IOC Report
8ObkdHP9Hq.exe

loading gif

Files

File Path
Type
Category
Malicious
8ObkdHP9Hq.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000349001\9d7da53f74.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 155
ASCII text, with very long lines (395)
downloaded
Chrome Cache Entry: 156
ASCII text, with very long lines (755)
downloaded
Chrome Cache Entry: 157
ASCII text, with very long lines (1694)
downloaded
Chrome Cache Entry: 158
ASCII text, with very long lines (683)
downloaded
Chrome Cache Entry: 159
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 160
ASCII text, with very long lines (2907)
downloaded
Chrome Cache Entry: 161
ASCII text, with very long lines (5693)
downloaded
Chrome Cache Entry: 162
HTML document, ASCII text, with very long lines (681)
downloaded
Chrome Cache Entry: 163
ASCII text, with very long lines (533)
downloaded
Chrome Cache Entry: 164
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 165
ASCII text, with very long lines (570)
downloaded
Chrome Cache Entry: 166
ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 167
ASCII text, with very long lines (553)
downloaded
Chrome Cache Entry: 168
ASCII text, with very long lines (468)
downloaded
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8ObkdHP9Hq.exe
"C:\Users\user\Desktop\8ObkdHP9Hq.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe
"C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
"C:\Users\user\AppData\Local\Temp\1000336001\num.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000349001\9d7da53f74.exe
"C:\Users\user\AppData\Local\Temp\1000349001\9d7da53f74.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5648 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe
"C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5800 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1152 --field-trial-handle=2040,i,8769351574913738686,7511269282204500585,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4484 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
"C:\Users\user\AppData\Local\Temp\1000336001\num.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1992,i,7048868189645442855,15603037541109083957,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2904 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000349001\9d7da53f74.exe
"C:\Users\user\AppData\Local\Temp\1000349001\9d7da53f74.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1152,i,15500864807837732652,8979653825790183584,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4516 --field-trial-handle=2240,i,13949646483110312368,15407111442915167702,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe
"C:\Users\user\AppData\Local\Temp\1000332001\84d280a9e8.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 66 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/LaJo
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
malicious
https://steamcommunity.com/profiles/765611997243319001l
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpKQ
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpu
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpw
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpJXi
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900u
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
http://185.215.113.37/ws
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpzX
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
https://player.vimeo.com
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65E
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://185.215.113.103/luma/random.exe
unknown
http://185.215.113.103/test/num.exe
unknown
https://community.akamai.steamstatic.com/public/css/ski
unknown
https://sergei-esenin.com/
unknown
https://play.google.com/work/enroll?identifier=
unknown
https://policies.google.com/terms/service-specific
unknown
https://g.co/recover
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://eaglepawnoy.store:443/apif
unknown
http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=.Verb
unknown
http://185.215.113.43/Zu7JuNko/index.php0349001
unknown
https://policies.google.com/technologies/cookies
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://policies.google.com/terms
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://www.google.
unknown
https://www.youtube.com/t/terms?chromeless=1&hl=
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://185.215.113.43/Zu7JuNko/index.php$AC
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://policies.google.com/terms/location
unknown
http://185.215.113.43/ViewSizePreferences.SourceAumid2=
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://steamcommunity.com/p
unknown
https://youtube.com/t/terms?gl=
unknown
https://www.google.com/intl/
unknown
http://microsoft.co
unknown
https://apis.google.com/js/api.js
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
http://185.215.113.43/15.113.43/ows
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://login.steampowere#
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://sergei-esenin.com:443/api
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://185.215.113.43/ones
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
http://185.215.113.43/Zu7JuNko/index.php9001
unknown
http://185.215.113.43/a
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://policies.google.com/privacy
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://play.google/intl/
unknown
https://families.google.com/intl/
unknown
https://sergei-esenin.com/apiO8
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://steamcommunity.com/0
unknown
https://policies.google.com/technologies/location-data
unknown
https://help.steampowered.com/en/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
104.21.53.8
malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
youtube-ui.l.google.com
142.250.181.238
steamcommunity.com
104.102.49.254
www3.l.google.com
142.250.184.238
play.google.com
172.217.16.206
www.google.com
142.250.184.228
youtube.com
142.250.185.142
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
eaglepawnoy.store
unknown
accounts.youtube.com
unknown
www.youtube.com
unknown
dissapoiznw.store
unknown
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
104.21.53.8
sergei-esenin.com
United States
malicious
185.215.113.37
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
172.217.16.206
play.google.com
United States
142.250.181.238
youtube-ui.l.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.142
youtube.com
United States
104.102.49.254
steamcommunity.com
United States
142.250.184.238
www3.l.google.com
United States
142.250.184.228
www.google.com
United States
185.215.113.103
unknown
Portugal
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
84d280a9e8.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9d7da53f74.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DA1000
unkown
page execute and read and write
malicious
587000
heap
page read and write
malicious
DE8000
heap
page read and write
malicious
1088000
heap
page read and write
malicious
4FC0000
direct allocation
page read and write
malicious
B81000
unkown
page execute and write copy
malicious
DA1000
unkown
page execute and read and write
malicious
E8E000
heap
page read and write
malicious
10A8000
heap
page read and write
malicious
B81000
unkown
page execute and write copy
malicious
4C40000
direct allocation
page read and write
malicious
51E0000
direct allocation
page read and write
malicious
881000
unkown
page execute and read and write
malicious
B81000
unkown
page execute and write copy
malicious
B81000
unkown
page execute and write copy
malicious
47D0000
heap
page read and write
F4E000
stack
page read and write
4B41000
heap
page read and write
15DE000
stack
page read and write
AF3000
heap
page read and write
4B41000
heap
page read and write
50F0000
direct allocation
page read and write
10B9000
heap
page read and write
B40000
heap
page read and write
1745000
heap
page read and write
68A0000
heap
page read and write
4B40000
heap
page read and write
1464000
heap
page read and write
BF0000
unkown
page write copy
CF5000
heap
page read and write
4D40000
direct allocation
page read and write
B81000
heap
page read and write
309E000
stack
page read and write
85E000
stack
page read and write
142C000
heap
page read and write
AA4000
heap
page read and write
50F0000
direct allocation
page read and write
391F000
stack
page read and write
5170000
direct allocation
page execute and read and write
331E000
stack
page read and write
1480000
heap
page read and write
30FF000
stack
page read and write
D90000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
47C1000
heap
page read and write
37DF000
stack
page read and write
4B41000
heap
page read and write
55FD000
stack
page read and write
346C000
stack
page read and write
AA4000
heap
page read and write
109D000
unkown
page execute and read and write
176F000
heap
page read and write
3F9E000
stack
page read and write
3DBE000
stack
page read and write
4B41000
heap
page read and write
2E1B000
stack
page read and write
1A9ED000
stack
page read and write
85DE000
stack
page read and write
47C1000
heap
page read and write
E09000
unkown
page write copy
4B41000
heap
page read and write
4B41000
heap
page read and write
3E6E000
stack
page read and write
147A000
heap
page read and write
4B41000
heap
page read and write
1230000
direct allocation
page read and write
3641000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4FAE000
stack
page read and write
4BEF000
stack
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
176F000
heap
page read and write
43FE000
stack
page read and write
17DC000
heap
page read and write
2DCF000
stack
page read and write
3AF1000
heap
page read and write
5ACE000
stack
page read and write
5740000
direct allocation
page execute and read and write
5C6000
heap
page read and write
EA0000
heap
page read and write
B80000
unkown
page readonly
3B3E000
stack
page read and write
392F000
stack
page read and write
422E000
stack
page read and write
38BE000
stack
page read and write
3DFE000
stack
page read and write
1AB9E000
stack
page read and write
665E000
stack
page read and write
D84000
heap
page read and write
47C1000
heap
page read and write
EA4000
heap
page read and write
D84000
heap
page read and write
453E000
stack
page read and write
106F000
unkown
page execute and read and write
9DB000
stack
page read and write
53F0000
direct allocation
page execute and read and write
4B41000
heap
page read and write
5101000
heap
page read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
47C1000
heap
page read and write
C90000
heap
page read and write
1230000
direct allocation
page read and write
4B41000
heap
page read and write
2DFF000
stack
page read and write
45AF000
stack
page read and write
EA4000
heap
page read and write
3BEE000
stack
page read and write
34BF000
stack
page read and write
50FF000
stack
page read and write
AA4000
heap
page read and write
6515000
heap
page read and write
4B41000
heap
page read and write
9C5000
heap
page read and write
51E0000
direct allocation
page read and write
4D51000
heap
page read and write
1209000
unkown
page execute and read and write
4B41000
heap
page read and write
AA4000
heap
page read and write
1A55F000
stack
page read and write
146D000
heap
page read and write
4D40000
direct allocation
page read and write
D84000
heap
page read and write
31A0000
heap
page read and write
109D000
unkown
page execute and read and write
443E000
stack
page read and write
689F000
stack
page read and write
EA4000
heap
page read and write
317E000
stack
page read and write
35AE000
stack
page read and write
BBC000
unkown
page readonly
82B000
stack
page read and write
520D000
stack
page read and write
1480000
heap
page read and write
4D20000
heap
page read and write
34FE000
stack
page read and write
1AF8E000
stack
page read and write
45DE000
stack
page read and write
BEC000
unkown
page read and write
377F000
stack
page read and write
1250000
unkown
page execute and write copy
10FA000
stack
page read and write
BBC000
unkown
page readonly
32BE000
stack
page read and write
D84000
heap
page read and write
48C0000
trusted library allocation
page read and write
1080000
heap
page read and write
880000
unkown
page readonly
EA4000
heap
page read and write
5101000
heap
page read and write
EA4000
heap
page read and write
1235000
unkown
page execute and read and write
5B80000
heap
page read and write
47C1000
heap
page read and write
3E2F000
stack
page read and write
435E000
stack
page read and write
1D6E000
stack
page read and write
3911000
heap
page read and write
1787000
heap
page read and write
BE2000
unkown
page readonly
3641000
heap
page read and write
3A5F000
stack
page read and write
381E000
stack
page read and write
4B41000
heap
page read and write
EA4000
heap
page read and write
53D0000
direct allocation
page execute and read and write
4D7F000
stack
page read and write
4FFE000
stack
page read and write
3641000
heap
page read and write
84DE000
stack
page read and write
53B0000
direct allocation
page execute and read and write
1A85F000
stack
page read and write
4B41000
heap
page read and write
3A5F000
stack
page read and write
F40000
heap
page read and write
4E30000
direct allocation
page execute and read and write
E6E000
stack
page read and write
C3D000
unkown
page read and write
47C1000
heap
page read and write
56FE000
stack
page read and write
47BE000
stack
page read and write
1475000
heap
page read and write
47C1000
heap
page read and write
5751000
trusted library allocation
page read and write
146E000
heap
page read and write
13F5000
heap
page read and write
124C000
unkown
page execute and read and write
39FF000
stack
page read and write
2CCE000
stack
page read and write
C93000
heap
page read and write
7DC000
stack
page read and write
459F000
stack
page read and write
4B41000
heap
page read and write
39FE000
stack
page read and write
47C1000
heap
page read and write
31DE000
stack
page read and write
417F000
stack
page read and write
5360000
direct allocation
page execute and read and write
9C0000
heap
page read and write
B4F000
unkown
page execute and read and write
38FE000
stack
page read and write
CFE000
stack
page read and write
D60000
heap
page read and write
AA4000
heap
page read and write
4D51000
heap
page read and write
6510000
heap
page read and write
17CB000
heap
page read and write
4D90000
direct allocation
page execute and read and write
303E000
stack
page read and write
D7E000
stack
page read and write
BEC000
unkown
page read and write
10A5000
unkown
page execute and read and write
5241000
direct allocation
page read and write
47C1000
heap
page read and write
47C1000
heap
page read and write
13E1000
unkown
page execute and read and write
5D4E000
stack
page read and write
D84000
heap
page read and write
3EFE000
stack
page read and write
495F000
stack
page read and write
56CF000
stack
page read and write
124E000
unkown
page execute and read and write
3AF1000
heap
page read and write
5400000
direct allocation
page execute and read and write
177C000
heap
page read and write
D80000
heap
page read and write
AA4000
heap
page read and write
EA4000
heap
page read and write
1775000
heap
page read and write
47C1000
heap
page read and write
1EE000
stack
page read and write
50F0000
direct allocation
page read and write
D84000
heap
page read and write
1ADDE000
stack
page read and write
530D000
stack
page read and write
EA4000
heap
page read and write
D84000
heap
page read and write
359E000
stack
page read and write
327E000
stack
page read and write
50EE000
stack
page read and write
41DF000
stack
page read and write
5590000
direct allocation
page read and write
AA4000
heap
page read and write
B80000
heap
page read and write
36EE000
stack
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
1464000
heap
page read and write
5730000
direct allocation
page execute and read and write
4B41000
heap
page read and write
13E2000
unkown
page execute and write copy
4B41000
heap
page read and write
F50000
unkown
page readonly
4B41000
heap
page read and write
4B41000
heap
page read and write
D84000
heap
page read and write
D90000
trusted library allocation
page read and write
EA4000
heap
page read and write
4C1E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
E1A000
heap
page read and write
CAF000
heap
page read and write
50C0000
direct allocation
page execute and read and write
2BFF000
stack
page read and write
48FE000
stack
page read and write
3641000
heap
page read and write
3F3E000
stack
page read and write
CFA000
heap
page read and write
4B41000
heap
page read and write
8873000
heap
page read and write
EA4000
heap
page read and write
3DBF000
stack
page read and write
5100000
direct allocation
page execute and read and write
EA4000
heap
page read and write
37BE000
stack
page read and write
54CD000
stack
page read and write
367E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
1245000
heap
page read and write
AB0000
heap
page read and write
10C4000
heap
page read and write
EA4000
heap
page read and write
FCF000
stack
page read and write
D84000
heap
page read and write
B20000
unkown
page readonly
C10000
heap
page read and write
EA4000
heap
page read and write
3641000
heap
page read and write
1B22E000
stack
page read and write
E2E000
stack
page read and write
15AF000
stack
page read and write
3E5E000
stack
page read and write
482F000
stack
page read and write
D80000
direct allocation
page read and write
AA4000
heap
page read and write
B30000
heap
page read and write
D90000
trusted library allocation
page read and write
47C1000
heap
page read and write
47C1000
heap
page read and write
D84000
heap
page read and write
1A65F000
stack
page read and write
4D40000
direct allocation
page read and write
6BE000
stack
page read and write
496F000
stack
page read and write
C20000
direct allocation
page read and write
B21000
unkown
page execute read
4B41000
heap
page read and write
C20000
direct allocation
page read and write
47C1000
heap
page read and write
1AA5E000
stack
page read and write
4B41000
heap
page read and write
3641000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
9BE000
stack
page read and write
CF8000
heap
page read and write
3A9E000
stack
page read and write
1ACDE000
stack
page read and write
3BAF000
stack
page read and write
47C1000
heap
page read and write
534E000
stack
page read and write
165E000
stack
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
50D0000
direct allocation
page execute and read and write
EA4000
heap
page read and write
D84000
heap
page read and write
1010000
trusted library allocation
page read and write
13B0000
heap
page read and write
5110000
direct allocation
page execute and read and write
467E000
stack
page read and write
47C1000
heap
page read and write
BAB000
unkown
page write copy
7B4000
heap
page read and write
43FF000
stack
page read and write
5710000
direct allocation
page execute and read and write
FFF000
stack
page read and write
EA4000
heap
page read and write
4B41000
heap
page read and write
AA4000
heap
page read and write
EC000
stack
page read and write
EA4000
heap
page read and write
CE4000
heap
page read and write
AA4000
heap
page read and write
53C0000
direct allocation
page execute and read and write
C98000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
1B08D000
stack
page read and write
D84000
heap
page read and write
1451000
heap
page read and write
4E50000
trusted library allocation
page read and write
4EAE000
stack
page read and write
D84000
heap
page read and write
36B4000
heap
page read and write
124E000
unkown
page execute and read and write
41EF000
stack
page read and write
4D51000
heap
page read and write
CAF000
heap
page read and write
33BE000
stack
page read and write
EA4000
heap
page read and write
4B41000
heap
page read and write
47C1000
heap
page read and write
8C0000
heap
page read and write
4B41000
heap
page read and write
1410000
heap
page read and write
4B41000
heap
page read and write
1A75F000
stack
page read and write
C3A000
heap
page read and write
3B9F000
stack
page read and write
4B41000
heap
page read and write
4B50000
heap
page read and write
3BDE000
stack
page read and write
3AF1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
A70000
heap
page read and write
4B41000
heap
page read and write
391F000
stack
page read and write
B94000
unkown
page execute and write copy
CF4000
heap
page read and write
453F000
stack
page read and write
AFD000
stack
page read and write
881000
unkown
page execute and write copy
47C1000
heap
page read and write
FDE000
stack
page read and write
55CE000
stack
page read and write
B1B000
heap
page read and write
4B41000
heap
page read and write
31A7000
heap
page read and write
449E000
stack
page read and write
C77000
heap
page read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
BAB000
unkown
page write copy
5101000
heap
page read and write
4B41000
heap
page read and write
472D000
stack
page read and write
47C1000
heap
page read and write
840000
heap
page read and write
10A3000
heap
page read and write
F91000
unkown
page execute and read and write
4AEE000
stack
page read and write
2FBF000
stack
page read and write
50AF000
stack
page read and write
AC7000
heap
page read and write
13E1000
unkown
page execute and read and write
D84000
heap
page read and write
445E000
stack
page read and write
547F000
stack
page read and write
EA4000
heap
page read and write
3641000
heap
page read and write
D84000
heap
page read and write
D80000
direct allocation
page read and write
373F000
stack
page read and write
134E000
stack
page read and write
47C1000
heap
page read and write
585F000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
B00000
heap
page read and write
5370000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
B93000
unkown
page execute and write copy
F3E000
stack
page read and write
4F50000
direct allocation
page read and write
839C000
stack
page read and write
1010000
trusted library allocation
page read and write
481F000
stack
page read and write
AA4000
heap
page read and write
880000
unkown
page read and write
D84000
heap
page read and write
B03000
heap
page read and write
359E000
stack
page read and write
570C000
stack
page read and write
ED6000
heap
page read and write
4B41000
heap
page read and write
5110000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
7BF000
stack
page read and write
5180000
direct allocation
page execute and read and write
584D000
stack
page read and write
4B41000
heap
page read and write
3A3E000
stack
page read and write
D84000
heap
page read and write
445F000
stack
page read and write
A50000
heap
page read and write
4B41000
heap
page read and write
3F5F000
stack
page read and write
35F0000
trusted library allocation
page read and write
EA4000
heap
page read and write
47C1000
heap
page read and write
EA4000
heap
page read and write
1451000
heap
page read and write
FDF000
stack
page read and write
5350000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
37EF000
stack
page read and write
BE2000
unkown
page readonly
8E2000
unkown
page execute and read and write
6ECE000
heap
page read and write
17DC000
heap
page read and write
1920000
heap
page read and write
47C1000
heap
page read and write
B9E000
unkown
page readonly
5580000
remote allocation
page read and write
7FE000
stack
page read and write
56E0000
direct allocation
page execute and read and write
5710000
direct allocation
page execute and read and write
ABC000
stack
page read and write
4E00000
direct allocation
page execute and read and write
47C1000
heap
page read and write
4C40000
direct allocation
page read and write
3FFF000
stack
page read and write
4B41000
heap
page read and write
3C7E000
stack
page read and write
D84000
heap
page read and write
3C3F000
stack
page read and write
1AC9F000
stack
page read and write
5590000
direct allocation
page read and write
485000
heap
page read and write
4B41000
heap
page read and write
B90000
heap
page read and write
4D2F000
stack
page read and write
FB0000
unkown
page execute and read and write
5330000
direct allocation
page execute and read and write
381E000
stack
page read and write
47E0000
heap
page read and write
D84000
heap
page read and write
431F000
stack
page read and write
4B51000
heap
page read and write
B21000
unkown
page execute read
A7B000
heap
page read and write
BE2000
unkown
page readonly
4F50000
direct allocation
page read and write
45DE000
stack
page read and write
C3E000
heap
page read and write
C20000
direct allocation
page read and write
DA0000
unkown
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
661F000
stack
page read and write
142F000
heap
page read and write
3B9F000
stack
page read and write
EA4000
heap
page read and write
124D000
unkown
page execute and write copy
16FD000
stack
page read and write
BEC000
unkown
page write copy
AF5000
stack
page read and write
AA4000
heap
page read and write
1401000
heap
page read and write
5101000
heap
page read and write
1230000
direct allocation
page read and write
B80000
unkown
page readonly
849C000
stack
page read and write
C80000
heap
page read and write
AA4000
heap
page read and write
1740000
heap
page read and write
3C7F000
stack
page read and write
BEC000
unkown
page read and write
41DF000
stack
page read and write
EFE000
stack
page read and write
1739000
heap
page read and write
1434000
heap
page read and write
2FFF000
stack
page read and write
4B41000
heap
page read and write
B80000
unkown
page readonly
C6B000
heap
page read and write
1464000
heap
page read and write
D84000
heap
page read and write
42BF000
stack
page read and write
3E5E000
stack
page read and write
884C000
stack
page read and write
3FAE000
stack
page read and write
40DE000
stack
page read and write
327F000
stack
page read and write
EEA000
heap
page read and write
140E000
heap
page read and write
5390000
direct allocation
page execute and read and write
1772000
heap
page read and write
4D40000
direct allocation
page read and write
4DD0000
direct allocation
page execute and read and write
50F0000
direct allocation
page read and write
5710000
direct allocation
page execute and read and write
A39000
stack
page read and write
47C1000
heap
page read and write
1490000
heap
page read and write
47C1000
heap
page read and write
150F000
stack
page read and write
2E50000
direct allocation
page execute and read and write
17C7000
heap
page read and write
CE4000
heap
page read and write
13C5000
heap
page read and write
3D7F000
stack
page read and write
4B41000
heap
page read and write
323F000
stack
page read and write
3CDF000
stack
page read and write
6BA000
stack
page read and write
1472000
heap
page read and write
2E60000
direct allocation
page execute and read and write
495F000
stack
page read and write
BBC000
unkown
page readonly
499E000
stack
page read and write
1210000
heap
page read and write
4AA0000
heap
page read and write
1230000
direct allocation
page read and write
5580000
remote allocation
page read and write
3F9E000
stack
page read and write
D84000
heap
page read and write
1AB3E000
stack
page read and write
AA4000
heap
page read and write
2EFF000
stack
page read and write
147D000
heap
page read and write
D84000
heap
page read and write
4D1F000
stack
page read and write
13BA000
heap
page read and write
6EC0000
heap
page read and write
1E5000
stack
page read and write
FFF000
stack
page read and write
47C1000
heap
page read and write
B3D000
stack
page read and write
47C1000
heap
page read and write
4C7C000
stack
page read and write
5110000
direct allocation
page execute and read and write
9EF000
stack
page read and write
1451000
heap
page read and write
8260000
heap
page read and write
1230000
direct allocation
page read and write
369F000
stack
page read and write
4B41000
heap
page read and write
1130000
unkown
page execute and read and write
BE2000
unkown
page readonly
BF4000
unkown
page readonly
50EF000
stack
page read and write
4B41000
heap
page read and write
47C1000
heap
page read and write
2DD0000
heap
page read and write
BBC000
unkown
page readonly
5220000
heap
page read and write
47C1000
heap
page read and write
E09000
unkown
page write copy
138E000
stack
page read and write
32DF000
stack
page read and write
1B0CD000
stack
page read and write
47C1000
heap
page read and write
387F000
stack
page read and write
4B41000
heap
page read and write
1230000
direct allocation
page read and write
10DA000
heap
page read and write
50F0000
direct allocation
page read and write
355F000
stack
page read and write
341F000
stack
page read and write
5EBF000
stack
page read and write
12A0000
heap
page read and write
124C000
unkown
page execute and write copy
5101000
heap
page read and write
1465000
heap
page read and write
363F000
stack
page read and write
114E000
stack
page read and write
50E0000
direct allocation
page execute and read and write
3D1E000
stack
page read and write
D90000
trusted library allocation
page read and write
36AF000
stack
page read and write
35FF000
stack
page read and write
47C1000
heap
page read and write
DDC000
unkown
page readonly
D84000
heap
page read and write
D80000
direct allocation
page read and write
450000
heap
page read and write
4B41000
heap
page read and write
5101000
heap
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
463F000
stack
page read and write
BF4000
unkown
page readonly
E02000
unkown
page execute and read and write
4B41000
heap
page read and write
800000
heap
page read and write
1480000
heap
page read and write
BE2000
unkown
page readonly
B20000
unkown
page readonly
499E000
stack
page read and write
5100000
heap
page read and write
4F6B000
stack
page read and write
770000
heap
page read and write
10D3000
heap
page read and write
AA4000
heap
page read and write
4B3F000
stack
page read and write
679E000
stack
page read and write
C80000
heap
page read and write
3A6F000
stack
page read and write
36B0000
heap
page read and write
34FF000
stack
page read and write
3641000
heap
page read and write
4D50000
heap
page read and write
4B41000
heap
page read and write
47C1000
heap
page read and write
4E10000
direct allocation
page execute and read and write
521E000
stack
page read and write
47C1000
heap
page read and write
1477000
heap
page read and write
5021000
direct allocation
page read and write
558F000
stack
page read and write
D84000
heap
page read and write
3AF1000
heap
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
D80000
direct allocation
page read and write
4B41000
heap
page read and write
4D40000
direct allocation
page read and write
40DE000
stack
page read and write
1230000
direct allocation
page read and write
B21000
unkown
page execute read
874C000
stack
page read and write
AA4000
heap
page read and write
BBC000
unkown
page readonly
47C1000
heap
page read and write
1451000
heap
page read and write
4DC000
stack
page read and write
173D000
heap
page read and write
1130000
unkown
page execute and read and write
4B41000
heap
page read and write
588E000
stack
page read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
E03000
heap
page read and write
140E000
stack
page read and write
1467000
heap
page read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
431F000
stack
page read and write
50F0000
direct allocation
page read and write
42FE000
stack
page read and write
D84000
heap
page read and write
123E000
unkown
page execute and read and write
5100000
direct allocation
page execute and read and write
D90000
trusted library allocation
page read and write
305F000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
4B41000
heap
page read and write
5118000
trusted library allocation
page read and write
1284000
heap
page read and write
D80000
direct allocation
page read and write
3B3F000
stack
page read and write
DA0000
unkown
page readonly
C20000
direct allocation
page read and write
4F00000
trusted library allocation
page read and write
5101000
heap
page read and write
4B41000
heap
page read and write
120E000
stack
page read and write
C31000
unkown
page read and write
435E000
stack
page read and write
459F000
stack
page read and write
5360000
direct allocation
page execute and read and write
C3D000
unkown
page read and write
5150000
direct allocation
page execute and read and write
4A3E000
stack
page read and write
49FF000
stack
page read and write
309E000
stack
page read and write
571E000
stack
page read and write
5140000
direct allocation
page execute and read and write
5540000
trusted library allocation
page read and write
45EE000
stack
page read and write
EA4000
heap
page read and write
BE2000
unkown
page readonly
432F000
stack
page read and write
485E000
stack
page read and write
4B41000
heap
page read and write
C93000
heap
page read and write
B00000
heap
page read and write
D84000
heap
page read and write
4B41000
heap
page read and write
55CE000
stack
page read and write
47C1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
980000
heap
page read and write
35C0000
heap
page read and write
2E4F000
stack
page read and write
CE4000
heap
page read and write
EA4000
heap
page read and write
2DD7000
heap
page read and write
5700000
direct allocation
page execute and read and write
4B41000
heap
page read and write
53E0000
direct allocation
page execute and read and write
1491000
heap
page read and write
35F0000
trusted library allocation
page read and write
403E000
stack
page read and write
D84000
heap
page read and write
B20000
unkown
page readonly
EA4000
heap
page read and write
4BDF000
stack
page read and write
D84000
heap
page read and write
477F000
stack
page read and write
C20000
direct allocation
page read and write
D80000
direct allocation
page read and write
40AF000
stack
page read and write
D84000
heap
page read and write
5360000
direct allocation
page execute and read and write
A77000
heap
page read and write
10B4000
unkown
page execute and write copy
1700000
heap
page read and write
39BF000
stack
page read and write
575E000
stack
page read and write
17D0000
heap
page read and write
4B41000
heap
page read and write
D90000
trusted library allocation
page read and write
580000
heap
page read and write
47C1000
heap
page read and write
D90000
trusted library allocation
page read and write
C5E000
stack
page read and write
A3C000
stack
page read and write
10B2000
heap
page read and write
5E4000
heap
page read and write
C73000
heap
page read and write
586D000
stack
page read and write
A4E000
stack
page read and write
1DC0000
heap
page read and write
124E000
stack
page read and write
46EF000
stack
page read and write
3F5F000
stack
page read and write
E09000
unkown
page write copy
403F000
stack
page read and write
EA4000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
10A5000
unkown
page execute and read and write
46DF000
stack
page read and write
D80000
direct allocation
page read and write
2CFF000
stack
page read and write
1475000
heap
page read and write
5710000
direct allocation
page execute and read and write
C20000
direct allocation
page read and write
46DF000
stack
page read and write
47C1000
heap
page read and write
D2E000
unkown
page execute and read and write
EA4000
heap
page read and write
19DF000
stack
page read and write
C20000
direct allocation
page read and write
332E000
stack
page read and write
56F0000
direct allocation
page execute and read and write
D84000
heap
page read and write
1280000
heap
page read and write
413F000
stack
page read and write
BF4000
unkown
page readonly
CAF000
heap
page read and write
1235000
unkown
page execute and read and write
4B41000
heap
page read and write
AA4000
heap
page read and write
BF4000
unkown
page readonly
196E000
stack
page read and write
5130000
direct allocation
page execute and read and write
1230000
direct allocation
page read and write
AA4000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4F8E000
stack
page read and write
4C40000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
DCA000
unkown
page read and write
6516000
heap
page read and write
44AE000
stack
page read and write
D80000
direct allocation
page read and write
4D40000
direct allocation
page read and write
17CF000
heap
page read and write
4CA1000
direct allocation
page read and write
BF0000
unkown
page write copy
AA4000
heap
page read and write
D03000
heap
page read and write
1480000
heap
page read and write
1230000
direct allocation
page read and write
47C1000
heap
page read and write
377E000
stack
page read and write
47C1000
heap
page read and write
342F000
stack
page read and write
47C1000
heap
page read and write
47C1000
heap
page read and write
D90000
trusted library allocation
page read and write
4C2E000
stack
page read and write
D30000
unkown
page execute and write copy
341F000
stack
page read and write
1B1CC000
stack
page read and write
2F5E000
stack
page read and write
4B41000
heap
page read and write
13E2000
unkown
page execute and write copy
4D40000
direct allocation
page read and write
47C1000
heap
page read and write
104E000
stack
page read and write
3CBE000
stack
page read and write
D84000
heap
page read and write
1490000
heap
page read and write
5120000
direct allocation
page execute and read and write
8874000
heap
page read and write
14EE000
stack
page read and write
AA4000
heap
page read and write
720000
heap
page read and write
3BDE000
stack
page read and write
C20000
direct allocation
page read and write
17BA000
heap
page read and write
D84000
heap
page read and write
177B000
heap
page read and write
508F000
stack
page read and write
4B41000
heap
page read and write
EA4000
heap
page read and write
C31000
unkown
page read and write
D84000
heap
page read and write
35C4000
heap
page read and write
3911000
heap
page read and write
B6E000
stack
page read and write
4B41000
heap
page read and write
DE0000
heap
page read and write
319F000
stack
page read and write
5101000
heap
page read and write
3640000
heap
page read and write
AA4000
heap
page read and write
10B3000
unkown
page execute and read and write
B1E000
stack
page read and write
47C1000
heap
page read and write
2F1F000
stack
page read and write
4D40000
direct allocation
page read and write
43BF000
stack
page read and write
51A0000
direct allocation
page execute and read and write
13C0000
heap
page read and write
1AB5F000
stack
page read and write
47C1000
heap
page read and write
10B3000
unkown
page execute and write copy
1476000
heap
page read and write
EA4000
heap
page read and write
32EE000
stack
page read and write
C20000
direct allocation
page read and write
F51000
unkown
page execute and write copy
7B4000
heap
page read and write
47C1000
heap
page read and write
100F000
stack
page read and write
EE0000
heap
page read and write
382E000
stack
page read and write
D84000
heap
page read and write
305F000
stack
page read and write
DA0000
unkown
page readonly
4D40000
direct allocation
page read and write
D50000
heap
page read and write
313F000
stack
page read and write
4B41000
heap
page read and write
B20000
unkown
page readonly
5710000
direct allocation
page execute and read and write
DA0000
unkown
page read and write
485E000
stack
page read and write
522E000
stack
page read and write
8E9000
unkown
page write copy
47C1000
heap
page read and write
47C1000
heap
page read and write
FB0000
unkown
page execute and read and write
3CDF000
stack
page read and write
B80000
unkown
page readonly
1230000
direct allocation
page read and write
D80000
direct allocation
page read and write
B0E000
stack
page read and write
5B0E000
stack
page read and write
5110000
direct allocation
page execute and read and write
421E000
stack
page read and write
47D6000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4B41000
heap
page read and write
D84000
heap
page read and write
EA4000
heap
page read and write
4B41000
heap
page read and write
BEC000
unkown
page write copy
CF8000
heap
page read and write
36DE000
stack
page read and write
446F000
stack
page read and write
4B41000
heap
page read and write
13A0000
direct allocation
page read and write
D84000
heap
page read and write
1250000
unkown
page execute and write copy
47C1000
heap
page read and write
4C3C000
stack
page read and write
170B000
heap
page read and write
4D40000
direct allocation
page read and write
409F000
stack
page read and write
1240000
heap
page read and write
4FAF000
stack
page read and write
EA4000
heap
page read and write
B85000
heap
page read and write
2FFE000
stack
page read and write
1AF3F000
stack
page read and write
5110000
direct allocation
page execute and read and write
47C1000
heap
page read and write
175A000
heap
page read and write
FEB000
stack
page read and write
C73000
heap
page read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
675F000
stack
page read and write
4B41000
heap
page read and write
C62000
unkown
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
51E0000
direct allocation
page read and write
D84000
heap
page read and write
106F000
unkown
page execute and read and write
47C1000
heap
page read and write
AA4000
heap
page read and write
59CE000
stack
page read and write
D80000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
4B41000
heap
page read and write
1439000
heap
page read and write
DCE000
stack
page read and write
5C0F000
stack
page read and write
BAB000
unkown
page write copy
471E000
stack
page read and write
3A9E000
stack
page read and write
47C1000
heap
page read and write
3641000
heap
page read and write
C6F000
heap
page read and write
D84000
heap
page read and write
4B41000
heap
page read and write
4A9F000
stack
page read and write
47D4000
heap
page read and write
48BF000
stack
page read and write
1AAED000
stack
page read and write
8EB000
unkown
page execute and read and write
319F000
stack
page read and write
A71000
unkown
page execute and read and write
4B41000
heap
page read and write
124C000
unkown
page execute and write copy
140F000
heap
page read and write
B55000
heap
page read and write
47C1000
heap
page read and write
47C1000
heap
page read and write
33BF000
stack
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
8E9000
unkown
page write copy
4D40000
direct allocation
page read and write
4FEE000
stack
page read and write
50F0000
direct allocation
page read and write
5224000
heap
page read and write
4A9F000
stack
page read and write
47C1000
heap
page read and write
E80000
heap
page read and write
4B41000
heap
page read and write
31DE000
stack
page read and write
36DE000
stack
page read and write
4F3E000
stack
page read and write
5540000
heap
page read and write
345E000
stack
page read and write
1209000
unkown
page execute and read and write
47C1000
heap
page read and write
4B41000
heap
page read and write
407E000
stack
page read and write
3E1F000
stack
page read and write
47C1000
heap
page read and write
3641000
heap
page read and write
6EC1000
heap
page read and write
480000
heap
page read and write
4AC1000
heap
page read and write
356F000
stack
page read and write
5360000
direct allocation
page execute and read and write
17CF000
heap
page read and write
AA4000
heap
page read and write
31EE000
stack
page read and write
4B41000
heap
page read and write
DCA000
unkown
page read and write
47C1000
heap
page read and write
395E000
stack
page read and write
369F000
stack
page read and write
337F000
stack
page read and write
35F0000
trusted library allocation
page read and write
531F000
stack
page read and write
4B41000
heap
page read and write
35F0000
trusted library allocation
page read and write
BF4000
unkown
page readonly
10A0000
heap
page read and write
A00000
heap
page read and write
C20000
direct allocation
page read and write
47C1000
heap
page read and write
1230000
direct allocation
page read and write
47C1000
heap
page read and write
E0B000
unkown
page execute and read and write
1796000
heap
page read and write
4B41000
heap
page read and write
BF0000
unkown
page write copy
CC0000
heap
page read and write
2F10000
heap
page read and write
C20000
direct allocation
page read and write
175A000
heap
page read and write
4D51000
heap
page read and write
EA4000
heap
page read and write
4B41000
heap
page read and write
13F0000
heap
page read and write
2F17000
heap
page read and write
457E000
stack
page read and write
AFF000
stack
page read and write
481F000
stack
page read and write
DDC000
unkown
page readonly
5360000
direct allocation
page execute and read and write
D84000
heap
page read and write
50F0000
direct allocation
page read and write
4B41000
heap
page read and write
427F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
1787000
heap
page read and write
10B3000
unkown
page execute and read and write
650E000
stack
page read and write
CB5000
heap
page read and write
17C8000
heap
page read and write
49AE000
stack
page read and write
C77000
heap
page read and write
5111000
heap
page read and write
331E000
stack
page read and write
B7D000
unkown
page execute and read and write
1775000
heap
page read and write
CF0000
heap
page read and write
BF4000
unkown
page readonly
D84000
heap
page read and write
124C000
unkown
page execute and read and write
EA4000
heap
page read and write
1260000
heap
page read and write
5DD000
stack
page read and write
4B41000
heap
page read and write
A7D000
heap
page read and write
173E000
heap
page read and write
38BF000
stack
page read and write
1A99E000
stack
page read and write
FCF000
stack
page read and write
D84000
heap
page read and write
8C4000
heap
page read and write
BBC000
unkown
page readonly
47C1000
heap
page read and write
4ADE000
stack
page read and write
100F000
stack
page read and write
B93000
unkown
page execute and read and write
B78000
heap
page read and write
2F5E000
stack
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
47C1000
heap
page read and write
449E000
stack
page read and write
D84000
heap
page read and write
5160000
direct allocation
page execute and read and write
152E000
heap
page read and write
396E000
stack
page read and write
3EFE000
stack
page read and write
D80000
direct allocation
page read and write
CB5000
heap
page read and write
FEB000
stack
page read and write
D90000
trusted library allocation
page read and write
F51000
unkown
page execute and read and write
89E000
stack
page read and write
1A89D000
stack
page read and write
32DF000
stack
page read and write
D3E000
stack
page read and write
C20000
direct allocation
page read and write
D84000
heap
page read and write
1520000
heap
page read and write
4B41000
heap
page read and write
4C40000
direct allocation
page read and write
DA1000
unkown
page execute and write copy
17BA000
heap
page read and write
3641000
heap
page read and write
123E000
unkown
page execute and read and write
BEC000
unkown
page write copy
D84000
heap
page read and write
B21000
unkown
page execute read
47C1000
heap
page read and write
D84000
heap
page read and write
AA4000
heap
page read and write
5340000
direct allocation
page execute and read and write
10B4000
unkown
page execute and write copy
409F000
stack
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
4AC0000
heap
page read and write
F51000
unkown
page execute and read and write
6ED0000
heap
page read and write
50DD000
stack
page read and write
50D0000
direct allocation
page execute and read and write
417E000
stack
page read and write
4D51000
heap
page read and write
353E000
stack
page read and write
47C1000
heap
page read and write
EA4000
heap
page read and write
1A11F000
stack
page read and write
D84000
heap
page read and write
47C0000
heap
page read and write
4B41000
heap
page read and write
C7C000
stack
page read and write
1230000
direct allocation
page read and write
EA4000
heap
page read and write
C6B000
heap
page read and write
313E000
stack
page read and write
D84000
heap
page read and write
4E40000
direct allocation
page execute and read and write
175F000
stack
page read and write
3AFF000
stack
page read and write
5580000
remote allocation
page read and write
B9E000
unkown
page readonly
39A000
stack
page read and write
50F0000
direct allocation
page read and write
55A0000
remote allocation
page read and write
51B0000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
F50000
unkown
page read and write
55A0000
remote allocation
page read and write
DF0000
heap
page read and write
7B0000
heap
page read and write
C20000
direct allocation
page read and write
4AAF000
stack
page read and write
1464000
heap
page read and write
D84000
heap
page read and write
5110000
direct allocation
page execute and read and write
1230000
direct allocation
page read and write
3EBF000
stack
page read and write
46BE000
stack
page read and write
1B32E000
stack
page read and write
560D000
stack
page read and write
4B41000
heap
page read and write
B9E000
unkown
page readonly
5720000
direct allocation
page execute and read and write
B45000
heap
page read and write
4B41000
heap
page read and write
E09000
unkown
page write copy
E7C000
stack
page read and write
BAB000
unkown
page write copy
D84000
heap
page read and write
D80000
direct allocation
page read and write
7B4000
heap
page read and write
1796000
heap
page read and write
6ED0000
heap
page read and write
2EBB000
stack
page read and write
C90000
heap
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
4B41000
heap
page read and write
47C1000
heap
page read and write
50F0000
direct allocation
page read and write
D84000
heap
page read and write
42BE000
stack
page read and write
176B000
heap
page read and write
5DBE000
stack
page read and write
4D40000
direct allocation
page read and write
13BE000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
436E000
stack
page read and write
DA1000
unkown
page execute and write copy
50D0000
direct allocation
page execute and read and write
5190000
direct allocation
page execute and read and write
D80000
direct allocation
page read and write
172F000
heap
page read and write
40EE000
stack
page read and write
1737000
heap
page read and write
D80000
direct allocation
page read and write
4E6F000
stack
page read and write
B50000
heap
page read and write
3D2E000
stack
page read and write
4B41000
heap
page read and write
532F000
stack
page read and write
1AC3F000
stack
page read and write
10B3000
unkown
page execute and write copy
D7D000
stack
page read and write
537E000
stack
page read and write
C66000
heap
page read and write
3CEF000
stack
page read and write
3AAE000
stack
page read and write
1772000
heap
page read and write
5590000
direct allocation
page read and write
50F0000
direct allocation
page read and write
5710000
direct allocation
page execute and read and write
3D1E000
stack
page read and write
19CF000
stack
page read and write
544F000
stack
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
C6F000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
D84000
heap
page read and write
F50000
unkown
page read and write
44FF000
stack
page read and write
3190000
heap
page read and write
3B7E000
stack
page read and write
41BE000
stack
page read and write
13A0000
direct allocation
page read and write
4F50000
direct allocation
page read and write
1451000
heap
page read and write
E13000
heap
page read and write
4B41000
heap
page read and write
1B50000
heap
page read and write
4B41000
heap
page read and write
2E77000
heap
page read and write
EA4000
heap
page read and write
B21000
unkown
page execute read
4B41000
heap
page read and write
1230000
direct allocation
page read and write
D84000
heap
page read and write
1AE3E000
stack
page read and write
47C1000
heap
page read and write
2F00000
heap
page read and write
B21000
unkown
page execute read
4B41000
heap
page read and write
467F000
stack
page read and write
4B41000
heap
page read and write
4D51000
heap
page read and write
E8A000
heap
page read and write
5C4D000
stack
page read and write
50F0000
direct allocation
page read and write
D84000
heap
page read and write
4B41000
heap
page read and write
F50000
unkown
page readonly
4B41000
heap
page read and write
CB5000
heap
page read and write
47C1000
heap
page read and write
AA4000
heap
page read and write
598D000
stack
page read and write
4B41000
heap
page read and write
4D40000
direct allocation
page read and write
9B0000
heap
page read and write
548E000
stack
page read and write
B9E000
unkown
page readonly
47C1000
heap
page read and write
B38000
heap
page read and write
1380000
heap
page read and write
17BA000
heap
page read and write
486E000
stack
page read and write
51EF000
stack
page read and write
AF7000
heap
page read and write
4B41000
heap
page read and write
DDC000
unkown
page readonly
3641000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
3AF1000
heap
page read and write
47C1000
heap
page read and write
471E000
stack
page read and write
EA4000
heap
page read and write
4B41000
heap
page read and write
EA4000
heap
page read and write
D84000
heap
page read and write
F91000
unkown
page execute and read and write
4B41000
heap
page read and write
EA4000
heap
page read and write
47BF000
stack
page read and write
B50000
heap
page read and write
CA6000
heap
page read and write
3910000
heap
page read and write
124D000
unkown
page execute and write copy
9FF000
stack
page read and write
4B41000
heap
page read and write
EA4000
heap
page read and write
47C1000
heap
page read and write
4D6E000
stack
page read and write
8850000
heap
page read and write
B85000
unkown
page execute and read and write
DDC000
unkown
page readonly
B20000
unkown
page readonly
2E70000
heap
page read and write
355F000
stack
page read and write
50F0000
direct allocation
page read and write
C62000
unkown
page read and write
4B41000
heap
page read and write
3F6F000
stack
page read and write
D84000
heap
page read and write
37DF000
stack
page read and write
1D70000
heap
page read and write
4B41000
heap
page read and write
1464000
heap
page read and write
147B000
heap
page read and write
363E000
stack
page read and write
BFE000
stack
page read and write
47C1000
heap
page read and write
1433000
heap
page read and write
4D40000
direct allocation
page read and write
4DC0000
direct allocation
page execute and read and write
33FE000
stack
page read and write
D90000
trusted library allocation
page read and write
1745000
heap
page read and write
D90000
trusted library allocation
page read and write
576D000
stack
page read and write
D84000
heap
page read and write
E0B000
unkown
page execute and read and write
D84000
heap
page read and write
AA0000
heap
page read and write
345E000
stack
page read and write
1477000
heap
page read and write
176B000
heap
page read and write
EA4000
heap
page read and write
50F0000
direct allocation
page read and write
AC0000
heap
page read and write
140E000
heap
page read and write
440000
heap
page read and write
3AF0000
heap
page read and write
E02000
unkown
page execute and read and write
C30000
heap
page read and write
152A000
heap
page read and write
55A0000
remote allocation
page read and write
421E000
stack
page read and write
395E000
stack
page read and write
D84000
heap
page read and write
F51000
unkown
page execute and write copy
1475000
heap
page read and write
47C1000
heap
page read and write
9CE000
stack
page read and write
D84000
heap
page read and write
B20000
unkown
page readonly
There are 1351 hidden memdumps, click here to show them.