IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\FCGIJKJJKE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFCFBKKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BGDAAEHDHIIJKECBKEBAKKECBK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBAAFCAFCBKFHJJJKKFH
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\FBAAAKFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\HJDAKFBFBFBAAAAAEBKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJDBGDGCGDAKFIDGIDBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFHJJDHJEGHJKECBGCFHDBFIEG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\03e62387-94c2-4dd6-a5e2-e2d607967ff7.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\04ed1eac-581a-4feb-b88c-812f9ea1b75e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\06619cee-eea6-44de-942e-d494b2f443b9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\54f89252-185f-493a-926c-aa42afffa1df.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8ddf908f-c7a0-4d7b-9288-97612a163395.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67562672-10EC.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3785d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF387af.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF387bf.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 22:06:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 22:06:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 22:06:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 22:06:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Dec 8 22:06:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 105
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (3376)
downloaded
Chrome Cache Entry: 107
ASCII text
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 110
SVG Scalable Vector Graphics image
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2192,i,8836495381764225993,18272830813939826502,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2480 --field-trial-handle=2256,i,9315223173467232572,5610375307349414568,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2308 --field-trial-handle=2088,i,7760681380638402633,10401053633401147008,262144 /prefetch:3
malicious
C:\Users\user\Documents\FCGIJKJJKE.exe
"C:\Users\user\Documents\FCGIJKJJKE.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\FCGIJKJJKE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php(B
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.php-24
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.16/mine/random.exexO
unknown
http://www.broofa.com
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.206/9
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll8
unknown
http://185.215.113.206/c4becf79229cb002.phpk
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/ws
unknown
http://185.215.113.43/Zu7JuNko/index.phpR
unknown
https://www.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.43/Zu7JuNko/index.phpB
unknown
http://185.215.113.206/c4becf79229cb002.phpUser
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phprowser
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.php/-
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.217.21.36
https://apis.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php~#
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.206/c4becf79229cb002.phptBw
unknown
http://185.215.113.43/Zu7JuNko/index.phpV#
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.206/68b591d6548ec281/softokn3.dllB
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dlluS
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dllj
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/sqlite3.dllx
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
172.217.21.36
http://185.215.113.206/68b591d6548ec281/softokn3.dllS
unknown
https://www.ecosia.org/newtab/
unknown
http://185.215.113.43/Zu7JuNko/index.php3:#tN
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
172.217.21.36
https://play.google.com/log?format=json&hasfast=true
unknown
http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
http://185.215.113.206/c4becf79229cb002.php?
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.217.21.36
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://185.215.113.206/c4becf79229cb002.phpK
unknown
http://185.215.113.206c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
http://185.215.113.43/rsonation
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dllJ
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.206/c4becf79229cb002.phpX
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www3.l.google.com
172.217.19.206
plus.l.google.com
142.250.181.110
www.google.com
172.217.21.36
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.19.206
www3.l.google.com
United States
185.215.113.16
unknown
Portugal
142.250.181.110
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BE1000
unkown
page execute and read and write
malicious
71000
unkown
page execute and read and write
malicious
4A30000
direct allocation
page read and write
malicious
DDE000
heap
page read and write
malicious
D81000
unkown
page execute and read and write
malicious
BE1000
unkown
page execute and read and write
malicious
DCE000
unkown
page execute and read and write
4DB0000
heap
page read and write
5505000
heap
page read and write
57DF000
stack
page read and write
C50000
heap
page read and write
B753000
heap
page read and write
E58000
unkown
page execute and write copy
C54000
heap
page read and write
5520000
heap
page read and write
D70000
direct allocation
page read and write
5505000
heap
page read and write
4981000
heap
page read and write
1440000
heap
page read and write
C42000
unkown
page execute and write copy
53B0000
direct allocation
page execute and read and write
50FE000
stack
page read and write
E61000
unkown
page execute and read and write
EF9000
unkown
page execute and write copy
44EE000
stack
page read and write
45B1000
heap
page read and write
4D70000
direct allocation
page read and write
E5A000
unkown
page execute and write copy
DFD000
unkown
page execute and read and write
4981000
heap
page read and write
3FAE000
stack
page read and write
4DA1000
heap
page read and write
DDA000
unkown
page execute and read and write
5520000
heap
page read and write
71000
unkown
page execute and write copy
2A8000
unkown
page execute and read and write
14E4000
heap
page read and write
DB0000
direct allocation
page read and write
45B1000
heap
page read and write
2930000
direct allocation
page read and write
E0B000
unkown
page execute and write copy
53B0000
direct allocation
page execute and read and write
6B3C000
heap
page read and write
4981000
heap
page read and write
4DA1000
heap
page read and write
4981000
heap
page read and write
54FB000
heap
page read and write
E48000
unkown
page execute and read and write
FA2000
unkown
page execute and write copy
130D000
heap
page read and write
6F861000
unkown
page execute read
35DE000
stack
page read and write
3BEF000
stack
page read and write
5450000
direct allocation
page execute and read and write
45B1000
heap
page read and write
2D60000
direct allocation
page execute and read and write
B6B0000
heap
page read and write
3FEE000
stack
page read and write
CB4000
heap
page read and write
4981000
heap
page read and write
C4B000
unkown
page execute and write copy
54FE000
heap
page read and write
321F000
stack
page read and write
54D0000
heap
page read and write
4DA1000
heap
page read and write
12FD000
stack
page read and write
C54000
heap
page read and write
3BBF000
stack
page read and write
5380000
direct allocation
page execute and read and write
CB4000
heap
page read and write
DE2000
unkown
page execute and read and write
EC6000
heap
page read and write
1458000
heap
page read and write
5A6F000
stack
page read and write
4981000
heap
page read and write
6E8000
unkown
page execute and write copy
53F0000
direct allocation
page execute and read and write
146E000
stack
page read and write
449E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1355000
heap
page read and write
425E000
stack
page read and write
CB4000
heap
page read and write
5520000
heap
page read and write
3EAE000
stack
page read and write
FE0000
unkown
page execute and read and write
386E000
stack
page read and write
BE1000
unkown
page execute and write copy
4F3F000
stack
page read and write
4DA1000
heap
page read and write
4D60000
heap
page read and write
C42000
unkown
page execute and write copy
B705000
heap
page read and write
4981000
heap
page read and write
343F000
stack
page read and write
435F000
stack
page read and write
393F000
stack
page read and write
12BD000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4F7E000
stack
page read and write
4DA1000
heap
page read and write
5505000
heap
page read and write
4DA1000
heap
page read and write
C2E000
stack
page read and write
E35000
unkown
page execute and write copy
4DA1000
heap
page read and write
4981000
heap
page read and write
5360000
direct allocation
page execute and read and write
3E6E000
stack
page read and write
4981000
heap
page read and write
3D1F000
stack
page read and write
E22000
heap
page read and write
54FB000
heap
page read and write
4981000
heap
page read and write
4B70000
direct allocation
page execute and read and write
D70000
direct allocation
page read and write
4981000
heap
page read and write
552000
unkown
page execute and write copy
1251C000
stack
page read and write
14E0000
heap
page read and write
4DA1000
heap
page read and write
8AD0000
heap
page read and write
4981000
heap
page read and write
50E4000
heap
page read and write
4DA1000
heap
page read and write
30AE000
stack
page read and write
6F860000
unkown
page readonly
4F60000
direct allocation
page execute and read and write
2930000
direct allocation
page read and write
397E000
stack
page read and write
CB4000
heap
page read and write
E03000
unkown
page execute and read and write
4981000
heap
page read and write
132D000
heap
page read and write
497F000
stack
page read and write
45B1000
heap
page read and write
FF5000
unkown
page execute and write copy
5520000
heap
page read and write
15EF000
stack
page read and write
4DA1000
heap
page read and write
2E7F000
stack
page read and write
4D90000
direct allocation
page read and write
AFE000
stack
page read and write
1087000
unkown
page execute and read and write
5505000
heap
page read and write
526C000
stack
page read and write
648F000
stack
page read and write
4DA1000
heap
page read and write
4D70000
heap
page read and write
E55000
heap
page read and write
C54000
heap
page read and write
45B1000
heap
page read and write
E83000
unkown
page execute and write copy
ECE000
unkown
page execute and read and write
4981000
heap
page read and write
4D90000
direct allocation
page read and write
D70000
direct allocation
page read and write
551B000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
6E7000
unkown
page execute and read and write
3E6F000
stack
page read and write
4AEF000
stack
page read and write
4DA1000
heap
page read and write
5230000
direct allocation
page read and write
12CF000
heap
page read and write
54E2000
heap
page read and write
FCE000
stack
page read and write
EC5000
heap
page read and write
4CFF000
stack
page read and write
56DE000
stack
page read and write
F8A000
unkown
page execute and read and write
2F6E000
stack
page read and write
16AF000
stack
page read and write
4DA1000
heap
page read and write
ECE000
unkown
page execute and read and write
3E7E000
stack
page read and write
C57000
unkown
page execute and write copy
61ECC000
direct allocation
page read and write
5390000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
CB4000
heap
page read and write
45B1000
heap
page read and write
346F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
489E000
stack
page read and write
4DA1000
heap
page read and write
31AF000
stack
page read and write
E61000
unkown
page execute and read and write
3D6E000
stack
page read and write
4981000
heap
page read and write
54FB000
heap
page read and write
4981000
heap
page read and write
473E000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
51FC000
stack
page read and write
4D81000
heap
page read and write
CB4000
heap
page read and write
4981000
heap
page read and write
4ADF000
stack
page read and write
4981000
heap
page read and write
125000
unkown
page execute and read and write
4981000
heap
page read and write
1343000
heap
page read and write
C54000
heap
page read and write
5210000
direct allocation
page read and write
132D000
heap
page read and write
6B44000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
CB4000
heap
page read and write
5410000
direct allocation
page execute and read and write
45B1000
heap
page read and write
11DE000
stack
page read and write
4DA1000
heap
page read and write
CB4000
heap
page read and write
675B000
stack
page read and write
411E000
stack
page read and write
DB0000
direct allocation
page read and write
4DA1000
heap
page read and write
6F8EE000
unkown
page read and write
5520000
heap
page read and write
45B1000
heap
page read and write
2930000
direct allocation
page read and write
4981000
heap
page read and write
45B1000
heap
page read and write
36EF000
stack
page read and write
54ED000
heap
page read and write
349E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
551D000
heap
page read and write
53E0000
direct allocation
page execute and read and write
4981000
heap
page read and write
4981000
heap
page read and write
B7A9000
heap
page read and write
4981000
heap
page read and write
E40000
unkown
page execute and read and write
45D0000
heap
page read and write
14E4000
heap
page read and write
1270000
heap
page read and write
510000
unkown
page execute and read and write
B743000
heap
page read and write
C54000
heap
page read and write
1089000
unkown
page execute and write copy
4981000
heap
page read and write
2D77000
heap
page read and write
CB4000
heap
page read and write
4D90000
direct allocation
page read and write
12D0000
heap
page read and write
4990000
heap
page read and write
487E000
stack
page read and write
763E000
heap
page read and write
7F0000
heap
page read and write
5440000
direct allocation
page execute and read and write
45B5000
heap
page read and write
45B1000
heap
page read and write
FF0000
heap
page read and write
B9DB000
heap
page read and write
2BA000
unkown
page write copy
D70000
direct allocation
page read and write
54FF000
heap
page read and write
F84000
unkown
page execute and write copy
D70000
direct allocation
page read and write
5390000
direct allocation
page execute and read and write
13C000
unkown
page execute and read and write
333E000
stack
page read and write
E38000
heap
page read and write
4981000
heap
page read and write
3120000
heap
page read and write
E68000
unkown
page execute and write copy
3ABE000
stack
page read and write
E55000
unkown
page execute and write copy
DB0000
direct allocation
page read and write
436E000
stack
page read and write
C54000
heap
page read and write
4D90000
direct allocation
page read and write
2D7E000
heap
page read and write
54DF000
heap
page read and write
4DA1000
heap
page read and write
381F000
stack
page read and write
4DA1000
heap
page read and write
41FF000
stack
page read and write
DB0000
direct allocation
page read and write
4DA1000
heap
page read and write
4981000
heap
page read and write
31BF000
stack
page read and write
12F4000
heap
page read and write
308F000
stack
page read and write
45B1000
heap
page read and write
F79000
unkown
page execute and write copy
45B1000
heap
page read and write
50E0000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
F4E000
unkown
page execute and write copy
12FD000
stack
page read and write
4981000
heap
page read and write
FB6000
unkown
page execute and read and write
FE9000
unkown
page execute and write copy
C57000
unkown
page execute and write copy
53D0000
direct allocation
page execute and read and write
4980000
heap
page read and write
44AF000
stack
page read and write
E85000
unkown
page execute and read and write
F4C000
unkown
page execute and read and write
4DA1000
heap
page read and write
7E0000
heap
page read and write
4D90000
direct allocation
page read and write
4B2E000
stack
page read and write
5512000
heap
page read and write
296E000
heap
page read and write
12E9000
heap
page read and write
4981000
heap
page read and write
5512000
heap
page read and write
C54000
heap
page read and write
6F8F2000
unkown
page readonly
342F000
stack
page read and write
E24000
heap
page read and write
4DA1000
heap
page read and write
4981000
heap
page read and write
6C591000
unkown
page execute read
CB4000
heap
page read and write
2BAE000
stack
page read and write
45B1000
heap
page read and write
4981000
heap
page read and write
5420000
direct allocation
page execute and read and write
E75000
heap
page read and write
596E000
stack
page read and write
3BEE000
stack
page read and write
E86000
heap
page read and write
4D70000
direct allocation
page read and write
54E1000
heap
page read and write
54EB000
heap
page read and write
EF9000
unkown
page execute and write copy
4981000
heap
page read and write
552000
unkown
page execute and read and write
C54000
heap
page read and write
B614000
heap
page read and write
551B000
heap
page read and write
476E000
stack
page read and write
1014000
unkown
page execute and read and write
C54000
heap
page read and write
310E000
stack
page read and write
B9D3000
heap
page read and write
FF0000
heap
page read and write
FB9000
unkown
page execute and read and write
5000000
direct allocation
page execute and read and write
4981000
heap
page read and write
5520000
heap
page read and write
4D90000
direct allocation
page read and write
372E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
45B1000
heap
page read and write
EE4000
unkown
page execute and write copy
45B1000
heap
page read and write
4DA1000
heap
page read and write
1345000
heap
page read and write
5520000
heap
page read and write
475E000
stack
page read and write
371E000
stack
page read and write
E7A000
heap
page read and write
B9D3000
heap
page read and write
2B6F000
stack
page read and write
3D2F000
stack
page read and write
396F000
stack
page read and write
17AF000
stack
page read and write
45B1000
heap
page read and write
B6F2000
heap
page read and write
54F2000
heap
page read and write
3E2F000
stack
page read and write
4C5E000
stack
page read and write
3CEF000
stack
page read and write
EE9000
unkown
page execute and write copy
14E4000
heap
page read and write
4981000
heap
page read and write
54FF000
heap
page read and write
36DF000
stack
page read and write
CB4000
heap
page read and write
45B1000
heap
page read and write
130D000
heap
page read and write
37EF000
stack
page read and write
E19000
unkown
page execute and read and write
4981000
heap
page read and write
5520000
heap
page read and write
4F60000
direct allocation
page execute and read and write
559E000
stack
page read and write
45B1000
heap
page read and write
4E3E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
346E000
stack
page read and write
EF9000
unkown
page execute and read and write
C42000
unkown
page execute and read and write
BA0000
heap
page read and write
EE4000
unkown
page execute and write copy
45B1000
heap
page read and write
B761000
heap
page read and write
4981000
heap
page read and write
6C76E000
unkown
page read and write
35AF000
stack
page read and write
E3A000
unkown
page execute and write copy
2F7F000
stack
page read and write
CB4000
heap
page read and write
447F000
stack
page read and write
53E0000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
14DE000
stack
page read and write
4F70000
direct allocation
page execute and read and write
E19000
unkown
page execute and read and write
396E000
stack
page read and write
CB4000
heap
page read and write
4981000
heap
page read and write
C4B000
unkown
page execute and write copy
54F9000
heap
page read and write
53CD000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
4981000
heap
page read and write
1082000
unkown
page execute and write copy
2960000
heap
page read and write
FEB000
unkown
page execute and read and write
FFA000
unkown
page execute and write copy
4981000
heap
page read and write
E59000
unkown
page execute and read and write
5512000
heap
page read and write
4981000
heap
page read and write
4DA1000
heap
page read and write
5512000
heap
page read and write
DEB000
unkown
page execute and write copy
356F000
stack
page read and write
5508000
heap
page read and write
2D0F000
stack
page read and write
5505000
heap
page read and write
53A0000
direct allocation
page execute and read and write
45B1000
heap
page read and write
FD9000
unkown
page execute and read and write
E8C000
heap
page read and write
2F8E000
stack
page read and write
4D81000
heap
page read and write
C49000
unkown
page write copy
D70000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
15F0000
heap
page read and write
DB0000
direct allocation
page read and write
2A6F000
stack
page read and write
45B1000
heap
page read and write
5505000
heap
page read and write
CB4000
heap
page read and write
54E9000
heap
page read and write
D70000
direct allocation
page read and write
3A9F000
stack
page read and write
DCE000
unkown
page execute and write copy
54E2000
heap
page read and write
E73000
unkown
page execute and write copy
54F7000
heap
page read and write
4981000
heap
page read and write
DEB000
unkown
page execute and read and write
C54000
heap
page read and write
4D90000
direct allocation
page read and write
1023000
unkown
page execute and write copy
4981000
heap
page read and write
3F6F000
stack
page read and write
1008000
unkown
page execute and write copy
4DA1000
heap
page read and write
5501000
heap
page read and write
3BFE000
stack
page read and write
3FAF000
stack
page read and write
14E4000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4981000
heap
page read and write
131A000
heap
page read and write
5505000
heap
page read and write
E68000
unkown
page execute and write copy
53F0000
direct allocation
page execute and read and write
45BF000
stack
page read and write
499F000
stack
page read and write
54F3000
heap
page read and write
4981000
heap
page read and write
48AE000
stack
page read and write
4DA1000
heap
page read and write
4D70000
direct allocation
page read and write
4DA1000
heap
page read and write
5520000
heap
page read and write
54F7000
heap
page read and write
B731000
heap
page read and write
5501000
heap
page read and write
CB0000
heap
page read and write
35AE000
stack
page read and write
4B6F000
stack
page read and write
4D70000
direct allocation
page read and write
50B0000
heap
page read and write
4DA1000
heap
page read and write
70000
unkown
page read and write
EE3000
unkown
page execute and read and write
45DF000
stack
page read and write
C42000
unkown
page execute and read and write
4DC0000
trusted library allocation
page read and write
45B1000
heap
page read and write
1357000
heap
page read and write
553000
unkown
page execute and write copy
DD9000
unkown
page execute and write copy
6C775000
unkown
page readonly
E38000
heap
page read and write
125E000
stack
page read and write
E56000
unkown
page execute and read and write
131B000
heap
page read and write
DAE000
unkown
page execute and write copy
CB4000
heap
page read and write
CB4000
heap
page read and write
4B80000
direct allocation
page execute and read and write
332F000
stack
page read and write
551B000
heap
page read and write
54E3000
heap
page read and write
4981000
heap
page read and write
5520000
heap
page read and write
524E000
stack
page read and write
6C590000
unkown
page readonly
EB3000
unkown
page execute and read and write
4D81000
heap
page read and write
5520000
heap
page read and write
C54000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4D70000
direct allocation
page read and write
127E000
heap
page read and write
4981000
heap
page read and write
E02000
unkown
page execute and write copy
B92E000
stack
page read and write
CB4000
heap
page read and write
1099000
unkown
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
4D80000
heap
page read and write
BE0000
unkown
page readonly
EE2000
unkown
page execute and write copy
DEA000
unkown
page execute and read and write
BE0000
unkown
page read and write
CB4000
heap
page read and write
4981000
heap
page read and write
45B1000
heap
page read and write
C49000
unkown
page write copy
E6B000
unkown
page execute and read and write
DE2000
unkown
page execute and write copy
551C000
heap
page read and write
E59000
unkown
page execute and read and write
EE2000
unkown
page execute and write copy
CB4000
heap
page read and write
139E000
stack
page read and write
45B1000
heap
page read and write
6C72F000
unkown
page readonly
45B1000
heap
page read and write
45B1000
heap
page read and write
569F000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4981000
heap
page read and write
C54000
heap
page read and write
5390000
direct allocation
page execute and read and write
44BE000
stack
page read and write
460D000
heap
page read and write
4DA1000
heap
page read and write
DA0000
heap
page read and write
E7F000
heap
page read and write
336E000
stack
page read and write
12ED000
heap
page read and write
40EF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
CB4000
heap
page read and write
4981000
heap
page read and write
DCE000
unkown
page execute and read and write
4FBE000
stack
page read and write
5CFE000
stack
page read and write
45B1000
heap
page read and write
DB0000
direct allocation
page read and write
C54000
heap
page read and write
D5E000
stack
page read and write
4981000
heap
page read and write
437E000
stack
page read and write
1053000
unkown
page execute and read and write
4DA1000
heap
page read and write
D81000
unkown
page execute and write copy
4981000
heap
page read and write
49F0000
trusted library allocation
page read and write
C54000
heap
page read and write
383E000
stack
page read and write
2D50000
direct allocation
page read and write
4981000
heap
page read and write
DAC000
unkown
page execute and read and write
C54000
heap
page read and write
D60000
heap
page read and write
311F000
stack
page read and write
50BF000
stack
page read and write
4981000
heap
page read and write
CB4000
heap
page read and write
3A7F000
stack
page read and write
CB4000
heap
page read and write
106E000
unkown
page execute and read and write
DF7000
unkown
page execute and write copy
DEA000
unkown
page execute and read and write
7630000
heap
page read and write
1357000
heap
page read and write
4981000
heap
page read and write
45B1000
heap
page read and write
4981000
heap
page read and write
4E7D000
stack
page read and write
CFE000
stack
page read and write
422F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
322F000
stack
page read and write
4DA1000
heap
page read and write
E39000
unkown
page execute and read and write
4DE0000
heap
page read and write
E47000
unkown
page execute and write copy
DCE000
unkown
page execute and write copy
5420000
direct allocation
page execute and read and write
49F0000
heap
page read and write
6B2C000
stack
page read and write
45B1000
heap
page read and write
54FF000
heap
page read and write
EE9000
unkown
page execute and write copy
4D70000
direct allocation
page read and write
C54000
heap
page read and write
4D70000
direct allocation
page read and write
E49000
unkown
page execute and write copy
74A0000
heap
page read and write
65CF000
stack
page read and write
E47000
unkown
page execute and write copy
5519000
heap
page read and write
2D70000
heap
page read and write
F6E000
unkown
page execute and read and write
EE9000
unkown
page execute and write copy
BE1000
unkown
page execute and write copy
E40000
unkown
page execute and read and write
FE7000
unkown
page execute and write copy
E03000
unkown
page execute and read and write
CB4000
heap
page read and write
C54000
heap
page read and write
45B1000
heap
page read and write
CB4000
heap
page read and write
13EB000
heap
page read and write
34AE000
stack
page read and write
4981000
heap
page read and write
45B1000
heap
page read and write
4DA1000
heap
page read and write
54FF000
heap
page read and write
4B90000
direct allocation
page execute and read and write
E4B000
unkown
page execute and read and write
439D000
stack
page read and write
4DA1000
heap
page read and write
382E000
stack
page read and write
E74000
unkown
page execute and read and write
335E000
stack
page read and write
C54000
heap
page read and write
DAE000
unkown
page execute and write copy
27AE000
stack
page read and write
4981000
heap
page read and write
DC3000
unkown
page execute and read and write
6CA0000
trusted library allocation
page read and write
14E4000
heap
page read and write
DB0000
direct allocation
page read and write
54F3000
heap
page read and write
437000
unkown
page execute and read and write
536F000
stack
page read and write
4981000
heap
page read and write
4DA1000
heap
page read and write
DE9000
unkown
page write copy
B6F6000
heap
page read and write
45B1000
heap
page read and write
E20000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
61ED0000
direct allocation
page read and write
F63000
unkown
page execute and read and write
4DA1000
heap
page read and write
B6FC000
heap
page read and write
3AAF000
stack
page read and write
142A000
heap
page read and write
4981000
heap
page read and write
DB0000
direct allocation
page read and write
C80000
heap
page read and write
483F000
stack
page read and write
4DA1000
heap
page read and write
5430000
direct allocation
page execute and read and write
D70000
direct allocation
page read and write
2FCE000
stack
page read and write
312D000
heap
page read and write
5503000
heap
page read and write
C54000
heap
page read and write
4981000
heap
page read and write
4D90000
direct allocation
page read and write
EE2000
unkown
page execute and write copy
54FD000
heap
page read and write
40BF000
stack
page read and write
CB4000
heap
page read and write
4E3F000
stack
page read and write
77C000
stack
page read and write
4A6C000
stack
page read and write
D70000
direct allocation
page read and write
54FF000
heap
page read and write
D9E000
stack
page read and write
4981000
heap
page read and write
4D90000
direct allocation
page read and write
45B1000
heap
page read and write
C54000
heap
page read and write
54FA000
heap
page read and write
53B0000
direct allocation
page execute and read and write
1345000
heap
page read and write
EFA000
unkown
page execute and write copy
1320000
heap
page read and write
4DA1000
heap
page read and write
54FF000
heap
page read and write
4981000
heap
page read and write
DB0000
direct allocation
page read and write
B7B0000
trusted library allocation
page read and write
461E000
stack
page read and write
4981000
heap
page read and write
421F000
stack
page read and write
45B1000
heap
page read and write
B6B0000
trusted library allocation
page read and write
296B000
heap
page read and write
4DA1000
heap
page read and write
4D70000
direct allocation
page read and write
2BC000
unkown
page execute and read and write
C54000
heap
page read and write
5520000
heap
page read and write
40DF000
stack
page read and write
54D2000
heap
page read and write
3AAE000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
4981000
heap
page read and write
1001000
unkown
page execute and read and write
E83000
unkown
page execute and write copy
D3E000
stack
page read and write
31EE000
stack
page read and write
8ACC000
stack
page read and write
45B1000
heap
page read and write
54FA000
heap
page read and write
CB4000
heap
page read and write
61E00000
direct allocation
page execute and read and write
C54000
heap
page read and write
35EE000
stack
page read and write
6710000
heap
page read and write
E5A000
unkown
page execute and write copy
5520000
heap
page read and write
32FF000
stack
page read and write
699E000
stack
page read and write
B774000
heap
page read and write
4981000
heap
page read and write
CB4000
heap
page read and write
C54000
heap
page read and write
4981000
heap
page read and write
DAC000
unkown
page execute and read and write
4981000
heap
page read and write
49DE000
stack
page read and write
50B6000
heap
page read and write
4981000
heap
page read and write
E17000
unkown
page execute and write copy
E16000
unkown
page execute and read and write
132D000
heap
page read and write
331F000
stack
page read and write
C4B000
unkown
page execute and read and write
4981000
heap
page read and write
4DA1000
heap
page read and write
45B1000
heap
page read and write
551B000
heap
page read and write
C54000
heap
page read and write
D80000
unkown
page readonly
45B1000
heap
page read and write
4D5F000
stack
page read and write
40FE000
stack
page read and write
61ED3000
direct allocation
page read and write
2950000
direct allocation
page execute and read and write
7640000
heap
page read and write
382F000
stack
page read and write
4DA1000
heap
page read and write
14E4000
heap
page read and write
133B000
heap
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
14E4000
heap
page read and write
399E000
stack
page read and write
12530000
heap
page read and write
E85000
unkown
page execute and read and write
555B000
stack
page read and write
6F8DD000
unkown
page readonly
3D2E000
stack
page read and write
45C0000
heap
page read and write
70000
unkown
page readonly
E02000
unkown
page execute and write copy
DD9000
unkown
page execute and write copy
CB4000
heap
page read and write
4DA1000
heap
page read and write
54EB000
heap
page read and write
ECC000
unkown
page execute and write copy
392F000
stack
page read and write
C54000
heap
page read and write
4981000
heap
page read and write
1448000
heap
page read and write
4D70000
direct allocation
page read and write
E17000
unkown
page execute and write copy
14E4000
heap
page read and write
4981000
heap
page read and write
3ADE000
stack
page read and write
3E3F000
stack
page read and write
B9CB000
heap
page read and write
5520000
heap
page read and write
7640000
heap
page read and write
D70000
direct allocation
page read and write
54E9000
heap
page read and write
5504000
heap
page read and write
6B52000
heap
page read and write
CB4000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
1336000
heap
page read and write
EE9000
unkown
page execute and write copy
4981000
heap
page read and write
4DA1000
heap
page read and write
4981000
heap
page read and write
5400000
direct allocation
page execute and read and write
F7A000
unkown
page execute and read and write
ECC000
unkown
page execute and write copy
CB4000
heap
page read and write
4981000
heap
page read and write
5600000
trusted library allocation
page read and write
DDA000
unkown
page execute and read and write
C54000
heap
page read and write
307F000
stack
page read and write
1263C000
stack
page read and write
45B0000
heap
page read and write
4981000
heap
page read and write
B57C000
heap
page read and write
B82E000
stack
page read and write
E6B000
heap
page read and write
300E000
stack
page read and write
4981000
heap
page read and write
C49000
unkown
page write copy
4DA1000
heap
page read and write
B9D9000
heap
page read and write
E0B000
unkown
page execute and write copy
3F9F000
stack
page read and write
2CAF000
stack
page read and write
36AF000
stack
page read and write
CB4000
heap
page read and write
12EC000
heap
page read and write
292E000
stack
page read and write
45B1000
heap
page read and write
446F000
stack
page read and write
CB4000
heap
page read and write
B751000
heap
page read and write
DB0000
direct allocation
page read and write
14E4000
heap
page read and write
4981000
heap
page read and write
4DA1000
heap
page read and write
1082000
unkown
page execute and write copy
EF9000
unkown
page execute and read and write
2CEE000
stack
page read and write
422E000
stack
page read and write
4981000
heap
page read and write
3D3E000
stack
page read and write
CB4000
heap
page read and write
581E000
stack
page read and write
4981000
heap
page read and write
4DA1000
heap
page read and write
5505000
heap
page read and write
436F000
stack
page read and write
357F000
stack
page read and write
4981000
heap
page read and write
130D000
heap
page read and write
4DA1000
heap
page read and write
6BAF000
heap
page read and write
45B1000
heap
page read and write
433F000
stack
page read and write
45B1000
heap
page read and write
539000
unkown
page execute and read and write
1359000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
5410000
direct allocation
page execute and read and write
3FDE000
stack
page read and write
45B1000
heap
page read and write
EE2000
unkown
page execute and write copy
544000
unkown
page execute and read and write
B711000
heap
page read and write
E49000
unkown
page execute and write copy
C4B000
unkown
page execute and read and write
45AF000
stack
page read and write
5602000
heap
page read and write
3E9E000
stack
page read and write
119E000
stack
page read and write
5504000
heap
page read and write
4981000
heap
page read and write
44DE000
stack
page read and write
4981000
heap
page read and write
5390000
direct allocation
page execute and read and write
5501000
heap
page read and write
45B1000
heap
page read and write
1013000
unkown
page execute and write copy
45B1000
heap
page read and write
14E4000
heap
page read and write
28EB000
stack
page read and write
30BE000
stack
page read and write
4981000
heap
page read and write
54E1000
heap
page read and write
45B1000
heap
page read and write
143E000
stack
page read and write
533D000
stack
page read and write
FF8000
unkown
page execute and write copy
6C76F000
unkown
page write copy
4DA1000
heap
page read and write
3110000
heap
page read and write
15FE000
heap
page read and write
462E000
stack
page read and write
426E000
stack
page read and write
4DA1000
heap
page read and write
5509000
heap
page read and write
54FB000
heap
page read and write
54FD000
heap
page read and write
EE3000
unkown
page execute and read and write
35BE000
stack
page read and write
45EF000
stack
page read and write
4D70000
direct allocation
page read and write
E55000
unkown
page execute and write copy
5520000
heap
page read and write
E6B000
unkown
page execute and read and write
CB4000
heap
page read and write
135D000
heap
page read and write
5512000
heap
page read and write
45B1000
heap
page read and write
39AE000
stack
page read and write
4981000
heap
page read and write
CB4000
heap
page read and write
3CFF000
stack
page read and write
359F000
stack
page read and write
3FBD000
stack
page read and write
45FE000
stack
page read and write
54FF000
heap
page read and write
4981000
heap
page read and write
51C0000
trusted library allocation
page read and write
4DA1000
heap
page read and write
AF7000
stack
page read and write
4C2F000
stack
page read and write
4DA1000
heap
page read and write
FF6000
unkown
page execute and read and write
61E01000
direct allocation
page execute read
CB4000
heap
page read and write
45B1000
heap
page read and write
4DB5000
heap
page read and write
45B1000
heap
page read and write
5520000
heap
page read and write
1025000
unkown
page execute and read and write
FB7000
unkown
page execute and write copy
685C000
stack
page read and write
4981000
heap
page read and write
C54000
heap
page read and write
30CB000
stack
page read and write
345F000
stack
page read and write
4981000
heap
page read and write
5505000
heap
page read and write
53B0000
direct allocation
page execute and read and write
B930000
trusted library allocation
page read and write
E58000
unkown
page execute and write copy
4981000
heap
page read and write
3BDF000
stack
page read and write
3010000
heap
page read and write
41EF000
stack
page read and write
1350000
heap
page read and write
DC3000
unkown
page execute and read and write
5390000
direct allocation
page execute and read and write
332E000
stack
page read and write
3E5F000
stack
page read and write
523D000
stack
page read and write
5BBC000
stack
page read and write
45B1000
heap
page read and write
670F000
stack
page read and write
DE9000
unkown
page write copy
4981000
heap
page read and write
54EB000
heap
page read and write
3F7F000
stack
page read and write
C54000
heap
page read and write
4DA1000
heap
page read and write
31FE000
stack
page read and write
E73000
unkown
page execute and write copy
4981000
heap
page read and write
45B1000
heap
page read and write
DFC000
unkown
page execute and write copy
C54000
heap
page read and write
FF9000
unkown
page execute and read and write
54F7000
heap
page read and write
EE7000
unkown
page execute and read and write
46FF000
stack
page read and write
FE8000
unkown
page execute and read and write
F8C000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
1341000
heap
page read and write
54E2000
heap
page read and write
54EB000
heap
page read and write
D70000
direct allocation
page read and write
A3B000
stack
page read and write
2967000
heap
page read and write
4DA1000
heap
page read and write
12C0000
heap
page read and write
4981000
heap
page read and write
CB4000
heap
page read and write
5512000
heap
page read and write
FAB000
unkown
page execute and write copy
BE0000
unkown
page readonly
45B1000
heap
page read and write
4981000
heap
page read and write
2D4E000
stack
page read and write
4DA1000
heap
page read and write
E48000
unkown
page execute and read and write
CB4000
heap
page read and write
54D6000
heap
page read and write
5390000
direct allocation
page execute and read and write
660E000
stack
page read and write
4C1F000
stack
page read and write
4981000
heap
page read and write
E56000
unkown
page execute and read and write
2D50000
direct allocation
page read and write
1084000
unkown
page execute and write copy
4F40000
direct allocation
page execute and read and write
100B000
unkown
page execute and read and write
CB4000
heap
page read and write
E55000
heap
page read and write
4DA1000
heap
page read and write
36BF000
stack
page read and write
C54000
heap
page read and write
4DA1000
heap
page read and write
4981000
heap
page read and write
F4000
unkown
page execute and read and write
4981000
heap
page read and write
C54000
heap
page read and write
4D90000
direct allocation
page read and write
1099000
unkown
page execute and write copy
638E000
stack
page read and write
132E000
heap
page read and write
4D70000
direct allocation
page read and write
4D70000
direct allocation
page read and write
7631000
heap
page read and write
5505000
heap
page read and write
DE4000
unkown
page execute and write copy
C54000
heap
page read and write
4981000
heap
page read and write
5520000
heap
page read and write
DB0000
direct allocation
page read and write
3BAF000
stack
page read and write
28AF000
stack
page read and write
54F2000
heap
page read and write
5370000
direct allocation
page execute and read and write
61ED4000
direct allocation
page readonly
5520000
heap
page read and write
5508000
heap
page read and write
54E1000
heap
page read and write
109A000
unkown
page execute and write copy
4DA1000
heap
page read and write
412E000
stack
page read and write
4981000
heap
page read and write
395F000
stack
page read and write
13D0000
heap
page read and write
CB4000
heap
page read and write
DD0000
heap
page read and write
4D70000
direct allocation
page read and write
1335000
heap
page read and write
43AE000
stack
page read and write
40AF000
stack
page read and write
C54000
heap
page read and write
2F2F000
stack
page read and write
44AE000
stack
page read and write
4D70000
direct allocation
page read and write
DE4000
unkown
page execute and write copy
BE0000
unkown
page read and write
E35000
unkown
page execute and write copy
1341000
heap
page read and write
FD5000
unkown
page execute and write copy
4D90000
direct allocation
page read and write
37FF000
stack
page read and write
3C1E000
stack
page read and write
36EE000
stack
page read and write
B6B0000
trusted library allocation
page read and write
3127000
heap
page read and write
3017000
heap
page read and write
D70000
direct allocation
page read and write
64CE000
stack
page read and write
13E0000
heap
page read and write
3D5E000
stack
page read and write
5230000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
486F000
stack
page read and write
14E4000
heap
page read and write
E3A000
unkown
page execute and write copy
14E4000
heap
page read and write
5ABD000
stack
page read and write
4DA1000
heap
page read and write
E4B000
unkown
page execute and read and write
DDA000
heap
page read and write
45B1000
heap
page read and write
4B1E000
stack
page read and write
54FC000
heap
page read and write
5505000
heap
page read and write
13DE000
stack
page read and write
472F000
stack
page read and write
AF2000
stack
page read and write
C54000
heap
page read and write
49AF000
stack
page read and write
471F000
stack
page read and write
DB0000
direct allocation
page read and write
B708000
heap
page read and write
45B1000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
53B0000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
6C770000
unkown
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1357000
heap
page read and write
121E000
stack
page read and write
127A000
heap
page read and write
551D000
heap
page read and write
148E000
stack
page read and write
B6F4000
heap
page read and write
14E4000
heap
page read and write
54FB000
heap
page read and write
1083000
unkown
page execute and read and write
2F8F000
stack
page read and write
61EB4000
direct allocation
page read and write
61ECD000
direct allocation
page readonly
D70000
direct allocation
page read and write
1089000
unkown
page execute and write copy
130D000
heap
page read and write
C54000
heap
page read and write
4981000
heap
page read and write
ED4000
unkown
page execute and write copy
4BFE000
stack
page read and write
E72000
heap
page read and write
14E4000
heap
page read and write
5380000
direct allocation
page execute and read and write
DB0000
direct allocation
page read and write
4981000
heap
page read and write
551B000
heap
page read and write
5430000
direct allocation
page execute and read and write
15FA000
heap
page read and write
4DA1000
heap
page read and write
2DEF000
stack
page read and write
45B1000
heap
page read and write
3C2E000
stack
page read and write
FA3000
unkown
page execute and read and write
54FB000
heap
page read and write
E16000
unkown
page execute and read and write
5505000
heap
page read and write
4981000
heap
page read and write
521C000
stack
page read and write
4DA1000
heap
page read and write
2BA000
unkown
page read and write
C54000
heap
page read and write
4981000
heap
page read and write
4D90000
direct allocation
page read and write
347E000
stack
page read and write
E39000
unkown
page execute and read and write
54FF000
heap
page read and write
54EB000
heap
page read and write
4981000
heap
page read and write
54CD000
stack
page read and write
4DA1000
heap
page read and write
EE7000
unkown
page execute and read and write
C49000
unkown
page write copy
5BFD000
stack
page read and write
B6F1000
heap
page read and write
385E000
stack
page read and write
4C6E000
stack
page read and write
4DA1000
heap
page read and write
49EE000
stack
page read and write
12B6000
heap
page read and write
145D000
heap
page read and write
4DA1000
heap
page read and write
3AEE000
stack
page read and write
C54000
heap
page read and write
54EB000
heap
page read and write
4DB2000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
4981000
heap
page read and write
14E4000
heap
page read and write
5512000
heap
page read and write
50B5000
heap
page read and write
E74000
unkown
page execute and read and write
534F000
stack
page read and write
EFA000
unkown
page execute and write copy
4DA1000
heap
page read and write
5505000
heap
page read and write
D70000
direct allocation
page read and write
CB4000
heap
page read and write
B6D0000
heap
page read and write
5512000
heap
page read and write
FDA000
unkown
page execute and write copy
EB3000
unkown
page execute and read and write
306F000
stack
page read and write
B3A000
stack
page read and write
2E2E000
stack
page read and write
5400000
direct allocation
page execute and read and write
5210000
direct allocation
page read and write
1D7000
unkown
page execute and read and write
ED4000
unkown
page execute and write copy
106C000
unkown
page execute and write copy
4981000
heap
page read and write
3A6F000
stack
page read and write
1074000
unkown
page execute and write copy
F6E000
unkown
page execute and write copy
D80000
unkown
page read and write
591E000
stack
page read and write
4981000
heap
page read and write
485F000
stack
page read and write
423E000
stack
page read and write
F8C000
stack
page read and write
4DA1000
heap
page read and write
4DC0000
heap
page read and write
32EE000
stack
page read and write
51E0000
trusted library allocation
page read and write
4D3E000
stack
page read and write
36FE000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
45B1000
heap
page read and write
4DA0000
heap
page read and write
40EE000
stack
page read and write
4981000
heap
page read and write
4D6F000
stack
page read and write
4DA1000
heap
page read and write
432F000
stack
page read and write
689E000
stack
page read and write
B70E000
heap
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
DB0000
direct allocation
page read and write
CB4000
heap
page read and write
45B1000
heap
page read and write
There are 1224 hidden memdumps, click here to show them.