IOC Report
sxs.exe

loading gif

Files

File Path
Type
Category
Malicious
sxs.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Windows\noruns.reg
Windows Registry text (Win95 or above)
modified
malicious
C:\Windows\wuauclt.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\wuauclt.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (65465)
dropped
Chrome Cache Entry: 101
ASCII text, with very long lines (380), with no line terminators
downloaded
Chrome Cache Entry: 102
MS Windows icon resource - 2 icons, 16x16, 16 colors, 32x32, 16 colors
downloaded
Chrome Cache Entry: 103
JSON data
dropped
Chrome Cache Entry: 104
ASCII text, with very long lines (1618)
dropped
Chrome Cache Entry: 105
ASCII text, with very long lines (3809)
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (1618)
downloaded
Chrome Cache Entry: 107
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (1618)
downloaded
Chrome Cache Entry: 109
HTML document, ASCII text, with very long lines (12974)
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (53485)
dropped
Chrome Cache Entry: 111
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 112
JSON data
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (380), with no line terminators
dropped
Chrome Cache Entry: 114
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 115
ASCII text, with very long lines (65465)
downloaded
Chrome Cache Entry: 116
MS Windows icon resource - 2 icons, 16x16, 16 colors, 32x32, 16 colors
dropped
Chrome Cache Entry: 117
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 87
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 88
ASCII text, with very long lines (53485)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (57339)
downloaded
Chrome Cache Entry: 90
HTML document, ASCII text, with very long lines (619)
downloaded
Chrome Cache Entry: 91
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 92
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (57339)
dropped
Chrome Cache Entry: 94
HTML document, ASCII text, with very long lines (12970)
downloaded
Chrome Cache Entry: 95
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 96
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 97
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 98
ASCII text, with very long lines (1618)
dropped
Chrome Cache Entry: 99
SVG Scalable Vector Graphics image
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sxs.exe
"C:\Users\user\Desktop\sxs.exe"
malicious
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe"
malicious
C:\Windows\wuauclt.exe
"C:\Windows\wuauclt.exe"
malicious
C:\Windows\SysWOW64\regedit.exe
"C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg
malicious
C:\Windows\wuauclt.exe
"C:\Windows\wuauclt.exe"
malicious
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe"
malicious
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\System32\explorer.exe" http://www.onefordvd.com
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.onefordvd.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2068,i,10012621105845313477,5144001626182359971,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\System32\explorer.exe" http://www.onefordvd.com
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop sharedaccess
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop KVWSC
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" config KVWSC start= disabled
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop KVSrvXP
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" config KVSrvXP start= disabled
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop kavsvc
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" config kavsvc start= disabled
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" config RsRavMon start= disabled
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop sharedaccess
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop RsCCenter
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop KVWSC
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" config RsCCenter start= disabled
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net.exe
"C:\Windows\System32\net.exe" stop RsRavMon
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop KVSrvXP
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop kavsvc
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop RsCCenter
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop RsRavMon
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.onefordvd.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=2004,i,8456847473545843836,6778845690688114268,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" http://www.dvdforone.com
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.dvdforone.com/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2028,i,12403838513569625985,14954567300867270703,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://msg.tmhacker.com/ie.txtZin
unknown
https://syndicatedsearch.goog
unknown
http://1861119.com/1.txt
unknown
http://1861119.com/index.exe$N
unknown
http://www.dvdforone.com/0M
unknown
http://www.xxx.com/qqmsg.txt
unknown
http://1861119.com/ie.txthT;
unknown
http://1861119.com/ie.txt
unknown
http://www.xxx.com/abc.exe
unknown
https://ad-delivery.net/px.gif?ch=2
172.67.69.19
http://msg.tmhacker.com/down.txt
unknown
http://www.xxx.com/ie.txt
unknown
http://1861119.com/ie.txt_
unknown
http://1861119.com/index.exeq#
unknown
https://img1.wsimg.com/parking-lander/static/js/main.5bbf83b7.js
unknown
http://msg.tmhacker.com/tean1.txt8U
unknown
https://www.google.com/pagead/1p-conversion/16521530460/?gad_source=1&adview_type=5
unknown
http://1861119.com/ie.tx
unknown
https://api.aws.parking.godaddy.com/v1/parkingEvents?abp=1&gdabp=true
54.174.215.77
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=lhb5r7xl5det&aqid=1Y_QZrGTL9KnjuwPiPe1wA0&psid=7621175430&pbt=bv&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=4%7C0%7C1541%7C1243%7C284&lle=0&ifv=1&hpt=0
172.217.16.206
http://www.onefordvd.comXV
unknown
https://www.onefordvd.com/lander
http://msg.tmhacker.com/ie.t
unknown
https://login.li
unknown
http://www.dvdforone.com/C:
unknown
http://1861119.com/index.exe
unknown
http://www.om7890.com/mfx/help.exe
unknown
http://www.onefordvd.com/A
unknown
http://www.dvdforone.com/Zy
unknown
http://www.onefordvd.com/s.lll
unknown
https://ad-delivery.net/px.gif?ch=1&e=0.7379176731179411
172.67.69.19
https://ad.doubleclick.net/favicon.ico?ad=300x250&ad_box_=1&adnet=1&showad=1&size=250x250
216.58.206.38
http://www.onefordvd.comop
unknown
https://www.google.com/js/bg/qfimbA0GYhgyETKN2gHT05d-Hpg6wiB8plDJ1aMSf3s.js
216.58.206.68
http://msg.tmhacker.com/ie.txt
unknown
http://1861119.com/index.exeb1
unknown
https://syndicatedsearch.goog/adsense/domains/caf.js?pac=0
142.250.184.238
http://www.gamesrb.com/rbm/help.exe
unknown
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=2gf50ip8fgbm&aqid=1o_QZoOUFf6kjuwPko2JoA0&psid=7621175430&pbt=bv&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=11%7C0%7C1627%7C1343%7C1527&lle=0&ifv=1&hpt=0
172.217.16.206
http://www.onefordvd.com/)
unknown
https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/chevron.svg?c=%230f1c21
142.250.186.161
http://www.onefordvd.com/&
unknown
http://msg.tmhacker.com/ie.txt&
unknown
http://1861119.com/1.txtW
unknown
http://www.dvdforone.com/23
unknown
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=g3yhpaijmirq&aqid=1o_QZoOUFf6kjuwPko2JoA0&psid=7621175430&pbt=bs&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=11%7C0%7C1627%7C1343%7C1527&lle=0&ifv=1&hpt=0
172.217.16.206
http://msg.tmhacker.com/ie.txt)
unknown
http://www.dvdforone.com
unknown
http://domainretailing.com/rg-dsale3p.php?d=onefordvd.com
unknown
http://1861119.com/index.exeE
unknown
http://msg.tmhacker.com/ie.txt-
unknown
http://1861119.com/1.txtO
unknown
http://1861119.com/ie.txt/
unknown
https://www.google.com/adsense/domains/caf.js?abp=1&gdabp=true
142.250.186.68
https://img1.wsimg.com/parking-lander/static/css/main.ef90a627.css
unknown
http://msg.tmhacker.com/ie.txt~n
unknown
http://1861119.com/index.exe0U
unknown
http://w.tw7890.com/
unknown
http://1861119.com/index.exe8
unknown
http://msg.tmhacker.com/tean1.txtJS;.JSE;.WSF;.WSH;#F
unknown
http://msg.tmhacker.com/ie.txtp1
unknown
http://www.dvdforone.com/o
unknown
http://1861119.com/index.exe.
unknown
http://www.onefordvd.com/~
unknown
http://www.onefordvd.com/23M4
unknown
http://www.onefordvd.com/6x
unknown
http://www.onefordvd.com/v
unknown
http://www.dvdforone.com/4b823s
unknown
http://www.onefordvd.com/t
unknown
http://www.onefordvd.com_
unknown
http://www.onefordvd.com/n
unknown
http://www.tw7890.com/twv/help.exehttp://www.om7890.com/mfx/help.exehttp://www.hg7890.com/hgb/help.e
unknown
http://www.onefordvd.com/l
unknown
http://www.onefordvd.come
unknown
https://ad-delivery.net/px.gif?ch=1&e=0.7550573385120041
172.67.69.19
http://www.onefordvd.com/i
unknown
http://msg.tmhacker.com/tean1.txtME
unknown
http://www.onefordvd.com/10
unknown
http://msg.tmhacker.com/down.txtrp
unknown
https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/search.svg?c=%230f1c21
142.250.186.161
http://msg.tmhacker.com/down.txtrj
unknown
http://msg.tmhacker.com/ie.txtSia
unknown
http://www.onefordvd.com/Y
unknown
http://www.onefordvd.com/W
unknown
https://btloader.com/tag?o=5097926782615552&upapi=true
172.67.41.60
http://www.onefordvd.com/lander
15.197.204.56
http://www.dvdforone.com/Vh
unknown
http://1861119.com/ie.txt~
unknown
http://www.tw7890.com/twv/help.exe
unknown
http://1861119.com/ie.txtlate
unknown
http://1861119.com/1.txtnss
unknown
http://www.onefordvd.com/4b823
unknown
http://www.onefordvd.com
unknown
http://msg.tmhacker.com/tean1.txt&
unknown
http://www.dvdforone.comC:
unknown
http://1861119.com/index.exe3N
unknown
http://www.onefordvd.com/c%1
unknown
http://www.dvdforone.com/
unknown
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=11hs6q014uq&aqid=1Y_QZrGTL9KnjuwPiPe1wA0&psid=7621175430&pbt=bs&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=4%7C0%7C1541%7C1243%7C284&lle=0&ifv=1&hpt=0
172.217.16.206
http://msg.tmhacker.com/tean1.txt
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gddomainparking.com
54.174.215.77
google.com
142.250.186.110
syndicatedsearch.goog
172.217.16.206
ad.doubleclick.net
216.58.206.38
www.google.com
142.250.186.68
btloader.com
172.67.41.60
googlehosted.l.googleusercontent.com
142.250.186.161
www.onefordvd.com
15.197.204.56
ad-delivery.net
172.67.69.19
img1.wsimg.com
unknown
1861119.com
unknown
afs.googleusercontent.com
unknown
www.dvdforone.com
unknown
api.aws.parking.godaddy.com
unknown
msg.tmhacker.com
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.68
www.google.com
United States
216.58.206.38
ad.doubleclick.net
United States
192.168.2.4
unknown
unknown
54.174.215.77
gddomainparking.com
United States
192.168.2.5
unknown
unknown
104.26.2.70
unknown
United States
142.250.186.161
googlehosted.l.googleusercontent.com
United States
172.217.16.206
syndicatedsearch.goog
United States
142.250.184.193
unknown
United States
172.67.69.19
ad-delivery.net
United States
15.197.204.56
www.onefordvd.com
United States
172.67.41.60
btloader.com
United States
216.58.206.68
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.166
unknown
United States
142.250.184.238
unknown
United States
There are 6 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoDriveTypeAutoRun
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Microsoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
hx-1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
386E000
stack
page read and write
5E8000
heap
page read and write
2219000
heap
page read and write
2B80000
heap
page read and write
BE0000
heap
page read and write
3000000
heap
page read and write
2F80000
heap
page read and write
2170000
direct allocation
page read and write
66A000
heap
page read and write
27F0000
heap
page read and write
8E5000
heap
page read and write
5F4000
heap
page read and write
534000
heap
page read and write
5D5000
heap
page read and write
26FD000
stack
page read and write
2170000
direct allocation
page read and write
592000
heap
page read and write
4F0000
heap
page read and write
1140000
heap
page read and write
2FBF000
stack
page read and write
8E0000
heap
page read and write
2350000
trusted library allocation
page read and write
23A0000
heap
page read and write
2100000
direct allocation
page read and write
330E000
stack
page read and write
EA4000
heap
page read and write
84B000
heap
page read and write
3140000
heap
page read and write
28BF000
stack
page read and write
5CE000
stack
page read and write
301E000
stack
page read and write
3F0000
heap
page read and write
42B000
unkown
page read and write
23B0000
direct allocation
page read and write
2BD0000
heap
page read and write
25AC000
stack
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
52EF000
stack
page read and write
1E4000
heap
page read and write
27D0000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
2211000
heap
page read and write
21E0000
direct allocation
page read and write
23B0000
direct allocation
page read and write
760000
trusted library allocation
page read and write
2271000
heap
page read and write
1620000
heap
page read and write
2201000
heap
page read and write
2271000
heap
page read and write
23B0000
direct allocation
page read and write
EB6000
heap
page read and write
2DB0000
heap
page read and write
437000
unkown
page read and write
740000
direct allocation
page execute and read and write
2908000
heap
page read and write
294E000
heap
page read and write
150000
heap
page read and write
2271000
heap
page read and write
1E4000
heap
page read and write
30D0000
heap
page read and write
2201000
heap
page read and write
23B0000
direct allocation
page read and write
5F4000
heap
page read and write
2201000
heap
page read and write
29E0000
heap
page read and write
5F4000
heap
page read and write
446000
unkown
page execute and write copy
5F4000
heap
page read and write
2FDF000
stack
page read and write
372E000
stack
page read and write
1E4000
heap
page read and write
303E000
stack
page read and write
2201000
heap
page read and write
2201000
heap
page read and write
2170000
direct allocation
page read and write
F60000
heap
page read and write
2E30000
trusted library allocation
page read and write
1E4000
heap
page read and write
700000
trusted library allocation
page read and write
2FE0000
heap
page read and write
303D000
stack
page read and write
3865000
heap
page read and write
572000
heap
page read and write
1E4000
heap
page read and write
2211000
heap
page read and write
1E4000
heap
page read and write
30D000
stack
page read and write
1205000
heap
page read and write
6F0000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2271000
heap
page read and write
E69000
heap
page read and write
2E7C000
stack
page read and write
3105000
heap
page read and write
2CFC000
stack
page read and write
249E000
stack
page read and write
7D0000
heap
page read and write
E60000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2310000
trusted library allocation
page read and write
5F4000
heap
page read and write
AC000
stack
page read and write
1E4000
heap
page read and write
6F0000
heap
page read and write
2ECF000
stack
page read and write
2201000
heap
page read and write
2B00000
heap
page read and write
23B0000
direct allocation
page read and write
2271000
heap
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
485E000
stack
page read and write
1E4000
heap
page read and write
326E000
stack
page read and write
2BF8000
heap
page read and write
1E4000
heap
page read and write
5DD000
heap
page read and write
2170000
direct allocation
page read and write
2170000
direct allocation
page read and write
238C000
stack
page read and write
534000
heap
page read and write
2310000
trusted library allocation
page read and write
28F8000
heap
page read and write
437000
unkown
page read and write
256B000
stack
page read and write
F6C000
heap
page read and write
2CFF000
stack
page read and write
534000
heap
page read and write
29DD000
heap
page read and write
2100000
direct allocation
page read and write
1E4000
heap
page read and write
600000
heap
page read and write
2200000
heap
page read and write
E00000
heap
page read and write
207C000
stack
page read and write
58F000
heap
page read and write
2271000
heap
page read and write
534000
heap
page read and write
534000
heap
page read and write
2AE0000
heap
page read and write
1E4000
heap
page read and write
5F4000
heap
page read and write
B0B000
stack
page read and write
2E30000
trusted library allocation
page read and write
360000
heap
page read and write
2201000
heap
page read and write
887000
heap
page read and write
2271000
heap
page read and write
1E4000
heap
page read and write
300E000
stack
page read and write
2858000
heap
page read and write
2B40000
heap
page read and write
D50000
remote allocation
page execute and read and write
2E30000
trusted library allocation
page read and write
5F4000
heap
page read and write
30EF000
stack
page read and write
13F0000
heap
page read and write
2201000
heap
page read and write
2FFE000
stack
page read and write
3198000
heap
page read and write
566000
heap
page read and write
BDE000
stack
page read and write
23B0000
direct allocation
page read and write
3080000
heap
page read and write
2845000
heap
page read and write
5F1000
heap
page read and write
1E4000
heap
page read and write
5BF000
heap
page read and write
1E4000
heap
page read and write
610000
heap
page read and write
372C000
stack
page read and write
2CD8000
heap
page read and write
2201000
heap
page read and write
2310000
trusted library allocation
page read and write
2B1D000
stack
page read and write
1AE000
stack
page read and write
1E4000
heap
page read and write
2310000
trusted library allocation
page read and write
30A0000
heap
page read and write
311E000
stack
page read and write
5DA000
heap
page read and write
400000
unkown
page readonly
50D000
stack
page read and write
410000
heap
page read and write
2A4E000
stack
page read and write
533000
direct allocation
page execute and read and write
43D000
stack
page read and write
26BD000
stack
page read and write
745000
direct allocation
page execute and read and write
534000
heap
page read and write
5F1000
heap
page read and write
1E4000
heap
page read and write
4FF000
stack
page read and write
2D10000
heap
page read and write
2170000
direct allocation
page read and write
2CBE000
stack
page read and write
34EE000
stack
page read and write
2750000
heap
page read and write
275E000
stack
page read and write
2E30000
trusted library allocation
page read and write
2100000
direct allocation
page read and write
1E4000
heap
page read and write
FD000
stack
page read and write
256B000
stack
page read and write
E8E000
heap
page read and write
2271000
heap
page read and write
3090000
heap
page read and write
EA9000
heap
page read and write
2860000
heap
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2B8E000
stack
page read and write
6E0000
heap
page read and write
2EA0000
heap
page read and write
2170000
direct allocation
page read and write
2170000
direct allocation
page read and write
2880000
heap
page read and write
2FC5000
heap
page read and write
2F3E000
stack
page read and write
550000
heap
page read and write
307D000
stack
page read and write
348E000
stack
page read and write
2B8E000
stack
page read and write
1E4000
heap
page read and write
F82000
heap
page read and write
2271000
heap
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2B90000
heap
page read and write
2172000
direct allocation
page read and write
317F000
stack
page read and write
2310000
trusted library allocation
page read and write
2201000
heap
page read and write
2FEE000
stack
page read and write
2E30000
trusted library allocation
page read and write
1E0000
heap
page read and write
BD000
stack
page read and write
29CF000
heap
page read and write
2201000
heap
page read and write
2B9D000
stack
page read and write
33B0000
heap
page read and write
534000
heap
page read and write
EB6000
heap
page read and write
5F4000
heap
page read and write
2100000
direct allocation
page read and write
5E8000
heap
page read and write
58B000
heap
page read and write
2C00000
heap
page read and write
51AC000
stack
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
2B60000
heap
page read and write
1E5000
heap
page read and write
2271000
heap
page read and write
760000
trusted library allocation
page read and write
2201000
heap
page read and write
D55000
remote allocation
page execute and read and write
2201000
heap
page read and write
2860000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
438000
unkown
page execute and read and write
2219000
heap
page read and write
5B8000
heap
page read and write
2310000
trusted library allocation
page read and write
1E4000
heap
page read and write
30B0000
heap
page read and write
5F4000
heap
page read and write
21B0000
heap
page read and write
1F7F000
stack
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
296F000
stack
page read and write
2885000
heap
page read and write
29CF000
stack
page read and write
14D5000
heap
page read and write
889000
heap
page read and write
5F4000
heap
page read and write
2ACD000
stack
page read and write
2ED4000
heap
page read and write
2AEF000
stack
page read and write
473E000
stack
page read and write
58E000
stack
page read and write
760000
trusted library allocation
page read and write
1E4000
heap
page read and write
31F0000
heap
page read and write
1E4000
heap
page read and write
29EF000
stack
page read and write
489F000
stack
page read and write
19C000
stack
page read and write
1F0000
heap
page read and write
1E4000
heap
page read and write
27D0000
heap
page read and write
5F0000
heap
page read and write
54F000
stack
page read and write
2840000
heap
page read and write
2B7F000
stack
page read and write
2201000
heap
page read and write
23B0000
direct allocation
page read and write
288E000
stack
page read and write
1E4000
heap
page read and write
5C1000
heap
page read and write
2E30000
trusted library allocation
page read and write
5C1000
heap
page read and write
2E30000
trusted library allocation
page read and write
2201000
heap
page read and write
23B0000
direct allocation
page read and write
6EF000
stack
page read and write
1E4000
heap
page read and write
2A6F000
stack
page read and write
2271000
heap
page read and write
2FBF000
stack
page read and write
1E4000
heap
page read and write
1F0000
heap
page read and write
2201000
heap
page read and write
33C0000
heap
page read and write
338F000
stack
page read and write
534000
heap
page read and write
2CBD000
stack
page read and write
2B5D000
stack
page read and write
2F4F000
stack
page read and write
293F000
stack
page read and write
5F4000
heap
page read and write
2D78000
heap
page read and write
6FF000
stack
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
27DF000
stack
page read and write
520000
heap
page read and write
2310000
trusted library allocation
page read and write
1E4000
heap
page read and write
2211000
heap
page read and write
2271000
heap
page read and write
534000
heap
page read and write
4D10000
heap
page read and write
30DD000
stack
page read and write
2170000
direct allocation
page read and write
58B000
heap
page read and write
1E4000
heap
page read and write
2315000
direct allocation
page execute and read and write
4E0C000
stack
page read and write
2201000
heap
page read and write
2100000
direct allocation
page read and write
2100000
direct allocation
page read and write
520000
heap
page read and write
42B000
unkown
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2211000
heap
page read and write
2310000
trusted library allocation
page read and write
2201000
heap
page read and write
2201000
heap
page read and write
2B4F000
stack
page read and write
2201000
heap
page read and write
5FC000
heap
page read and write
E94000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
2219000
heap
page read and write
2211000
heap
page read and write
508000
heap
page read and write
431000
unkown
page read and write
43B0000
heap
page read and write
2830000
heap
page read and write
2211000
heap
page read and write
515000
heap
page read and write
3C0000
heap
page read and write
2100000
direct allocation
page read and write
88A000
heap
page read and write
820000
heap
page read and write
78E000
stack
page read and write
1E4000
heap
page read and write
2E30000
trusted library allocation
page read and write
2219000
heap
page read and write
1E4000
heap
page read and write
730000
heap
page read and write
2201000
heap
page read and write
2A3E000
stack
page read and write
354F000
stack
page read and write
530000
direct allocation
page execute and read and write
534000
heap
page read and write
1E4000
heap
page read and write
119E000
stack
page read and write
573000
heap
page read and write
28CE000
stack
page read and write
2ED0000
heap
page read and write
2201000
heap
page read and write
2AAC000
stack
page read and write
2271000
heap
page read and write
2934000
heap
page read and write
F10000
heap
page read and write
2271000
heap
page read and write
1F0000
heap
page read and write
1E4000
heap
page read and write
520000
heap
page read and write
1E4000
heap
page read and write
F6D000
heap
page read and write
26E000
stack
page read and write
234E000
stack
page read and write
534000
heap
page read and write
1E4000
heap
page read and write
2A7D000
stack
page read and write
5DA000
heap
page read and write
245E000
stack
page read and write
292E000
heap
page read and write
2219000
heap
page read and write
29E0000
heap
page read and write
1E4000
heap
page read and write
2170000
direct allocation
page read and write
5F4000
heap
page read and write
14AA000
heap
page read and write
534000
heap
page read and write
58F000
heap
page read and write
1E4000
heap
page read and write
3ED000
stack
page read and write
5F4000
heap
page read and write
400000
unkown
page readonly
2D4E000
stack
page read and write
160000
heap
page read and write
2219000
heap
page read and write
1E4000
heap
page read and write
9B000
stack
page read and write
36EE000
stack
page read and write
10AE000
stack
page read and write
1E4000
heap
page read and write
760000
trusted library allocation
page read and write
2C3E000
stack
page read and write
8CF000
stack
page read and write
6A0000
heap
page read and write
400000
unkown
page readonly
2219000
heap
page read and write
1E4000
heap
page read and write
2170000
direct allocation
page read and write
56C000
heap
page read and write
5F0000
direct allocation
page execute and read and write
2BF0000
heap
page read and write
2211000
heap
page read and write
5CA000
heap
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
2C1F000
stack
page read and write
2100000
direct allocation
page read and write
446000
unkown
page execute and write copy
1E4000
heap
page read and write
35C0000
heap
page read and write
23B0000
direct allocation
page read and write
5F4000
heap
page read and write
E98000
heap
page read and write
5F4000
heap
page read and write
2271000
heap
page read and write
2AE000
stack
page read and write
1E4000
heap
page read and write
2AA5000
heap
page read and write
2E30000
trusted library allocation
page read and write
5F4000
heap
page read and write
350000
heap
page read and write
F60000
heap
page read and write
27F5000
heap
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
868000
heap
page read and write
1145000
heap
page read and write
2201000
heap
page read and write
23B0000
direct allocation
page read and write
2219000
heap
page read and write
6E5000
heap
page read and write
9B000
stack
page read and write
2930000
heap
page read and write
29C0000
heap
page read and write
1E4000
heap
page read and write
28FE000
stack
page read and write
2271000
heap
page read and write
534000
heap
page read and write
1E4000
heap
page read and write
28EE000
stack
page read and write
F83000
heap
page read and write
2219000
heap
page read and write
2ADE000
stack
page read and write
438000
unkown
page execute and write copy
2E4F000
stack
page read and write
2330000
direct allocation
page execute and read and write
2B4E000
stack
page read and write
47BE000
stack
page read and write
2E30000
trusted library allocation
page read and write
5F4000
heap
page read and write
9CF000
stack
page read and write
273D000
stack
page read and write
5F4000
heap
page read and write
1AD000
stack
page read and write
1E4000
heap
page read and write
2F60000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
2D00000
heap
page read and write
5FC000
heap
page read and write
5E0000
heap
page read and write
2201000
heap
page read and write
2E30000
trusted library allocation
page read and write
1E4000
heap
page read and write
5F4000
heap
page read and write
2D5E000
stack
page read and write
5F4000
heap
page read and write
340E000
stack
page read and write
437000
unkown
page read and write
2B9C000
stack
page read and write
2270000
heap
page read and write
276F000
stack
page read and write
3EF000
stack
page read and write
2271000
heap
page read and write
420000
heap
page read and write
536000
direct allocation
page execute and read and write
2201000
heap
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
F40000
heap
page read and write
27F0000
heap
page read and write
310F000
stack
page read and write
2271000
heap
page read and write
30E0000
trusted library allocation
page read and write
1E4000
heap
page read and write
750000
direct allocation
page execute and read and write
401000
unkown
page read and write
600000
trusted library allocation
page read and write
2271000
heap
page read and write
760000
trusted library allocation
page read and write
1E4000
heap
page read and write
2B05000
heap
page read and write
2271000
heap
page read and write
2201000
heap
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
34F000
stack
page read and write
2FED000
stack
page read and write
5C1000
heap
page read and write
780000
direct allocation
page read and write
5F4000
heap
page read and write
B68000
stack
page read and write
27CE000
stack
page read and write
534000
heap
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
2210000
heap
page read and write
1E4000
heap
page read and write
6F0000
heap
page read and write
23B0000
direct allocation
page read and write
5CA000
heap
page read and write
2170000
direct allocation
page read and write
2810000
heap
page read and write
2271000
heap
page read and write
2E30000
trusted library allocation
page read and write
7CE000
stack
page read and write
2800000
heap
page read and write
859000
heap
page read and write
534000
heap
page read and write
534000
heap
page read and write
37E000
stack
page read and write
2F50000
heap
page read and write
315F000
stack
page read and write
23B0000
direct allocation
page read and write
148B000
heap
page read and write
3100000
heap
page read and write
2219000
heap
page read and write
299E000
stack
page read and write
1E4000
heap
page read and write
2175000
direct allocation
page read and write
2271000
heap
page read and write
2310000
trusted library allocation
page read and write
23AC000
heap
page read and write
1E4000
heap
page read and write
536000
direct allocation
page execute and read and write
2271000
heap
page read and write
450000
heap
page read and write
1E4000
heap
page read and write
2E30000
trusted library allocation
page read and write
2BB0000
heap
page read and write
70E000
stack
page read and write
47D000
stack
page read and write
2E30000
trusted library allocation
page read and write
6B0000
heap
page read and write
2201000
heap
page read and write
2219000
heap
page read and write
534000
heap
page read and write
5F4000
heap
page read and write
23B0000
direct allocation
page read and write
2271000
heap
page read and write
2B7E000
stack
page read and write
8D0000
heap
page read and write
6E0000
heap
page read and write
1E4000
heap
page read and write
2271000
heap
page read and write
14AB000
heap
page read and write
5F4000
heap
page read and write
2170000
direct allocation
page read and write
5F4000
heap
page read and write
2170000
direct allocation
page read and write
2E00000
heap
page read and write
2CDC000
stack
page read and write
2201000
heap
page read and write
2D2E000
stack
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
2170000
direct allocation
page read and write
42B000
unkown
page read and write
2820000
heap
page read and write
1EF000
stack
page read and write
700000
trusted library allocation
page read and write
47FF000
stack
page read and write
500000
heap
page read and write
534000
heap
page read and write
1E4000
heap
page read and write
14AA000
heap
page read and write
30E0000
heap
page read and write
2BD0000
heap
page read and write
339E000
stack
page read and write
5D0000
heap
page read and write
1E4000
heap
page read and write
2780000
heap
page read and write
2170000
direct allocation
page read and write
2201000
heap
page read and write
2211000
heap
page read and write
58D000
heap
page read and write
2170000
direct allocation
page read and write
2201000
heap
page read and write
23B0000
direct allocation
page read and write
2271000
heap
page read and write
544000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2170000
direct allocation
page read and write
2310000
trusted library allocation
page read and write
400000
unkown
page readonly
2CCD000
stack
page read and write
2CF0000
heap
page read and write
2E30000
trusted library allocation
page read and write
530000
heap
page read and write
6D0000
heap
page read and write
2E4E000
stack
page read and write
F53000
heap
page read and write
565000
heap
page read and write
1E4000
heap
page read and write
23B0000
direct allocation
page read and write
2E30000
trusted library allocation
page read and write
2271000
heap
page read and write
1E4000
heap
page read and write
382F000
stack
page read and write
28EF000
stack
page read and write
7F2000
heap
page read and write
60F000
stack
page read and write
2100000
direct allocation
page read and write
2C3D000
stack
page read and write
35EC000
stack
page read and write
1E4000
heap
page read and write
710000
heap
page read and write
27AE000
stack
page read and write
19C000
stack
page read and write
2B4F000
stack
page read and write
5F4000
heap
page read and write
55B000
heap
page read and write
2271000
heap
page read and write
4D20000
heap
page read and write
2A0E000
stack
page read and write
1E4000
heap
page read and write
2170000
direct allocation
page read and write
2271000
heap
page read and write
BE0000
heap
page read and write
2271000
heap
page read and write
2E30000
trusted library allocation
page read and write
2840000
heap
page read and write
148C000
heap
page read and write
2219000
heap
page read and write
2211000
heap
page read and write
2808000
heap
page read and write
2201000
heap
page read and write
5F4000
heap
page read and write
35C8000
heap
page read and write
322B000
stack
page read and write
29CC000
heap
page read and write
2080000
heap
page read and write
534000
heap
page read and write
29A8000
heap
page read and write
760000
trusted library allocation
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
2211000
heap
page read and write
2105000
direct allocation
page read and write
2AEF000
stack
page read and write
2271000
heap
page read and write
1FFE000
stack
page read and write
EAB000
heap
page read and write
592000
heap
page read and write
2100000
direct allocation
page read and write
2F30000
heap
page read and write
2885000
heap
page read and write
58D000
heap
page read and write
2DFE000
stack
page read and write
66E000
heap
page read and write
FA8000
heap
page read and write
760000
trusted library allocation
page read and write
23B0000
direct allocation
page read and write
1E4000
heap
page read and write
5D5000
heap
page read and write
376C000
stack
page read and write
21F0000
direct allocation
page execute and read and write
2ECE000
stack
page read and write
2280000
heap
page read and write
760000
trusted library allocation
page read and write
1290000
heap
page read and write
1E4000
heap
page read and write
215E000
stack
page read and write
28D0000
heap
page read and write
1E4000
heap
page read and write
EAD000
heap
page read and write
1E4000
heap
page read and write
27C8000
heap
page read and write
2170000
direct allocation
page read and write
28D8000
heap
page read and write
1E4000
heap
page read and write
2A7E000
stack
page read and write
534000
heap
page read and write
2211000
heap
page read and write
1E4000
heap
page read and write
362C000
stack
page read and write
32D0000
heap
page read and write
2271000
heap
page read and write
6DB000
heap
page read and write
F5E000
heap
page read and write
312C000
stack
page read and write
5D2000
heap
page read and write
534000
heap
page read and write
3F0000
heap
page read and write
533000
heap
page read and write
2211000
heap
page read and write
2170000
direct allocation
page read and write
5F4000
heap
page read and write
1E0000
heap
page read and write
2A3F000
stack
page read and write
1E4000
heap
page read and write
5F4000
heap
page read and write
14D5000
heap
page read and write
5B7000
heap
page read and write
1E4000
heap
page read and write
1200000
heap
page read and write
3100000
heap
page read and write
50AC000
stack
page read and write
2A50000
heap
page read and write
2219000
heap
page read and write
2350000
trusted library allocation
page read and write
33DF000
stack
page read and write
14D3000
heap
page read and write
401000
unkown
page read and write
2E30000
trusted library allocation
page read and write
1E4000
heap
page read and write
2350000
trusted library allocation
page read and write
2100000
direct allocation
page read and write
2E30000
trusted library allocation
page read and write
27E0000
heap
page read and write
2E30000
trusted library allocation
page read and write
30D5000
heap
page read and write
246F000
stack
page read and write
2271000
heap
page read and write
5F4000
heap
page read and write
2170000
direct allocation
page read and write
2900000
heap
page read and write
2211000
heap
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
2B30000
heap
page read and write
5F4000
heap
page read and write
308F000
stack
page read and write
307F000
stack
page read and write
4B0000
heap
page read and write
1E4000
heap
page read and write
2AD000
stack
page read and write
760000
trusted library allocation
page read and write
2271000
heap
page read and write
530000
direct allocation
page execute and read and write
2E30000
trusted library allocation
page read and write
5F7000
heap
page read and write
590000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
713000
heap
page read and write
1E4000
heap
page read and write
100000
remote allocation
page execute and read and write
534000
heap
page read and write
23B0000
direct allocation
page read and write
2201000
heap
page read and write
2201000
heap
page read and write
534000
heap
page read and write
534000
heap
page read and write
2211000
heap
page read and write
19B000
stack
page read and write
2200000
direct allocation
page read and write
327E000
stack
page read and write
4370000
heap
page read and write
BB0000
heap
page read and write
438000
unkown
page execute and read and write
FA8000
heap
page read and write
30C0000
heap
page read and write
2BFE000
stack
page read and write
2F1E000
stack
page read and write
14D3000
heap
page read and write
308F000
stack
page read and write
2102000
direct allocation
page read and write
63D000
stack
page read and write
68E000
stack
page read and write
3008000
heap
page read and write
47E000
stack
page read and write
2B0D000
stack
page read and write
2938000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
29DC000
heap
page read and write
534000
heap
page read and write
1E4000
heap
page read and write
1440000
heap
page read and write
2100000
direct allocation
page read and write
27DF000
stack
page read and write
2AF0000
heap
page read and write
2201000
heap
page read and write
5D8000
heap
page read and write
12D000
stack
page read and write
2FC0000
heap
page read and write
606000
heap
page read and write
2AA0000
heap
page read and write
275E000
stack
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
2100000
direct allocation
page read and write
3148000
heap
page read and write
2E30000
trusted library allocation
page read and write
1410000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2100000
direct allocation
page read and write
2ED000
stack
page read and write
5CE000
heap
page read and write
20DE000
stack
page read and write
2E30000
trusted library allocation
page read and write
2219000
heap
page read and write
431000
unkown
page read and write
2271000
heap
page read and write
2219000
heap
page read and write
2271000
heap
page read and write
886000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
889000
heap
page read and write
1E4000
heap
page read and write
2310000
trusted library allocation
page read and write
38E000
stack
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
2219000
heap
page read and write
27EF000
stack
page read and write
640000
heap
page read and write
5DA000
heap
page read and write
2211000
heap
page read and write
1E4000
heap
page read and write
1625000
heap
page read and write
3430000
heap
page read and write
1E4000
heap
page read and write
5F4000
heap
page read and write
282E000
stack
page read and write
2E2E000
stack
page read and write
5F4000
heap
page read and write
2201000
heap
page read and write
58D000
stack
page read and write
2201000
heap
page read and write
78F000
stack
page read and write
2FC0000
heap
page read and write
1E4000
heap
page read and write
2BEF000
stack
page read and write
477F000
stack
page read and write
2E30000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
2170000
direct allocation
page read and write
2211000
heap
page read and write
1E4000
heap
page read and write
660000
heap
page read and write
2B00000
heap
page read and write
1E4000
heap
page read and write
30E8000
heap
page read and write
198000
stack
page read and write
2271000
heap
page read and write
534000
heap
page read and write
2201000
heap
page read and write
1E4000
heap
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
2830000
heap
page read and write
2271000
heap
page read and write
534000
heap
page read and write
2CD0000
heap
page read and write
293E000
heap
page read and write
1E4000
heap
page read and write
21E0000
direct allocation
page execute and read and write
400000
unkown
page readonly
1E4000
heap
page read and write
2201000
heap
page read and write
5F4000
heap
page read and write
27C0000
heap
page read and write
700000
direct allocation
page execute and read and write
760000
trusted library allocation
page read and write
2B4E000
stack
page read and write
1E4000
heap
page read and write
2219000
heap
page read and write
2271000
heap
page read and write
1E4000
heap
page read and write
B50000
heap
page read and write
5F4000
heap
page read and write
277F000
stack
page read and write
2100000
direct allocation
page read and write
2201000
heap
page read and write
51EE000
stack
page read and write
1E4000
heap
page read and write
740000
direct allocation
page execute and read and write
58F000
heap
page read and write
2E30000
trusted library allocation
page read and write
1E4000
heap
page read and write
2CED000
stack
page read and write
28F0000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
23B0000
direct allocation
page read and write
1E4000
heap
page read and write
2CBE000
stack
page read and write
5F4000
heap
page read and write
31F5000
heap
page read and write
606000
heap
page read and write
534000
heap
page read and write
3085000
heap
page read and write
2B90000
heap
page read and write
EA4000
heap
page read and write
1E4000
heap
page read and write
2271000
heap
page read and write
5F4000
heap
page read and write
1278000
stack
page read and write
EA9000
heap
page read and write
760000
trusted library allocation
page read and write
2271000
heap
page read and write
50E000
stack
page read and write
5F4000
heap
page read and write
2DFD000
stack
page read and write
5F4000
heap
page read and write
2ABF000
stack
page read and write
1E4000
heap
page read and write
2271000
heap
page read and write
2820000
heap
page read and write
2E30000
trusted library allocation
page read and write
2211000
heap
page read and write
2271000
heap
page read and write
2211000
heap
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
2EF0000
heap
page read and write
5E1000
heap
page read and write
2A2E000
stack
page read and write
29A0000
heap
page read and write
2201000
heap
page read and write
2F4C000
stack
page read and write
3190000
heap
page read and write
3080000
heap
page read and write
5F4000
heap
page read and write
2CF8000
heap
page read and write
27BE000
stack
page read and write
534000
heap
page read and write
25AC000
stack
page read and write
23B0000
direct allocation
page read and write
2271000
heap
page read and write
5F4000
heap
page read and write
1E4000
heap
page read and write
2211000
heap
page read and write
2201000
heap
page read and write
EB6000
heap
page read and write
70E000
stack
page read and write
2201000
heap
page read and write
2BBC000
stack
page read and write
1E4000
heap
page read and write
58D000
heap
page read and write
5F4000
heap
page read and write
5BF000
heap
page read and write
2201000
heap
page read and write
7CE000
stack
page read and write
2219000
heap
page read and write
46FF000
stack
page read and write
2271000
heap
page read and write
1E4000
heap
page read and write
2ADD000
stack
page read and write
4F0E000
stack
page read and write
336F000
stack
page read and write
5BF000
heap
page read and write
30D0000
heap
page read and write
2271000
heap
page read and write
23B5000
direct allocation
page read and write
760000
trusted library allocation
page read and write
E83000
heap
page read and write
3860000
heap
page read and write
1E4000
heap
page read and write
430000
heap
page read and write
1E4000
heap
page read and write
2100000
direct allocation
page read and write
23B2000
direct allocation
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
2210000
heap
page read and write
67D000
stack
page read and write
68E000
stack
page read and write
1E4000
heap
page read and write
438000
unkown
page execute and write copy
2EBA000
stack
page read and write
14D5000
heap
page read and write
2100000
direct allocation
page read and write
760000
trusted library allocation
page read and write
543000
direct allocation
page execute and read and write
300E000
stack
page read and write
534000
heap
page read and write
5F0000
heap
page read and write
27D8000
heap
page read and write
27FD000
stack
page read and write
2201000
heap
page read and write
2AF5000
heap
page read and write
630000
heap
page read and write
2DDE000
stack
page read and write
2271000
heap
page read and write
28AE000
stack
page read and write
2219000
heap
page read and write
2E30000
trusted library allocation
page read and write
23B0000
direct allocation
page read and write
1E4000
heap
page read and write
3AE000
stack
page read and write
5F7000
heap
page read and write
292C000
heap
page read and write
2310000
trusted library allocation
page read and write
23B0000
direct allocation
page read and write
29FF000
stack
page read and write
2271000
heap
page read and write
2B2E000
stack
page read and write
2D70000
heap
page read and write
1E4000
heap
page read and write
436E000
stack
page read and write
267E000
stack
page read and write
2810000
heap
page read and write
2C7F000
stack
page read and write
285E000
stack
page read and write
431000
unkown
page read and write
1E4000
heap
page read and write
546000
direct allocation
page execute and read and write
2B1E000
stack
page read and write
2281000
heap
page read and write
533000
direct allocation
page execute and read and write
2BC0000
heap
page read and write
2D8F000
stack
page read and write
5CE000
stack
page read and write
34CE000
stack
page read and write
2A8F000
stack
page read and write
26BE000
stack
page read and write
1463000
heap
page read and write
885000
heap
page read and write
534000
heap
page read and write
4D0000
heap
page read and write
2170000
direct allocation
page read and write
534000
heap
page read and write
23B0000
direct allocation
page read and write
1E4000
heap
page read and write
2F60000
heap
page read and write
446000
unkown
page execute and write copy
29E0000
heap
page read and write
2C0000
heap
page read and write
720000
direct allocation
page read and write
1E4000
heap
page read and write
2170000
direct allocation
page read and write
276F000
stack
page read and write
1E4000
heap
page read and write
2220000
heap
page read and write
2211000
heap
page read and write
58B000
heap
page read and write
597000
heap
page read and write
53F000
heap
page read and write
2201000
heap
page read and write
2C9D000
stack
page read and write
33D000
stack
page read and write
2F50000
heap
page read and write
534000
heap
page read and write
2880000
heap
page read and write
660000
heap
page read and write
2D60000
heap
page read and write
211E000
stack
page read and write
1E4000
heap
page read and write
23B0000
direct allocation
page read and write
2934000
heap
page read and write
2271000
heap
page read and write
2271000
heap
page read and write
3550000
heap
page read and write
5F4000
heap
page read and write
FA8000
heap
page read and write
2201000
heap
page read and write
592000
heap
page read and write
401000
unkown
page read and write
5F4000
heap
page read and write
400000
unkown
page readonly
ED000
stack
page read and write
438000
unkown
page execute and write copy
2BCF000
stack
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
2850000
heap
page read and write
5F4000
heap
page read and write
2B0000
heap
page read and write
24AE000
stack
page read and write
5F4000
heap
page read and write
540000
direct allocation
page execute and read and write
438000
unkown
page execute and read and write
2FAE000
stack
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
7DE000
heap
page read and write
2D30000
heap
page read and write
610000
direct allocation
page read and write
2BE0000
heap
page read and write
2FB0000
heap
page read and write
534000
heap
page read and write
2310000
direct allocation
page execute and read and write
2211000
heap
page read and write
600000
trusted library allocation
page read and write
2D00000
heap
page read and write
2271000
heap
page read and write
1E4000
heap
page read and write
2201000
heap
page read and write
5B7000
heap
page read and write
24F0000
heap
page read and write
BC0000
heap
page read and write
293E000
heap
page read and write
23B0000
direct allocation
page read and write
2310000
trusted library allocation
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
113E000
stack
page read and write
14CD000
heap
page read and write
2E30000
trusted library allocation
page read and write
6D0000
heap
page read and write
2FE5000
heap
page read and write
9B000
stack
page read and write
105000
remote allocation
page execute and read and write
5D0000
heap
page read and write
23A7000
heap
page read and write
2201000
heap
page read and write
5D8000
heap
page read and write
3108000
heap
page read and write
2F20000
heap
page read and write
23B0000
direct allocation
page read and write
2100000
direct allocation
page read and write
2211000
heap
page read and write
7DA000
heap
page read and write
There are 1156 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
http://www.onefordvd.com/
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander
https://www.onefordvd.com/lander