stack
page read and write
384F000
stack
page read and write
42F1000
heap
page read and write
2C90000
heap
page read and write
58BA000
heap
page read and write
2DAF000
stack
page read and write
631E000
stack
page read and write
3A3E000
stack
page read and write
25B000
unkown
page execute and write copy
4951000
heap
page read and write
4960000
heap
page read and write
4B11000
heap
page read and write
4950000
heap
page read and write
2CA0000
direct allocation
page read and write
4B11000
heap
page read and write
B9C2000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
E39000
unkown
page execute and read and write
3A4F000
stack
page read and write
E5C000
stack
page read and write
B84000
heap
page read and write
7014E000
unkown
page read and write
FB0000
heap
page read and write
42F1000
heap
page read and write
2CA0000
direct allocation
page read and write
4B11000
heap
page read and write
4900000
direct allocation
page execute and read and write
4951000
heap
page read and write
4B11000
heap
page read and write
42F1000
heap
page read and write
3D4F000
stack
page read and write
4B11000
heap
page read and write
2CA0000
direct allocation
page read and write
4B11000
heap
page read and write
4951000
heap
page read and write
40B000
unkown
page execute and read and write
584000
heap
page read and write
F50000
direct allocation
page read and write
42F0000
heap
page read and write
F50000
direct allocation
page read and write
1036000
heap
page read and write
4B11000
heap
page read and write
410F000
stack
page read and write
334F000
stack
page read and write
7CE000
stack
page read and write
65F000
heap
page read and write
46B000
unkown
page execute and write copy
32CF000
stack
page read and write
58D2000
heap
page read and write
58BE000
heap
page read and write
E49000
unkown
page execute and read and write
58D1000
heap
page read and write
47B000
unkown
page execute and read and write
584000
heap
page read and write
B84000
heap
page read and write
584000
heap
page read and write
1289C000
stack
page read and write
478E000
stack
page read and write
B930000
trusted library allocation
page read and write
42F1000
heap
page read and write
4F50000
trusted library allocation
page read and write
F70000
heap
page read and write
56EE000
stack
page read and write
366F000
stack
page read and write
43C000
unkown
page execute and read and write
259000
unkown
page write copy
2F4F000
stack
page read and write
48D0000
direct allocation
page execute and read and write
340F000
stack
page read and write
4B11000
heap
page read and write
42F1000
heap
page read and write
F50000
direct allocation
page read and write
58C5000
heap
page read and write
47AE000
stack
page read and write
2CA0000
direct allocation
page read and write
B0E000
stack
page read and write
42F1000
heap
page read and write
40C000
unkown
page execute and write copy
B84000
heap
page read and write
4951000
heap
page read and write
2C20000
direct allocation
page read and write
59CF000
heap
page read and write
3F4F000
stack
page read and write
3ECE000
stack
page read and write
3FA000
unkown
page execute and write copy
33BF000
stack
page read and write
B93B000
heap
page read and write
663000
heap
page read and write
58BC000
heap
page read and write
507F000
stack
page read and write
5120000
direct allocation
page execute and read and write
3F3E000
stack
page read and write
4B11000
heap
page read and write
4B20000
heap
page read and write
58A9000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
5A0000
direct allocation
page read and write
588D000
stack
page read and write
3C4E000
stack
page read and write
4B11000
heap
page read and write
F50000
direct allocation
page read and write
308E000
stack
page read and write
3F0000
unkown
page read and write
7013D000
unkown
page readonly
367E000
stack
page read and write
58B7000
heap
page read and write
46A000
unkown
page execute and read and write
40CE000
stack
page read and write
B84000
heap
page read and write
4951000
heap
page read and write
42A000
unkown
page execute and write copy
B84000
heap
page read and write
38BF000
stack
page read and write
464E000
stack
page read and write
390F000
stack
page read and write
51A0000
direct allocation
page execute and read and write
58C2000
heap
page read and write
4B11000
heap
page read and write
61ECC000
direct allocation
page read and write
687000
heap
page read and write
42F1000
heap
page read and write
679000
heap
page read and write
6CFAE000
unkown
page read and write
2FCE000
stack
page read and write
4950000
direct allocation
page execute and read and write
61E000
heap
page read and write
57EF000
stack
page read and write
50A0000
direct allocation
page execute and read and write
266000
unkown
page execute and read and write
5120000
direct allocation
page execute and read and write
460F000
stack
page read and write
42F1000
heap
page read and write
33EF000
stack
page read and write
3D8E000
stack
page read and write
B931000
heap
page read and write
4B11000
heap
page read and write
58DA000
heap
page read and write
48E0000
direct allocation
page execute and read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
589F000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
D03000
unkown
page execute and write copy
520000
heap
page read and write
42F1000
heap
page read and write
500000
unkown
page execute and write copy
13ED000
heap
page read and write
358E000
stack
page read and write
584000
heap
page read and write
42F1000
heap
page read and write
58E0000
heap
page read and write
B84000
heap
page read and write
63C000
unkown
page execute and read and write
48E0000
direct allocation
page execute and read and write
13AF000
stack
page read and write
4B11000
heap
page read and write
265000
unkown
page execute and write copy
2CA0000
direct allocation
page read and write
4AD0000
heap
page read and write
584000
heap
page read and write
3FF000
unkown
page execute and read and write
58AA000
heap
page read and write
4B11000
heap
page read and write
4A61000
heap
page read and write
5180000
direct allocation
page execute and read and write
42F1000
heap
page read and write
46D000
unkown
page execute and read and write
584000
heap
page read and write
252000
unkown
page execute and write copy
3F6000
unkown
page execute and read and write
50BE000
stack
page read and write
5070000
direct allocation
page execute and read and write
327F000
stack
page read and write
BBB0000
trusted library allocation
page read and write
3CEE000
stack
page read and write
42F1000
heap
page read and write
584000
heap
page read and write
4B11000
heap
page read and write
5A0000
direct allocation
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
29EF000
stack
page read and write
58BF000
heap
page read and write
42F1000
heap
page read and write
DC7000
unkown
page execute and read and write
3F2F000
stack
page read and write
58E0000
heap
page read and write
338E000
stack
page read and write
4B11000
heap
page read and write
EF8000
stack
page read and write
63D000
heap
page read and write
2BDE000
stack
page read and write
2D30000
direct allocation
page read and write
265000
unkown
page execute and write copy
4951000
heap
page read and write
2D30000
direct allocation
page read and write
42F1000
heap
page read and write
64C000
heap
page read and write
457E000
stack
page read and write
D6C000
unkown
page execute and read and write
4951000
heap
page read and write
B84000
heap
page read and write
2C47000
heap
page read and write
42F1000
heap
page read and write
476000
unkown
page execute and write copy
3E4E000
stack
page read and write
2D30000
direct allocation
page read and write
5090000
direct allocation
page execute and read and write
5130000
direct allocation
page execute and read and write
584000
heap
page read and write
7B8C000
stack
page read and write
494F000
stack
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
58E0000
heap
page read and write
58AB000
heap
page read and write
584000
heap
page read and write
BA28000
heap
page read and write
12CE000
stack
page read and write
7B91000
heap
page read and write
48E0000
direct allocation
page execute and read and write
320F000
stack
page read and write
B96000
unkown
page execute and read and write
4B11000
heap
page read and write
4730000
trusted library allocation
page read and write
DAB000
unkown
page execute and read and write
4B11000
heap
page read and write
61F000
heap
page read and write
458F000
stack
page read and write
E3B000
unkown
page execute and write copy
5F5E000
stack
page read and write
B84000
heap
page read and write
128A1000
heap
page read and write
4B11000
heap
page read and write
33FE000
stack
page read and write
380E000
stack
page read and write
567000
heap
page read and write
51FE000
stack
page read and write
11E1000
heap
page read and write
BC42000
heap
page read and write
42F1000
heap
page read and write
7B9F000
heap
page read and write
450000
unkown
page execute and write copy
58D6000
heap
page read and write
4B11000
heap
page read and write
FD9000
heap
page read and write
500000
unkown
page execute and write copy
B84000
heap
page read and write
12710000
heap
page read and write
4951000
heap
page read and write
2D30000
direct allocation
page read and write
519000
unkown
page execute and read and write
61EB7000
direct allocation
page readonly
58BF000
heap
page read and write
5100000
direct allocation
page execute and read and write
304F000
stack
page read and write
42F1000
heap
page read and write
FC5000
heap
page read and write
B82000
unkown
page execute and read and write
5080000
direct allocation
page execute and read and write
4B11000
heap
page read and write
B21000
unkown
page execute and write copy
40F000
unkown
page execute and read and write
590000
heap
page read and write
58AB000
heap
page read and write
584000
heap
page read and write
B940000
heap
page read and write
4B11000
heap
page read and write
584000
heap
page read and write
42F1000
heap
page read and write
58D2000
heap
page read and write
568F000
stack
page read and write
3F8E000
stack
page read and write
58AF000
heap
page read and write
42F1000
heap
page read and write
11C0000
heap
page read and write
B84000
heap
page read and write
2CA0000
direct allocation
page read and write
4B11000
heap
page read and write
58D2000
heap
page read and write
7BB8000
heap
page read and write
2D30000
direct allocation
page read and write
2CAE000
stack
page read and write
DC5000
unkown
page execute and write copy
58D1000
heap
page read and write
B20000
unkown
page read and write
42F1000
heap
page read and write
584000
heap
page read and write
B84000
heap
page read and write
48CE000
stack
page read and write
D9A000
unkown
page execute and read and write
E49000
unkown
page execute and write copy
B2C000
stack
page read and write
47B000
unkown
page execute and read and write
DBC000
unkown
page execute and read and write
488F000
stack
page read and write
42F1000
heap
page read and write
4B11000
heap
page read and write
58A3000
heap
page read and write
420E000
stack
page read and write
4B11000
heap
page read and write
43FF000
stack
page read and write
4EF0000
direct allocation
page read and write
68D000
heap
page read and write
42A000
unkown
page execute and write copy
1F0000
unkown
page read and write
B84000
heap
page read and write
3C0F000
stack
page read and write
7B97000
heap
page read and write
46A000
unkown
page execute and read and write
F3E000
stack
page read and write
58AB000
heap
page read and write
1F0000
unkown
page readonly
259000
unkown
page write copy
5CA000
heap
page read and write
70152000
unkown
page readonly
5A0000
direct allocation
page read and write
454000
unkown
page execute and write copy
2D40000
heap
page read and write
D9D000
unkown
page execute and read and write
B980000
heap
page read and write
3D1000
unkown
page execute and read and write
B84000
heap
page read and write
38EF000
stack
page read and write
3ACF000
stack
page read and write
58C5000
heap
page read and write
F7A000
heap
page read and write
584000
heap
page read and write
5CCE000
stack
page read and write
F50000
direct allocation
page read and write
3F0000
unkown
page readonly
8CE000
stack
page read and write
368F000
stack
page read and write
B84000
heap
page read and write
42F1000
heap
page read and write
1279C000
stack
page read and write
3DBF000
stack
page read and write
66C0000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
13D7000
heap
page read and write
E30000
unkown
page execute and write copy
42F1000
heap
page read and write
115E000
stack
page read and write
4B11000
heap
page read and write
BAAE000
stack
page read and write
58AA000
heap
page read and write
5100000
direct allocation
page execute and read and write
58E0000
heap
page read and write
66B0000
heap
page read and write
58BD000
heap
page read and write
42F1000
heap
page read and write
582D000
stack
page read and write
641F000
stack
page read and write
584000
heap
page read and write
E20000
unkown
page execute and write copy
36CE000
stack
page read and write
B9A0000
heap
page read and write
4B10000
heap
page read and write
32EE000
stack
page read and write
2E4F000
stack
page read and write
58D6000
heap
page read and write
58D5000
heap
page read and write
4B11000
heap
page read and write
4980000
direct allocation
page execute and read and write
691000
heap
page read and write
B97000
unkown
page execute and write copy
540F000
stack
page read and write
676000
heap
page read and write
E02000
unkown
page execute and read and write
584000
heap
page read and write
50F0000
direct allocation
page execute and read and write
58DB000
heap
page read and write
4951000
heap
page read and write
58E0000
heap
page read and write
302F000
stack
page read and write
8E5000
unkown
page execute and read and write
135E000
stack
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
6A3000
heap
page read and write
4951000
heap
page read and write
58B7000
heap
page read and write
EF3000
stack
page read and write
453F000
stack
page read and write
42F1000
heap
page read and write
B8B000
unkown
page execute and write copy
5F0000
heap
page read and write
11BA000
heap
page read and write
D89000
unkown
page execute and read and write
4951000
heap
page read and write
324E000
stack
page read and write
3D3000
unkown
page execute and write copy
5D10000
heap
page read and write
58BB000
heap
page read and write
48C000
unkown
page execute and read and write
58DE000
heap
page read and write
4951000
heap
page read and write
3BCE000
stack
page read and write
42F1000
heap
page read and write
46B000
unkown
page execute and write copy
310E000
stack
page read and write
4E0B000
stack
page read and write
52FE000
stack
page read and write
687000
heap
page read and write
459000
unkown
page execute and read and write
2B6E000
stack
page read and write
392E000
stack
page read and write
3F6E000
stack
page read and write
58BC000
heap
page read and write
42F1000
heap
page read and write
38FE000
stack
page read and write
48B000
unkown
page execute and write copy
4960000
direct allocation
page execute and read and write
F50000
direct allocation
page read and write
58D2000
heap
page read and write
663000
heap
page read and write
7B96000
heap
page read and write
2CA0000
direct allocation
page read and write
B84000
heap
page read and write
A8B000
stack
page read and write
663000
heap
page read and write
5A0000
direct allocation
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
430F000
stack
page read and write
50B000
unkown
page execute and write copy
58E0000
heap
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
3F6000
unkown
page execute and write copy
58A9000
heap
page read and write
5A0000
direct allocation
page read and write
4A61000
heap
page read and write
47FE000
stack
page read and write
546F000
stack
page read and write
4B11000
heap
page read and write
342E000
stack
page read and write
42F1000
heap
page read and write
58DE000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4951000
heap
page read and write
58E0000
heap
page read and write
4940000
direct allocation
page execute and read and write
4B11000
heap
page read and write
58C5000
heap
page read and write
B84000
heap
page read and write
4951000
heap
page read and write
2CB7000
heap
page read and write
32BE000
stack
page read and write
4A5000
unkown
page execute and read and write
3F6000
unkown
page execute and read and write
B10000
direct allocation
page read and write
39FF000
stack
page read and write
FF4000
heap
page read and write
7BBA000
heap
page read and write
58E0000
heap
page read and write
409000
unkown
page execute and write copy
58C1000
heap
page read and write
2DEE000
stack
page read and write
4B30000
heap
page read and write
403F000
stack
page read and write
58D2000
heap
page read and write
584000
heap
page read and write
6CFB0000
unkown
page read and write
4951000
heap
page read and write
1009000
heap
page read and write
3D0E000
stack
page read and write
4A61000
heap
page read and write
4951000
heap
page read and write
42F1000
heap
page read and write
467F000
stack
page read and write
3BAE000
stack
page read and write
58E0000
heap
page read and write
48B0000
direct allocation
page execute and read and write
7CF000
unkown
page execute and read and write
42F1000
heap
page read and write
123E000
stack
page read and write
4B11000
heap
page read and write
58BE000
heap
page read and write
4951000
heap
page read and write
50B000
unkown
page execute and write copy
4B11000
heap
page read and write
58B1000
heap
page read and write
58C5000
heap
page read and write
58DC000
heap
page read and write
509000
unkown
page execute and read and write
42F1000
heap
page read and write
4951000
heap
page read and write
352F000
stack
page read and write
61DB000
stack
page read and write
5D0E000
stack
page read and write
4F20000
direct allocation
page execute and read and write
4B11000
heap
page read and write
58D3000
heap
page read and write
4951000
heap
page read and write
F40000
heap
page read and write
B10000
direct allocation
page read and write
3D3000
unkown
page execute and write copy
4FA0000
direct allocation
page read and write
584000
heap
page read and write
B942000
heap
page read and write
B930000
trusted library allocation
page read and write
5A0000
direct allocation
page read and write
474000
unkown
page execute and write copy
4B11000
heap
page read and write
41BE000
stack
page read and write
64C000
heap
page read and write
584000
heap
page read and write
4EF0000
direct allocation
page read and write
28EF000
stack
page read and write
58A1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
584000
heap
page read and write
B936000
heap
page read and write
B84000
heap
page read and write
2D47000
heap
page read and write
B84000
heap
page read and write
58E0000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
61ECD000
direct allocation
page readonly
4951000
heap
page read and write
544E000
stack
page read and write
3E2E000
stack
page read and write
B960000
heap
page read and write
374E000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page read and write
4951000
heap
page read and write
252000
unkown
page execute and read and write
4970000
heap
page read and write
584000
heap
page read and write
B82000
unkown
page execute and write copy
4A40000
heap
page read and write
BC4D000
heap
page read and write
58C2000
heap
page read and write
42F1000
heap
page read and write
D9B000
unkown
page execute and write copy
42F1000
heap
page read and write
4951000
heap
page read and write
B84000
heap
page read and write
34FF000
stack
page read and write
5A0000
direct allocation
page read and write
36AE000
stack
page read and write
2C4E000
heap
page read and write
BBAF000
stack
page read and write
D18000
unkown
page execute and read and write
58D1000
heap
page read and write
584000
heap
page read and write
5890000
heap
page read and write
5070000
direct allocation
page execute and read and write
676000
heap
page read and write
58C5000
heap
page read and write
4951000
heap
page read and write
584000
heap
page read and write
5896000
heap
page read and write
42F1000
heap
page read and write
2CA0000
direct allocation
page read and write
4930000
direct allocation
page execute and read and write
678000
heap
page read and write
63A000
unkown
page read and write
4A3F000
stack
page read and write
60A0000
heap
page read and write
25B000
unkown
page execute and write copy
41CF000
stack
page read and write
58C5000
heap
page read and write
42F1000
heap
page read and write
5A0000
direct allocation
page read and write
42F1000
heap
page read and write
FC0000
heap
page read and write
8B2000
unkown
page execute and read and write
4AD4000
heap
page read and write
354F000
stack
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
453000
unkown
page execute and read and write
42F1000
heap
page read and write
4F0000
unkown
page execute and write copy
BC50000
heap
page read and write
377F000
stack
page read and write
4951000
heap
page read and write
58A1000
heap
page read and write
5F1F000
stack
page read and write
266000
unkown
page execute and read and write
11C5000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
584000
heap
page read and write
BA0000
heap
page read and write
139B000
heap
page read and write
11B0000
heap
page read and write
119E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
663000
heap
page read and write
48B000
unkown
page execute and write copy
6A3000
heap
page read and write
E30000
unkown
page execute and write copy
49AC000
heap
page read and write
F50000
direct allocation
page read and write
450000
unkown
page execute and write copy
39CE000
stack
page read and write
4B11000
heap
page read and write
2B5E000
stack
page read and write
D2A000
unkown
page execute and write copy
58C1000
heap
page read and write
42F1000
heap
page read and write
49CF000
stack
page read and write
4970000
direct allocation
page execute and read and write
42F1000
heap
page read and write
676000
heap
page read and write
ACE000
stack
page read and write
3B8F000
stack
page read and write
4B11000
heap
page read and write
B948000
heap
page read and write
BC55000
heap
page read and write
4B11000
heap
page read and write
443E000
stack
page read and write
BB0000
heap
page read and write
3EFF000
stack
page read and write
D84000
unkown
page execute and write copy
42F1000
heap
page read and write
42F1000
heap
page read and write
137E000
stack
page read and write
424000
unkown
page execute and write copy
536E000
stack
page read and write
E32000
unkown
page execute and read and write
46BE000
stack
page read and write
B9C7000
heap
page read and write
503000
unkown
page execute and write copy
584000
heap
page read and write
318F000
stack
page read and write
58E0000
heap
page read and write
584000
heap
page read and write
55AD000
stack
page read and write
105F000
heap
page read and write
48E0000
direct allocation
page execute and read and write
503000
unkown
page execute and write copy
6090000
heap
page read and write
42F1000
heap
page read and write
6CFB5000
unkown
page readonly
4F0000
unkown
page execute and write copy
5040000
direct allocation
page execute and read and write
5070000
direct allocation
page execute and read and write
3D1000
unkown
page execute and read and write
4B11000
heap
page read and write
D5A000
unkown
page execute and write copy
B84000
heap
page read and write
48E0000
direct allocation
page execute and read and write
42F1000
heap
page read and write
6CFAF000
unkown
page write copy
CFC000
stack
page read and write
4300000
heap
page read and write
363F000
stack
page read and write
42F1000
heap
page read and write
58AB000
heap
page read and write
48C0000
direct allocation
page execute and read and write
D2F000
unkown
page execute and read and write
1360000
heap
page read and write
F50000
direct allocation
page read and write
5070000
direct allocation
page execute and read and write
42F1000
heap
page read and write
4B11000
heap
page read and write
42F1000
heap
page read and write
58A1000
heap
page read and write
4951000
heap
page read and write
4F3000
unkown
page execute and write copy
106A000
heap
page read and write
4951000
heap
page read and write
474000
unkown
page execute and write copy
4B11000
heap
page read and write
605F000
stack
page read and write
4FDC000
stack
page read and write
6CDD1000
unkown
page execute read
495000
unkown
page execute and write copy
4B11000
heap
page read and write
663000
heap
page read and write
B84000
heap
page read and write
58B7000
heap
page read and write
2EFE000
stack
page read and write
2CA0000
direct allocation
page read and write
58D2000
heap
page read and write
360E000
stack
page read and write
31AE000
stack
page read and write
58BE000
heap
page read and write
46D000
unkown
page execute and read and write
3DEF000
stack
page read and write
554F000
stack
page read and write
7BAB000
heap
page read and write
58D9000
heap
page read and write
475000
unkown
page execute and read and write
25B000
unkown
page execute and write copy
58D2000
heap
page read and write
50B000
unkown
page execute and write copy
450E000
stack
page read and write
2D30000
direct allocation
page read and write
4951000
heap
page read and write
42F1000
heap
page read and write
F5D000
stack
page read and write
42F1000
heap
page read and write
592E000
stack
page read and write
4F8C000
stack
page read and write
5190000
direct allocation
page execute and read and write
66C0000
heap
page read and write
4D2000
unkown
page execute and read and write
4B11000
heap
page read and write
1F0000
unkown
page read and write
52CB000
stack
page read and write
4951000
heap
page read and write
4F30000
direct allocation
page execute and read and write
58C2000
heap
page read and write
1AB000
stack
page read and write
4951000
heap
page read and write
4B11000
heap
page read and write
2F8F000
stack
page read and write
B84000
heap
page read and write
58E0000
heap
page read and write
61E01000
direct allocation
page execute read
58AB000
heap
page read and write
3C7F000
stack
page read and write
6A4000
heap
page read and write
4951000
heap
page read and write
50B000
unkown
page execute and write copy
6CDD0000
unkown
page readonly
42F1000
heap
page read and write
42F1000
heap
page read and write
F50000
direct allocation
page read and write
11BE000
heap
page read and write
8F4000
unkown
page execute and read and write
D01000
unkown
page execute and read and write
42F1000
heap
page read and write
5A0000
direct allocation
page read and write
3E0F000
stack
page read and write
45CE000
stack
page read and write
4B11000
heap
page read and write
2D30000
direct allocation
page read and write
2D30000
direct allocation
page read and write
267000
unkown
page execute and write copy
58D2000
heap
page read and write
42F1000
heap
page read and write
42F1000
heap
page read and write
27EF000
stack
page read and write
104E000
heap
page read and write
584000
heap
page read and write
1F0000
unkown
page readonly
428E000
stack
page read and write
2C40000
heap
page read and write
4951000
heap
page read and write
D98000
unkown
page execute and write copy
4D90000
heap
page read and write
46CF000
stack
page read and write
2A2E000
stack
page read and write
1390000
heap
page read and write
4FA000
stack
page read and write
4951000
heap
page read and write
584000
heap
page read and write
510000
heap
page read and write
408F000
stack
page read and write
128C8000
heap
page read and write
530E000
stack
page read and write
2C4F000
stack
page read and write
54AD000
stack
page read and write
60F000
heap
page read and write
3CCF000
stack
page read and write
474000
unkown
page execute and read and write
3CAF000
stack
page read and write
259000
unkown
page write copy
B89000
unkown
page write copy
B84000
heap
page read and write
E33000
unkown
page execute and write copy
B84000
heap
page read and write
DBB000
unkown
page execute and write copy
8DD000
unkown
page execute and read and write
B8B000
unkown
page execute and read and write
609000
heap
page read and write
640000
heap
page read and write
5170000
direct allocation
page execute and read and write
468000
unkown
page execute and write copy
4951000
heap
page read and write
4A61000
heap
page read and write
42F1000
heap
page read and write
306E000
stack
page read and write
5C2F000
stack
page read and write
317E000
stack
page read and write
F50000
direct allocation
page read and write
252000
unkown
page execute and write copy
42F1000
heap
page read and write
4B11000
heap
page read and write
3B6F000
stack
page read and write
D83000
unkown
page execute and read and write
4F70000
direct allocation
page execute and read and write
676000
heap
page read and write
58E0000
heap
page read and write
700C1000
unkown
page execute read
2E8C000
stack
page read and write
2C4B000
heap
page read and write
58C5000
heap
page read and write
267000
unkown
page execute and write copy
58BB000
heap
page read and write
3FA000
unkown
page execute and write copy
D39000
unkown
page execute and write copy
50E0000
direct allocation
page execute and read and write
3F1000
unkown
page execute and write copy
2D30000
direct allocation
page read and write
584000
heap
page read and write
475000
unkown
page execute and read and write
58C5000
heap
page read and write
67F000
heap
page read and write
4951000
heap
page read and write
353E000
stack
page read and write
D3F000
unkown
page execute and read and write
7BA8000
heap
page read and write
1425000
heap
page read and write
2C20000
direct allocation
page read and write
4B11000
heap
page read and write
476000
unkown
page execute and write copy
509000
unkown
page execute and read and write
3E8000
unkown
page execute and read and write
330E000
stack
page read and write
584000
heap
page read and write
44CF000
stack
page read and write
4B11000
heap
page read and write
4A0E000
stack
page read and write
5160000
direct allocation
page execute and read and write
E23000
unkown
page execute and write copy
42F1000
heap
page read and write
4A60000
heap
page read and write
50DF000
stack
page read and write
8F5000
unkown
page execute and write copy
4D90000
trusted library allocation
page read and write
1063000
heap
page read and write
4B11000
heap
page read and write
497000
unkown
page execute and read and write
58BE000
heap
page read and write
424F000
stack
page read and write
676000
heap
page read and write
4B11000
heap
page read and write
2D30000
direct allocation
page read and write
3FCF000
stack
page read and write
6A3000
heap
page read and write
25B000
unkown
page execute and write copy
B84000
heap
page read and write
48AF000
stack
page read and write
4951000
heap
page read and write
66BE000
heap
page read and write
58C5000
heap
page read and write
D26000
unkown
page execute and write copy
303E000
stack
page read and write
48C000
unkown
page execute and read and write
4951000
heap
page read and write
42F1000
heap
page read and write
DA6000
unkown
page execute and write copy
B84000
heap
page read and write
5070000
direct allocation
page execute and read and write
474F000
stack
page read and write
4B11000
heap
page read and write
58E0000
heap
page read and write
58C0000
heap
page read and write
2CA0000
direct allocation
page read and write
58D2000
heap
page read and write
4B11000
heap
page read and write
2CA0000
direct allocation
page read and write
58B9000
heap
page read and write
4951000
heap
page read and write
B80000
heap
page read and write
62DC000
stack
page read and write
502000
unkown
page execute and read and write
B84000
heap
page read and write
7BA7000
heap
page read and write
4951000
heap
page read and write
313F000
stack
page read and write
DFD000
stack
page read and write
40AE000
stack
page read and write
4B11000
heap
page read and write
584000
heap
page read and write
25B000
unkown
page execute and read and write
4F2E000
stack
page read and write
2C1E000
stack
page read and write
5A0000
direct allocation
page read and write
495000
unkown
page execute and write copy
677000
heap
page read and write
3FF000
unkown
page execute and read and write
584000
heap
page read and write
5120000
direct allocation
page execute and read and write
4B11000
heap
page read and write
584000
heap
page read and write
B89000
unkown
page write copy
42F1000
heap
page read and write
4951000
heap
page read and write
4B11000
heap
page read and write
B84000
heap
page read and write
56ED000
stack
page read and write
2C8E000
stack
page read and write
4B11000
heap
page read and write
58E0000
heap
page read and write
680000
heap
page read and write
689000
heap
page read and write
252000
unkown
page execute and read and write
3B0E000
stack
page read and write
4B11000
heap
page read and write
55EE000
stack
page read and write
4B11000
heap
page read and write
470E000
stack
page read and write
47BF000
stack
page read and write
42F1000
heap
page read and write
409000
unkown
page execute and write copy
5C0000
heap
page read and write
A9A000
unkown
page execute and read and write
4B11000
heap
page read and write
6CF6F000
unkown
page readonly
1F1000
unkown
page execute and write copy
2D30000
direct allocation
page read and write
4B11000
heap
page read and write
4D2000
unkown
page execute and read and write
BA30000
trusted library allocation
page read and write
4951000
heap
page read and write
4F4E000
stack
page read and write
5E1F000
stack
page read and write
519000
unkown
page execute and read and write
90D000
stack
page read and write
4B11000
heap
page read and write
41AF000
stack
page read and write
4951000
heap
page read and write
519000
unkown
page execute and write copy
30CF000
stack
page read and write
FC0000
heap
page read and write
1060000
heap
page read and write
4B0F000
stack
page read and write
438F000
stack
page read and write
259000
unkown
page write copy
48B0000
heap
page read and write
61ED4000
direct allocation
page readonly
42F1000
heap
page read and write
484E000
stack
page read and write
394E000
stack
page read and write
B9BE000
heap
page read and write
B930000
heap
page read and write
414E000
stack
page read and write
584000
heap
page read and write
2B9B000
stack
page read and write
1049000
heap
page read and write
584000
heap
page read and write
5060000
direct allocation
page execute and read and write
13FB000
heap
page read and write
628000
unkown
page execute and read and write
58C4000
heap
page read and write
127E000
stack
page read and write
42F1000
heap
page read and write
4951000
heap
page read and write
41EE000
stack
page read and write
58DE000
heap
page read and write
5120000
direct allocation
page execute and read and write
4B11000
heap
page read and write
4951000
heap
page read and write
519000
unkown
page execute and write copy
58DD000
heap
page read and write
5A0000
direct allocation
page read and write
5CE000
heap
page read and write
58C7000
heap
page read and write
61EB4000
direct allocation
page read and write
42F1000
heap
page read and write
459000
unkown
page execute and read and write
584000
heap
page read and write
F50000
direct allocation
page read and write
58AD000
heap
page read and write
4B11000
heap
page read and write
578D000
stack
page read and write
66B1000
heap
page read and write
434E000
stack
page read and write
61E00000
direct allocation
page execute and read and write
448E000
stack
page read and write
3E8F000
stack
page read and write
42F1000
heap
page read and write
B84000
heap
page read and write
2E4F000
stack
page read and write
4951000
heap
page read and write
130E000
stack
page read and write
4910000
direct allocation
page execute and read and write
5A6C000
stack
page read and write
5070000
direct allocation
page execute and read and write
406F000
stack
page read and write
3B7E000
stack
page read and write
51BF000
stack
page read and write
691000
heap
page read and write
3CBE000
stack
page read and write
7B90000
heap
page read and write
37BE000
stack
page read and write
1370000
heap
page read and write
5120000
direct allocation
page execute and read and write
48FF000
stack
page read and write
388E000
stack
page read and write
3DFE000
stack
page read and write
B9AD000
heap
page read and write
58AB000
heap
page read and write
D3C000
unkown
page execute and write copy
42EF000
stack
page read and write
5A0000
direct allocation
page read and write
5B2E000
stack
page read and write
26EF000
stack
page read and write
61ED3000
direct allocation
page read and write
42F1000
heap
page read and write
106B000
heap
page read and write
684000
heap
page read and write
42F1000
heap
page read and write
5050000
direct allocation
page execute and read and write
DA5000
unkown
page execute and read and write
4B11000
heap
page read and write
468000
unkown
page execute and write copy
4EA0000
trusted library allocation
page read and write
42F1000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
407E000
stack
page read and write
4BC000
unkown
page execute and read and write
42F1000
heap
page read and write
2EBF000
stack
page read and write
480F000
stack
page read and write
42F1000
heap
page read and write
There are 1197 hidden memdumps, click here to show them.