IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\HIDHIEGIII.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGIJDGCA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBFBFBFIIJDAKECAKKJEHCFIJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIJEGDBGDBFIJKECBAKF
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\HJEHIJEBKEBFBFHIIDHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDGIJEGHDAECAKECAFCA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IIEHCFIDHIDGIDHJEHIDAECFHD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JDAFBKEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4e5c3ea1-b836-4210-b686-97407dcd5ea2.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\68653027-5d4a-4ee9-af92-6e135aee8472.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\854e48dd-ca0a-42f4-85b1-d8a64038d4bc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\93155141-6720-4a83-9676-03583f9ec586.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-675726D3-784.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38bc6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF38be5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF394de.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d369303c-13f3-4ab9-b4aa-ed77208a53ea.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 84
ASCII text, with very long lines (3339)
downloaded
Chrome Cache Entry: 85
ASCII text
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 89
SVG Scalable Vector Graphics image
downloaded
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2172,i,9379353750806782494,3710681808778928881,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2404 --field-trial-handle=2268,i,18147046930143251905,629712067082401529,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2324 --field-trial-handle=2200,i,4519856815945680510,4741741539002150674,262144 /prefetch:3
malicious
C:\Users\user\Documents\HIDHIEGIII.exe
"C:\Users\user\Documents\HIDHIEGIII.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\Documents\HIDHIEGIII.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/68b591d6548ec281/softokn3.dll
185.215.113.206
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php_
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://www.broofa.com
unknown
http://185.215.113.206/c4becf79229cb002.phpc
unknown
http://185.215.113.206/c4becf79229cb002.phpd
unknown
http://185.215.113.206/c4becf79229cb002.phpe
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phps
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://185.215.113.206/c4becf79229cb002.phpq
unknown
http://185.215.113.206/c4becf79229cb002.phpw
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.206/c4becf79229cb002.phpation
unknown
http://185.215.113.206/68b591d6548ec281/freebl3.dll
185.215.113.206
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.181.100
https://apis.google.com
unknown
http://185.215.113.206/c4becf79229cb002.phpam
unknown
http://185.215.113.206ta
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dllLs
unknown
http://www.sqlite.org/copyright.html.
unknown
185.215.113.206/c4becf79229cb002.php
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/c4becf79229cb002.php#
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dll
185.215.113.206
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.181.100
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
http://185.215.113.206/c4becf79229cb002.php;
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.181.100
https://play.google.com/log?format=json&hasfast=true
unknown
http://185.215.113.206/c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
http://185.215.113.43/Zu7JuNko/index.phpt
unknown
http://185.215.113.206/c4becf79229cb002.php?
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.181.100
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/c4becf79229cb002.phpG
unknown
http://185.215.113.43/a
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://185.215.113.206c4becf79229cb002.phpd2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll9n
unknown
http://185.215.113.206/c4becf79229cb002.phpO
unknown
https://support.mozilla.org
unknown
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.php/;p
unknown
http://185.215.113.206/c4becf79229cb002.phpes;C:
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
172.217.17.78
play.google.com
172.217.19.238
www.google.com
142.250.181.100
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
172.217.17.78
plus.l.google.com
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
154E000
heap
page read and write
malicious
51F0000
direct allocation
page read and write
malicious
7D1000
unkown
page execute and read and write
malicious
781000
unkown
page execute and read and write
malicious
841000
unkown
page execute and read and write
malicious
7D1000
unkown
page execute and read and write
malicious
7D1000
unkown
page execute and read and write
malicious
2F5E000
stack
page read and write
9E9000
unkown
page execute and read and write
754000
heap
page read and write
3E0E000
stack
page read and write
2ACF000
stack
page read and write
EA0000
direct allocation
page read and write
A5D000
unkown
page execute and read and write
11BE000
stack
page read and write
1010000
direct allocation
page read and write
7D0000
unkown
page readonly
4931000
heap
page read and write
1034000
heap
page read and write
9FA000
unkown
page execute and write copy
847000
unkown
page execute and write copy
99C000
unkown
page execute and read and write
4931000
heap
page read and write
1010000
direct allocation
page read and write
BC62000
heap
page read and write
2F8F000
stack
page read and write
4751000
heap
page read and write
302F000
stack
page read and write
4931000
heap
page read and write
A73000
unkown
page execute and write copy
1010000
direct allocation
page read and write
3A6E000
stack
page read and write
A72000
unkown
page execute and read and write
152E000
stack
page read and write
AC3000
unkown
page execute and write copy
12F8000
stack
page read and write
29C7000
heap
page read and write
754000
heap
page read and write
9F6000
unkown
page execute and write copy
1255000
heap
page read and write
832000
unkown
page execute and write copy
125E000
heap
page read and write
1034000
heap
page read and write
154A000
heap
page read and write
9C3000
unkown
page execute and read and write
5190000
trusted library allocation
page read and write
1010000
direct allocation
page read and write
682E000
stack
page read and write
EF8000
heap
page read and write
4D51000
heap
page read and write
AEA000
unkown
page execute and read and write
1278000
heap
page read and write
754000
heap
page read and write
846000
unkown
page execute and read and write
1284000
heap
page read and write
3A4F000
stack
page read and write
F2C000
heap
page read and write
4751000
heap
page read and write
13B0000
heap
page read and write
1530000
direct allocation
page read and write
AD4000
unkown
page execute and read and write
1296000
heap
page read and write
4931000
heap
page read and write
754000
heap
page read and write
127C000
heap
page read and write
3CAF000
stack
page read and write
A73000
unkown
page execute and write copy
46E0000
direct allocation
page read and write
EFA000
stack
page read and write
430F000
stack
page read and write
A76000
unkown
page execute and read and write
4931000
heap
page read and write
4931000
heap
page read and write
5B81000
heap
page read and write
A9E000
unkown
page execute and read and write
4B90000
direct allocation
page read and write
81DC000
stack
page read and write
41AF000
stack
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
4D60000
direct allocation
page execute and read and write
344E000
stack
page read and write
9BC000
unkown
page execute and write copy
EA0000
direct allocation
page read and write
FB4000
heap
page read and write
5B77000
heap
page read and write
378F000
stack
page read and write
5200000
direct allocation
page execute and read and write
4D51000
heap
page read and write
4DAC000
heap
page read and write
3C4E000
stack
page read and write
5B67000
heap
page read and write
4940000
heap
page read and write
5B64000
heap
page read and write
AB7000
unkown
page execute and write copy
324F000
stack
page read and write
4751000
heap
page read and write
13E0000
heap
page read and write
35CE000
stack
page read and write
754000
heap
page read and write
2CA0000
heap
page read and write
BCF0000
trusted library allocation
page read and write
1010000
direct allocation
page read and write
3ACF000
stack
page read and write
754000
heap
page read and write
4751000
heap
page read and write
1228000
heap
page read and write
480E000
stack
page read and write
839000
unkown
page write copy
342E000
stack
page read and write
492F000
stack
page read and write
6C9F1000
unkown
page execute read
1278000
heap
page read and write
308E000
stack
page read and write
3F4F000
stack
page read and write
AD5000
unkown
page execute and write copy
46E0000
direct allocation
page read and write
5B80000
heap
page read and write
4D51000
heap
page read and write
1284000
heap
page read and write
A8A000
unkown
page write copy
5B73000
heap
page read and write
2DEE000
stack
page read and write
FB4000
heap
page read and write
5B67000
heap
page read and write
4BA1000
heap
page read and write
6C9DE000
unkown
page read and write
4D10000
direct allocation
page execute and read and write
549F000
stack
page read and write
1612000
heap
page read and write
5B62000
heap
page read and write
36CF000
stack
page read and write
532F000
stack
page read and write
46E0000
direct allocation
page read and write
AEB000
unkown
page execute and write copy
1034000
heap
page read and write
A52000
unkown
page execute and read and write
FB4000
heap
page read and write
4D51000
heap
page read and write
4D51000
heap
page read and write
46CF000
stack
page read and write
FB4000
heap
page read and write
125E000
heap
page read and write
A68000
unkown
page execute and read and write
A9B000
unkown
page execute and write copy
46CE000
stack
page read and write
494E000
stack
page read and write
3C0F000
stack
page read and write
4BA1000
heap
page read and write
4D51000
heap
page read and write
4B90000
heap
page read and write
4751000
heap
page read and write
8F5000
unkown
page execute and read and write
61E00000
direct allocation
page execute and read and write
1034000
heap
page read and write
1632000
heap
page read and write
45CF000
stack
page read and write
5B8E000
heap
page read and write
4751000
heap
page read and write
142D000
stack
page read and write
5B73000
heap
page read and write
4751000
heap
page read and write
4931000
heap
page read and write
328F000
stack
page read and write
4B90000
direct allocation
page read and write
9C6000
unkown
page execute and read and write
94C000
unkown
page execute and read and write
5C8F000
heap
page read and write
4931000
heap
page read and write
621E000
stack
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
EA0000
direct allocation
page read and write
4751000
heap
page read and write
1278000
heap
page read and write
A9A000
unkown
page execute and read and write
354F000
stack
page read and write
4931000
heap
page read and write
3BCF000
stack
page read and write
2EEF000
stack
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
5AED000
stack
page read and write
E90000
heap
page read and write
4D51000
heap
page read and write
1278000
heap
page read and write
847000
unkown
page execute and write copy
4930000
heap
page read and write
316F000
stack
page read and write
A9E000
unkown
page execute and read and write
ADC000
unkown
page execute and write copy
1296000
heap
page read and write
FB4000
heap
page read and write
780000
unkown
page read and write
5B77000
heap
page read and write
EAE000
stack
page read and write
37AF000
stack
page read and write
4C0E000
stack
page read and write
AEA000
unkown
page execute and write copy
5B93000
heap
page read and write
414E000
stack
page read and write
4D51000
heap
page read and write
BE2D000
stack
page read and write
4931000
heap
page read and write
754000
heap
page read and write
13D0000
heap
page read and write
A53000
unkown
page execute and write copy
780000
heap
page read and write
A4A000
unkown
page execute and write copy
4D51000
heap
page read and write
2B4F000
stack
page read and write
9C5000
unkown
page execute and write copy
4931000
heap
page read and write
4751000
heap
page read and write
3F8E000
stack
page read and write
5B93000
heap
page read and write
470F000
stack
page read and write
5B9C000
heap
page read and write
1034000
heap
page read and write
4F30000
direct allocation
page execute and read and write
A72000
unkown
page execute and read and write
390F000
stack
page read and write
9B0000
unkown
page execute and write copy
4D51000
heap
page read and write
BC51000
heap
page read and write
780000
unkown
page readonly
4D51000
heap
page read and write
ADC000
unkown
page execute and write copy
5B9C000
heap
page read and write
129F000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4F20000
direct allocation
page execute and read and write
5B6B000
heap
page read and write
754000
heap
page read and write
5030000
direct allocation
page read and write
4FC0000
direct allocation
page execute and read and write
61ED3000
direct allocation
page read and write
5B85000
heap
page read and write
9C0000
unkown
page execute and read and write
A4A000
unkown
page execute and write copy
AEB000
unkown
page execute and write copy
625E000
stack
page read and write
BA0000
heap
page read and write
AB8000
unkown
page execute and read and write
571E000
stack
page read and write
750000
heap
page read and write
83B000
unkown
page execute and read and write
440F000
stack
page read and write
46E0000
direct allocation
page read and write
4931000
heap
page read and write
356E000
stack
page read and write
1034000
heap
page read and write
177F000
stack
page read and write
760000
heap
page read and write
5B9C000
heap
page read and write
65AE000
stack
page read and write
A8C000
unkown
page execute and write copy
1034000
heap
page read and write
66AF000
stack
page read and write
A70000
unkown
page execute and write copy
E60000
heap
page read and write
5B8E000
heap
page read and write
BBF0000
heap
page read and write
5B81000
heap
page read and write
832000
unkown
page execute and read and write
A81000
unkown
page execute and write copy
4931000
heap
page read and write
FB4000
heap
page read and write
301E000
stack
page read and write
A84000
unkown
page execute and read and write
1278000
heap
page read and write
33CF000
stack
page read and write
1034000
heap
page read and write
442F000
stack
page read and write
5B7B000
heap
page read and write
4751000
heap
page read and write
A73000
unkown
page execute and write copy
FB4000
heap
page read and write
A52000
unkown
page execute and read and write
4D51000
heap
page read and write
4931000
heap
page read and write
4751000
heap
page read and write
62AE000
unkown
page read and write
9D8000
unkown
page execute and write copy
3B4F000
stack
page read and write
AD1000
unkown
page execute and write copy
3ACE000
stack
page read and write
9C6000
unkown
page execute and read and write
51B0000
direct allocation
page execute and read and write
4D51000
heap
page read and write
4EEF000
stack
page read and write
430E000
stack
page read and write
59ED000
stack
page read and write
51F0000
direct allocation
page execute and read and write
1034000
heap
page read and write
434F000
stack
page read and write
4B90000
direct allocation
page read and write
4751000
heap
page read and write
1530000
direct allocation
page read and write
4931000
heap
page read and write
A2B000
unkown
page execute and write copy
40AE000
stack
page read and write
1010000
direct allocation
page read and write
BCCE000
heap
page read and write
5B8F000
heap
page read and write
46E0000
direct allocation
page read and write
541F000
stack
page read and write
12CAC000
stack
page read and write
AEB000
unkown
page execute and write copy
5B99000
heap
page read and write
31CE000
stack
page read and write
3A0F000
stack
page read and write
398F000
stack
page read and write
1276000
heap
page read and write
6D01000
heap
page read and write
BC68000
heap
page read and write
3F2F000
stack
page read and write
4931000
heap
page read and write
9CF000
unkown
page execute and write copy
5220000
direct allocation
page execute and read and write
A78000
unkown
page execute and read and write
989000
unkown
page execute and read and write
5370000
direct allocation
page execute and read and write
555C000
stack
page read and write
4D51000
heap
page read and write
EA0000
direct allocation
page read and write
9C3000
unkown
page execute and read and write
A70000
unkown
page execute and write copy
47CF000
stack
page read and write
83B000
unkown
page execute and write copy
408E000
stack
page read and write
8C4000
unkown
page execute and read and write
32CF000
stack
page read and write
344F000
stack
page read and write
516F000
stack
page read and write
46EE000
stack
page read and write
4D51000
heap
page read and write
4931000
heap
page read and write
4D51000
heap
page read and write
BBF0000
trusted library allocation
page read and write
9BF000
unkown
page execute and write copy
61E01000
direct allocation
page execute read
656F000
stack
page read and write
1034000
heap
page read and write
4931000
heap
page read and write
61ECC000
direct allocation
page read and write
348E000
stack
page read and write
4751000
heap
page read and write
4931000
heap
page read and write
4D51000
heap
page read and write
6DD000
stack
page read and write
AD1000
unkown
page execute and write copy
4931000
heap
page read and write
4931000
heap
page read and write
1034000
heap
page read and write
2C8F000
stack
page read and write
FB4000
heap
page read and write
7F5000
unkown
page execute and write copy
41CF000
stack
page read and write
5B69000
heap
page read and write
4D51000
heap
page read and write
4931000
heap
page read and write
4D40000
direct allocation
page execute and read and write
9AF000
unkown
page execute and read and write
4D51000
heap
page read and write
7D1000
unkown
page execute and write copy
5B50000
heap
page read and write
ADA000
unkown
page execute and read and write
3F8F000
stack
page read and write
A4A000
unkown
page execute and write copy
5DC000
stack
page read and write
299B000
stack
page read and write
5B81000
heap
page read and write
EA0000
direct allocation
page read and write
586F000
stack
page read and write
4D51000
heap
page read and write
4D51000
heap
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
2A4F000
stack
page read and write
46F1000
heap
page read and write
4B90000
direct allocation
page read and write
4751000
heap
page read and write
7EB000
unkown
page execute and read and write
334F000
stack
page read and write
4931000
heap
page read and write
7E2000
unkown
page execute and read and write
4D51000
heap
page read and write
D8C000
stack
page read and write
2C5F000
stack
page read and write
4DEE000
stack
page read and write
3E4E000
stack
page read and write
448E000
stack
page read and write
5340000
direct allocation
page execute and read and write
522B000
stack
page read and write
2DCF000
stack
page read and write
121E000
heap
page read and write
3FCF000
stack
page read and write
4D0F000
stack
page read and write
1245000
heap
page read and write
FB4000
heap
page read and write
46E0000
direct allocation
page read and write
81F1000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4931000
heap
page read and write
4D51000
heap
page read and write
1287000
heap
page read and write
4D51000
heap
page read and write
61EB4000
direct allocation
page read and write
5B81000
heap
page read and write
5B90000
heap
page read and write
4B90000
direct allocation
page read and write
4F40000
direct allocation
page execute and read and write
A0D000
unkown
page execute and read and write
80DC000
stack
page read and write
488E000
stack
page read and write
4D51000
heap
page read and write
EA0000
direct allocation
page read and write
4DB0000
direct allocation
page read and write
9C1000
unkown
page execute and write copy
4931000
heap
page read and write
39CE000
stack
page read and write
113E000
stack
page read and write
5190000
direct allocation
page execute and read and write
5B77000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
BC79000
heap
page read and write
ADA000
unkown
page execute and read and write
FB4000
heap
page read and write
7D0000
unkown
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
6D10000
heap
page read and write
4931000
heap
page read and write
4751000
heap
page read and write
4D51000
heap
page read and write
4931000
heap
page read and write
358E000
stack
page read and write
37CE000
stack
page read and write
5B77000
heap
page read and write
A70000
unkown
page execute and write copy
4D51000
heap
page read and write
4751000
heap
page read and write
5B7B000
heap
page read and write
122E000
stack
page read and write
125E000
heap
page read and write
5B7A000
heap
page read and write
6260000
heap
page read and write
4751000
heap
page read and write
12CB1000
heap
page read and write
FB4000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
4751000
heap
page read and write
2FDE000
stack
page read and write
5B81000
heap
page read and write
4751000
heap
page read and write
167E000
stack
page read and write
6C9CD000
unkown
page readonly
380E000
stack
page read and write
AD1000
unkown
page execute and write copy
3CCF000
stack
page read and write
4F2E000
stack
page read and write
4CBF000
stack
page read and write
5B97000
heap
page read and write
4D51000
heap
page read and write
46D0000
heap
page read and write
1287000
heap
page read and write
61EB7000
direct allocation
page readonly
5390000
direct allocation
page execute and read and write
31AE000
stack
page read and write
AC3000
unkown
page execute and write copy
1250000
heap
page read and write
EB0000
heap
page read and write
4BA1000
heap
page read and write
1530000
direct allocation
page read and write
5B6C000
heap
page read and write
4BA1000
heap
page read and write
A2B000
unkown
page execute and write copy
9D8000
unkown
page execute and write copy
BBF0000
trusted library allocation
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
374E000
stack
page read and write
4B90000
direct allocation
page read and write
4751000
heap
page read and write
FB4000
heap
page read and write
4FE0000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
458E000
stack
page read and write
1240000
heap
page read and write
2CA7000
heap
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
9B2000
unkown
page execute and read and write
4DB0000
direct allocation
page execute and read and write
4751000
heap
page read and write
2E0E000
stack
page read and write
BF0000
heap
page read and write
448F000
stack
page read and write
5240000
direct allocation
page execute and read and write
4751000
heap
page read and write
1034000
heap
page read and write
3020000
heap
page read and write
4931000
heap
page read and write
456F000
stack
page read and write
A8C000
unkown
page execute and write copy
A00000
unkown
page execute and read and write
410F000
stack
page read and write
9C1000
unkown
page execute and write copy
482E000
stack
page read and write
754000
heap
page read and write
7D0000
unkown
page read and write
3FCE000
stack
page read and write
161F000
heap
page read and write
4931000
heap
page read and write
4931000
heap
page read and write
7D0000
unkown
page readonly
4EDB000
stack
page read and write
4931000
heap
page read and write
3CEE000
stack
page read and write
388E000
stack
page read and write
FB4000
heap
page read and write
408F000
stack
page read and write
5B8E000
heap
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
41EE000
stack
page read and write
2E1E000
stack
page read and write
1034000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4B90000
direct allocation
page read and write
CEA000
unkown
page execute and read and write
468F000
stack
page read and write
5B6F000
heap
page read and write
2D5F000
stack
page read and write
AD4000
unkown
page execute and read and write
4D51000
heap
page read and write
394E000
stack
page read and write
42CF000
stack
page read and write
10FD000
stack
page read and write
4931000
heap
page read and write
EC6000
unkown
page execute and read and write
1280000
heap
page read and write
95F000
unkown
page execute and read and write
696B000
stack
page read and write
51E0000
direct allocation
page read and write
3E2E000
stack
page read and write
4B90000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
4931000
heap
page read and write
1034000
heap
page read and write
1010000
direct allocation
page read and write
A23000
unkown
page execute and read and write
9F6000
unkown
page execute and write copy
FB4000
heap
page read and write
781000
unkown
page execute and write copy
1296000
heap
page read and write
9AF000
unkown
page execute and read and write
4D51000
heap
page read and write
4D51000
heap
page read and write
537E000
stack
page read and write
8265000
heap
page read and write
4931000
heap
page read and write
4A8E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
5B62000
heap
page read and write
5180000
direct allocation
page execute and read and write
FB4000
heap
page read and write
61ED0000
direct allocation
page read and write
2F4F000
stack
page read and write
531E000
stack
page read and write
4751000
heap
page read and write
D29000
unkown
page execute and write copy
1280000
heap
page read and write
1034000
heap
page read and write
839000
unkown
page write copy
7CE000
stack
page read and write
1276000
heap
page read and write
4751000
heap
page read and write
1276000
heap
page read and write
3E4F000
stack
page read and write
A2D000
unkown
page execute and read and write
A1F000
unkown
page execute and write copy
4C0F000
stack
page read and write
A2D000
unkown
page execute and read and write
46E0000
direct allocation
page read and write
71D000
stack
page read and write
135F000
stack
page read and write
6CBD5000
unkown
page readonly
4D51000
heap
page read and write
A1F000
unkown
page execute and write copy
9DB000
unkown
page execute and write copy
4F50000
direct allocation
page execute and read and write
5B81000
heap
page read and write
2F9C000
stack
page read and write
4BBE000
stack
page read and write
384F000
stack
page read and write
129C000
heap
page read and write
832000
unkown
page execute and write copy
1276000
heap
page read and write
9B2000
unkown
page execute and read and write
2BCF000
stack
page read and write
A76000
unkown
page execute and read and write
2E4F000
stack
page read and write
9B0000
unkown
page execute and write copy
506E000
stack
page read and write
12BAC000
stack
page read and write
83B000
unkown
page execute and write copy
4931000
heap
page read and write
832000
unkown
page execute and read and write
C050000
heap
page read and write
5380000
direct allocation
page execute and read and write
1284000
heap
page read and write
4D51000
heap
page read and write
1530000
direct allocation
page read and write
4931000
heap
page read and write
4751000
heap
page read and write
1296000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4D51000
heap
page read and write
1034000
heap
page read and write
4D00000
direct allocation
page execute and read and write
410E000
stack
page read and write
A8C000
unkown
page execute and read and write
4931000
heap
page read and write
5360000
direct allocation
page execute and read and write
432E000
stack
page read and write
839000
unkown
page write copy
1034000
heap
page read and write
4D51000
heap
page read and write
37EE000
stack
page read and write
4D51000
heap
page read and write
364F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
C09000
unkown
page execute and read and write
545E000
stack
page read and write
4D51000
heap
page read and write
4931000
heap
page read and write
4D51000
heap
page read and write
30CF000
stack
page read and write
384E000
stack
page read and write
D1B000
unkown
page execute and read and write
576E000
stack
page read and write
4931000
heap
page read and write
ADC000
unkown
page execute and write copy
9A6000
unkown
page execute and write copy
561E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
46E0000
direct allocation
page read and write
40CF000
stack
page read and write
4A4F000
stack
page read and write
4931000
heap
page read and write
4D51000
heap
page read and write
4751000
heap
page read and write
A77000
unkown
page execute and write copy
42EF000
stack
page read and write
4751000
heap
page read and write
4D51000
heap
page read and write
988000
unkown
page execute and write copy
4931000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4D51000
heap
page read and write
5B76000
heap
page read and write
1289000
heap
page read and write
4931000
heap
page read and write
5230000
direct allocation
page execute and read and write
4D51000
heap
page read and write
4931000
heap
page read and write
1530000
direct allocation
page read and write
52AF000
stack
page read and write
5B7D000
heap
page read and write
847000
unkown
page execute and write copy
4B90000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
4D4C000
stack
page read and write
13E5000
heap
page read and write
4751000
heap
page read and write
D29000
unkown
page execute and read and write
438D000
stack
page read and write
C048000
heap
page read and write
4D51000
heap
page read and write
EA0000
direct allocation
page read and write
2E20000
heap
page read and write
962000
unkown
page execute and read and write
4D51000
heap
page read and write
306E000
stack
page read and write
1034000
heap
page read and write
4D70000
heap
page read and write
32AF000
stack
page read and write
1034000
heap
page read and write
9AF000
unkown
page execute and read and write
380F000
stack
page read and write
1034000
heap
page read and write
EA0000
direct allocation
page read and write
418F000
stack
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
EB0000
heap
page read and write
314F000
stack
page read and write
4D51000
heap
page read and write
9C6000
unkown
page execute and write copy
51E0000
direct allocation
page execute and read and write
AB7000
unkown
page execute and write copy
4B0E000
stack
page read and write
4931000
heap
page read and write
4B8F000
stack
page read and write
4751000
heap
page read and write
BFB0000
trusted library allocation
page read and write
AEA000
unkown
page execute and write copy
4931000
heap
page read and write
BC74000
heap
page read and write
4751000
heap
page read and write
A73000
unkown
page execute and write copy
BC5F000
heap
page read and write
1010000
direct allocation
page read and write
AD5000
unkown
page execute and write copy
3C8F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
340F000
stack
page read and write
4D51000
heap
page read and write
F3C000
stack
page read and write
4D51000
heap
page read and write
A79000
unkown
page execute and read and write
3A8E000
stack
page read and write
A20000
unkown
page execute and write copy
4BA0000
heap
page read and write
1034000
heap
page read and write
A5D000
unkown
page execute and read and write
569E000
stack
page read and write
4D51000
heap
page read and write
A9A000
unkown
page execute and write copy
434E000
stack
page read and write
A23000
unkown
page execute and write copy
4931000
heap
page read and write
754000
heap
page read and write
FB4000
heap
page read and write
4751000
heap
page read and write
81E6000
heap
page read and write
368F000
stack
page read and write
3A2F000
stack
page read and write
4751000
heap
page read and write
368E000
stack
page read and write
BC70000
heap
page read and write
4751000
heap
page read and write
2F4E000
stack
page read and write
61ECD000
direct allocation
page readonly
841000
unkown
page execute and write copy
4B30000
trusted library allocation
page read and write
4D51000
heap
page read and write
1530000
direct allocation
page read and write
1034000
heap
page read and write
4D80000
direct allocation
page execute and read and write
3B0E000
stack
page read and write
4931000
heap
page read and write
A26000
unkown
page execute and read and write
9B2000
unkown
page execute and read and write
1034000
heap
page read and write
4760000
heap
page read and write
A16000
unkown
page execute and write copy
44CE000
stack
page read and write
4B90000
direct allocation
page read and write
46E0000
direct allocation
page read and write
2F2E000
stack
page read and write
A00000
unkown
page execute and read and write
846000
unkown
page execute and read and write
29CC000
heap
page read and write
A1F000
unkown
page execute and write copy
5B6B000
heap
page read and write
6CB8F000
unkown
page readonly
4D70000
trusted library allocation
page read and write
127C000
heap
page read and write
5B9C000
heap
page read and write
2DDE000
stack
page read and write
123A000
heap
page read and write
FB4000
heap
page read and write
1034000
heap
page read and write
38CF000
stack
page read and write
81E0000
heap
page read and write
1034000
heap
page read and write
6A6C000
stack
page read and write
4751000
heap
page read and write
9BD000
unkown
page execute and read and write
318E000
stack
page read and write
348F000
stack
page read and write
4D51000
heap
page read and write
4751000
heap
page read and write
99E000
unkown
page execute and write copy
15C4000
heap
page read and write
40CE000
stack
page read and write
E3E000
stack
page read and write
1034000
heap
page read and write
5B9C000
heap
page read and write
5210000
direct allocation
page execute and read and write
FB4000
heap
page read and write
10AF000
stack
page read and write
1284000
heap
page read and write
1010000
direct allocation
page read and write
3DEF000
stack
page read and write
FB4000
heap
page read and write
464E000
stack
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
334F000
stack
page read and write
2E8E000
stack
page read and write
999000
unkown
page execute and read and write
B90000
heap
page read and write
1593000
heap
page read and write
3D0E000
stack
page read and write
10BF000
stack
page read and write
51B0000
direct allocation
page execute and read and write
FB4000
heap
page read and write
1280000
heap
page read and write
3F6D000
stack
page read and write
460E000
stack
page read and write
4931000
heap
page read and write
839000
unkown
page write copy
474F000
stack
page read and write
692E000
stack
page read and write
A8A000
unkown
page execute and read and write
47EF000
stack
page read and write
1617000
heap
page read and write
9D8000
unkown
page execute and write copy
5B5D000
heap
page read and write
1530000
direct allocation
page read and write
12F3000
stack
page read and write
5B81000
heap
page read and write
4931000
heap
page read and write
358F000
stack
page read and write
4D00000
direct allocation
page execute and read and write
420F000
stack
page read and write
450E000
stack
page read and write
454F000
stack
page read and write
1540000
heap
page read and write
4931000
heap
page read and write
3B6F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
5B90000
heap
page read and write
AC3000
unkown
page execute and write copy
7D1000
unkown
page execute and write copy
B2B000
stack
page read and write
446E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
13C0000
heap
page read and write
36AE000
stack
page read and write
1530000
direct allocation
page read and write
11C0000
heap
page read and write
4F70000
direct allocation
page execute and read and write
66F3000
heap
page read and write
845000
unkown
page execute and write copy
A16000
unkown
page execute and write copy
FB4000
heap
page read and write
7F6000
unkown
page execute and read and write
5030000
heap
page read and write
EBA000
heap
page read and write
5B8D000
heap
page read and write
4B90000
direct allocation
page read and write
6C951000
unkown
page execute read
4B80000
direct allocation
page read and write
3DCF000
stack
page read and write
5B7A000
heap
page read and write
51A0000
direct allocation
page execute and read and write
4931000
heap
page read and write
EA0000
direct allocation
page read and write
A53000
unkown
page execute and write copy
4D40000
direct allocation
page execute and read and write
1276000
heap
page read and write
6CBCE000
unkown
page read and write
4931000
heap
page read and write
15C4000
heap
page read and write
A79000
unkown
page execute and read and write
304F000
stack
page read and write
94E000
unkown
page execute and write copy
444F000
stack
page read and write
1607000
heap
page read and write
1034000
heap
page read and write
8258000
heap
page read and write
FB4000
heap
page read and write
1010000
direct allocation
page read and write
C050000
heap
page read and write
4ACF000
stack
page read and write
4751000
heap
page read and write
FB4000
heap
page read and write
4C4E000
stack
page read and write
46AF000
stack
page read and write
1624000
heap
page read and write
4D51000
heap
page read and write
46F1000
heap
page read and write
3D0F000
stack
page read and write
BE9E000
stack
page read and write
1010000
direct allocation
page read and write
4D90000
direct allocation
page execute and read and write
4BA1000
heap
page read and write
5B98000
heap
page read and write
6C9E2000
unkown
page readonly
7E9000
unkown
page write copy
E8E000
stack
page read and write
3D8E000
stack
page read and write
4931000
heap
page read and write
4D40000
direct allocation
page execute and read and write
A22000
unkown
page execute and read and write
4931000
heap
page read and write
1530000
direct allocation
page read and write
BC31000
heap
page read and write
FB4000
heap
page read and write
46F1000
heap
page read and write
3A4E000
stack
page read and write
AB7000
unkown
page execute and write copy
5C80000
trusted library allocation
page read and write
43CE000
stack
page read and write
A03000
unkown
page execute and write copy
4751000
heap
page read and write
1276000
heap
page read and write
E67000
heap
page read and write
FB0000
heap
page read and write
38EF000
stack
page read and write
9C1000
unkown
page execute and write copy
123F000
heap
page read and write
1034000
heap
page read and write
304E000
heap
page read and write
5B75000
heap
page read and write
1034000
heap
page read and write
1203000
heap
page read and write
4D51000
heap
page read and write
973000
unkown
page execute and read and write
EBB000
heap
page read and write
498F000
stack
page read and write
484F000
stack
page read and write
1530000
direct allocation
page read and write
4D51000
heap
page read and write
1238000
heap
page read and write
125E000
heap
page read and write
A52000
unkown
page execute and read and write
4D80000
direct allocation
page execute and read and write
840000
unkown
page read and write
9BC000
unkown
page execute and write copy
A85000
unkown
page execute and write copy
7D1000
unkown
page execute and write copy
9C5000
unkown
page execute and write copy
4D51000
heap
page read and write
646F000
stack
page read and write
4931000
heap
page read and write
1280000
heap
page read and write
5B81000
heap
page read and write
4D51000
heap
page read and write
1280000
heap
page read and write
1219000
heap
page read and write
46E0000
direct allocation
page read and write
BFF0000
heap
page read and write
11F0000
heap
page read and write
FB4000
heap
page read and write
4D51000
heap
page read and write
502F000
stack
page read and write
9CE000
unkown
page execute and read and write
4751000
heap
page read and write
9A7000
unkown
page execute and read and write
AB8000
unkown
page execute and read and write
9F6000
unkown
page execute and write copy
3D4E000
stack
page read and write
4751000
heap
page read and write
6265000
heap
page read and write
1227000
heap
page read and write
4750000
heap
page read and write
7F7000
unkown
page execute and write copy
32EE000
stack
page read and write
4F30000
direct allocation
page execute and read and write
1284000
heap
page read and write
4931000
heap
page read and write
5250000
direct allocation
page execute and read and write
35CF000
stack
page read and write
6C950000
unkown
page readonly
5B77000
heap
page read and write
A1E000
unkown
page execute and read and write
123F000
heap
page read and write
3BAE000
stack
page read and write
A77000
unkown
page execute and write copy
2CCE000
stack
page read and write
2B8E000
stack
page read and write
A2B000
unkown
page execute and write copy
A23000
unkown
page execute and read and write
4D51000
heap
page read and write
51AE000
stack
page read and write
4931000
heap
page read and write
4751000
heap
page read and write
9B0000
unkown
page execute and write copy
1284000
heap
page read and write
4B90000
direct allocation
page read and write
FB4000
heap
page read and write
5B77000
heap
page read and write
4931000
heap
page read and write
6DFF000
stack
page read and write
4D40000
direct allocation
page execute and read and write
66F0000
heap
page read and write
1296000
heap
page read and write
AD1000
unkown
page execute and write copy
4D50000
heap
page read and write
976000
unkown
page execute and read and write
13BE000
stack
page read and write
4931000
heap
page read and write
29C0000
heap
page read and write
83B000
unkown
page execute and write copy
1034000
heap
page read and write
A29000
unkown
page execute and read and write
398E000
stack
page read and write
4D51000
heap
page read and write
A53000
unkown
page execute and write copy
4D00000
direct allocation
page execute and read and write
1034000
heap
page read and write
559E000
stack
page read and write
A00000
unkown
page execute and read and write
460F000
stack
page read and write
A02000
unkown
page execute and read and write
4751000
heap
page read and write
4D00000
direct allocation
page execute and read and write
120D000
heap
page read and write
314F000
stack
page read and write
4931000
heap
page read and write
EA0000
direct allocation
page read and write
51E0000
direct allocation
page read and write
C04A000
heap
page read and write
46E0000
direct allocation
page read and write
33EF000
stack
page read and write
3D4F000
stack
page read and write
324E000
stack
page read and write
41CE000
stack
page read and write
4931000
heap
page read and write
4D30000
direct allocation
page execute and read and write
444E000
stack
page read and write
4D51000
heap
page read and write
9D3000
unkown
page execute and read and write
FB4000
heap
page read and write
960000
unkown
page execute and write copy
3E0F000
stack
page read and write
2C9E000
stack
page read and write
5B8F000
heap
page read and write
4B90000
direct allocation
page read and write
4931000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
310E000
stack
page read and write
9BD000
unkown
page execute and read and write
4931000
heap
page read and write
2FCE000
stack
page read and write
4751000
heap
page read and write
1010000
direct allocation
page read and write
846000
unkown
page execute and read and write
4D4F000
stack
page read and write
3A8F000
stack
page read and write
338E000
stack
page read and write
FB4000
heap
page read and write
1034000
heap
page read and write
4D10000
direct allocation
page execute and read and write
6D0E000
heap
page read and write
A1E000
unkown
page execute and read and write
1010000
direct allocation
page read and write
4CF0000
direct allocation
page execute and read and write
1010000
direct allocation
page read and write
4931000
heap
page read and write
832000
unkown
page execute and read and write
2D4E000
stack
page read and write
FB4000
heap
page read and write
516E000
stack
page read and write
99E000
unkown
page execute and write copy
5B52000
heap
page read and write
5030000
direct allocation
page read and write
34CE000
stack
page read and write
5B9C000
heap
page read and write
55DF000
stack
page read and write
4D51000
heap
page read and write
4751000
heap
page read and write
2E47000
heap
page read and write
4751000
heap
page read and write
FB4000
heap
page read and write
740000
heap
page read and write
FB4000
heap
page read and write
3CCE000
stack
page read and write
4D00000
direct allocation
page execute and read and write
51B0000
direct allocation
page execute and read and write
4931000
heap
page read and write
90C000
unkown
page execute and read and write
AD1000
unkown
page execute and write copy
1607000
heap
page read and write
FA0000
heap
page read and write
ADC000
unkown
page execute and write copy
5B79000
heap
page read and write
4D00000
direct allocation
page execute and read and write
4931000
heap
page read and write
EA0000
direct allocation
page read and write
5B9C000
heap
page read and write
4931000
heap
page read and write
FB4000
heap
page read and write
129C000
heap
page read and write
2E40000
heap
page read and write
4D51000
heap
page read and write
4F30000
direct allocation
page execute and read and write
FB4000
heap
page read and write
BCE1000
heap
page read and write
4D20000
direct allocation
page execute and read and write
DF0000
heap
page read and write
4931000
heap
page read and write
29B0000
direct allocation
page read and write
428E000
stack
page read and write
EA0000
direct allocation
page read and write
4931000
heap
page read and write
424F000
stack
page read and write
3C0E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
F0E000
heap
page read and write
5B79000
heap
page read and write
A79000
unkown
page execute and read and write
F15000
heap
page read and write
340E000
stack
page read and write
EA0000
direct allocation
page read and write
11CA000
heap
page read and write
400E000
stack
page read and write
1034000
heap
page read and write
832000
unkown
page execute and write copy
4751000
heap
page read and write
1530000
direct allocation
page read and write
A77000
unkown
page execute and write copy
4D60000
heap
page read and write
438F000
stack
page read and write
9C0000
unkown
page execute and read and write
1530000
direct allocation
page read and write
4D51000
heap
page read and write
2DAF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4BA1000
heap
page read and write
4D51000
heap
page read and write
AEA000
unkown
page execute and write copy
5B67000
heap
page read and write
C042000
heap
page read and write
4931000
heap
page read and write
1034000
heap
page read and write
5B93000
heap
page read and write
1230000
heap
page read and write
350F000
stack
page read and write
83B000
unkown
page execute and read and write
2C0E000
stack
page read and write
318F000
stack
page read and write
4751000
heap
page read and write
9BC000
unkown
page execute and write copy
394F000
stack
page read and write
49CE000
stack
page read and write
1281000
heap
page read and write
9B0000
unkown
page execute and read and write
7D0000
unkown
page read and write
5B81000
heap
page read and write
6CBD0000
unkown
page read and write
4931000
heap
page read and write
1276000
heap
page read and write
4F30000
direct allocation
page execute and read and write
490F000
stack
page read and write
A4E000
unkown
page execute and read and write
ADA000
unkown
page execute and read and write
360E000
stack
page read and write
A16000
unkown
page execute and write copy
366F000
stack
page read and write
46E0000
direct allocation
page read and write
354E000
stack
page read and write
A2D000
unkown
page execute and read and write
96C000
unkown
page execute and write copy
4931000
heap
page read and write
9BF000
unkown
page execute and write copy
5B6B000
heap
page read and write
4751000
heap
page read and write
4931000
heap
page read and write
1034000
heap
page read and write
9DD000
unkown
page execute and read and write
4751000
heap
page read and write
46E0000
direct allocation
page read and write
1034000
heap
page read and write
4770000
heap
page read and write
1034000
heap
page read and write
4D51000
heap
page read and write
4751000
heap
page read and write
FB4000
heap
page read and write
BD2D000
stack
page read and write
1034000
heap
page read and write
51E0000
direct allocation
page read and write
4931000
heap
page read and write
295E000
stack
page read and write
96D000
unkown
page execute and read and write
9D9000
unkown
page execute and read and write
9D9000
unkown
page execute and read and write
1595000
heap
page read and write
4931000
heap
page read and write
4D51000
heap
page read and write
A67000
unkown
page execute and write copy
4751000
heap
page read and write
4931000
heap
page read and write
304F000
stack
page read and write
420E000
stack
page read and write
51C0000
direct allocation
page execute and read and write
32CE000
stack
page read and write
3040000
heap
page read and write
4D51000
heap
page read and write
3ECE000
stack
page read and write
A27000
unkown
page execute and write copy
A8A000
unkown
page read and write
4751000
heap
page read and write
A9E000
unkown
page execute and read and write
139E000
stack
page read and write
4931000
heap
page read and write
D13000
unkown
page execute and read and write
845000
unkown
page execute and write copy
320F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4751000
heap
page read and write
EBE000
heap
page read and write
4751000
heap
page read and write
5B73000
heap
page read and write
11AF000
stack
page read and write
9BF000
unkown
page execute and write copy
4DB0000
direct allocation
page read and write
11CE000
heap
page read and write
1034000
heap
page read and write
4751000
heap
page read and write
4B80000
direct allocation
page read and write
370F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
4D51000
heap
page read and write
ADC000
unkown
page execute and write copy
96F000
unkown
page execute and write copy
304B000
heap
page read and write
1034000
heap
page read and write
59AD000
stack
page read and write
5B81000
heap
page read and write
1034000
heap
page read and write
5034000
heap
page read and write
5B81000
heap
page read and write
46E0000
direct allocation
page read and write
4751000
heap
page read and write
9C6000
unkown
page execute and read and write
EA0000
direct allocation
page read and write
3E8F000
stack
page read and write
E5E000
stack
page read and write
4751000
heap
page read and write
4931000
heap
page read and write
45CE000
stack
page read and write
5B81000
heap
page read and write
4D40000
direct allocation
page execute and read and write
7E9000
unkown
page write copy
5B67000
heap
page read and write
58AD000
stack
page read and write
13CB000
heap
page read and write
9D9000
unkown
page execute and read and write
FB4000
heap
page read and write
5370000
direct allocation
page execute and read and write
4931000
heap
page read and write
839000
unkown
page write copy
66E0000
heap
page read and write
AEA000
unkown
page execute and read and write
61C000
stack
page read and write
4F00000
direct allocation
page execute and read and write
406F000
stack
page read and write
A81000
unkown
page execute and write copy
352F000
stack
page read and write
4B90000
direct allocation
page read and write
4D51000
heap
page read and write
4751000
heap
page read and write
99C000
unkown
page execute and read and write
12CB0000
heap
page read and write
9BD000
unkown
page execute and read and write
4751000
heap
page read and write
4931000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
83B000
unkown
page execute and read and write
1278000
heap
page read and write
100E000
stack
page read and write
4751000
heap
page read and write
6D10000
heap
page read and write
330E000
stack
page read and write
1034000
heap
page read and write
4931000
heap
page read and write
AD4000
unkown
page execute and read and write
ADC000
unkown
page execute and write copy
404F000
stack
page read and write
5B93000
heap
page read and write
5B5B000
heap
page read and write
FB4000
heap
page read and write
506E000
stack
page read and write
121D000
heap
page read and write
6266000
heap
page read and write
754000
heap
page read and write
4751000
heap
page read and write
5B81000
heap
page read and write
4D51000
heap
page read and write
81FE000
heap
page read and write
1034000
heap
page read and write
6C9F0000
unkown
page readonly
4D51000
heap
page read and write
7B0000
heap
page read and write
5B9C000
heap
page read and write
4B90000
direct allocation
page read and write
3F0F000
stack
page read and write
4751000
heap
page read and write
1034000
heap
page read and write
458F000
stack
page read and write
754000
heap
page read and write
4D40000
direct allocation
page execute and read and write
BFE000
stack
page read and write
4751000
heap
page read and write
839000
unkown
page write copy
D2A000
unkown
page execute and write copy
2F0F000
stack
page read and write
5350000
direct allocation
page execute and read and write
7E2000
unkown
page execute and write copy
4751000
heap
page read and write
4931000
heap
page read and write
392E000
stack
page read and write
6D00000
heap
page read and write
A76000
unkown
page execute and read and write
9C5000
unkown
page execute and write copy
4751000
heap
page read and write
9E8000
unkown
page execute and write copy
15A9000
heap
page read and write
3E8E000
stack
page read and write
4751000
heap
page read and write
1277000
heap
page read and write
971000
unkown
page execute and write copy
FB4000
heap
page read and write
127D000
heap
page read and write
970000
unkown
page execute and read and write
1296000
heap
page read and write
7D0000
unkown
page readonly
A1E000
unkown
page execute and read and write
AEA000
unkown
page execute and read and write
158E000
heap
page read and write
2D9E000
stack
page read and write
FB4000
heap
page read and write
5B81000
heap
page read and write
3F4E000
stack
page read and write
1296000
heap
page read and write
4931000
heap
page read and write
424E000
stack
page read and write
4D51000
heap
page read and write
4D51000
heap
page read and write
370E000
stack
page read and write
4751000
heap
page read and write
845000
unkown
page execute and write copy
3047000
heap
page read and write
5B76000
heap
page read and write
1030000
heap
page read and write
4751000
heap
page read and write
A23000
unkown
page execute and read and write
4751000
heap
page read and write
4D40000
direct allocation
page execute and read and write
7EB000
unkown
page execute and write copy
46F0000
heap
page read and write
4F00000
heap
page read and write
FB4000
heap
page read and write
1034000
heap
page read and write
BFE000
stack
page read and write
6CBCF000
unkown
page write copy
A72000
unkown
page execute and read and write
99E000
unkown
page execute and write copy
29B0000
direct allocation
page read and write
1284000
heap
page read and write
390E000
stack
page read and write
BC10000
heap
page read and write
9C0000
unkown
page execute and read and write
99C000
unkown
page execute and read and write
4751000
heap
page read and write
44CF000
stack
page read and write
FB4000
heap
page read and write
36CE000
stack
page read and write
BF9F000
stack
page read and write
AD5000
unkown
page execute and write copy
5B67000
heap
page read and write
A5D000
unkown
page execute and read and write
45AE000
stack
page read and write
3BCE000
stack
page read and write
840000
unkown
page readonly
160D000
heap
page read and write
998000
unkown
page execute and write copy
FB4000
heap
page read and write
4931000
heap
page read and write
474E000
stack
page read and write
1530000
direct allocation
page read and write
4931000
heap
page read and write
4F30000
direct allocation
page execute and read and write
37CF000
stack
page read and write
975000
unkown
page execute and write copy
3B8F000
stack
page read and write
117E000
stack
page read and write
AD1000
unkown
page execute and write copy
9C3000
unkown
page execute and read and write
FB0000
heap
page read and write
15A9000
heap
page read and write
3B8E000
stack
page read and write
1530000
direct allocation
page read and write
5B9C000
heap
page read and write
BC5D000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4931000
heap
page read and write
54DE000
stack
page read and write
FB4000
heap
page read and write
AB8000
unkown
page execute and read and write
There are 1391 hidden memdumps, click here to show them.