IOC Report
https://finalstepgetshere.com/uploads/beta111.zip

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\beta111.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 17:12:57 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 17:12:57 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 09:23:19 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 17:12:57 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 17:12:57 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 17:12:57 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\beta111.zip.crdownload
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 66
Zip archive data, at least v2.0 to extract, compression method=deflate
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2004,i,5079889322829463843,17366028058288366952,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://finalstepgetshere.com/uploads/beta111.zip"
malicious
C:\Users\user\Downloads\beta111\pen-drive-rec.exe
"C:\Users\user\Downloads\beta111\pen-drive-rec.exe"
malicious
C:\Users\user\Downloads\beta111\pen-drive-rec.exe
"C:\Users\user\Downloads\beta111\pen-drive-rec.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
https://finalstepgetshere.com/uploads/beta111.zip
malicious
opponnentduei.shop
malicious
achievenmtynwjq.shop
malicious
milldymarskwom.shop
malicious
https://steamcommunity.com/profiles/76561199724331900s
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
quotamkdsdqo.shop
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
chickerkuso.shop
malicious
metallygaricwo.shop
malicious
https://gravvitywio.store/api
172.67.209.193
malicious
carrtychaintnyw.shop
malicious
https://player.vimeo.com
unknown
https://achievenmtynwjq.shop/
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://fontawesome.com
unknown
https://gravvitywio.store/
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://github.com/gabomdq/SDL_GameControllerDB
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://chart-studio.plotly.com
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://github.com/voidqk/polybooljs
unknown
http://getify.mit-license.org
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://syntheti.cc
unknown
https://help.steampowered.com/en/
unknown
https://finalstepgetshere.com/uploads/beta111.zip
185.255.122.133
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://github.com/arl/statsviz
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://fontawesome.com/license/free
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://gravvitywio.store/T
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=0qXC
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=TlXuhKjTdHfu&l=e
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://github.com/go-sql-driver/mysql/wiki/strict-modepkcs7:
unknown
https://gravvitywio.store/apiM
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://github.com/uber-go/dig/issues/new
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://pkg.go.dev/runtime/metrics#hdr-Supported_metrics
unknown
https://getbootstrap.com/)
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gravvitywio.store
172.67.209.193
malicious
milldymarskwom.shop
unknown
malicious
chickerkuso.shop
unknown
malicious
opponnentduei.shop
unknown
malicious
carrtychaintnyw.shop
unknown
malicious
quotamkdsdqo.shop
unknown
malicious
puredoffustow.shop
unknown
malicious
achievenmtynwjq.shop
unknown
malicious
metallygaricwo.shop
unknown
malicious
steamcommunity.com
104.102.49.254
finalstepgetshere.com
185.255.122.133
www.google.com
142.250.184.196
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.209.193
gravvitywio.store
United States
malicious
192.168.2.18
unknown
unknown
malicious
185.255.122.133
finalstepgetshere.com
Netherlands
142.250.184.196
www.google.com
United States
239.255.255.250
unknown
Reserved
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2F5F000
remote allocation
page execute and read and write
malicious
7FF66A463000
unkown
page readonly
malicious
7FF66A3E5000
unkown
page readonly
1EAF61ED000
direct allocation
page read and write
7FF66A354000
unkown
page readonly
C000839000
direct allocation
page read and write
C000696000
direct allocation
page read and write
1EAB108A000
direct allocation
page read and write
D7447FE000
stack
page read and write
33F0000
heap
page read and write
34DD000
stack
page read and write
C0000BE000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
C000576000
direct allocation
page read and write
C000EDA000
direct allocation
page read and write
2AEF8BAE000
direct allocation
page read and write
2AB24300000
heap
page read and write
33F5000
heap
page read and write
C000566000
direct allocation
page read and write
C0005AA000
direct allocation
page read and write
C00085E000
direct allocation
page read and write
C0006EF000
direct allocation
page read and write
C000036000
direct allocation
page read and write
C000735000
direct allocation
page read and write
C000517000
direct allocation
page read and write
C0006FF000
direct allocation
page read and write
C00075F000
direct allocation
page read and write
C000073000
direct allocation
page read and write
358F000
heap
page read and write
C000B48000
direct allocation
page read and write
7FF66A412000
unkown
page readonly
C000A28000
direct allocation
page read and write
4A7ADFE000
stack
page read and write
7FF668651000
unkown
page execute read
C000E62000
direct allocation
page read and write
7FF6697CF000
unkown
page read and write
7FF66A402000
unkown
page readonly
C0008A4000
direct allocation
page read and write
C000003000
direct allocation
page read and write
2AB24310000
heap
page read and write
7FF6696F8000
unkown
page read and write
C0006BF000
direct allocation
page read and write
C0004A9000
direct allocation
page read and write
C000801000
direct allocation
page read and write
37FF000
stack
page read and write
C000F37000
direct allocation
page read and write
2AEF8B5F000
direct allocation
page read and write
C000727000
direct allocation
page read and write
C0008F2000
direct allocation
page read and write
1EAF644D000
direct allocation
page read and write
C000B8E000
direct allocation
page read and write
C00082E000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C000A57000
direct allocation
page read and write
C000737000
direct allocation
page read and write
C000B72000
direct allocation
page read and write
2AEF35E4000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
7FF6697DE000
unkown
page read and write
C000677000
direct allocation
page read and write
2AEF8AFA000
direct allocation
page read and write
C00007B000
direct allocation
page read and write
35BF000
heap
page read and write
C00053B000
direct allocation
page read and write
C00060C000
direct allocation
page read and write
C0001B2000
direct allocation
page read and write
2AEF8BA8000
direct allocation
page read and write
C00079B000
direct allocation
page read and write
C000B36000
direct allocation
page read and write
352E000
heap
page read and write
2AB242E0000
heap
page read and write
C0007D2000
direct allocation
page read and write
1EAF6380000
direct allocation
page read and write
C000727000
direct allocation
page read and write
1EAB0D1B000
heap
page read and write
C000A8D000
direct allocation
page read and write
343E000
stack
page read and write
2AEFA709000
direct allocation
page read and write
C000B2E000
direct allocation
page read and write
C00019E000
direct allocation
page read and write
C000A2C000
direct allocation
page read and write
C0006C7000
direct allocation
page read and write
2FFE000
stack
page read and write
2AB24100000
heap
page read and write
C0006A3000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
C000995000
direct allocation
page read and write
7FF66A447000
unkown
page readonly
2AEF8B7B000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
3592000
heap
page read and write
352A000
heap
page read and write
35A3000
heap
page read and write
C000474000
direct allocation
page read and write
C0005D9000
direct allocation
page read and write
C00076B000
direct allocation
page read and write
C000ADA000
direct allocation
page read and write
D7449FD000
stack
page read and write
7FF6696E8000
unkown
page read and write
C000854000
direct allocation
page read and write
C000720000
direct allocation
page read and write
7FF66A426000
unkown
page readonly
C0001A8000
direct allocation
page read and write
1EAB1075000
direct allocation
page read and write
C00068D000
direct allocation
page read and write
7FF66A432000
unkown
page readonly
7FF66AE63000
unkown
page readonly
C000AC4000
direct allocation
page read and write
35AD000
heap
page read and write
C000A34000
direct allocation
page read and write
1EAB1053000
direct allocation
page read and write
7FF669805000
unkown
page read and write
C0006F5000
direct allocation
page read and write
C0006BA000
direct allocation
page read and write
3547000
heap
page read and write
C000483000
direct allocation
page read and write
7FF6697ED000
unkown
page read and write
569D000
stack
page read and write
C000042000
direct allocation
page read and write
2AEF8ACD000
direct allocation
page read and write
7FF669816000
unkown
page readonly
35C0000
heap
page read and write
C0001FB000
direct allocation
page read and write
3560000
heap
page read and write
C00082A000
direct allocation
page read and write
1EAF6442000
direct allocation
page read and write
C0000A3000
direct allocation
page read and write
7FF6696F8000
unkown
page read and write
C000036000
direct allocation
page read and write
C0004D1000
direct allocation
page read and write
C000B4E000
direct allocation
page read and write
2AEF36D0000
heap
page read and write
C000B9C000
direct allocation
page read and write
7FF66A3C9000
unkown
page readonly
C000830000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C00091A000
direct allocation
page read and write
C0009E0000
direct allocation
page read and write
7FF66A417000
unkown
page readonly
C000AA0000
direct allocation
page read and write
1EAF61F0000
direct allocation
page read and write
C0007C2000
direct allocation
page read and write
1EAB1030000
heap
page read and write
C0006FD000
direct allocation
page read and write
C000713000
direct allocation
page read and write
7FF66A423000
unkown
page readonly
C000106000
direct allocation
page read and write
3557000
heap
page read and write
C000892000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0006D1000
direct allocation
page read and write
2AEF3684000
direct allocation
page read and write
C00089A000
direct allocation
page read and write
2AEF8AFD000
direct allocation
page read and write
2AEFA680000
heap
page read and write
C0009B0000
direct allocation
page read and write
C000BA6000
direct allocation
page read and write
7FF66B06D000
unkown
page read and write
7FF66B0E2000
unkown
page write copy
C000A3A000
direct allocation
page read and write
C00070F000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
2AEF8B20000
direct allocation
page read and write
2AEF34E9000
heap
page read and write
C0008FA000
direct allocation
page read and write
C000B52000
direct allocation
page read and write
C00089C000
direct allocation
page read and write
3594000
heap
page read and write
C0006B3000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C000557000
direct allocation
page read and write
1EAF64AD000
direct allocation
page read and write
C000789000
direct allocation
page read and write
7FF6697F8000
unkown
page read and write
C000054000
direct allocation
page read and write
3560000
heap
page read and write
2AEF8BF2000
direct allocation
page read and write
1EAF639D000
direct allocation
page read and write
1EAF6410000
direct allocation
page read and write
4A7AFFF000
stack
page read and write
C00017C000
direct allocation
page read and write
7FF66B07B000
unkown
page read and write
C000751000
direct allocation
page read and write
C000BD2000
direct allocation
page read and write
C000A5E000
direct allocation
page read and write
1EAF64F1000
direct allocation
page read and write
D7451FF000
stack
page read and write
1EAB0D39000
heap
page read and write
C000861000
direct allocation
page read and write
7FF6696E4000
unkown
page read and write
C000B70000
direct allocation
page read and write
1EAF644F000
direct allocation
page read and write
582E000
stack
page read and write
1EAB1085000
direct allocation
page read and write
C000ABA000
direct allocation
page read and write
C000196000
direct allocation
page read and write
C000AA8000
direct allocation
page read and write
3548000
heap
page read and write
7FF6696EA000
unkown
page read and write
C00091E000
direct allocation
page read and write
C00010F000
direct allocation
page read and write
C00072A000
direct allocation
page read and write
C000B42000
direct allocation
page read and write
C0007C9000
direct allocation
page read and write
C0006E3000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000A76000
direct allocation
page read and write
C000466000
direct allocation
page read and write
C000114000
direct allocation
page read and write
C00076D000
direct allocation
page read and write
C000070000
direct allocation
page read and write
C00078B000
direct allocation
page read and write
C000040000
direct allocation
page read and write
7FF66A42A000
unkown
page readonly
C0001ED000
direct allocation
page read and write
2AEF34C0000
heap
page read and write
C00059B000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
2AEF8ADB000
direct allocation
page read and write
C00099A000
direct allocation
page read and write
7FF66A42E000
unkown
page readonly
C000828000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C0007A6000
direct allocation
page read and write
C000ACC000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0009FC000
direct allocation
page read and write
C000AB2000
direct allocation
page read and write
C00073B000
direct allocation
page read and write
C00077D000
direct allocation
page read and write
C000A1E000
direct allocation
page read and write
2AEF33D0000
heap
page read and write
C000052000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
C000A18000
direct allocation
page read and write
2AB24305000
heap
page read and write
D7453FE000
stack
page read and write
C000A3E000
direct allocation
page read and write
C0004A6000
direct allocation
page read and write
C00007D000
direct allocation
page read and write
2AEF8B94000
direct allocation
page read and write
7FF66A40B000
unkown
page readonly
D744BFE000
stack
page read and write
357F000
heap
page read and write
C0007AC000
direct allocation
page read and write
C000AC6000
direct allocation
page read and write
D45087F000
stack
page read and write
2AEF8B10000
direct allocation
page read and write
C0005A4000
direct allocation
page read and write
7FF669805000
unkown
page read and write
C000111000
direct allocation
page read and write
7FF6696E4000
unkown
page write copy
D7445FE000
stack
page read and write
7FF66A3F7000
unkown
page readonly
C0000E0000
direct allocation
page read and write
C0006E7000
direct allocation
page read and write
1EAF64EB000
direct allocation
page read and write
2AEF8BAB000
direct allocation
page read and write
C0007A1000
direct allocation
page read and write
1EAB0EE4000
direct allocation
page read and write
C000172000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
7FF6697DE000
unkown
page read and write
4FE0000
remote allocation
page read and write
C000184000
direct allocation
page read and write
4A7B1FF000
stack
page read and write
7FF66A449000
unkown
page readonly
C000A40000
direct allocation
page read and write
C000B80000
direct allocation
page read and write
7FF66A216000
unkown
page readonly
C000A26000
direct allocation
page read and write
C0005B9000
direct allocation
page read and write
7FF6697E8000
unkown
page read and write
C000920000
direct allocation
page read and write
2AEFA6D0000
direct allocation
page read and write
1EAB107C000
direct allocation
page read and write
C000BA8000
direct allocation
page read and write
C000ADC000
direct allocation
page read and write
1EAF64B7000
direct allocation
page read and write
35AC000
heap
page read and write
C0007E6000
direct allocation
page read and write
C0006E9000
direct allocation
page read and write
7FF66B092000
unkown
page read and write
502E000
stack
page read and write
C0007D9000
direct allocation
page read and write
1EAF64F4000
direct allocation
page read and write
2AB24840000
heap
page read and write
2AEF8B03000
direct allocation
page read and write
1EAF63FA000
direct allocation
page read and write
2AEF8910000
direct allocation
page read and write
7FF66A405000
unkown
page readonly
1EAF642E000
direct allocation
page read and write
D743FFC000
stack
page read and write
C0000D0000
direct allocation
page read and write
C000A8A000
direct allocation
page read and write
C000154000
direct allocation
page read and write
35AA000
heap
page read and write
4A7B9FE000
stack
page read and write
C00093C000
direct allocation
page read and write
35B9000
heap
page read and write
C0006FB000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C0004D2000
direct allocation
page read and write
C000ADE000
direct allocation
page read and write
C000900000
direct allocation
page read and write
C0009E0000
direct allocation
page read and write
C000781000
direct allocation
page read and write
7FF66B06D000
unkown
page read and write
C000A4A000
direct allocation
page read and write
C0006C3000
direct allocation
page read and write
2AEF3640000
direct allocation
page read and write
C0005F2000
direct allocation
page read and write
2AEF88ED000
direct allocation
page read and write
C0005B5000
direct allocation
page read and write
C0006F9000
direct allocation
page read and write
C0005F0000
direct allocation
page read and write
1EAB0EE8000
direct allocation
page read and write
C000A00000
direct allocation
page read and write
7FF66B0DE000
unkown
page write copy
C0005A0000
direct allocation
page read and write
1EAF6432000
direct allocation
page read and write
C000896000
direct allocation
page read and write
C0009AE000
direct allocation
page read and write
1EAB1056000
direct allocation
page read and write
C000124000
direct allocation
page read and write
7FF6697D7000
unkown
page read and write
C000A32000
direct allocation
page read and write
2AEF8904000
direct allocation
page read and write
C000769000
direct allocation
page read and write
C000580000
direct allocation
page read and write
C000777000
direct allocation
page read and write
C00046D000
direct allocation
page read and write
C0008AA000
direct allocation
page read and write
C000113000
direct allocation
page read and write
2AEF34CC000
heap
page read and write
35C7000
heap
page read and write
C000138000
direct allocation
page read and write
35B2000
heap
page read and write
7FF6697D3000
unkown
page read and write
7FF66B0C6000
unkown
page read and write
C000858000
direct allocation
page read and write
C000AAE000
direct allocation
page read and write
C0009F4000
direct allocation
page read and write
C00070D000
direct allocation
page read and write
2AEF3650000
direct allocation
page read and write
1EAB10CC000
direct allocation
page read and write
C000466000
direct allocation
page read and write
C0006DD000
direct allocation
page read and write
C000803000
direct allocation
page read and write
C000A38000
direct allocation
page read and write
2F65000
remote allocation
page execute and read and write
35C6000
heap
page read and write
D744FFD000
stack
page read and write
C00049F000
direct allocation
page read and write
3500000
heap
page read and write
C00099C000
direct allocation
page read and write
C0008F8000
direct allocation
page read and write
C000B92000
direct allocation
page read and write
C000B30000
direct allocation
page read and write
C000A4B000
direct allocation
page read and write
7FF66B0DE000
unkown
page read and write
C000882000
direct allocation
page read and write
C0008C4000
direct allocation
page read and write
1EAF63D3000
direct allocation
page read and write
7FF66A3EC000
unkown
page readonly
C000464000
direct allocation
page read and write
C000659000
direct allocation
page read and write
C000966000
direct allocation
page read and write
C0008D1000
direct allocation
page read and write
C000ABC000
direct allocation
page read and write
7FF6697CD000
unkown
page read and write
7FF66A3D8000
unkown
page readonly
1EAF6390000
direct allocation
page read and write
2AEF35C0000
heap
page read and write
1EAB1090000
direct allocation
page read and write
359A000
heap
page read and write
5050000
heap
page read and write
4A7ABFE000
stack
page read and write
3580000
heap
page read and write
358F000
heap
page read and write
1EAB0CA0000
heap
page read and write
D4504FC000
stack
page read and write
C00065F000
direct allocation
page read and write
2AEF3660000
heap
page read and write
4FDD000
stack
page read and write
C00085C000
direct allocation
page read and write
C00092E000
direct allocation
page read and write
C0006CD000
direct allocation
page read and write
C0007CB000
direct allocation
page read and write
515E000
stack
page read and write
1EAB0D10000
heap
page read and write
C00049B000
direct allocation
page read and write
C000B52000
direct allocation
page read and write
7FF66A407000
unkown
page readonly
C000635000
direct allocation
page read and write
56DD000
stack
page read and write
359D000
heap
page read and write
347E000
stack
page read and write
33D0000
heap
page read and write
2AEF88E9000
direct allocation
page read and write
1EAF64FC000
direct allocation
page read and write
C000735000
direct allocation
page read and write
C0004B3000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C000786000
direct allocation
page read and write
7FF66B092000
unkown
page read and write
7FF66A415000
unkown
page readonly
2AB241E8000
heap
page read and write
1EAB10D0000
heap
page read and write
C0009D8000
direct allocation
page read and write
7FF6696E8000
unkown
page read and write
7FF6697DC000
unkown
page read and write
C000A60000
direct allocation
page read and write
C000146000
direct allocation
page read and write
C0004DC000
direct allocation
page read and write
C000A9A000
direct allocation
page read and write
C000507000
direct allocation
page read and write
357A000
heap
page read and write
C000640000
direct allocation
page read and write
2EDC000
stack
page read and write
C0009AA000
direct allocation
page read and write
C0005AC000
direct allocation
page read and write
2AEF8ABB000
direct allocation
page read and write
C0005B0000
direct allocation
page read and write
C00083B000
direct allocation
page read and write
C0001A4000
direct allocation
page read and write
C0005D4000
direct allocation
page read and write
3553000
heap
page read and write
35D3000
heap
page read and write
D4505FE000
stack
page read and write
C00009C000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C0006FF000
direct allocation
page read and write
7FF66980F000
unkown
page read and write
C0000FC000
direct allocation
page read and write
C000A54000
direct allocation
page read and write
C000662000
direct allocation
page read and write
C000623000
direct allocation
page read and write
C0004BC000
direct allocation
page read and write
C000958000
direct allocation
page read and write
C00050B000
direct allocation
page read and write
7FF66B0E4000
unkown
page readonly
C000588000
direct allocation
page read and write
35A3000
heap
page read and write
C0000B6000
direct allocation
page read and write
7FF669051000
unkown
page execute read
C00091C000
direct allocation
page read and write
1EAB0EE0000
direct allocation
page read and write
C000AD8000
direct allocation
page read and write
2AEF88E0000
direct allocation
page read and write
C000605000
direct allocation
page read and write
1EAB0D00000
direct allocation
page read and write
C000747000
direct allocation
page read and write
C00066D000
direct allocation
page read and write
35B6000
heap
page read and write
36FF000
stack
page read and write
C000773000
direct allocation
page read and write
3531000
heap
page read and write
C00012C000
direct allocation
page read and write
3544000
heap
page read and write
C000A92000
direct allocation
page read and write
C000AD4000
direct allocation
page read and write
C0008B4000
direct allocation
page read and write
C0005AE000
direct allocation
page read and write
C0009D4000
direct allocation
page read and write
2AEF8AF3000
direct allocation
page read and write
C0004A4000
direct allocation
page read and write
C000105000
direct allocation
page read and write
C000B54000
direct allocation
page read and write
3480000
heap
page read and write
C0009B2000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
C0006A7000
direct allocation
page read and write
C000079000
direct allocation
page read and write
3508000
heap
page read and write
C000A32000
direct allocation
page read and write
3539000
heap
page read and write
D7443FE000
stack
page read and write
2AEF36D5000
heap
page read and write
2AEF8BA0000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
C0007F2000
direct allocation
page read and write
2AEF8AE1000
direct allocation
page read and write
C000AB4000
direct allocation
page read and write
C000577000
direct allocation
page read and write
7FF66A41F000
unkown
page readonly
D45057E000
stack
page read and write
4FE0000
remote allocation
page read and write
C000613000
direct allocation
page read and write
C000A9E000
direct allocation
page read and write
7FF668650000
unkown
page readonly
3528000
heap
page read and write
C0001D8000
direct allocation
page read and write
C000675000
direct allocation
page read and write
C0008F6000
direct allocation
page read and write
C0009F8000
direct allocation
page read and write
C000A2C000
direct allocation
page read and write
356F000
heap
page read and write
7FF66A3FC000
unkown
page readonly
C0006F6000
direct allocation
page read and write
525D000
stack
page read and write
7FF66A3DB000
unkown
page readonly
C00018E000
direct allocation
page read and write
C00010D000
direct allocation
page read and write
2AEF8B9D000
direct allocation
page read and write
C0009E2000
direct allocation
page read and write
C00085A000
direct allocation
page read and write
C0009BC000
direct allocation
page read and write
C0009A0000
direct allocation
page read and write
C000A6C000
direct allocation
page read and write
C000A74000
direct allocation
page read and write
C000069000
direct allocation
page read and write
2AEF8ACA000
direct allocation
page read and write
C0001A0000
direct allocation
page read and write
C000715000
direct allocation
page read and write
351C000
heap
page read and write
2AEF88FB000
direct allocation
page read and write
C0007BF000
direct allocation
page read and write
7FF66A450000
unkown
page readonly
35A7000
heap
page read and write
C0009DA000
direct allocation
page read and write
7FF669803000
unkown
page read and write
C0009CA000
direct allocation
page read and write
C00074F000
direct allocation
page read and write
7FF66A44B000
unkown
page readonly
C000AB6000
direct allocation
page read and write
C00046F000
direct allocation
page read and write
1EAB10D5000
heap
page read and write
3523000
heap
page read and write
7FF6696F1000
unkown
page read and write
1EAF61E9000
direct allocation
page read and write
C000832000
direct allocation
page read and write
4A7A9FC000
stack
page read and write
1EAB1020000
direct allocation
page read and write
7FF6697EA000
unkown
page read and write
7FF66A3F1000
unkown
page readonly
C000BA2000
direct allocation
page read and write
C000C9D000
direct allocation
page read and write
353B000
heap
page read and write
7FF66B0C0000
unkown
page read and write
C000E26000
direct allocation
page read and write
C000186000
direct allocation
page read and write
C000BA0000
direct allocation
page read and write
C0006C9000
direct allocation
page read and write
C0009CC000
direct allocation
page read and write
C000079000
direct allocation
page read and write
C0009F2000
direct allocation
page read and write
1EAF61E2000
direct allocation
page read and write
1EAF644B000
direct allocation
page read and write
35CC000
heap
page read and write
C00016A000
direct allocation
page read and write
D7441FF000
stack
page read and write
2AEF8B00000
direct allocation
page read and write
C0007AF000
direct allocation
page read and write
C000042000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
2AEF8AD8000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
2AEF8BA6000
direct allocation
page read and write
7FF66B0C0000
unkown
page read and write
C000B74000
direct allocation
page read and write
C00019C000
direct allocation
page read and write
359B000
heap
page read and write
2AEF35E0000
direct allocation
page read and write
C000C2B000
direct allocation
page read and write
7FF66A3D6000
unkown
page readonly
3565000
heap
page read and write
1EAB0CB0000
heap
page read and write
7FF6697E8000
unkown
page read and write
C0006B7000
direct allocation
page read and write
C000722000
direct allocation
page read and write
4A7BBFF000
stack
page read and write
C000086000
direct allocation
page read and write
2AEF8B1C000
direct allocation
page read and write
7FF669812000
unkown
page read and write
C000A40000
direct allocation
page read and write
7FF66B07B000
unkown
page read and write
C000A7A000
direct allocation
page read and write
2AEFA790000
direct allocation
page read and write
C0007D4000
direct allocation
page read and write
C00046B000
direct allocation
page read and write
2AEF88F3000
direct allocation
page read and write
1EAF6502000
direct allocation
page read and write
C000628000
direct allocation
page read and write
4FE0000
remote allocation
page read and write
1EAF6448000
direct allocation
page read and write
C000A60000
direct allocation
page read and write
4A7B5FF000
stack
page read and write
356A000
heap
page read and write
C000152000
direct allocation
page read and write
2AEF35E8000
direct allocation
page read and write
7FF66A3FF000
unkown
page readonly
C0001E8000
direct allocation
page read and write
C0007F5000
direct allocation
page read and write
C000526000
direct allocation
page read and write
C000884000
direct allocation
page read and write
C000598000
direct allocation
page read and write
C000651000
direct allocation
page read and write
C000816000
direct allocation
page read and write
35A0000
heap
page read and write
C000763000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C000800000
direct allocation
page read and write
2FB0000
heap
page read and write
33CF000
stack
page read and write
2AEF890E000
direct allocation
page read and write
C00099E000
direct allocation
page read and write
C000188000
direct allocation
page read and write
358A000
heap
page read and write
1EAF6506000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C000472000
direct allocation
page read and write
C000582000
direct allocation
page read and write
4A7B3FE000
stack
page read and write
C000B00000
direct allocation
page read and write
C000C00000
direct allocation
page read and write
357A000
heap
page read and write
C000130000
direct allocation
page read and write
C000880000
direct allocation
page read and write
4A7B7FE000
stack
page read and write
C000464000
direct allocation
page read and write
2AEFA730000
direct allocation
page read and write
C000794000
direct allocation
page read and write
C00082C000
direct allocation
page read and write
35A7000
heap
page read and write
C00007D000
direct allocation
page read and write
C0004BF000
direct allocation
page read and write
7FF66B0C6000
unkown
page read and write
C000A4E000
direct allocation
page read and write
35B8000
heap
page read and write
2E9C000
stack
page read and write
C00075F000
direct allocation
page read and write
1EAF64E3000
direct allocation
page read and write
C0009A4000
direct allocation
page read and write
C00065F000
direct allocation
page read and write
C00069A000
direct allocation
page read and write
C000540000
direct allocation
page read and write
C000AC8000
direct allocation
page read and write
2AEF3680000
direct allocation
page read and write
C0009A2000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
C0009FA000
direct allocation
page read and write
7FF6697CF000
unkown
page read and write
3588000
heap
page read and write
C0006D5000
direct allocation
page read and write
2AEF34FB000
heap
page read and write
2AEFA710000
direct allocation
page read and write
C00064E000
direct allocation
page read and write
C000741000
direct allocation
page read and write
C000C00000
direct allocation
page read and write
C000003000
direct allocation
page read and write
2AEFA7EF000
direct allocation
page read and write
C0007B1000
direct allocation
page read and write
C000596000
direct allocation
page read and write
7FF6697D7000
unkown
page read and write
C000069000
direct allocation
page read and write
C0006E9000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
1EAB0EF0000
direct allocation
page read and write
57DE000
stack
page read and write
C000A46000
direct allocation
page read and write
1EAF61E0000
direct allocation
page read and write
C0008BC000
direct allocation
page read and write
7FF66A435000
unkown
page readonly
C000848000
direct allocation
page read and write
592F000
stack
page read and write
C000A7E000
direct allocation
page read and write
C000A42000
direct allocation
page read and write
1EAF7FB0000
heap
page read and write
1EAF61F6000
direct allocation
page read and write
7FF6697D9000
unkown
page read and write
D7455FF000
stack
page read and write
C00007B000
direct allocation
page read and write
2AB241E0000
heap
page read and write
C0006F9000
direct allocation
page read and write
C00058B000
direct allocation
page read and write
C000A52000
direct allocation
page read and write
C0007B5000
direct allocation
page read and write
C0006E7000
direct allocation
page read and write
C000846000
direct allocation
page read and write
C000B10000
direct allocation
page read and write
D744DFF000
stack
page read and write
C0008DA000
direct allocation
page read and write
C000711000
direct allocation
page read and write
There are 676 hidden memdumps, click here to show them.