IOC Report
xwZfYpo16i.exe

loading gif

Files

File Path
Type
Category
Malicious
xwZfYpo16i.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\num[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 10:27:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xwZfYpo16i.exe
"C:\Users\user\Desktop\xwZfYpo16i.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
"C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
"C:\Users\user\AppData\Local\Temp\1000336001\num.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5612 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe
"C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
"C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5172 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=2016,i,9763649198199615889,4058380472595766421,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000336001\num.exe
"C:\Users\user\AppData\Local\Temp\1000336001\num.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2456 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=2004,i,8592830290365317448,7467397625344037838,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe
"C:\Users\user\AppData\Local\Temp\1000349001\4db5303091.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2456 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=2056,i,1132564284520540060,11615293102951086546,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe
"C:\Users\user\AppData\Local\Temp\1000332001\cb428cafc9.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5364 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5528 --field-trial-handle=1964,i,16714315343876232385,13045965869128810005,262144 /prefetch:8
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 64 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phptE
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/Data
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
malicious
http://185.215.113.37/e2b1563c6670f193.phpt
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
http://185.215.113.37/e2b1563c6670f193.php(3
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php9EV
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/sE
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpeV
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpZ
unknown
malicious
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.google.com/favicon.ico
172.217.16.132
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://dissapoiznw.store:443/apic
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://sergei-esenin.com:443/apiB
unknown
http://www.valvesoftware.com/le
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://sergei-esenin.com/K
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=9yzMGndrVfY4&l=e
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://sergei-esenin.com/api1
unknown
https://clearancek.site:443/api
unknown
https://sergei-esenin.com/api-
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
172.217.18.14
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://studennotediw.store:443/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
172.67.206.204
malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
youtube-ui.l.google.com
172.217.23.110
steamcommunity.com
104.102.49.254
www3.l.google.com
142.250.184.206
play.google.com
172.217.18.14
www.google.com
172.217.16.132
youtube.com
142.250.185.110
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
accounts.youtube.com
unknown
eaglepawnoy.store
unknown
www.youtube.com
unknown
dissapoiznw.store
unknown
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
172.67.206.204
sergei-esenin.com
United States
malicious
172.217.18.14
play.google.com
United States
142.250.185.110
youtube.com
United States
172.217.23.110
youtube-ui.l.google.com
United States
239.255.255.250
unknown
Reserved
104.102.49.254
steamcommunity.com
United States
142.250.184.206
www3.l.google.com
United States
185.215.113.103
unknown
Portugal
172.217.16.132
www.google.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
cb428cafc9.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
num.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4db5303091.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
641000
unkown
page execute and write copy
malicious
145E000
heap
page read and write
malicious
4BB0000
direct allocation
page read and write
malicious
A27000
heap
page read and write
malicious
641000
unkown
page execute and write copy
malicious
221000
unkown
page execute and read and write
malicious
641000
unkown
page execute and write copy
malicious
641000
unkown
page execute and write copy
malicious
B01000
unkown
page execute and read and write
malicious
B01000
unkown
page execute and read and write
malicious
5280000
direct allocation
page read and write
malicious
4F90000
direct allocation
page read and write
malicious
1410000
heap
page read and write
malicious
52D0000
direct allocation
page read and write
malicious
3921000
heap
page read and write
272C000
stack
page read and write
950000
heap
page read and write
DD9000
heap
page read and write
F02000
unkown
page readonly
14D4000
heap
page read and write
AFD000
stack
page read and write
4E30000
direct allocation
page read and write
1564000
heap
page read and write
39AE000
stack
page read and write
3D2F000
stack
page read and write
4DF1000
heap
page read and write
4D40000
direct allocation
page execute and read and write
10FE000
stack
page read and write
D30000
heap
page read and write
1564000
heap
page read and write
65E000
unkown
page readonly
A5C000
stack
page read and write
34EE000
stack
page read and write
17D4000
heap
page read and write
131F000
stack
page read and write
F14000
unkown
page readonly
4E41000
heap
page read and write
372E000
stack
page read and write
53A000
unkown
page execute and read and write
E20000
heap
page read and write
2C2E000
stack
page read and write
428F000
stack
page read and write
42BF000
stack
page read and write
17D4000
heap
page read and write
C44000
heap
page read and write
5190000
direct allocation
page execute and read and write
715E000
stack
page read and write
5624000
heap
page read and write
DA0000
direct allocation
page execute and read and write
286F000
stack
page read and write
14D4000
heap
page read and write
4CA000
unkown
page execute and read and write
14BE000
heap
page read and write
4E30000
direct allocation
page read and write
C44000
heap
page read and write
1564000
heap
page read and write
640000
unkown
page readonly
17D4000
heap
page read and write
3CBE000
stack
page read and write
994000
heap
page read and write
146A000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
378E000
stack
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
14D4000
heap
page read and write
3030000
direct allocation
page read and write
2C3F000
stack
page read and write
BE4000
heap
page read and write
4DF1000
heap
page read and write
E1C000
heap
page read and write
1564000
heap
page read and write
50F0000
direct allocation
page execute and read and write
1898000
heap
page read and write
17D4000
heap
page read and write
B00000
unkown
page read and write
4DF1000
heap
page read and write
4BB0000
direct allocation
page read and write
4DF1000
heap
page read and write
E1A000
unkown
page execute and read and write
B6B000
unkown
page execute and read and write
372E000
stack
page read and write
4DF1000
heap
page read and write
5420000
direct allocation
page execute and read and write
17D4000
heap
page read and write
C10000
direct allocation
page read and write
284F000
stack
page read and write
17D4000
heap
page read and write
D8E000
stack
page read and write
2EAE000
stack
page read and write
994000
heap
page read and write
4541000
heap
page read and write
1562000
heap
page read and write
462E000
stack
page read and write
BE4000
heap
page read and write
1564000
heap
page read and write
4E41000
heap
page read and write
2EBF000
stack
page read and write
4DF1000
heap
page read and write
D95000
heap
page read and write
43EE000
stack
page read and write
147F000
stack
page read and write
4D1D000
stack
page read and write
240000
heap
page read and write
C44000
heap
page read and write
4DF1000
heap
page read and write
1564000
heap
page read and write
3C31000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
3B2E000
stack
page read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
386F000
stack
page read and write
3030000
direct allocation
page read and write
317E000
stack
page read and write
14D4000
heap
page read and write
1B5CE000
stack
page read and write
2A9E000
stack
page read and write
4DF1000
heap
page read and write
2D0000
direct allocation
page read and write
30EE000
stack
page read and write
290E000
stack
page read and write
3921000
heap
page read and write
169F000
stack
page read and write
44F1000
heap
page read and write
14D4000
heap
page read and write
EDC000
unkown
page readonly
4D30000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
14D4000
heap
page read and write
13DE000
stack
page read and write
4541000
heap
page read and write
490E000
stack
page read and write
BE4000
heap
page read and write
4E41000
heap
page read and write
4DF0000
heap
page read and write
16DE000
stack
page read and write
E41000
unkown
page execute read
4731000
heap
page read and write
280000
heap
page read and write
17D4000
heap
page read and write
3D2F000
stack
page read and write
511E000
stack
page read and write
BE4000
heap
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
2A3F000
stack
page read and write
416E000
stack
page read and write
3C2E000
stack
page read and write
B69000
unkown
page write copy
53BF000
stack
page read and write
AE0000
direct allocation
page read and write
BE4000
heap
page read and write
DA0000
direct allocation
page execute and read and write
2AEE000
stack
page read and write
3ECF000
stack
page read and write
404E000
stack
page read and write
17D4000
heap
page read and write
4E30000
direct allocation
page read and write
3030000
direct allocation
page read and write
3D6D000
stack
page read and write
14D4000
heap
page read and write
14DE000
heap
page read and write
53D0000
direct allocation
page execute and read and write
4AB0000
direct allocation
page execute and read and write
E1C000
heap
page read and write
4DF1000
heap
page read and write
B62000
unkown
page execute and read and write
48CF000
stack
page read and write
18BC000
heap
page read and write
6BDB000
stack
page read and write
17D4000
heap
page read and write
1A84F000
stack
page read and write
AFD000
stack
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
6FAC000
stack
page read and write
18B4000
heap
page read and write
324F000
stack
page read and write
6FD000
unkown
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
35EF000
stack
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
C44000
heap
page read and write
AE0000
direct allocation
page read and write
1435000
heap
page read and write
3FC1000
heap
page read and write
DC5000
heap
page read and write
17D4000
heap
page read and write
2FEE000
stack
page read and write
1564000
heap
page read and write
2D0000
direct allocation
page read and write
4E41000
heap
page read and write
17D4000
heap
page read and write
6D9000
unkown
page execute and read and write
132E000
stack
page read and write
4E41000
heap
page read and write
3EEE000
stack
page read and write
FDB000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
14D4000
heap
page read and write
4DF1000
heap
page read and write
44AF000
stack
page read and write
65E000
unkown
page readonly
14A7000
heap
page read and write
C44000
heap
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
39AF000
stack
page read and write
88A5000
heap
page read and write
4541000
heap
page read and write
14D4000
heap
page read and write
1540000
heap
page read and write
4DF1000
heap
page read and write
DCD000
heap
page read and write
3C7F000
stack
page read and write
AE0000
direct allocation
page read and write
4AF0000
direct allocation
page read and write
50DD000
stack
page read and write
3E6F000
stack
page read and write
17D4000
heap
page read and write
EDC000
unkown
page readonly
154F000
heap
page read and write
159E000
stack
page read and write
7F0000
direct allocation
page read and write
155D000
heap
page read and write
53A000
unkown
page execute and write copy
3030000
direct allocation
page read and write
1564000
heap
page read and write
4E41000
heap
page read and write
1564000
heap
page read and write
C44000
heap
page read and write
2D0000
direct allocation
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
314F000
stack
page read and write
7F0000
direct allocation
page read and write
6E1F000
stack
page read and write
14D4000
heap
page read and write
41BE000
stack
page read and write
4E41000
heap
page read and write
6FD000
unkown
page read and write
1790000
heap
page read and write
4C00000
trusted library allocation
page read and write
1340000
heap
page read and write
994000
heap
page read and write
5400000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
21C000
stack
page read and write
3FEE000
stack
page read and write
382F000
stack
page read and write
5400000
direct allocation
page execute and read and write
4E41000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
38AE000
stack
page read and write
43AF000
stack
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
4E41000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
141E000
heap
page read and write
14D4000
heap
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
2EA7000
heap
page read and write
4E41000
heap
page read and write
BE4000
heap
page read and write
10BF000
stack
page read and write
BE0000
heap
page read and write
1A70E000
stack
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
18C3000
heap
page read and write
990000
heap
page read and write
1564000
heap
page read and write
470000
heap
page read and write
2E0000
unkown
page read and write
994000
heap
page read and write
3FEE000
stack
page read and write
DF0000
heap
page read and write
E41000
unkown
page execute read
4E41000
heap
page read and write
5110000
direct allocation
page execute and read and write
E1A000
unkown
page execute and write copy
17D4000
heap
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
17D4000
heap
page read and write
4B13000
trusted library allocation
page read and write
4DF1000
heap
page read and write
AE0000
direct allocation
page read and write
14D4000
heap
page read and write
44F1000
heap
page read and write
18B3000
heap
page read and write
BE4000
heap
page read and write
1530000
heap
page read and write
1A60F000
stack
page read and write
156A000
heap
page read and write
EDC000
unkown
page readonly
4DF1000
heap
page read and write
3BEF000
stack
page read and write
17D4000
heap
page read and write
16B0000
heap
page read and write
1564000
heap
page read and write
332F000
stack
page read and write
44EE000
stack
page read and write
131F000
stack
page read and write
39AE000
stack
page read and write
2E1000
unkown
page execute and write copy
14D4000
heap
page read and write
4B01000
heap
page read and write
6A1F000
stack
page read and write
128E000
heap
page read and write
A6C000
heap
page read and write
4DF1000
heap
page read and write
2D6E000
stack
page read and write
9E0000
heap
page read and write
E41000
unkown
page execute read
994000
heap
page read and write
AE0000
direct allocation
page read and write
BE4000
heap
page read and write
17D4000
heap
page read and write
1564000
heap
page read and write
5430000
direct allocation
page execute and read and write
4E41000
heap
page read and write
322F000
stack
page read and write
2E6F000
stack
page read and write
396F000
stack
page read and write
4E30000
direct allocation
page read and write
17D4000
heap
page read and write
C44000
heap
page read and write
CF6000
unkown
page execute and read and write
DD9000
heap
page read and write
4DF1000
heap
page read and write
2EFE000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
220000
unkown
page readonly
C44000
heap
page read and write
1B42D000
stack
page read and write
C1E000
stack
page read and write
313F000
stack
page read and write
4D4D000
stack
page read and write
18BE000
heap
page read and write
30AF000
stack
page read and write
1A50F000
stack
page read and write
1564000
heap
page read and write
4DF1000
heap
page read and write
1564000
heap
page read and write
DD6000
unkown
page execute and read and write
142A000
heap
page read and write
4DF1000
heap
page read and write
1B32D000
stack
page read and write
17D4000
heap
page read and write
2750000
remote allocation
page read and write
83E000
stack
page read and write
888C000
stack
page read and write
4DF1000
heap
page read and write
BE4000
heap
page read and write
14D4000
heap
page read and write
51A0000
direct allocation
page execute and read and write
3DAE000
stack
page read and write
35AF000
stack
page read and write
340000
unkown
page execute and read and write
35EE000
stack
page read and write
14D4000
heap
page read and write
5DD000
unkown
page execute and read and write
2D0000
direct allocation
page read and write
37BE000
stack
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
5450000
direct allocation
page execute and read and write
1563000
heap
page read and write
D7F000
heap
page read and write
17D4000
heap
page read and write
43AE000
stack
page read and write
39FF000
stack
page read and write
1423000
heap
page read and write
3790000
trusted library allocation
page read and write
1AF2F000
stack
page read and write
2E1000
unkown
page execute and write copy
43AE000
stack
page read and write
1564000
heap
page read and write
AE0000
direct allocation
page read and write
14D4000
heap
page read and write
2AE000
stack
page read and write
17D4000
heap
page read and write
422E000
stack
page read and write
4C0D000
stack
page read and write
53B000
unkown
page execute and write copy
17D4000
heap
page read and write
4E41000
heap
page read and write
2750000
direct allocation
page execute and read and write
2D0000
direct allocation
page read and write
17D4000
heap
page read and write
288B000
stack
page read and write
14E3000
heap
page read and write
4E41000
heap
page read and write
328E000
stack
page read and write
4E41000
heap
page read and write
338F000
stack
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
4F6000
unkown
page execute and read and write
7F0000
direct allocation
page read and write
4DF1000
heap
page read and write
153F000
heap
page read and write
65E000
unkown
page readonly
18D9000
heap
page read and write
2E0000
unkown
page readonly
17D4000
heap
page read and write
17D4000
heap
page read and write
4D70000
direct allocation
page execute and read and write
1C5000
stack
page read and write
1564000
heap
page read and write
49EE000
stack
page read and write
4E41000
heap
page read and write
BE4000
heap
page read and write
4E30000
direct allocation
page read and write
C44000
heap
page read and write
5100000
direct allocation
page execute and read and write
30EF000
stack
page read and write
156A000
heap
page read and write
12FE000
stack
page read and write
4980000
trusted library allocation
page read and write
17D4000
heap
page read and write
4E8E000
stack
page read and write
DA8000
heap
page read and write
3FC1000
heap
page read and write
14D4000
heap
page read and write
3F0E000
stack
page read and write
2750000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
44EE000
stack
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
4541000
heap
page read and write
52BE000
stack
page read and write
E0B000
unkown
page execute and read and write
14D4000
heap
page read and write
1564000
heap
page read and write
796000
unkown
page execute and read and write
14BE000
heap
page read and write
2ADE000
stack
page read and write
4DF1000
heap
page read and write
1194000
heap
page read and write
8693000
heap
page read and write
DA8000
heap
page read and write
4E41000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
BE4000
heap
page read and write
4AF0000
direct allocation
page read and write
31EF000
stack
page read and write
422F000
stack
page read and write
796000
unkown
page execute and read and write
3790000
trusted library allocation
page read and write
7F0000
direct allocation
page read and write
17D4000
heap
page read and write
155A000
heap
page read and write
4930000
trusted library allocation
page read and write
67D0000
heap
page read and write
524F000
stack
page read and write
46E000
stack
page read and write
17D4000
heap
page read and write
1500000
heap
page read and write
462E000
stack
page read and write
1194000
heap
page read and write
2D0000
direct allocation
page read and write
4540000
heap
page read and write
4E41000
heap
page read and write
E23000
heap
page read and write
289000
unkown
page write copy
1EC000
stack
page read and write
BE4000
heap
page read and write
7F0000
direct allocation
page read and write
4D20000
direct allocation
page execute and read and write
4E41000
heap
page read and write
1530000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
B69000
unkown
page write copy
F0C000
unkown
page read and write
5490000
direct allocation
page execute and read and write
14DB000
heap
page read and write
4F9F000
stack
page read and write
E38000
heap
page read and write
5450000
direct allocation
page execute and read and write
4E30000
direct allocation
page read and write
7DE000
stack
page read and write
E1B000
unkown
page execute and write copy
2E0000
unkown
page read and write
4DF1000
heap
page read and write
1574000
heap
page read and write
C44000
heap
page read and write
D10000
heap
page read and write
5400000
direct allocation
page execute and read and write
1B1AF000
stack
page read and write
1564000
heap
page read and write
1194000
heap
page read and write
BE4000
heap
page read and write
42FE000
stack
page read and write
1194000
heap
page read and write
3EAF000
stack
page read and write
17D4000
heap
page read and write
E13000
heap
page read and write
4DF1000
heap
page read and write
486F000
stack
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
640000
unkown
page readonly
17D4000
heap
page read and write
1194000
heap
page read and write
85B000
heap
page read and write
1564000
heap
page read and write
17D4000
heap
page read and write
4FCF000
stack
page read and write
17D4000
heap
page read and write
29AE000
stack
page read and write
17D4000
heap
page read and write
1194000
heap
page read and write
1B0AE000
stack
page read and write
14D4000
heap
page read and write
F0C000
unkown
page read and write
4541000
heap
page read and write
5B1000
unkown
page execute and read and write
4541000
heap
page read and write
2D0000
direct allocation
page read and write
332F000
stack
page read and write
3030000
direct allocation
page read and write
18B0000
heap
page read and write
137F000
stack
page read and write
D7A000
heap
page read and write
1423000
heap
page read and write
151F000
heap
page read and write
14D4000
heap
page read and write
DCD000
heap
page read and write
17D4000
heap
page read and write
4E30000
direct allocation
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
15DB000
stack
page read and write
14D4000
heap
page read and write
E40000
unkown
page readonly
4E41000
heap
page read and write
994000
heap
page read and write
3A3E000
stack
page read and write
5F4000
unkown
page execute and write copy
4DF1000
heap
page read and write
3790000
trusted library allocation
page read and write
994000
heap
page read and write
4DF1000
heap
page read and write
4C8F000
stack
page read and write
5430000
direct allocation
page execute and read and write
49C0000
direct allocation
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
14D4000
heap
page read and write
2300000
heap
page read and write
1562000
heap
page read and write
1410000
heap
page read and write
14D4000
heap
page read and write
336E000
stack
page read and write
89C000
unkown
page readonly
D90000
direct allocation
page execute and read and write
17D4000
heap
page read and write
5140000
direct allocation
page execute and read and write
403F000
stack
page read and write
7DE000
stack
page read and write
132E000
stack
page read and write
145A000
heap
page read and write
17D4000
heap
page read and write
3790000
trusted library allocation
page read and write
336E000
stack
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
2750000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
5170000
direct allocation
page execute and read and write
4AEF000
stack
page read and write
4DF1000
heap
page read and write
4541000
heap
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
52E1000
direct allocation
page read and write
6D1E000
stack
page read and write
4DF1000
heap
page read and write
850000
heap
page read and write
2AE0000
heap
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
3FC1000
heap
page read and write
4F40000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
5F3000
unkown
page execute and write copy
1530000
heap
page read and write
2D0000
direct allocation
page read and write
1562000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
5110000
direct allocation
page execute and read and write
17D4000
heap
page read and write
436F000
stack
page read and write
E38000
heap
page read and write
D40000
direct allocation
page execute and read and write
67D5000
heap
page read and write
44F1000
heap
page read and write
156A000
heap
page read and write
5F3000
unkown
page execute and read and write
4B8E000
stack
page read and write
C44000
heap
page read and write
D14000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
3FC1000
heap
page read and write
453F000
stack
page read and write
1564000
heap
page read and write
14D4000
heap
page read and write
E40000
unkown
page readonly
386E000
stack
page read and write
17D4000
heap
page read and write
468E000
stack
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
4E30000
direct allocation
page read and write
14D4000
heap
page read and write
130B000
stack
page read and write
E7F000
heap
page read and write
14D4000
heap
page read and write
525E000
stack
page read and write
4E41000
heap
page read and write
D2E000
stack
page read and write
3AAF000
stack
page read and write
38CE000
stack
page read and write
4DF1000
heap
page read and write
BE4000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
28B000
unkown
page execute and read and write
15FE000
stack
page read and write
38BF000
stack
page read and write
DD6000
unkown
page execute and read and write
33FE000
stack
page read and write
F02000
unkown
page readonly
BE4000
heap
page read and write
17D4000
heap
page read and write
1564000
heap
page read and write
BE4000
heap
page read and write
4DF1000
heap
page read and write
4A0F000
stack
page read and write
3AF4000
heap
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
550000
heap
page read and write
426F000
stack
page read and write
2E0000
unkown
page readonly
DA0000
direct allocation
page execute and read and write
1564000
heap
page read and write
BE4000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
4E41000
heap
page read and write
722000
unkown
page read and write
54A0000
direct allocation
page execute and read and write
EDC000
unkown
page readonly
12FA000
stack
page read and write
14D4000
heap
page read and write
4E41000
heap
page read and write
4D10000
direct allocation
page execute and read and write
DD0000
heap
page read and write
4DF1000
heap
page read and write
15EF000
stack
page read and write
66B000
unkown
page write copy
F02000
unkown
page readonly
8890000
heap
page read and write
3FC0000
heap
page read and write
F0C000
unkown
page write copy
4DF1000
heap
page read and write
478F000
stack
page read and write
4731000
heap
page read and write
2CEF000
stack
page read and write
364E000
stack
page read and write
45EF000
stack
page read and write
4E30000
direct allocation
page read and write
4541000
heap
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
7F0000
direct allocation
page read and write
220000
unkown
page read and write
346F000
stack
page read and write
14D4000
heap
page read and write
1500000
heap
page read and write
14D4000
heap
page read and write
396F000
stack
page read and write
1194000
heap
page read and write
EDC000
unkown
page readonly
BE4000
heap
page read and write
2E5E000
stack
page read and write
A20000
heap
page read and write
4DF1000
heap
page read and write
D30000
direct allocation
page read and write
C44000
heap
page read and write
C6A000
stack
page read and write
4E41000
heap
page read and write
44EF000
stack
page read and write
142A000
heap
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
1275000
heap
page read and write
125E000
stack
page read and write
340000
unkown
page execute and read and write
B00000
unkown
page read and write
B00000
unkown
page readonly
17D4000
heap
page read and write
1564000
heap
page read and write
270000
heap
page read and write
DC4000
heap
page read and write
BE4000
heap
page read and write
363F000
stack
page read and write
5400000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
514E000
stack
page read and write
17D4000
heap
page read and write
C44000
heap
page read and write
DF0000
heap
page read and write
1564000
heap
page read and write
3D8F000
stack
page read and write
22C0000
trusted library allocation
page read and write
FB9000
unkown
page execute and read and write
4E30000
direct allocation
page read and write
3FC1000
heap
page read and write
ACE000
stack
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
4AAF000
stack
page read and write
17D4000
heap
page read and write
98E000
stack
page read and write
36EF000
stack
page read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
86D000
heap
page read and write
164E000
stack
page read and write
1450000
heap
page read and write
CD0000
heap
page read and write
17D4000
heap
page read and write
43CF000
stack
page read and write
DC0000
heap
page read and write
AE0000
direct allocation
page read and write
17D0000
heap
page read and write
1529000
heap
page read and write
17D4000
heap
page read and write
E1B000
unkown
page execute and write copy
4E5E000
stack
page read and write
14D4000
heap
page read and write
168E000
stack
page read and write
282000
unkown
page execute and read and write
7F0000
direct allocation
page read and write
4B01000
heap
page read and write
DE0000
trusted library allocation
page read and write
418E000
stack
page read and write
17D4000
heap
page read and write
7F0000
direct allocation
page read and write
17D4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
10BD000
stack
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
AC0000
heap
page read and write
2FDE000
stack
page read and write
1564000
heap
page read and write
22C0000
trusted library allocation
page read and write
1559000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
67D6000
heap
page read and write
4AFF000
stack
page read and write
3BEF000
stack
page read and write
17D4000
heap
page read and write
1423000
heap
page read and write
1194000
heap
page read and write
72F0000
heap
page read and write
17D4000
heap
page read and write
2AE7000
heap
page read and write
382F000
stack
page read and write
4B00000
heap
page read and write
14D4000
heap
page read and write
5440000
direct allocation
page execute and read and write
14A1000
heap
page read and write
1423000
heap
page read and write
3FAF000
stack
page read and write
5480000
direct allocation
page execute and read and write
472F000
stack
page read and write
1564000
heap
page read and write
DF7000
heap
page read and write
2FAF000
stack
page read and write
501E000
stack
page read and write
10F5000
stack
page read and write
640000
unkown
page readonly
D89000
heap
page read and write
14D4000
heap
page read and write
2E1000
unkown
page execute and read and write
3030000
direct allocation
page read and write
28CE000
stack
page read and write
E41000
unkown
page execute read
36EF000
stack
page read and write
E40000
unkown
page readonly
4DF1000
heap
page read and write
4D50000
direct allocation
page execute and read and write
BE4000
heap
page read and write
A67000
heap
page read and write
346F000
stack
page read and write
3921000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
3FEF000
stack
page read and write
17D4000
heap
page read and write
3DBE000
stack
page read and write
E03000
heap
page read and write
B00000
unkown
page readonly
17D4000
heap
page read and write
C30000
direct allocation
page execute and read and write
E3D000
heap
page read and write
4E41000
heap
page read and write
3AAF000
stack
page read and write
155B000
heap
page read and write
4E41000
heap
page read and write
797000
unkown
page execute and write copy
1520000
heap
page read and write
C44000
heap
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
17D4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
E1A000
unkown
page execute and read and write
DC4000
heap
page read and write
4E41000
heap
page read and write
18CA000
heap
page read and write
2A5F000
stack
page read and write
AE0000
direct allocation
page read and write
4E9E000
stack
page read and write
5110000
direct allocation
page execute and read and write
5160000
direct allocation
page execute and read and write
17D4000
heap
page read and write
E40000
unkown
page readonly
141C000
heap
page read and write
44F0000
heap
page read and write
5280000
direct allocation
page read and write
414F000
stack
page read and write
1564000
heap
page read and write
322E000
stack
page read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
F14000
unkown
page readonly
2D0000
direct allocation
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
2E9E000
stack
page read and write
3DFE000
stack
page read and write
B00000
unkown
page readonly
17D4000
heap
page read and write
3030000
direct allocation
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
5280000
direct allocation
page read and write
11DE000
stack
page read and write
1564000
heap
page read and write
1AB0E000
stack
page read and write
D7F000
heap
page read and write
B6B000
unkown
page execute and read and write
1564000
heap
page read and write
E11000
heap
page read and write
22C0000
trusted library allocation
page read and write
3C2E000
stack
page read and write
4CCE000
stack
page read and write
4E41000
heap
page read and write
4830000
trusted library allocation
page read and write
142A000
heap
page read and write
4E41000
heap
page read and write
4730000
heap
page read and write
2E2F000
stack
page read and write
52D0000
direct allocation
page read and write
14D4000
heap
page read and write
156A000
heap
page read and write
3FAF000
stack
page read and write
4731000
heap
page read and write
1564000
heap
page read and write
7F0000
direct allocation
page read and write
1434000
heap
page read and write
17D4000
heap
page read and write
C94000
heap
page read and write
17D4000
heap
page read and write
E38000
heap
page read and write
1B56D000
stack
page read and write
17D4000
heap
page read and write
3AEE000
stack
page read and write
35AF000
stack
page read and write
E02000
unkown
page execute and read and write
4E41000
heap
page read and write
4AF0000
direct allocation
page read and write
34AF000
stack
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
8EA000
stack
page read and write
52BC000
stack
page read and write
F10000
unkown
page write copy
18BF000
heap
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
E0B000
unkown
page execute and read and write
1564000
heap
page read and write
4DF1000
heap
page read and write
30EE000
stack
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
DC0000
heap
page read and write
725F000
stack
page read and write
4DF1000
heap
page read and write
89C000
unkown
page readonly
14D4000
heap
page read and write
4EF0000
trusted library allocation
page read and write
17D4000
heap
page read and write
1564000
heap
page read and write
C0E000
stack
page read and write
14D4000
heap
page read and write
4E41000
heap
page read and write
5620000
heap
page read and write
2730000
direct allocation
page execute and read and write
4501000
heap
page read and write
1130000
heap
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
367E000
stack
page read and write
14D4000
heap
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
DA0000
remote allocation
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
994000
heap
page read and write
AE0000
direct allocation
page read and write
BE4000
heap
page read and write
4BDE000
stack
page read and write
F14000
unkown
page readonly
6DB000
unkown
page execute and write copy
14D4000
heap
page read and write
1573000
heap
page read and write
E3D000
heap
page read and write
4AF0000
direct allocation
page read and write
4C11000
direct allocation
page read and write
4D00000
direct allocation
page execute and read and write
B01000
unkown
page execute and write copy
156A000
heap
page read and write
14D4000
heap
page read and write
18C0000
heap
page read and write
14D4000
heap
page read and write
2E6E000
stack
page read and write
141F000
heap
page read and write
1194000
heap
page read and write
5B1000
unkown
page execute and read and write
C44000
heap
page read and write
17D4000
heap
page read and write
14C0000
heap
page read and write
994000
heap
page read and write
17D4000
heap
page read and write
1194000
heap
page read and write
4541000
heap
page read and write
14D4000
heap
page read and write
3040000
heap
page read and write
44F1000
heap
page read and write
17D4000
heap
page read and write
301C000
stack
page read and write
F10000
unkown
page write copy
4D90000
direct allocation
page execute and read and write
121E000
stack
page read and write
9EE000
stack
page read and write
49FE000
stack
page read and write
2767000
heap
page read and write
17D4000
heap
page read and write
AE0000
direct allocation
page read and write
376E000
stack
page read and write
353E000
stack
page read and write
1564000
heap
page read and write
65E000
unkown
page readonly
15BF000
stack
page read and write
1519000
heap
page read and write
4731000
heap
page read and write
17D4000
heap
page read and write
49AF000
stack
page read and write
5E4000
unkown
page execute and read and write
4E41000
heap
page read and write
5120000
direct allocation
page execute and read and write
C44000
heap
page read and write
5110000
direct allocation
page execute and read and write
14D4000
heap
page read and write
66B000
unkown
page write copy
4FF1000
direct allocation
page read and write
2D0000
direct allocation
page read and write
3FC1000
heap
page read and write
4E41000
heap
page read and write
AE0000
direct allocation
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
DA0000
remote allocation
page read and write
6B90000
heap
page read and write
3790000
trusted library allocation
page read and write
4E41000
heap
page read and write
5450000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4E30000
direct allocation
page read and write
2E1000
unkown
page execute and read and write
4E41000
heap
page read and write
2BEF000
stack
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
4541000
heap
page read and write
4FCE000
stack
page read and write
44F1000
heap
page read and write
426E000
stack
page read and write
2D0000
direct allocation
page read and write
3C2F000
stack
page read and write
1210000
heap
page read and write
40EF000
stack
page read and write
63E000
stack
page read and write
4C4E000
stack
page read and write
17D4000
heap
page read and write
4541000
heap
page read and write
420000
heap
page read and write
14D4000
heap
page read and write
14A4000
heap
page read and write
17D4000
heap
page read and write
52D0000
direct allocation
page read and write
BE4000
heap
page read and write
76D000
stack
page read and write
3C4F000
stack
page read and write
7300000
heap
page read and write
5331000
direct allocation
page read and write
4970000
direct allocation
page read and write
13F8000
heap
page read and write
AE0000
direct allocation
page read and write
4B01000
heap
page read and write
4D5E000
stack
page read and write
454E000
stack
page read and write
5450000
direct allocation
page execute and read and write
17D4000
heap
page read and write
7E0000
heap
page read and write
88A000
unkown
page read and write
4DF1000
heap
page read and write
B69000
unkown
page write copy
DDC000
stack
page read and write
4DF1000
heap
page read and write
18CA000
heap
page read and write
7D0000
heap
page read and write
B69000
unkown
page write copy
296F000
stack
page read and write
994000
heap
page read and write
1500000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
2DBE000
stack
page read and write
4DF1000
heap
page read and write
BE4000
heap
page read and write
475000
heap
page read and write
157F000
stack
page read and write
1500000
heap
page read and write
12EE000
stack
page read and write
F14000
unkown
page readonly
417F000
stack
page read and write
2D0000
direct allocation
page read and write
45EF000
stack
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
1280000
heap
page read and write
BE4000
heap
page read and write
B01000
unkown
page execute and write copy
362E000
stack
page read and write
4AF0000
direct allocation
page read and write
BE4000
heap
page read and write
66B000
unkown
page write copy
476E000
stack
page read and write
7F0000
direct allocation
page read and write
326E000
stack
page read and write
2C7E000
stack
page read and write
F0C000
unkown
page write copy
E11000
heap
page read and write
464F000
stack
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
2750000
direct allocation
page execute and read and write
2BEF000
stack
page read and write
5E0000
heap
page read and write
1518000
heap
page read and write
3790000
trusted library allocation
page read and write
1564000
heap
page read and write
3AF0000
heap
page read and write
1564000
heap
page read and write
1564000
heap
page read and write
14D4000
heap
page read and write
5410000
direct allocation
page execute and read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
4AF0000
direct allocation
page read and write
DC5000
heap
page read and write
4D30000
direct allocation
page execute and read and write
C44000
heap
page read and write
B69000
unkown
page write copy
4DD0000
direct allocation
page execute and read and write
22C0000
trusted library allocation
page read and write
402E000
stack
page read and write
14D4000
heap
page read and write
1564000
heap
page read and write
15CF000
stack
page read and write
1B46D000
stack
page read and write
426E000
stack
page read and write
4DF1000
heap
page read and write
1A98E000
stack
page read and write
3FC1000
heap
page read and write
2B3F000
stack
page read and write
14D4000
heap
page read and write
443E000
stack
page read and write
BE4000
heap
page read and write
4DF1000
heap
page read and write
89C000
unkown
page readonly
3C31000
heap
page read and write
17D4000
heap
page read and write
D89000
heap
page read and write
4DF1000
heap
page read and write
F0C000
unkown
page write copy
22A0000
heap
page read and write
416000
unkown
page execute and read and write
386E000
stack
page read and write
4DF1000
heap
page read and write
3FC1000
heap
page read and write
1194000
heap
page read and write
42AE000
stack
page read and write
5F3000
unkown
page execute and read and write
BE4000
heap
page read and write
1564000
heap
page read and write
797000
unkown
page execute and write copy
11BF000
stack
page read and write
14D4000
heap
page read and write
3030000
direct allocation
page read and write
E1A000
unkown
page execute and write copy
17D4000
heap
page read and write
14D4000
heap
page read and write
BE4000
heap
page read and write
2D7F000
stack
page read and write
14D4000
heap
page read and write
9AE000
stack
page read and write
44F1000
heap
page read and write
35EE000
stack
page read and write
F14000
unkown
page readonly
DCD000
heap
page read and write
2740000
direct allocation
page execute and read and write
303E000
stack
page read and write
360F000
stack
page read and write
522000
unkown
page execute and read and write
C20000
direct allocation
page execute and read and write
374F000
stack
page read and write
4DF1000
heap
page read and write
5400000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
D30000
direct allocation
page read and write
33CE000
stack
page read and write
1B6CE000
stack
page read and write
32BE000
stack
page read and write
89C000
unkown
page readonly
5450000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
68DF000
stack
page read and write
4DF1000
heap
page read and write
39CF000
stack
page read and write
1564000
heap
page read and write
3921000
heap
page read and write
327F000
stack
page read and write
1564000
heap
page read and write
17D4000
heap
page read and write
C44000
heap
page read and write
130B000
stack
page read and write
1B2EF000
stack
page read and write
372F000
stack
page read and write
3790000
trusted library allocation
page read and write
DFE000
heap
page read and write
4E41000
heap
page read and write
3C8E000
stack
page read and write
691E000
stack
page read and write
5130000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4A4E000
stack
page read and write
CF6000
unkown
page execute and read and write
DA0000
remote allocation
page read and write
DA0000
direct allocation
page execute and read and write
66C000
stack
page read and write
14D4000
heap
page read and write
3874000
heap
page read and write
4DF1000
heap
page read and write
994000
heap
page read and write
12EF000
stack
page read and write
38FE000
stack
page read and write
722000
unkown
page read and write
1564000
heap
page read and write
4DF1000
heap
page read and write
E41000
unkown
page execute read
4DF1000
heap
page read and write
3030000
direct allocation
page read and write
EDC000
unkown
page readonly
14D4000
heap
page read and write
3920000
heap
page read and write
2EA0000
heap
page read and write
3C6E000
stack
page read and write
F02000
unkown
page readonly
4AF0000
direct allocation
page read and write
5F4000
unkown
page execute and write copy
47CE000
stack
page read and write
3F3E000
stack
page read and write
1435000
heap
page read and write
17D4000
heap
page read and write
50CF000
stack
page read and write
4C1D000
stack
page read and write
3020000
heap
page read and write
377F000
stack
page read and write
C44000
heap
page read and write
4DF1000
heap
page read and write
C10000
direct allocation
page read and write
5110000
direct allocation
page execute and read and write
6F1000
unkown
page read and write
2F6F000
stack
page read and write
72FE000
heap
page read and write
14D4000
heap
page read and write
52B000
unkown
page execute and read and write
18B9000
heap
page read and write
7F0000
direct allocation
page read and write
2750000
direct allocation
page execute and read and write
412E000
stack
page read and write
BE4000
heap
page read and write
1421000
heap
page read and write
14D4000
heap
page read and write
FAF000
stack
page read and write
1564000
heap
page read and write
2FAF000
stack
page read and write
3D6E000
stack
page read and write
4E41000
heap
page read and write
4DD0000
heap
page read and write
7F0000
direct allocation
page read and write
17D4000
heap
page read and write
18BE000
heap
page read and write
6CDC000
stack
page read and write
14AB000
heap
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
DD9000
heap
page read and write
4E41000
heap
page read and write
3FC1000
heap
page read and write
C20000
heap
page read and write
2D0000
direct allocation
page read and write
3870000
heap
page read and write
4F90000
direct allocation
page read and write
14D4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
D5B000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
16B4000
heap
page read and write
1520000
heap
page read and write
407E000
stack
page read and write
4DF1000
heap
page read and write
1460000
heap
page read and write
5110000
direct allocation
page execute and read and write
1CE000
stack
page read and write
53BF000
stack
page read and write
4DF1000
heap
page read and write
5E4000
unkown
page execute and read and write
4DF1000
heap
page read and write
2750000
remote allocation
page read and write
994000
heap
page read and write
14D4000
heap
page read and write
3030000
direct allocation
page read and write
322E000
stack
page read and write
34AE000
stack
page read and write
496D000
stack
page read and write
4DF1000
heap
page read and write
6A5E000
stack
page read and write
1491000
heap
page read and write
289000
unkown
page write copy
14D4000
heap
page read and write
1B06F000
stack
page read and write
8690000
heap
page read and write
88A000
unkown
page read and write
2760000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
E3D000
heap
page read and write
A86000
heap
page read and write
3DCE000
stack
page read and write
14D4000
heap
page read and write
2910000
direct allocation
page execute and read and write
C90000
heap
page read and write
5180000
direct allocation
page execute and read and write
4CA000
unkown
page execute and read and write
840000
heap
page read and write
4DF1000
heap
page read and write
14D4000
heap
page read and write
AB0000
heap
page read and write
1552000
heap
page read and write
4AF0000
direct allocation
page read and write
1425000
heap
page read and write
17D4000
heap
page read and write
3EAE000
stack
page read and write
4E30000
direct allocation
page read and write
12FF000
stack
page read and write
FB9000
unkown
page execute and read and write
4DF1000
heap
page read and write
7300000
heap
page read and write
1430000
heap
page read and write
1541000
heap
page read and write
2D2E000
stack
page read and write
5450000
direct allocation
page execute and read and write
4E41000
heap
page read and write
49AE000
stack
page read and write
3B0F000
stack
page read and write
C44000
heap
page read and write
3030000
direct allocation
page read and write
350E000
stack
page read and write
3790000
trusted library allocation
page read and write
BE4000
heap
page read and write
21E0000
heap
page read and write
1560000
heap
page read and write
17D4000
heap
page read and write
3790000
trusted library allocation
page read and write
66B000
unkown
page write copy
BE4000
heap
page read and write
17D4000
heap
page read and write
4541000
heap
page read and write
49BD000
stack
page read and write
18CA000
heap
page read and write
34FF000
stack
page read and write
4DF1000
heap
page read and write
1564000
heap
page read and write
44AF000
stack
page read and write
515E000
stack
page read and write
4ECE000
stack
page read and write
AE0000
direct allocation
page read and write
4B4F000
stack
page read and write
6B5F000
stack
page read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
C40000
heap
page read and write
BE4000
heap
page read and write
14D4000
heap
page read and write
67CE000
stack
page read and write
4DF1000
heap
page read and write
CEF000
stack
page read and write
C44000
heap
page read and write
155E000
heap
page read and write
14B0000
heap
page read and write
4E01000
heap
page read and write
1564000
heap
page read and write
156A000
heap
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
4E41000
heap
page read and write
4541000
heap
page read and write
126E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
4E30000
direct allocation
page read and write
3921000
heap
page read and write
18CA000
heap
page read and write
3B3F000
stack
page read and write
3FC1000
heap
page read and write
5CE000
stack
page read and write
5440000
direct allocation
page execute and read and write
AE0000
direct allocation
page read and write
4E41000
heap
page read and write
1B1EE000
stack
page read and write
BE4000
heap
page read and write
1529000
heap
page read and write
14D4000
heap
page read and write
2D2F000
stack
page read and write
18CA000
heap
page read and write
E1A000
unkown
page execute and write copy
DC0000
heap
page read and write
1194000
heap
page read and write
39EE000
stack
page read and write
14E7000
heap
page read and write
5F3000
unkown
page execute and write copy
13F0000
heap
page read and write
1194000
heap
page read and write
4DF1000
heap
page read and write
1538000
heap
page read and write
450F000
stack
page read and write
AD0000
heap
page read and write
14D4000
heap
page read and write
53F0000
direct allocation
page execute and read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
DF5000
heap
page read and write
153F000
heap
page read and write
1AACF000
stack
page read and write
4D80000
direct allocation
page execute and read and write
DE0000
trusted library allocation
page read and write
1564000
heap
page read and write
5470000
direct allocation
page execute and read and write
14D0000
heap
page read and write
DD0000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
F10000
unkown
page write copy
43FF000
stack
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
3790000
trusted library allocation
page read and write
C5E000
stack
page read and write
7F0000
direct allocation
page read and write
4DF1000
heap
page read and write
DC4000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
DBA000
heap
page read and write
14D4000
heap
page read and write
53E0000
direct allocation
page execute and read and write
44F1000
heap
page read and write
4E41000
heap
page read and write
17D4000
heap
page read and write
412E000
stack
page read and write
D4F000
stack
page read and write
472F000
stack
page read and write
33BF000
stack
page read and write
26EE000
stack
page read and write
4AF0000
direct allocation
page read and write
17D4000
heap
page read and write
DBE000
heap
page read and write
DC5000
heap
page read and write
221000
unkown
page execute and write copy
128A000
heap
page read and write
1564000
heap
page read and write
17D4000
heap
page read and write
3D6F000
stack
page read and write
4DF1000
heap
page read and write
1AC0C000
stack
page read and write
1413000
heap
page read and write
4E41000
heap
page read and write
33AE000
stack
page read and write
153F000
heap
page read and write
34CF000
stack
page read and write
E30000
heap
page read and write
14D4000
heap
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
DA0000
direct allocation
page execute and read and write
4AF0000
direct allocation
page read and write
F0C000
unkown
page read and write
1420000
heap
page read and write
14D4000
heap
page read and write
4AF0000
direct allocation
page read and write
D50000
heap
page read and write
2FFF000
stack
page read and write
14D4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
DFE000
heap
page read and write
2E1F000
stack
page read and write
4E41000
heap
page read and write
994000
heap
page read and write
14D4000
heap
page read and write
E14000
heap
page read and write
4DF1000
heap
page read and write
3047000
heap
page read and write
2750000
direct allocation
page execute and read and write
F02000
unkown
page readonly
3C30000
heap
page read and write
DF9000
heap
page read and write
2750000
remote allocation
page read and write
640000
unkown
page readonly
3EFF000
stack
page read and write
1270000
heap
page read and write
17D4000
heap
page read and write
1A88D000
stack
page read and write
4DF1000
heap
page read and write
440E000
stack
page read and write
14D4000
heap
page read and write
72F1000
heap
page read and write
5150000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
E40000
unkown
page readonly
4541000
heap
page read and write
1564000
heap
page read and write
42CE000
stack
page read and write
E41000
unkown
page execute read
4DB0000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
4BB0000
direct allocation
page read and write
4FDD000
stack
page read and write
31EF000
stack
page read and write
436F000
stack
page read and write
44F1000
heap
page read and write
146E000
heap
page read and write
1194000
heap
page read and write
17D4000
heap
page read and write
4DF1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
14D4000
heap
page read and write
4DF1000
heap
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
1564000
heap
page read and write
7F0000
direct allocation
page read and write
4D8E000
stack
page read and write
2B0000
heap
page read and write
17D4000
heap
page read and write
3AEF000
stack
page read and write
17D4000
heap
page read and write
1A74E000
stack
page read and write
2AAF000
stack
page read and write
3EAE000
stack
page read and write
4DF1000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4DF1000
heap
page read and write
4B01000
heap
page read and write
BE4000
heap
page read and write
14D4000
heap
page read and write
DB0000
heap
page read and write
4DF1000
heap
page read and write
4CEF000
stack
page read and write
34AE000
stack
page read and write
18BA000
heap
page read and write
E40000
unkown
page readonly
17D4000
heap
page read and write
412F000
stack
page read and write
14D4000
heap
page read and write
4E41000
heap
page read and write
E02000
unkown
page execute and read and write
BE4000
heap
page read and write
4DF1000
heap
page read and write
17D4000
heap
page read and write
3FC1000
heap
page read and write
153F000
heap
page read and write
3B7D000
stack
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
4BEE000
stack
page read and write
5DD000
unkown
page execute and read and write
14D4000
heap
page read and write
DA0000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
4AF0000
direct allocation
page read and write
E10000
heap
page read and write
14D4000
heap
page read and write
D95000
heap
page read and write
2FAE000
stack
page read and write
1270000
heap
page read and write
6F1000
unkown
page read and write
30AF000
stack
page read and write
FBB000
unkown
page execute and write copy
994000
heap
page read and write
4DF1000
heap
page read and write
3C31000
heap
page read and write
1564000
heap
page read and write
4E30000
direct allocation
page read and write
2920000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
14D4000
heap
page read and write
3AEE000
stack
page read and write
40EF000
stack
page read and write
336F000
stack
page read and write
BE4000
heap
page read and write
3030000
direct allocation
page read and write
3B4E000
stack
page read and write
17D4000
heap
page read and write
4B00000
direct allocation
page execute and read and write
1AF6E000
stack
page read and write
4550000
heap
page read and write
3A0E000
stack
page read and write
B62000
unkown
page execute and read and write
4E41000
heap
page read and write
14D4000
heap
page read and write
FBB000
unkown
page execute and write copy
312E000
stack
page read and write
3030000
direct allocation
page read and write
4E41000
heap
page read and write
388F000
stack
page read and write
DE8000
heap
page read and write
17D4000
heap
page read and write
14D4000
heap
page read and write
3030000
direct allocation
page read and write
4F90000
direct allocation
page read and write
1564000
heap
page read and write
DC4000
heap
page read and write
1A9CE000
stack
page read and write
14D4000
heap
page read and write
4E41000
heap
page read and write
2730000
heap
page read and write
1194000
heap
page read and write
CC000
stack
page read and write
F02000
unkown
page readonly
1890000
heap
page read and write
14D4000
heap
page read and write
17D4000
heap
page read and write
2937000
heap
page read and write
4AF0000
direct allocation
page read and write
17DE000
stack
page read and write
5400000
direct allocation
page execute and read and write
DD0000
heap
page read and write
4DCF000
stack
page read and write
2930000
heap
page read and write
E1C000
heap
page read and write
17D4000
heap
page read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
1190000
heap
page read and write
4E41000
heap
page read and write
18CA000
heap
page read and write
14D4000
heap
page read and write
2D0000
direct allocation
page read and write
4E41000
heap
page read and write
F14000
unkown
page readonly
4DF1000
heap
page read and write
4AE9000
trusted library allocation
page read and write
17D4000
heap
page read and write
C44000
heap
page read and write
1530000
heap
page read and write
17D4000
heap
page read and write
994000
heap
page read and write
400F000
stack
page read and write
48AE000
stack
page read and write
1564000
heap
page read and write
CC9000
stack
page read and write
17D4000
heap
page read and write
5450000
direct allocation
page execute and read and write
4E41000
heap
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
DC4000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
B01000
unkown
page execute and write copy
DB0000
heap
page read and write
17D4000
heap
page read and write
7E0000
heap
page read and write
4AF0000
direct allocation
page read and write
There are 1664 hidden memdumps, click here to show them.