IOC Report
1cad1f43e4768f56d68bb2b2737b7f5eebe78e8737f38.exe

loading gif

Files

File Path
Type
Category
Malicious
1cad1f43e4768f56d68bb2b2737b7f5eebe78e8737f38.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
JSON data
dropped
malicious
C:\Users\user\AppData\Local\Temp\kwvvjj
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\pvrrwvlxy
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\xwv
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\yuyhf
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\527e37c9
PNG image data, 2096 x 1532, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\5353bb38
data
modified
C:\Users\user\AppData\Local\Temp\5d1ee590
PNG image data, 2096 x 1532, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\5db178aa
data
modified
C:\Users\user\AppData\Local\Temp\61739b62
PNG image data, 2096 x 1532, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\62382b62
data
modified
C:\Users\user\AppData\Local\Temp\d5087297
PNG image data, 2096 x 1532, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\d599b680
data
modified
C:\Users\user\AppData\Local\Temp\runenwwtdnpx
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 5 06:54:56 2023, mtime=Wed Sep 25 22:47:25 2024, atime=Wed Sep 25 22:47:21 2024, length=19169216, window=hide
dropped
C:\Users\user\AppData\Local\Temp\tmp10FA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp1A60.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp1AF3.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp29F4.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp2A53.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp2A8E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3304.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp34BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3A00.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3B47.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3B92.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3F42.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp4566.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp467D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp4DBF.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp4F05.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp545C.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5548.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp5C59.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5CC7.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5FA6.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp6382.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp6904.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp6BB1.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp74B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp775A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7BE2.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7F88.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp8527.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8A77.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmp8B05.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8DB4.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp907D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp921B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9726.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9737.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9747.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9864.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9E36.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpA91E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpB1A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpBF17.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpC06D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpC26.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpCC38.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpCD0E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpCF2.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpD1F.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpDB37.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpDF5A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpE0A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpE976.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpF111.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpF1FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpF9BF.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\tmpFFF.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\background.js
ASCII text
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\content.js
ASCII text
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\icon.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\jquery.js
ASCII text, with very long lines (32086)
dropped
C:\Users\user\AppData\Local\ksedtnorf\llg\manifest.json
JSON data
dropped
C:\Windows\Tasks\AsusFCNotification.job
data
dropped
There are 68 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1cad1f43e4768f56d68bb2b2737b7f5eebe78e8737f38.exe
"C:\Users\user\Desktop\1cad1f43e4768f56d68bb2b2737b7f5eebe78e8737f38.exe"
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Users\user\AppData\Roaming\ITEinboxI2CFlash\ITERHPGen.exe
C:\Users\user\AppData\Roaming\ITEinboxI2CFlash\ITERHPGen.exe
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Users\user\AppData\Roaming\ITEinboxI2CFlash\ITERHPGen.exe
"C:\Users\user\AppData\Roaming\ITEinboxI2CFlash\ITERHPGen.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\ITEinboxI2CFlash\ITERHPGen.exe
C:\Users\user\AppData\Roaming\ITEinboxI2CFlash\ITERHPGen.exe
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://213.109.202.97:9000/wbinjget?q=ABEE5D020398559D1CCC81B5F72669AE
213.109.202.97
malicious
https://pastebin.com/raw/Ld9GfkdJ
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://donutsoft.orghttps://t.me/donutsoftdonutsoftorg
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://donutsoft.org/
unknown
https://pay.cloudtips.ru/p/96db8bb7https://donationalerts.com/r/donutsoft
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://213.109.202.97:
unknown
https://yoomoney.ru/to/410015205849375https://qiwi.com/n/DONUTSOFT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://www.ecosia.org/newtab/
unknown
https://t.me/donutsoft
unknown
https://pastebin.com/raw/Ld9GfkdJPOr6
unknown
https://paypal.me/donutsofthttps://patreon.com/donutsofthttps://ko-fi.com/donutsofthttps://buymeacof
unknown
http://213.109.202.97:9000
unknown
http://213.109.202.97:9000/
unknown
http://purl.oen
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://donutsoft.org/nusrHtwtb_file.tmpdonutsoftRy%02dp.%02dv.%02dm.%03dr.%s.%s.iddo%s%d%s%s%d%s%sr
unknown
https://qiwi.com/...
unknown
https://donutsoft.orghttps://t.me/donutsoftSubjectHello
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.info-zip.org/
unknown
https://donutsoft.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 20 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
213.109.202.97
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5730000
direct allocation
page read and write
malicious
5FD0000
direct allocation
page read and write
malicious
51C0000
direct allocation
page read and write
malicious
5C10000
direct allocation
page read and write
malicious
9C2000
unkown
page readonly
malicious
313B000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
3041000
direct allocation
page read and write
3972000
direct allocation
page read and write
5FAE000
stack
page read and write
30D5000
direct allocation
page read and write
3136000
trusted library allocation
page read and write
914000
trusted library allocation
page read and write
30A3000
direct allocation
page read and write
3103000
direct allocation
page read and write
5140000
heap
page read and write
2BE4000
heap
page read and write
30EE000
stack
page read and write
506E000
trusted library allocation
page read and write
1AA3000
direct allocation
page read and write
DB0000
heap
page read and write
32F4000
heap
page read and write
8C4000
heap
page read and write
5651000
unkown
page read and write
61D2000
unkown
page read and write
1989000
direct allocation
page read and write
26F0000
heap
page read and write
2FBC000
direct allocation
page read and write
39D0000
heap
page read and write
2CC5000
trusted library allocation
page read and write
8C4000
heap
page read and write
3069000
direct allocation
page read and write
C73000
heap
page read and write
D08000
heap
page read and write
2E6C000
trusted library allocation
page read and write
3EC8000
trusted library allocation
page read and write
37C3000
heap
page read and write
3EE1000
trusted library allocation
page read and write
C77000
heap
page read and write
494E000
direct allocation
page read and write
535A000
heap
page read and write
32F4000
heap
page read and write
C60000
trusted library allocation
page execute and read and write
2BE4000
heap
page read and write
32F4000
heap
page read and write
30C8000
direct allocation
page read and write
5340000
unkown
page read and write
302F000
direct allocation
page read and write
2D14000
heap
page read and write
8D0000
heap
page read and write
3A51000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
4FCD000
direct allocation
page read and write
2D56000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2FE0000
heap
page read and write
E30000
trusted library allocation
page read and write
19C9000
direct allocation
page read and write
3540000
heap
page read and write
28C0000
heap
page read and write
7F0000
heap
page read and write
64AE000
unkown
page read and write
1AE6000
heap
page read and write
1710000
heap
page read and write
39B1000
heap
page read and write
4D4C000
stack
page read and write
850000
heap
page read and write
2F1C000
heap
page read and write
304C000
direct allocation
page read and write
7F0000
heap
page read and write
3D43000
trusted library allocation
page read and write
6FB000
stack
page read and write
3520000
heap
page read and write
592E000
stack
page read and write
30B3000
direct allocation
page read and write
8C4000
heap
page read and write
8C0000
heap
page read and write
3160000
heap
page execute and read and write
4F15000
trusted library allocation
page read and write
D66000
heap
page read and write
2BE4000
heap
page read and write
183E000
heap
page read and write
E6A000
unkown
page write copy
301F000
direct allocation
page read and write
5FEC000
stack
page read and write
2E0C000
trusted library allocation
page read and write
2D14000
heap
page read and write
19B6000
direct allocation
page read and write
1820000
direct allocation
page execute and read and write
30F1000
unkown
page read and write
3BB1000
trusted library allocation
page read and write
19A4000
direct allocation
page read and write
372F000
direct allocation
page read and write
62EE000
stack
page read and write
3766000
direct allocation
page read and write
3D18000
trusted library allocation
page read and write
1327000
heap
page read and write
3002000
unkown
page read and write
3085000
direct allocation
page read and write
FA3000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
3736000
direct allocation
page read and write
2D14000
heap
page read and write
2FB4000
trusted library allocation
page read and write
12FB000
stack
page read and write
300B000
direct allocation
page read and write
4EC5000
trusted library allocation
page read and write
64A8000
unkown
page read and write
1574000
trusted library allocation
page read and write
32F4000
heap
page read and write
29B0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
3038000
direct allocation
page read and write
1340000
heap
page read and write
4B61000
unkown
page read and write
B63000
unkown
page execute read
4DC2000
heap
page read and write
1AB8000
direct allocation
page read and write
9CF000
stack
page read and write
1B9F000
heap
page read and write
4EE0000
trusted library allocation
page read and write
32F4000
heap
page read and write
3530000
heap
page read and write
E9F000
unkown
page readonly
32F4000
heap
page read and write
3008000
direct allocation
page read and write
50B9000
direct allocation
page read and write
4F60000
trusted library allocation
page read and write
4E96000
trusted library allocation
page read and write
3540000
heap
page read and write
30C0000
direct allocation
page read and write
30B1000
direct allocation
page read and write
32F4000
heap
page read and write
745E000
stack
page read and write
531E000
stack
page read and write
3104000
trusted library allocation
page read and write
307E000
direct allocation
page read and write
155F000
stack
page read and write
2FC4000
direct allocation
page read and write
6184000
heap
page read and write
4F1A000
trusted library allocation
page read and write
199C000
direct allocation
page read and write
310A000
direct allocation
page read and write
DF0000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
1417000
heap
page read and write
2664000
heap
page read and write
2D14000
heap
page read and write
15D0000
trusted library allocation
page read and write
503E000
direct allocation
page read and write
2F49000
trusted library allocation
page read and write
5AAF000
stack
page read and write
2D14000
heap
page read and write
1164000
unkown
page readonly
2E15000
trusted library allocation
page read and write
337F000
stack
page read and write
3017000
direct allocation
page read and write
2FE0000
direct allocation
page read and write
515F000
heap
page read and write
2FE6000
direct allocation
page read and write
2F18000
trusted library allocation
page read and write
2BE4000
heap
page read and write
51EB000
trusted library allocation
page read and write
2BE4000
heap
page read and write
16BE000
stack
page read and write
302E000
direct allocation
page read and write
4ED8000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
77DD000
stack
page read and write
4F2D000
stack
page read and write
2BE4000
heap
page read and write
19DA000
direct allocation
page read and write
32F4000
heap
page read and write
3014000
direct allocation
page read and write
FA4000
trusted library allocation
page read and write
2664000
heap
page read and write
12FB000
stack
page read and write
E50000
trusted library allocation
page read and write
2664000
heap
page read and write
32F4000
heap
page read and write
714A000
stack
page read and write
76DE000
stack
page read and write
32F5000
heap
page read and write
3CE0000
trusted library allocation
page read and write
3C7000
unkown
page execute read
1590000
trusted library allocation
page read and write
AC0000
heap
page read and write
14BF000
heap
page read and write
441000
unkown
page read and write
DFD000
stack
page read and write
2D6D000
trusted library allocation
page read and write
30F3000
direct allocation
page read and write
4FB0000
heap
page read and write
1410000
heap
page read and write
441000
unkown
page read and write
3B71000
heap
page read and write
30A3000
direct allocation
page read and write
39B8000
heap
page read and write
2C3C000
stack
page read and write
3140000
trusted library allocation
page read and write
57A0000
heap
page read and write
2BE4000
heap
page read and write
8C4000
heap
page read and write
E3E000
stack
page read and write
2D21000
trusted library allocation
page read and write
3077000
direct allocation
page read and write
1249000
heap
page read and write
303A000
direct allocation
page read and write
2EEC000
stack
page read and write
5DB9000
stack
page read and write
50DE000
heap
page read and write
6420000
unkown
page read and write
300E000
direct allocation
page read and write
4581000
trusted library allocation
page read and write
28AE000
stack
page read and write
2D14000
heap
page read and write
32F4000
heap
page read and write
8C4000
heap
page read and write
2F26000
trusted library allocation
page read and write
CF0000
heap
page read and write
501E000
stack
page read and write
D4B000
stack
page read and write
2D14000
heap
page read and write
E40000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
23EC000
stack
page read and write
32F0000
heap
page read and write
8C4000
heap
page read and write
1B38000
heap
page read and write
32F4000
heap
page read and write
FC4000
trusted library allocation
page read and write
8C4000
heap
page read and write
4E62000
heap
page read and write
3031000
direct allocation
page read and write
31C5000
trusted library allocation
page read and write
39B1000
heap
page read and write
5BA0000
unkown
page read and write
39B0000
heap
page read and write
622D000
heap
page read and write
39B1000
heap
page read and write
301E000
direct allocation
page read and write
51F0000
trusted library allocation
page read and write
5B53000
heap
page read and write
3543000
heap
page read and write
6203000
heap
page read and write
57B0000
unkown
page read and write
2E5C000
trusted library allocation
page read and write
50A0000
unkown
page read and write
2664000
heap
page read and write
2F0C000
heap
page read and write
596E000
stack
page read and write
3D3B000
trusted library allocation
page read and write
8C4000
heap
page read and write
61B3000
heap
page read and write
1360000
heap
page read and write
724E000
stack
page read and write
51E0000
trusted library allocation
page read and write
5652000
unkown
page read and write
32F4000
heap
page read and write
62AE000
stack
page read and write
5F3D000
stack
page read and write
2EFE000
trusted library allocation
page read and write
123E000
heap
page read and write
39B0000
heap
page read and write
4EA0000
direct allocation
page read and write
2664000
heap
page read and write
3CFE000
trusted library allocation
page read and write
543E000
direct allocation
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
BAF000
stack
page read and write
3029000
direct allocation
page read and write
1350000
heap
page read and write
3035000
direct allocation
page read and write
FEB000
trusted library allocation
page execute and read and write
3001000
unkown
page read and write
19F8000
direct allocation
page read and write
59C0000
unkown
page read and write
51CE000
heap
page read and write
310E000
trusted library allocation
page read and write
3F8000
stack
page read and write
8C4000
heap
page read and write
2E6F000
stack
page read and write
5341000
unkown
page read and write
2BE4000
heap
page read and write
3718000
direct allocation
page read and write
4F1B000
stack
page read and write
E30000
trusted library allocation
page read and write
1810000
heap
page read and write
32F4000
heap
page read and write
2D7D000
trusted library allocation
page read and write
2D14000
heap
page read and write
53BA000
heap
page read and write
1730000
heap
page read and write
AD0000
direct allocation
page execute and read and write
781B000
stack
page read and write
2F17000
heap
page read and write
E10000
trusted library allocation
page read and write
2CB8000
trusted library allocation
page read and write
3B70000
heap
page read and write
1460000
heap
page read and write
4F2D000
trusted library allocation
page read and write
8C4000
heap
page read and write
48DD000
direct allocation
page read and write
1576000
heap
page read and write
2D14000
heap
page read and write
79D2000
heap
page read and write
E78000
unkown
page read and write
2D27000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
53D4000
heap
page read and write
12FB000
stack
page read and write
4EAE000
trusted library allocation
page read and write
2664000
heap
page read and write
1415000
heap
page read and write
36E2000
direct allocation
page read and write
6110000
trusted library allocation
page execute and read and write
1498000
heap
page read and write
3779000
direct allocation
page read and write
4ECE000
stack
page read and write
1AAA000
direct allocation
page read and write
4F1E000
trusted library allocation
page read and write
2664000
heap
page read and write
2E01000
trusted library allocation
page read and write
2D14000
heap
page read and write
42A000
unkown
page write copy
30C7000
direct allocation
page read and write
1A6E000
direct allocation
page read and write
582E000
stack
page read and write
2FDE000
direct allocation
page read and write
4B4E000
stack
page read and write
32F4000
heap
page read and write
4171000
trusted library allocation
page read and write
70430000
unkown
page readonly
458000
unkown
page read and write
6241000
heap
page read and write
56F2000
trusted library allocation
page read and write
30DD000
direct allocation
page read and write
5750000
unkown
page read and write
C8F000
heap
page read and write
2D10000
heap
page read and write
30F6000
trusted library allocation
page read and write
15DB000
trusted library allocation
page read and write
8C4000
heap
page read and write
1210000
heap
page read and write
5360000
trusted library allocation
page read and write
4E50000
heap
page read and write
2CB4000
trusted library allocation
page read and write
3DB7000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
49DC000
heap
page read and write
2A20000
trusted library allocation
page read and write
32F4000
heap
page read and write
8C4000
heap
page read and write
2D14000
heap
page read and write
3720000
direct allocation
page read and write
30E4000
direct allocation
page read and write
301B000
direct allocation
page read and write
3066000
direct allocation
page read and write
1299000
heap
page read and write
3049000
trusted library allocation
page read and write
44E000
unkown
page read and write
658D000
unkown
page read and write
8C4000
heap
page read and write
4F0B000
trusted library allocation
page read and write
3024000
direct allocation
page read and write
E50000
trusted library allocation
page read and write
1800000
heap
page read and write
2D14000
heap
page read and write
D25000
heap
page read and write
2BE4000
heap
page read and write
C3A000
heap
page read and write
6D70000
trusted library allocation
page read and write
1220000
heap
page read and write
1030000
heap
page read and write
311A000
trusted library allocation
page read and write
7C70000
heap
page read and write
C9F000
heap
page read and write
305F000
direct allocation
page read and write
6C1B000
stack
page read and write
168D000
unkown
page readonly
5341000
unkown
page read and write
3125000
trusted library allocation
page read and write
C18000
heap
page read and write
32F4000
heap
page read and write
913000
trusted library allocation
page execute and read and write
264E000
stack
page read and write
526E000
stack
page read and write
2BE4000
heap
page read and write
64F5000
unkown
page read and write
2881000
trusted library allocation
page read and write
308E000
stack
page read and write
2D14000
heap
page read and write
618C000
heap
page read and write
441000
unkown
page write copy
6BD0000
trusted library allocation
page execute and read and write
8C4000
heap
page read and write
308C000
direct allocation
page read and write
7C3D000
stack
page read and write
7BC0000
trusted library allocation
page read and write
759C000
stack
page read and write
303A000
direct allocation
page read and write
5251000
unkown
page read and write
2E8E000
stack
page read and write
3D48000
trusted library allocation
page read and write
2664000
heap
page read and write
625F000
heap
page read and write
38BC000
heap
page read and write
51D0000
trusted library allocation
page read and write
1A58000
direct allocation
page read and write
586F000
stack
page read and write
3D25000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
30F1000
unkown
page read and write
4F90000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
4D56000
trusted library allocation
page read and write
2BE4000
heap
page read and write
30C0000
direct allocation
page read and write
E26000
trusted library allocation
page execute and read and write
1B30000
heap
page read and write
2F91000
trusted library allocation
page read and write
2CBD000
trusted library allocation
page read and write
3026000
direct allocation
page read and write
32F4000
heap
page read and write
C46000
heap
page read and write
31F0000
heap
page read and write
3523000
heap
page read and write
E3B000
trusted library allocation
page execute and read and write
2660000
heap
page read and write
1310000
heap
page read and write
2EED000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
EFC000
unkown
page read and write
2D0F000
stack
page read and write
7C0000
heap
page read and write
5651000
unkown
page read and write
27FE000
stack
page read and write
E22000
trusted library allocation
page read and write
8C4000
heap
page read and write
39B7000
heap
page read and write
1325000
heap
page read and write
5C00000
heap
page read and write
2BE4000
heap
page read and write
2BE4000
heap
page read and write
301B000
direct allocation
page read and write
32F4000
heap
page read and write
5F65000
trusted library allocation
page read and write
641E000
stack
page read and write
E39000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
3004000
direct allocation
page read and write
795B000
trusted library section
page read and write
572E000
stack
page read and write
BE5000
heap
page read and write
2D88000
trusted library allocation
page read and write
2BE4000
heap
page read and write
32F4000
heap
page read and write
2FF0000
direct allocation
page read and write
8C4000
heap
page read and write
308C000
direct allocation
page read and write
537F000
stack
page read and write
1656000
heap
page read and write
61A1000
heap
page read and write
9D9000
heap
page read and write
5030000
heap
page read and write
A16000
heap
page read and write
FC0000
trusted library allocation
page read and write
5A6D000
heap
page read and write
2777000
heap
page read and write
3111000
direct allocation
page read and write
2D37000
trusted library allocation
page read and write
2870000
heap
page execute and read and write
1384000
heap
page read and write
2BE4000
heap
page read and write
156E000
stack
page read and write
1BD4000
heap
page read and write
2664000
heap
page read and write
430000
unkown
page write copy
2BE4000
heap
page read and write
3420000
heap
page read and write
53C9000
direct allocation
page read and write
32F4000
heap
page read and write
4E4E000
stack
page read and write
620B000
heap
page read and write
2F90000
direct allocation
page read and write
2664000
heap
page read and write
1A1D000
direct allocation
page read and write
8C4000
heap
page read and write
924000
trusted library allocation
page read and write
3560000
direct allocation
page execute and read and write
304E000
stack
page read and write
3D1F000
trusted library allocation
page read and write
3067000
direct allocation
page read and write
10EE000
stack
page read and write
32F4000
heap
page read and write
8C4000
heap
page read and write
1683000
unkown
page readonly
63A0000
unkown
page read and write
3CAD000
trusted library allocation
page read and write
79C0000
heap
page read and write
387000
stack
page read and write
4B61000
unkown
page read and write
509E000
stack
page read and write
1A67000
direct allocation
page read and write
FC7000
stack
page read and write
3885000
trusted library allocation
page read and write
679C000
unkown
page read and write
1800000
heap
page read and write
C2E000
heap
page read and write
1490000
heap
page read and write
3D78000
trusted library allocation
page read and write
3427000
heap
page read and write
8C4000
heap
page read and write
32F4000
heap
page read and write
1A08000
direct allocation
page read and write
15F0000
heap
page read and write
48B9000
heap
page read and write
7C50000
trusted library allocation
page execute and read and write
2B70000
heap
page read and write
E03000
trusted library allocation
page execute and read and write
32F4000
heap
page read and write
C80000
heap
page read and write
10F8000
stack
page read and write
C0E000
stack
page read and write
2D14000
heap
page read and write
4F49000
trusted library allocation
page read and write
7940000
trusted library allocation
page execute and read and write
4F83000
trusted library allocation
page read and write
2FDE000
stack
page read and write
1A51000
direct allocation
page read and write
60B0000
trusted library allocation
page read and write
438000
unkown
page read and write
2A39000
trusted library allocation
page read and write
3118000
direct allocation
page read and write
3148000
trusted library allocation
page read and write
2BE4000
heap
page read and write
2664000
heap
page read and write
292E000
stack
page read and write
3001000
direct allocation
page read and write
602E000
stack
page read and write
7040000
trusted library allocation
page execute and read and write
56E0000
unkown
page read and write
56F0000
trusted library allocation
page read and write
4AC3000
heap
page read and write
2F76000
heap
page read and write
3D2C000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
4175000
trusted library allocation
page read and write
E98000
unkown
page read and write
2FB000
stack
page read and write
6D50000
trusted library allocation
page execute and read and write
2664000
heap
page read and write
39B0000
heap
page read and write
4CC7000
heap
page read and write
56E9000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
E25000
trusted library allocation
page read and write
5250000
unkown
page read and write
6130000
trusted library allocation
page execute and read and write
2BE4000
heap
page read and write
2F10000
heap
page read and write
2BE4000
heap
page read and write
558D000
heap
page read and write
32F4000
heap
page read and write
3048000
direct allocation
page read and write
1020000
trusted library allocation
page read and write
2BE4000
heap
page read and write
15B8000
heap
page read and write
ACE000
stack
page read and write
8C4000
heap
page read and write
304A000
direct allocation
page read and write
376A000
direct allocation
page read and write
441000
unkown
page read and write
2D14000
heap
page read and write
8C4000
heap
page read and write
BE0000
heap
page read and write
5F5F000
trusted library allocation
page read and write
7310000
trusted library allocation
page execute and read and write
84D000
stack
page read and write
5025000
trusted library allocation
page read and write
305A000
direct allocation
page read and write
8C4000
heap
page read and write
4FA0000
trusted library allocation
page read and write
4F90000
heap
page read and write
E6A000
unkown
page read and write
5751000
unkown
page read and write
51B0000
heap
page read and write
3881000
trusted library allocation
page read and write
D8F000
stack
page read and write
2B0A000
stack
page read and write
3CC6000
trusted library allocation
page read and write
527E000
stack
page read and write
8C4000
heap
page read and write
E81000
unkown
page read and write
19F1000
direct allocation
page read and write
58AE000
stack
page read and write
795E000
trusted library section
page read and write
780000
heap
page read and write
5F58000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
120D000
stack
page read and write
120000
unkown
page readonly
2D72000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
3CE7000
trusted library allocation
page read and write
2BE4000
heap
page read and write
920000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
59AF000
stack
page read and write
31DA000
trusted library allocation
page read and write
EBE000
unkown
page read and write
4F40000
trusted library allocation
page read and write
2D14000
heap
page read and write
730000
heap
page read and write
1570000
heap
page read and write
7BE000
stack
page read and write
6487000
unkown
page read and write
988000
stack
page read and write
1368000
heap
page read and write
3058000
direct allocation
page read and write
5341000
unkown
page read and write
77E000
stack
page read and write
2664000
heap
page read and write
2E21000
trusted library allocation
page read and write
13D0000
heap
page read and write
7FFE000
stack
page read and write
58EF000
stack
page read and write
2BBE000
stack
page read and write
8C4000
heap
page read and write
15E0000
trusted library allocation
page read and write
2EAB000
stack
page read and write
4D4B000
stack
page read and write
50D0000
heap
page read and write
1330000
heap
page read and write
2D14000
heap
page read and write
1536000
heap
page read and write
42F8000
heap
page read and write
3054000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
166F000
stack
page read and write
4EB1000
trusted library allocation
page read and write
32F4000
heap
page read and write
5F6A000
trusted library allocation
page read and write
5F45000
trusted library allocation
page read and write
5341000
unkown
page read and write
2E45000
trusted library allocation
page read and write
2C80000
heap
page read and write
2F2D000
trusted library allocation
page read and write
2FE4000
direct allocation
page read and write
1A7C000
direct allocation
page read and write
1326000
heap
page read and write
310A000
direct allocation
page read and write
900000
trusted library allocation
page read and write
30A3000
direct allocation
page read and write
3729000
direct allocation
page read and write
4F26000
trusted library allocation
page read and write
3D03000
trusted library allocation
page read and write
2BE4000
heap
page read and write
FC7000
stack
page read and write
32F4000
heap
page read and write
375E000
direct allocation
page read and write
2BE4000
heap
page read and write
2CCE000
stack
page read and write
31AD000
trusted library allocation
page read and write
7CE000
stack
page read and write
296F000
stack
page read and write
1A8B000
direct allocation
page read and write
3026000
direct allocation
page read and write
463000
unkown
page write copy
29B8000
trusted library allocation
page read and write
30D5000
direct allocation
page read and write
2FF1000
direct allocation
page read and write
583D000
heap
page read and write
5351000
unkown
page read and write
4793000
heap
page read and write
4E5F000
stack
page read and write
3119000
direct allocation
page read and write
8C4000
heap
page read and write
4EEC000
heap
page read and write
9E8000
heap
page read and write
32F4000
heap
page read and write
2BD0000
direct allocation
page read and write
14FF000
heap
page read and write
D1F000
heap
page read and write
57C6000
unkown
page read and write
3219000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
8C4000
heap
page read and write
5751000
unkown
page read and write
E7C000
heap
page read and write
4EA4000
trusted library allocation
page read and write
E60000
trusted library allocation
page execute and read and write
3CD3000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5341000
unkown
page read and write
2BE4000
heap
page read and write
3D2F000
trusted library allocation
page read and write
6A9E000
stack
page read and write
7990000
trusted library allocation
page execute and read and write
55C0000
trusted library allocation
page read and write
32F4000
heap
page read and write
2D14000
heap
page read and write
1405000
heap
page read and write
4C61000
unkown
page read and write
44E000
unkown
page read and write
32F4000
heap
page read and write
CEE000
stack
page read and write
53CD000
direct allocation
page read and write
2BE4000
heap
page read and write
49A0000
heap
page read and write
2E70000
heap
page read and write
42A000
unkown
page read and write
307D000
direct allocation
page read and write
3045000
direct allocation
page read and write
8C4000
heap
page read and write
3AB1000
heap
page read and write
4EF0000
trusted library allocation
page read and write
303C000
direct allocation
page read and write
2A3B000
trusted library allocation
page read and write
6415000
unkown
page read and write
6172000
unkown
page read and write
3076000
direct allocation
page read and write
1A33000
direct allocation
page read and write
1A75000
direct allocation
page read and write
300F000
direct allocation
page read and write
2650000
heap
page read and write
1736000
heap
page read and write
458000
unkown
page read and write
523F000
stack
page read and write
30AA000
direct allocation
page read and write
B60000
unkown
page readonly
9B8000
heap
page read and write
770000
heap
page read and write
17CF000
stack
page read and write
BDE000
stack
page read and write
3012000
direct allocation
page read and write
62D8000
unkown
page read and write
2B90000
trusted library allocation
page read and write
63A0000
unkown
page read and write
E32000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
9C0000
unkown
page readonly
6190000
heap
page read and write
52A0000
direct allocation
page read and write
305A000
trusted library allocation
page read and write
4B60000
unkown
page read and write
4F20000
heap
page read and write
32F4000
heap
page read and write
D7E000
heap
page read and write
5316000
heap
page read and write
32F4000
heap
page read and write
6650000
unkown
page read and write
3CBA000
trusted library allocation
page read and write
32F4000
heap
page read and write
3150000
trusted library allocation
page read and write
1010000
trusted library allocation
page execute and read and write
32F5000
heap
page read and write
309B000
direct allocation
page read and write
1836000
heap
page read and write
9CE000
heap
page read and write
7EBE000
stack
page read and write
2BE4000
heap
page read and write
2F44000
trusted library allocation
page read and write
7044F000
unkown
page readonly
44E000
unkown
page read and write
302B000
direct allocation
page read and write
32F5000
heap
page read and write
3890000
heap
page read and write
E35000
trusted library allocation
page execute and read and write
E3B000
trusted library allocation
page read and write
32F4000
heap
page read and write
4B62000
unkown
page read and write
E2A000
trusted library allocation
page execute and read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
32F4000
heap
page read and write
F90000
trusted library allocation
page read and write
458000
unkown
page read and write
7951000
trusted library section
page read and write
2BC0000
heap
page read and write
5341000
unkown
page read and write
3107000
trusted library allocation
page read and write
1281000
heap
page read and write
6310000
trusted library allocation
page execute and read and write
3D35000
trusted library allocation
page read and write
32F4000
heap
page read and write
32F4000
heap
page read and write
6276000
unkown
page read and write
32F4000
heap
page read and write
268E000
stack
page read and write
3768000
direct allocation
page read and write
30E4000
direct allocation
page read and write
8C4000
heap
page read and write
160000
unkown
page execute read
3D0E000
trusted library allocation
page read and write
2FFA000
direct allocation
page read and write
39B1000
heap
page read and write
30EC000
direct allocation
page read and write
2BE4000
heap
page read and write
F3F000
stack
page read and write
1A3C000
direct allocation
page read and write
173E000
heap
page read and write
60D0000
trusted library allocation
page read and write
5710000
heap
page read and write
8C4000
heap
page read and write
60C0000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
58AE000
stack
page read and write
2D61000
trusted library allocation
page read and write
2F00000
heap
page read and write
2664000
heap
page read and write
5341000
unkown
page read and write
2A30000
trusted library allocation
page read and write
1A93000
direct allocation
page read and write
3111000
trusted library allocation
page read and write
32F4000
heap
page read and write
32F4000
heap
page read and write
4C1F000
trusted library allocation
page read and write
39E6000
direct allocation
page read and write
4E9C000
trusted library allocation
page read and write
39CD000
heap
page read and write
1A0F000
direct allocation
page read and write
2BE4000
heap
page read and write
17F0000
heap
page read and write
1317000
heap
page read and write
2CAC000
trusted library allocation
page read and write
2B8D000
stack
page read and write
123000
unkown
page execute read
16CE000
stack
page read and write
80C0000
heap
page read and write
2A20000
heap
page read and write
3061000
direct allocation
page read and write
1080000
heap
page read and write
30B9000
direct allocation
page read and write
6170000
unkown
page read and write
3051000
direct allocation
page read and write
2F0E000
stack
page read and write
4DC0000
heap
page read and write
6170000
heap
page read and write
3093000
direct allocation
page read and write
70B000
stack
page read and write
7F6000
heap
page read and write
535E000
stack
page read and write
8C4000
heap
page read and write
2FF5000
trusted library allocation
page read and write
3085000
direct allocation
page read and write
5E3E000
stack
page read and write
39E0000
direct allocation
page read and write
A28000
heap
page read and write
2D14000
heap
page read and write
1A43000
direct allocation
page read and write
66C4000
unkown
page read and write
C50000
heap
page read and write
2BE4000
heap
page read and write
7EFE000
stack
page read and write
1243000
heap
page read and write
497E000
stack
page read and write
3CF9000
trusted library allocation
page read and write
F3E000
stack
page read and write
32F4000
heap
page read and write
FFBC0000
trusted library allocation
page execute and read and write
2664000
heap
page read and write
EA3000
unkown
page write copy
2D41000
trusted library allocation
page read and write
1317000
heap
page read and write
E48000
trusted library allocation
page read and write
513E000
stack
page read and write
5251000
unkown
page read and write
448000
unkown
page read and write
3ED4000
trusted library allocation
page read and write
3051000
direct allocation
page read and write
4C60000
unkown
page read and write
3058000
direct allocation
page read and write
2BE4000
heap
page read and write
2BE4000
heap
page read and write
30BA000
direct allocation
page read and write
305F000
direct allocation
page read and write
5341000
unkown
page read and write
6D40000
trusted library allocation
page read and write
80E000
stack
page read and write
2BE4000
heap
page read and write
2D14000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
61E6000
unkown
page read and write
B61000
unkown
page execute read
AF8000
stack
page read and write
4F58000
trusted library allocation
page read and write
7F5000
heap
page read and write
3103000
direct allocation
page read and write
438000
unkown
page read and write
1315000
heap
page read and write
30F0000
unkown
page read and write
E70000
heap
page read and write
5F42000
trusted library allocation
page read and write
5893000
heap
page read and write
5F6F000
trusted library allocation
page read and write
594F000
heap
page read and write
58B1000
heap
page read and write
2FE0000
direct allocation
page read and write
29DB000
stack
page read and write
DCD000
stack
page read and write
2A0D000
stack
page read and write
5700000
trusted library allocation
page execute and read and write
1830000
heap
page read and write
30B1000
direct allocation
page read and write
102B000
trusted library allocation
page read and write
309C000
direct allocation
page read and write
30AA000
direct allocation
page read and write
2FF8000
direct allocation
page read and write
33A0000
heap
page read and write
2A51000
trusted library allocation
page read and write
6E7E000
stack
page read and write
5200000
heap
page execute and read and write
2F07000
heap
page read and write
1257000
heap
page read and write
32F4000
heap
page read and write
51BD000
stack
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
562E000
stack
page read and write
61F4000
unkown
page read and write
7930000
trusted library allocation
page read and write
2FAD000
direct allocation
page read and write
4FC9000
direct allocation
page read and write
4D5B000
stack
page read and write
8C4000
heap
page read and write
6218000
heap
page read and write
47B0000
direct allocation
page read and write
2BE4000
heap
page read and write
1A4A000
direct allocation
page read and write
48D9000
direct allocation
page read and write
2ACC000
stack
page read and write
2BE4000
heap
page read and write
32F4000
heap
page read and write
3700000
direct allocation
page read and write
4D0D000
trusted library allocation
page read and write
3CF2000
trusted library allocation
page read and write
1340000
heap
page read and write
8C4000
heap
page read and write
10A0000
heap
page execute and read and write
2E3E000
trusted library allocation
page read and write
2F8F000
stack
page read and write
2E2E000
stack
page read and write
4E5D000
stack
page read and write
5650000
unkown
page read and write
4F5E000
stack
page read and write
39CD000
heap
page read and write
161F000
heap
page read and write
426A000
heap
page read and write
1320000
heap
page read and write
168F000
stack
page read and write
39C7000
heap
page read and write
39C7000
heap
page read and write
39CC000
heap
page read and write
3728000
direct allocation
page read and write
302F000
trusted library allocation
page read and write
3070000
direct allocation
page read and write
3D3D000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
E9F000
unkown
page readonly
30EF000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
448000
unkown
page read and write
51D4000
trusted library allocation
page read and write
307E000
direct allocation
page read and write
6186000
unkown
page read and write
39B7000
heap
page read and write
DE0000
trusted library allocation
page read and write
8C4000
heap
page read and write
308D000
direct allocation
page read and write
94B000
trusted library allocation
page execute and read and write
19FF000
direct allocation
page read and write
11EF000
stack
page read and write
2664000
heap
page read and write
72BA000
stack
page read and write
32F4000
heap
page read and write
39B1000
heap
page read and write
5341000
unkown
page read and write
30F2000
unkown
page read and write
32F4000
heap
page read and write
D00000
heap
page read and write
31D2000
trusted library allocation
page read and write
333E000
stack
page read and write
6F7E000
stack
page read and write
2BE4000
heap
page read and write
4EA1000
trusted library allocation
page read and write
5341000
unkown
page read and write
2664000
heap
page read and write
6160000
trusted library allocation
page execute and read and write
121000
unkown
page execute read
1A2C000
direct allocation
page read and write
7920000
trusted library allocation
page read and write
1207000
heap
page read and write
306F000
direct allocation
page read and write
12B8000
heap
page read and write
2A8C000
stack
page read and write
2FEA000
direct allocation
page read and write
31B7000
trusted library allocation
page read and write
36F8000
direct allocation
page read and write
2A10000
trusted library allocation
page read and write
30B8000
direct allocation
page read and write
36AB000
direct allocation
page read and write
E00000
trusted library allocation
page read and write
30F3000
direct allocation
page read and write
311C000
trusted library allocation
page read and write
198F000
direct allocation
page read and write
769C000
stack
page read and write
59A0000
unkown
page read and write
15B0000
heap
page read and write
9AE000
stack
page read and write
32F4000
heap
page read and write
505F000
stack
page read and write
72C0000
heap
page read and write
4ED0000
trusted library allocation
page read and write
1564000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
E04000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
6480000
unkown
page read and write
6D60000
trusted library allocation
page execute and read and write
C7F000
heap
page read and write
4FC0000
heap
page read and write
2BE4000
heap
page read and write
C49000
heap
page read and write
1327000
heap
page read and write
3F0000
heap
page read and write
32F4000
heap
page read and write
E1D000
trusted library allocation
page execute and read and write
41D5000
heap
page read and write
107E000
stack
page read and write
3076000
direct allocation
page read and write
2BE4000
heap
page read and write
2E61000
trusted library allocation
page read and write
1A16000
direct allocation
page read and write
C70000
trusted library allocation
page read and write
8C4000
heap
page read and write
6529000
unkown
page read and write
173E000
stack
page read and write
2ED0000
direct allocation
page read and write
4D50000
heap
page read and write
32F4000
heap
page read and write
1000000
trusted library allocation
page read and write
3B71000
heap
page read and write
15C0000
trusted library allocation
page execute and read and write
32F4000
heap
page read and write
2750000
direct allocation
page read and write
61DD000
heap
page read and write
2BE0000
heap
page read and write
4FB3000
heap
page read and write
72D0000
heap
page read and write
19D8000
direct allocation
page read and write
19D1000
direct allocation
page read and write
39D0000
heap
page read and write
3D38000
trusted library allocation
page read and write
2FDE000
stack
page read and write
39B8000
heap
page read and write
2BE4000
heap
page read and write
512E000
direct allocation
page read and write
1550000
trusted library allocation
page read and write
2664000
heap
page read and write
3A55000
trusted library allocation
page read and write
39B1000
heap
page read and write
2664000
heap
page read and write
3085000
direct allocation
page read and write
2CC8000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
2BE4000
heap
page read and write
3130000
trusted library allocation
page read and write
1700000
heap
page read and write
575E000
trusted library allocation
page read and write
FC7000
stack
page read and write
4538000
trusted library allocation
page read and write
32F4000
heap
page read and write
4F9B000
trusted library allocation
page read and write
1228000
heap
page read and write
3C7F000
heap
page read and write
EA3000
unkown
page read and write
5341000
unkown
page read and write
32F4000
heap
page read and write
1560000
heap
page read and write
2BE4000
heap
page read and write
4F21000
trusted library allocation
page read and write
26CE000
stack
page read and write
E60000
heap
page read and write
3131000
trusted library allocation
page read and write
4EDB000
heap
page read and write
2FE9000
direct allocation
page read and write
E20000
trusted library allocation
page read and write
32F4000
heap
page read and write
6254000
heap
page read and write
645E000
stack
page read and write
2D14000
heap
page read and write
2F0B000
trusted library allocation
page read and write
463000
unkown
page read and write
2EF6000
trusted library allocation
page read and write
56AE000
stack
page read and write
32F4000
heap
page read and write
3111000
trusted library allocation
page read and write
3095000
direct allocation
page read and write
39CA000
heap
page read and write
19BE000
direct allocation
page read and write
2D14000
heap
page read and write
2664000
heap
page read and write
6B9E000
stack
page read and write
64D3000
trusted library allocation
page read and write
E37000
trusted library allocation
page execute and read and write
6180000
heap
page read and write
30DC000
direct allocation
page read and write
8C4000
heap
page read and write
14FE000
stack
page read and write
5341000
unkown
page read and write
1A60000
direct allocation
page read and write
5370000
trusted library allocation
page execute and read and write
3100000
heap
page read and write
2F0E000
trusted library allocation
page read and write
7BB0000
heap
page read and write
277C000
heap
page read and write
2BE4000
heap
page read and write
1A25000
direct allocation
page read and write
145E000
stack
page read and write
37C0000
heap
page read and write
306F000
direct allocation
page read and write
2FC5000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
16FF000
stack
page read and write
11F0000
trusted library allocation
page read and write
2BE4000
heap
page read and write
8C4000
heap
page read and write
1813000
heap
page read and write
2D14000
heap
page read and write
3171000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
F50000
heap
page read and write
E77000
heap
page read and write
3A7B000
heap
page read and write
4F0E000
trusted library allocation
page read and write
32F4000
heap
page read and write
5341000
unkown
page read and write
1BD9000
heap
page read and write
E88000
unkown
page read and write
D2B000
heap
page read and write
4F90000
direct allocation
page read and write
8C4000
heap
page read and write
4D10000
heap
page read and write
28EF000
stack
page read and write
2F54000
trusted library allocation
page read and write
1417000
heap
page read and write
438000
unkown
page read and write
8C4000
heap
page read and write
129000
unkown
page execute read
61D0000
unkown
page read and write
70446000
unkown
page readonly
755D000
stack
page read and write
2E50000
trusted library allocation
page read and write
372E000
direct allocation
page read and write
30C1000
direct allocation
page read and write
38B4000
heap
page read and write
2CB0000
trusted library allocation
page read and write
29CF000
stack
page read and write
2F50000
heap
page read and write
2BE4000
heap
page read and write
19E1000
direct allocation
page read and write
30CE000
direct allocation
page read and write
1A84000
direct allocation
page read and write
70431000
unkown
page execute read
2BE4000
heap
page read and write
32F4000
heap
page read and write
8B0000
heap
page read and write
342C000
heap
page read and write
281E000
stack
page read and write
32F4000
heap
page read and write
2E57000
trusted library allocation
page read and write
50AB000
heap
page read and write
C10000
heap
page read and write
2770000
heap
page read and write
3041000
direct allocation
page read and write
55EE000
stack
page read and write
791D000
stack
page read and write
309C000
direct allocation
page read and write
3053000
direct allocation
page read and write
3094000
direct allocation
page read and write
1563000
trusted library allocation
page execute and read and write
2664000
heap
page read and write
5341000
unkown
page read and write
8C4000
heap
page read and write
32F4000
heap
page read and write
17E0000
trusted library allocation
page read and write
32F4000
heap
page read and write
9D3000
heap
page read and write
43E000
unkown
page write copy
32F4000
heap
page read and write
8C4000
heap
page read and write
4ED0000
heap
page read and write
2BE4000
heap
page read and write
1AB1000
direct allocation
page read and write
30EC000
direct allocation
page read and write
3AB1000
heap
page read and write
57B2000
unkown
page read and write
2740000
heap
page read and write
8C4000
heap
page read and write
D39000
heap
page read and write
2BB1000
trusted library allocation
page read and write
1980000
direct allocation
page read and write
4DEA000
heap
page read and write
EA4000
unkown
page readonly
51C0000
trusted library allocation
page execute and read and write
1AE0000
heap
page read and write
448000
unkown
page read and write
23AB000
stack
page read and write
E8E000
unkown
page read and write
32F4000
heap
page read and write
1510000
heap
page read and write
88B000
stack
page read and write
6100000
trusted library allocation
page execute and read and write
159B000
trusted library allocation
page execute and read and write
2E78000
trusted library allocation
page read and write
2664000
heap
page read and write
7418000
stack
page read and write
50BD000
direct allocation
page read and write
39CA000
heap
page read and write
30CE000
direct allocation
page read and write
39C7000
heap
page read and write
2664000
heap
page read and write
56ED000
trusted library allocation
page read and write
2BE4000
heap
page read and write
3CB5000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
3001000
unkown
page read and write
38B0000
heap
page read and write
7044D000
unkown
page read and write
3460000
direct allocation
page execute and read and write
2FDB000
direct allocation
page read and write
4C61000
unkown
page read and write
3AB7000
heap
page read and write
2BE4000
heap
page read and write
2D14000
heap
page read and write
C7B000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
6D20000
trusted library section
page read and write
6D1D000
stack
page read and write
198D000
direct allocation
page read and write
FB0000
heap
page read and write
2F9E000
stack
page read and write
79B0000
heap
page read and write
30C7000
direct allocation
page read and write
1200000
heap
page read and write
1320000
heap
page read and write
3101000
trusted library allocation
page read and write
6754000
unkown
page read and write
30AE000
stack
page read and write
145E000
stack
page read and write
There are 1247 hidden memdumps, click here to show them.