IOC Report
0BzQNa8hYd.exe

loading gif

Files

File Path
Type
Category
Malicious
0BzQNa8hYd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DHpYI8xc8c5WJf_4ET3wn7d.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0BzQNa8hYd.exe_50cc62df3591dc34e858afdd27ebf5f1c8310_05a05b09_33045566-a8c3-450a-ac5c-b01b2b3d9798\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12D0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER131F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBAB.tmp.dmp
Mini DuMP crash report, 15 streams, Thu May 2 11:06:17 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\9CCJaOUL98GXWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\9gL_vPVyR4oVLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\FHAnyLa3I2CpWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\Ho83UKZgRu8rLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\JZ_Was4YldHsWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\MY5k1n_XX7d8History
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\QA_Wrs4XUenFHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\QxMs11keIPSEHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\WeYUwDgk_fOSLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\g1OttGkisHfpCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\gXzxHmUZ2_5lHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\idMFhIeLY_eOWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\tZTAlSEuxH6TWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanw8R_aGshRbae\zxLjEwJSsqkaWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixyw8R_aGshRbae\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyw8R_aGshRbae\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyw8R_aGshRbae\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (2387)
downloaded
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0BzQNa8hYd.exe
"C:\Users\user\Desktop\0BzQNa8hYd.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7116 -s 2100
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1976,i,748993754934603013,4578033061278539889,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://db-ip.com/M.D
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://ipinfo.io/widget/demo/191.96.150.225;
unknown
https://duckduckgo.com/ac/?q=
unknown
https://t.me/risepro_botF
unknown
https://ipinfo.io/__
unknown
http://crl.microsoft
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
http://193.233.132.56/cost/go.exe50.225O
unknown
https://db-ip.com/
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.225P
unknown
https://db-ip.com/3
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225YPT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://t.me/risepro
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.2253I
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGNfnzbEGIjBpu0AXRtAugJJEK6NXUAWenWNp_rLmDdiE_g0IiJIN8uoI71qSPwXzhiK60YKMB64yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.164
https://db-ip.com/A
unknown
http://193.233.132.56/cost/go.exe
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGNfnzbEGIjD1WaW_kQpX5UuTH3k6sLaT2sgha20jAZtNUmX4owd2e1RNY717lgQsRK3T9_HrP4AyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.164
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://t.me/risepro_bot$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/risepro_botisepro_bot
unknown
https://t.me/risepro_bot;
unknown
https://db-ip.com/Q
unknown
https://t.me/RiseProSUPPORTH
unknown
https://ipinfo.io/widget/demo/191.96.150.225
34.117.186.192
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.40.164
http://147.45.47.102:57893/hera/amadka.exe68.0Z
unknown
https://db-ip.com:443/demo/home.php?s=191.96.150.225
unknown
https://t.me/risepro_botrisepro
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/O
unknown
https://ipinfo.io/;o
unknown
https://ipinfo.io/S
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.251.40.164
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/widget/demo/191.96.150.225i
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225K
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225I
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225w
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225
unknown
https://www.ecosia.org/newtab/
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225
172.67.75.166
https://ipinfo.io/Mozilla/5.0
unknown
http://193.233.132.56/cost/lenin.exeum
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225C
unknown
http://193.233.132.56/cost/sok.exe
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.40.164
https://t.me/risepro_bot
unknown
https://db-ip.com/demo/home.php?s=191.96.150.225Z
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.40.164
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://t.me/risepro_botisepro_botw
unknown
http://193.233.132.56/cost/sok.exev
unknown
http://193.233.132.56/cost/lenin.exe
unknown
http://www.winimage.com/zLibDll
unknown
http://193.233.132.56/cost/sok.exedka.et
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/widget/demo/191.96.150.225S
unknown
https://ipinfo.io:443/widget/demo/191.96.150.225O
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
www.google.com
142.251.40.164
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
147.45.47.93
unknown
Russian Federation
malicious
192.168.2.4
unknown
unknown
malicious
142.251.40.164
www.google.com
United States
34.117.186.192
ipinfo.io
United States
239.255.255.250
unknown
Reserved
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
ProgramId
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
FileId
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
LowerCaseLongPath
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
LongPathHash
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
Name
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
OriginalFileName
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
Publisher
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
Version
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
BinFileVersion
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
BinaryType
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
ProductName
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
ProductVersion
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
LinkDate
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
BinProductVersion
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
AppxPackageFullName
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
AppxPackageRelativeId
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
Size
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
Language
\REGISTRY\A\{1de96c83-3f3e-6b22-a2f7-84170212ed7e}\Root\InventoryApplicationFile\0bzqna8hyd.exe|fc90c279651ccdb8
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
81DD000
heap
page read and write
malicious
81CB000
heap
page read and write
malicious
81DC000
heap
page read and write
malicious
4A20000
direct allocation
page execute and read and write
39BE000
stack
page read and write
824D000
heap
page read and write
408E000
stack
page read and write
5660000
direct allocation
page read and write
31FF000
stack
page read and write
4741000
heap
page read and write
418F000
stack
page read and write
F57000
unkown
page read and write
4F01000
heap
page read and write
4960000
direct allocation
page execute and read and write
BF2000
unkown
page execute and read and write
4741000
heap
page read and write
A70000
unkown
page read and write
51D1000
heap
page read and write
14AA000
heap
page read and write
4741000
heap
page read and write
81F2000
heap
page read and write
19DF000
stack
page read and write
51D1000
heap
page read and write
5400000
direct allocation
page execute and read and write
370F000
stack
page read and write
51D1000
heap
page read and write
5450000
direct allocation
page execute and read and write
5668000
direct allocation
page read and write
722000
heap
page read and write
1115000
heap
page read and write
51D1000
heap
page read and write
3D7D000
stack
page read and write
19C7000
heap
page read and write
823D000
heap
page read and write
4A30000
direct allocation
page execute and read and write
423F000
stack
page read and write
822F000
heap
page read and write
4C30000
direct allocation
page execute and read and write
E97000
unkown
page execute and read and write
1800000
heap
page read and write
5470000
direct allocation
page execute and read and write
10F6000
heap
page read and write
481F000
stack
page read and write
27FF000
stack
page read and write
14EE000
heap
page read and write
14C2000
heap
page read and write
51D1000
heap
page read and write
7DEE000
stack
page read and write
82A5000
heap
page read and write
14EC000
heap
page read and write
4EF0000
direct allocation
page read and write
460F000
stack
page read and write
51D1000
heap
page read and write
8243000
heap
page read and write
103F000
stack
page read and write
C04000
unkown
page execute and read and write
8214000
heap
page read and write
1739000
heap
page read and write
E9E000
stack
page read and write
1A4C000
heap
page read and write
990000
direct allocation
page read and write
4741000
heap
page read and write
44C1000
heap
page read and write
907000
unkown
page write copy
8245000
heap
page read and write
323E000
stack
page read and write
7D80000
remote allocation
page read and write
19DF000
heap
page read and write
44C1000
heap
page read and write
8218000
heap
page read and write
1A05000
heap
page read and write
56B0000
direct allocation
page execute and read and write
4DCE000
stack
page read and write
4D00000
direct allocation
page execute and read and write
772F000
stack
page read and write
781000
unkown
page execute and read and write
8223000
heap
page read and write
748F000
stack
page read and write
907000
unkown
page read and write
4C11000
heap
page read and write
4741000
heap
page read and write
53E0000
direct allocation
page execute and read and write
781000
unkown
page execute and write copy
E47000
heap
page read and write
46DF000
stack
page read and write
2E7E000
stack
page read and write
802E000
stack
page read and write
8272000
heap
page read and write
8214000
heap
page read and write
8223000
heap
page read and write
D58000
unkown
page execute and write copy
F34000
heap
page read and write
51D1000
heap
page read and write
4C11000
heap
page read and write
8244000
heap
page read and write
8690000
trusted library allocation
page read and write
829D000
heap
page read and write
51D1000
heap
page read and write
196C000
stack
page read and write
4741000
heap
page read and write
710000
heap
page read and write
4A00000
direct allocation
page execute and read and write
480E000
stack
page read and write
2ABE000
stack
page read and write
464E000
stack
page read and write
1080000
direct allocation
page read and write
4C11000
heap
page read and write
4940000
direct allocation
page read and write
4F01000
heap
page read and write
F34000
heap
page read and write
1080000
direct allocation
page read and write
584000
heap
page read and write
1A0C000
heap
page read and write
786E000
stack
page read and write
822F000
heap
page read and write
4ECF000
stack
page read and write
7BFF000
stack
page read and write
F34000
heap
page read and write
8690000
trusted library allocation
page read and write
6FE000
heap
page read and write
5200000
direct allocation
page execute and read and write
DD1000
unkown
page execute and write copy
450E000
stack
page read and write
8250000
heap
page read and write
53F0000
direct allocation
page execute and read and write
584000
heap
page read and write
50F0000
direct allocation
page execute and read and write
8253000
heap
page read and write
8243000
heap
page read and write
51D1000
heap
page read and write
780000
unkown
page read and write
5665000
direct allocation
page read and write
F34000
heap
page read and write
F34000
heap
page read and write
8421000
heap
page read and write
4C80000
direct allocation
page execute and read and write
820E000
heap
page read and write
4F01000
heap
page read and write
2B3F000
stack
page read and write
104B000
unkown
page execute and write copy
8420000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
1717000
heap
page read and write
50F0000
direct allocation
page execute and read and write
7A8F000
stack
page read and write
7D5F000
stack
page read and write
3FFE000
stack
page read and write
A97000
unkown
page execute and read and write
8030000
heap
page read and write
1043000
unkown
page execute and write copy
8222000
heap
page read and write
781000
unkown
page execute and write copy
4C11000
heap
page read and write
8259000
heap
page read and write
D58000
unkown
page execute and write copy
584000
heap
page read and write
53A0000
direct allocation
page read and write
5710000
direct allocation
page execute and read and write
51CF000
stack
page read and write
342E000
stack
page read and write
4BE0000
heap
page read and write
373E000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
8259000
heap
page read and write
4F4F000
stack
page read and write
4F8E000
stack
page read and write
34B000
stack
page read and write
F34000
heap
page read and write
7C3E000
stack
page read and write
368F000
stack
page read and write
4E2D000
stack
page read and write
F34000
heap
page read and write
1080000
direct allocation
page read and write
4741000
heap
page read and write
30FE000
stack
page read and write
F34000
heap
page read and write
4F01000
heap
page read and write
51D1000
heap
page read and write
45FF000
stack
page read and write
3547000
heap
page read and write
3A8E000
stack
page read and write
5610000
trusted library allocation
page read and write
7B3E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
1720000
heap
page read and write
2E3F000
stack
page read and write
5740000
direct allocation
page execute and read and write
8421000
heap
page read and write
914000
unkown
page execute and read and write
4AC0000
heap
page read and write
56B0000
direct allocation
page execute and read and write
1970000
heap
page read and write
8243000
heap
page read and write
DD0000
unkown
page readonly
584000
heap
page read and write
775D000
stack
page read and write
8204000
heap
page read and write
5395000
direct allocation
page read and write
4C11000
heap
page read and write
155D000
heap
page read and write
51D1000
heap
page read and write
32BE000
stack
page read and write
781000
unkown
page execute and read and write
8690000
trusted library allocation
page read and write
5680000
direct allocation
page execute and read and write
4980000
direct allocation
page execute and read and write
2F7F000
stack
page read and write
8245000
heap
page read and write
825F000
heap
page read and write
14A7000
heap
page read and write
1160000
heap
page read and write
454F000
stack
page read and write
7DBD000
stack
page read and write
44C1000
heap
page read and write
BA7000
unkown
page execute and read and write
8233000
heap
page read and write
54D0000
direct allocation
page execute and read and write
43BE000
stack
page read and write
49C0000
direct allocation
page execute and read and write
4900000
trusted library allocation
page read and write
827F000
heap
page read and write
584000
heap
page read and write
3E4E000
stack
page read and write
104B000
unkown
page execute and write copy
826A000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
907000
unkown
page read and write
A71000
unkown
page execute and read and write
F5F000
unkown
page read and write
4C4F000
stack
page read and write
50F0000
direct allocation
page execute and read and write
3FFE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
51D1000
heap
page read and write
49D0000
direct allocation
page execute and read and write
388E000
stack
page read and write
3CCE000
stack
page read and write
3D4F000
stack
page read and write
82FD000
stack
page read and write
907000
unkown
page write copy
A70000
unkown
page read and write
50A8000
direct allocation
page read and write
2E7E000
stack
page read and write
71BF000
stack
page read and write
358E000
stack
page read and write
51D1000
heap
page read and write
368E000
stack
page read and write
F34000
heap
page read and write
4D10000
direct allocation
page execute and read and write
4C40000
direct allocation
page execute and read and write
1515000
heap
page read and write
4C00000
direct allocation
page execute and read and write
51D1000
heap
page read and write
4960000
direct allocation
page execute and read and write
48CE000
stack
page read and write
826B000
heap
page read and write
8212000
heap
page read and write
44BF000
stack
page read and write
18DE000
stack
page read and write
80BE000
stack
page read and write
14F7000
heap
page read and write
53E0000
direct allocation
page execute and read and write
56E0000
direct allocation
page execute and read and write
104E000
unkown
page execute and read and write
10D9000
heap
page read and write
1048000
unkown
page execute and write copy
34BE000
stack
page read and write
8253000
heap
page read and write
4C11000
heap
page read and write
4F01000
heap
page read and write
770E000
stack
page read and write
6F3E000
stack
page read and write
F34000
heap
page read and write
7C5E000
stack
page read and write
4ADE000
stack
page read and write
D87000
unkown
page execute and read and write
444E000
stack
page read and write
BC1000
unkown
page execute and write copy
1787000
heap
page read and write
A71000
unkown
page execute and write copy
7A4C000
heap
page read and write
828F000
heap
page read and write
828F000
heap
page read and write
37CF000
stack
page read and write
584000
heap
page read and write
51E0000
heap
page read and write
81DD000
heap
page read and write
4960000
direct allocation
page execute and read and write
13A2000
unkown
page execute and read and write
780000
unkown
page read and write
776D000
stack
page read and write
34BE000
stack
page read and write
364F000
stack
page read and write
4F01000
heap
page read and write
5460000
direct allocation
page execute and read and write
4EF0000
direct allocation
page read and write
4F01000
heap
page read and write
5120000
direct allocation
page execute and read and write
1080000
direct allocation
page read and write
4C11000
heap
page read and write
3ABF000
stack
page read and write
5750000
direct allocation
page execute and read and write
172F000
heap
page read and write
44C1000
heap
page read and write
410F000
stack
page read and write
81CF000
heap
page read and write
1A41000
heap
page read and write
EB1000
unkown
page execute and write copy
7320000
remote allocation
page read and write
8259000
heap
page read and write
7A48000
heap
page read and write
823A000
heap
page read and write
BC0000
unkown
page execute and write copy
423F000
stack
page read and write
458E000
stack
page read and write
8690000
trusted library allocation
page read and write
7320000
remote allocation
page read and write
51D1000
heap
page read and write
53E0000
direct allocation
page execute and read and write
51D1000
heap
page read and write
81D3000
heap
page read and write
8233000
heap
page read and write
1A1B000
heap
page read and write
4D20000
direct allocation
page execute and read and write
828F000
heap
page read and write
4960000
direct allocation
page execute and read and write
8690000
trusted library allocation
page read and write
413E000
stack
page read and write
2E3F000
stack
page read and write
74CE000
stack
page read and write
10AB000
heap
page read and write
81F2000
heap
page read and write
90C000
unkown
page read and write
4C00000
direct allocation
page read and write
1503000
heap
page read and write
387E000
stack
page read and write
51D1000
heap
page read and write
14CE000
stack
page read and write
8264000
heap
page read and write
8213000
heap
page read and write
5130000
direct allocation
page execute and read and write
13A8000
unkown
page execute and write copy
738E000
stack
page read and write
8289000
heap
page read and write
4D8F000
stack
page read and write
81DC000
heap
page read and write
4EF0000
direct allocation
page read and write
56A0000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
BC1000
unkown
page execute and write copy
8690000
trusted library allocation
page read and write
333F000
stack
page read and write
165F000
stack
page read and write
8259000
heap
page read and write
5050000
trusted library allocation
page read and write
10E7000
unkown
page execute and read and write
176C000
heap
page read and write
146A000
heap
page read and write
18A0000
heap
page read and write
8216000
heap
page read and write
5440000
direct allocation
page execute and read and write
44CF000
stack
page read and write
8222000
heap
page read and write
56B0000
direct allocation
page execute and read and write
35FE000
stack
page read and write
81F2000
heap
page read and write
6CE000
heap
page read and write
780000
heap
page read and write
8215000
heap
page read and write
8270000
heap
page read and write
50F0000
direct allocation
page execute and read and write
8213000
heap
page read and write
81D4000
heap
page read and write
3E0000
heap
page read and write
BA7000
unkown
page execute and read and write
1080000
direct allocation
page read and write
1A09000
heap
page read and write
4C10000
direct allocation
page execute and read and write
14C8000
heap
page read and write
30BF000
stack
page read and write
8259000
heap
page read and write
3530000
direct allocation
page read and write
53D0000
direct allocation
page execute and read and write
584000
heap
page read and write
8245000
heap
page read and write
1558000
heap
page read and write
1148000
heap
page read and write
829E000
heap
page read and write
8690000
trusted library allocation
page read and write
3AFE000
stack
page read and write
90C000
unkown
page read and write
8245000
heap
page read and write
1121000
heap
page read and write
75CF000
stack
page read and write
4C11000
heap
page read and write
789E000
stack
page read and write
5730000
direct allocation
page execute and read and write
690000
heap
page read and write
1210000
unkown
page execute and write copy
7870000
heap
page read and write
56B0000
direct allocation
page execute and read and write
390E000
stack
page read and write
4960000
direct allocation
page execute and read and write
4B80000
trusted library allocation
page read and write
10F1000
heap
page read and write
902000
unkown
page execute and read and write
584000
heap
page read and write
1A17000
heap
page read and write
14BE000
heap
page read and write
4C00000
direct allocation
page read and write
1A0F000
heap
page read and write
1130000
heap
page read and write
584000
heap
page read and write
4C11000
heap
page read and write
104F000
unkown
page execute and write copy
44D1000
heap
page read and write
8214000
heap
page read and write
1745000
heap
page read and write
10DC000
heap
page read and write
4F01000
heap
page read and write
44FE000
stack
page read and write
81E3000
heap
page read and write
51D1000
heap
page read and write
584000
heap
page read and write
44C1000
heap
page read and write
8233000
heap
page read and write
8244000
heap
page read and write
129F000
stack
page read and write
828F000
heap
page read and write
584000
heap
page read and write
73E000
stack
page read and write
8233000
heap
page read and write
8238000
heap
page read and write
13AE000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
51F0000
direct allocation
page execute and read and write
DCB000
stack
page read and write
50F0000
direct allocation
page execute and read and write
8233000
heap
page read and write
8050000
remote allocation
page read and write
8400000
trusted library allocation
page read and write
F34000
heap
page read and write
32C0000
heap
page read and write
584000
heap
page read and write
168B000
stack
page read and write
1043000
unkown
page execute and write copy
823A000
heap
page read and write
1748000
heap
page read and write
51D1000
heap
page read and write
72FF000
stack
page read and write
8265000
heap
page read and write
1210000
unkown
page execute and read and write
1890000
heap
page read and write
31FF000
stack
page read and write
714000
heap
page read and write
2BBF000
stack
page read and write
9B7000
heap
page read and write
4D0E000
stack
page read and write
82A5000
heap
page read and write
584000
heap
page read and write
337E000
stack
page read and write
4F01000
heap
page read and write
8243000
heap
page read and write
824A000
heap
page read and write
828F000
heap
page read and write
51D1000
heap
page read and write
F52000
unkown
page execute and read and write
8212000
heap
page read and write
13AF000
unkown
page execute and write copy
11F7000
unkown
page execute and read and write
347F000
stack
page read and write
8204000
heap
page read and write
824D000
heap
page read and write
4F00000
heap
page read and write
51D1000
heap
page read and write
81FA000
heap
page read and write
4C11000
heap
page read and write
3A0F000
stack
page read and write
4C11000
heap
page read and write
51D1000
heap
page read and write
990000
direct allocation
page read and write
51E0000
direct allocation
page execute and read and write
44C1000
heap
page read and write
53E000
stack
page read and write
4C11000
heap
page read and write
56B0000
direct allocation
page execute and read and write
F34000
heap
page read and write
1450000
heap
page read and write
14AF000
heap
page read and write
51D1000
heap
page read and write
8250000
heap
page read and write
4BCE000
stack
page read and write
2EFF000
stack
page read and write
14E7000
heap
page read and write
828F000
heap
page read and write
42CF000
stack
page read and write
51D1000
heap
page read and write
3CCF000
stack
page read and write
A97000
unkown
page execute and read and write
51D1000
heap
page read and write
BC0000
unkown
page execute and write copy
F34000
heap
page read and write
6E3D000
stack
page read and write
398F000
stack
page read and write
1048000
unkown
page execute and write copy
449E000
stack
page read and write
4C11000
heap
page read and write
44C1000
heap
page read and write
826B000
heap
page read and write
6AD1000
heap
page read and write
4BC0000
direct allocation
page read and write
3B0000
heap
page read and write
7320000
remote allocation
page read and write
459F000
stack
page read and write
3E7E000
stack
page read and write
51D1000
heap
page read and write
400000
heap
page read and write
5690000
direct allocation
page execute and read and write
8235000
heap
page read and write
82A5000
heap
page read and write
7CBE000
stack
page read and write
3530000
direct allocation
page read and write
4C00000
direct allocation
page read and write
780D000
stack
page read and write
EA1000
unkown
page execute and read and write
51D1000
heap
page read and write
81C0000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
8222000
heap
page read and write
584000
heap
page read and write
8245000
heap
page read and write
57D0000
direct allocation
page execute and read and write
4C11000
heap
page read and write
4E50000
heap
page read and write
4C11000
heap
page read and write
4940000
direct allocation
page execute and read and write
8299000
heap
page read and write
51D1000
heap
page read and write
2BFE000
stack
page read and write
F34000
heap
page read and write
F20000
heap
page read and write
56B0000
direct allocation
page execute and read and write
4A4F000
stack
page read and write
471E000
stack
page read and write
468F000
stack
page read and write
7D80000
remote allocation
page read and write
F34000
heap
page read and write
4960000
direct allocation
page execute and read and write
8264000
heap
page read and write
5410000
direct allocation
page execute and read and write
F34000
heap
page read and write
4E40000
remote allocation
page read and write
7B1E000
stack
page read and write
383F000
stack
page read and write
584000
heap
page read and write
41CE000
stack
page read and write
51D1000
heap
page read and write
2FBE000
stack
page read and write
51D2000
heap
page read and write
1042000
unkown
page execute and read and write
1A44000
heap
page read and write
4450000
heap
page read and write
384F000
stack
page read and write
4F01000
heap
page read and write
8264000
heap
page read and write
4990000
direct allocation
page execute and read and write
45DE000
stack
page read and write
8253000
heap
page read and write
EB0000
unkown
page execute and read and write
8248000
heap
page read and write
75CE000
stack
page read and write
F34000
heap
page read and write
BF7000
unkown
page write copy
8264000
heap
page read and write
8272000
heap
page read and write
794F000
stack
page read and write
784D000
stack
page read and write
4C10000
direct allocation
page execute and read and write
485E000
stack
page read and write
1758000
heap
page read and write
4C10000
direct allocation
page execute and read and write
344E000
stack
page read and write
31CF000
stack
page read and write
49B0000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
825E000
heap
page read and write
4C11000
heap
page read and write
104F000
unkown
page execute and write copy
81F2000
heap
page read and write
4741000
heap
page read and write
44C1000
heap
page read and write
4C10000
heap
page read and write
BFC000
unkown
page read and write
4960000
direct allocation
page execute and read and write
8690000
trusted library allocation
page read and write
1201000
unkown
page execute and read and write
4741000
heap
page read and write
4741000
heap
page read and write
4D51000
direct allocation
page read and write
440F000
stack
page read and write
BF7000
unkown
page read and write
DD0000
unkown
page read and write
3F4E000
stack
page read and write
A40000
direct allocation
page read and write
584000
heap
page read and write
4741000
heap
page read and write
53B0000
heap
page read and write
18EE000
stack
page read and write
495F000
stack
page read and write
51D1000
heap
page read and write
3C3E000
stack
page read and write
4F01000
heap
page read and write
51D1000
heap
page read and write
44C1000
heap
page read and write
734D000
stack
page read and write
822F000
heap
page read and write
79DE000
stack
page read and write
360E000
stack
page read and write
3C3E000
stack
page read and write
825E000
heap
page read and write
700000
heap
page read and write
14D7000
heap
page read and write
4E40000
remote allocation
page read and write
19F8000
heap
page read and write
36FF000
stack
page read and write
826B000
heap
page read and write
7ADD000
stack
page read and write
BB1000
unkown
page execute and read and write
8690000
trusted library allocation
page read and write
4750000
heap
page read and write
4EF0000
direct allocation
page read and write
EDC000
stack
page read and write
2F3C000
stack
page read and write
7A90000
heap
page read and write
B62000
unkown
page execute and read and write
110D000
heap
page read and write
4C11000
heap
page read and write
81CE000
heap
page read and write
44C0000
heap
page read and write
34CF000
stack
page read and write
51C0000
direct allocation
page execute and read and write
8222000
heap
page read and write
51D1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
F64000
unkown
page execute and read and write
4EF0000
direct allocation
page read and write
4C11000
heap
page read and write
4E0F000
stack
page read and write
50F0000
direct allocation
page execute and read and write
81BF000
stack
page read and write
4C10000
direct allocation
page execute and read and write
5830000
heap
page read and write
4C1D000
stack
page read and write
717000
heap
page read and write
77E000
stack
page read and write
BFF000
unkown
page read and write
3C4E000
stack
page read and write
5340000
trusted library allocation
page read and write
50B0000
direct allocation
page read and write
584000
heap
page read and write
8254000
heap
page read and write
5231000
direct allocation
page read and write
51D1000
heap
page read and write
51D1000
heap
page read and write
8235000
heap
page read and write
2CFF000
stack
page read and write
508F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
8212000
heap
page read and write
199E000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4C00000
direct allocation
page read and write
4741000
heap
page read and write
49A0000
direct allocation
page execute and read and write
16EE000
heap
page read and write
825E000
heap
page read and write
E52000
unkown
page execute and read and write
4A9F000
stack
page read and write
EB0000
unkown
page execute and read and write
44C1000
heap
page read and write
4741000
heap
page read and write
4F01000
heap
page read and write
4C11000
heap
page read and write
8259000
heap
page read and write
473F000
stack
page read and write
35CF000
stack
page read and write
F34000
heap
page read and write
81F2000
heap
page read and write
B62000
unkown
page execute and read and write
825E000
heap
page read and write
828F000
heap
page read and write
51D1000
heap
page read and write
5190000
direct allocation
page execute and read and write
104E000
unkown
page execute and read and write
F34000
heap
page read and write
A3E000
stack
page read and write
7B7E000
stack
page read and write
51D1000
heap
page read and write
354F000
stack
page read and write
DFB000
stack
page read and write
6F7D000
stack
page read and write
990000
direct allocation
page read and write
824A000
heap
page read and write
4741000
heap
page read and write
8245000
heap
page read and write
8235000
heap
page read and write
3A4F000
stack
page read and write
584000
heap
page read and write
30CF000
stack
page read and write
4F01000
heap
page read and write
14B9000
heap
page read and write
4F01000
heap
page read and write
3D0E000
stack
page read and write
F34000
heap
page read and write
8289000
heap
page read and write
52C0000
heap
page read and write
990000
direct allocation
page read and write
822F000
heap
page read and write
50F0000
direct allocation
page execute and read and write
10A0000
heap
page read and write
4B8F000
stack
page read and write
D58000
unkown
page execute and write copy
584000
heap
page read and write
4C11000
heap
page read and write
3EBE000
stack
page read and write
8279000
heap
page read and write
32C7000
heap
page read and write
7D80000
remote allocation
page read and write
8272000
heap
page read and write
584000
heap
page read and write
9B000
stack
page read and write
D5E000
unkown
page execute and read and write
BC0000
unkown
page execute and read and write
825A000
heap
page read and write
478E000
stack
page read and write
8690000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
56B0000
direct allocation
page execute and read and write
175A000
heap
page read and write
494E000
stack
page read and write
8268000
heap
page read and write
90F000
unkown
page read and write
49F0000
direct allocation
page execute and read and write
51D1000
heap
page read and write
50A5000
direct allocation
page read and write
780000
unkown
page readonly
7A90000
remote allocation
page read and write
8690000
trusted library allocation
page read and write
16D0000
heap
page read and write
7A8C000
heap
page read and write
4F01000
heap
page read and write
474F000
stack
page read and write
3DCF000
stack
page read and write
4741000
heap
page read and write
50F0000
direct allocation
page execute and read and write
3E8F000
stack
page read and write
13AB000
unkown
page execute and write copy
4741000
heap
page read and write
463E000
stack
page read and write
826B000
heap
page read and write
18A5000
heap
page read and write
8253000
heap
page read and write
397F000
stack
page read and write
3F0F000
stack
page read and write
7EEF000
stack
page read and write
380E000
stack
page read and write
437F000
stack
page read and write
3B0E000
stack
page read and write
4F01000
heap
page read and write
104B000
unkown
page execute and write copy
584000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4C00000
direct allocation
page read and write
51D1000
heap
page read and write
4C11000
heap
page read and write
D5B000
unkown
page execute and write copy
6E3000
heap
page read and write
10E1000
heap
page read and write
5670000
direct allocation
page read and write
1240000
heap
page read and write
5398000
direct allocation
page read and write
F34000
heap
page read and write
12EE000
stack
page read and write
404F000
stack
page read and write
7849000
heap
page read and write
57C0000
direct allocation
page execute and read and write
35BF000
stack
page read and write
584000
heap
page read and write
8272000
heap
page read and write
49CF000
stack
page read and write
4A60000
direct allocation
page execute and read and write
822F000
heap
page read and write
803F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
14D9000
heap
page read and write
53B0000
direct allocation
page execute and read and write
13A8000
unkown
page execute and write copy
51D1000
heap
page read and write
8215000
heap
page read and write
4C11000
heap
page read and write
F34000
heap
page read and write
584000
heap
page read and write
3B8F000
stack
page read and write
4D90000
heap
page read and write
283C000
stack
page read and write
4F01000
heap
page read and write
1770000
heap
page read and write
738E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
824D000
heap
page read and write
51D1000
heap
page read and write
8234000
heap
page read and write
4C10000
direct allocation
page execute and read and write
F34000
heap
page read and write
8254000
heap
page read and write
8050000
remote allocation
page read and write
4C10000
direct allocation
page execute and read and write
584000
heap
page read and write
199A000
heap
page read and write
8212000
heap
page read and write
8204000
heap
page read and write
D5F000
unkown
page execute and write copy
6EA000
heap
page read and write
76CD000
stack
page read and write
828A000
heap
page read and write
352F000
stack
page read and write
51A0000
direct allocation
page execute and read and write
9FE000
stack
page read and write
F34000
heap
page read and write
36FF000
stack
page read and write
584000
heap
page read and write
8235000
heap
page read and write
914000
unkown
page execute and read and write
39BE000
stack
page read and write
427E000
stack
page read and write
8279000
heap
page read and write
57A0000
direct allocation
page execute and read and write
825A000
heap
page read and write
798E000
stack
page read and write
2A7F000
stack
page read and write
51D1000
heap
page read and write
56B0000
direct allocation
page execute and read and write
8233000
heap
page read and write
51B0000
direct allocation
page execute and read and write
799D000
stack
page read and write
1779000
heap
page read and write
529E000
stack
page read and write
37CE000
stack
page read and write
E97000
unkown
page execute and read and write
390F000
stack
page read and write
3FCF000
stack
page read and write
434E000
stack
page read and write
3ABF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
51D1000
heap
page read and write
51D1000
heap
page read and write
51D1000
heap
page read and write
4741000
heap
page read and write
A71000
unkown
page execute and read and write
51D1000
heap
page read and write
8279000
heap
page read and write
584000
heap
page read and write
5720000
direct allocation
page execute and read and write
1B8E000
stack
page read and write
8690000
trusted library allocation
page read and write
4AC1000
direct allocation
page read and write
584000
heap
page read and write
4A0E000
stack
page read and write
1767000
heap
page read and write
44C1000
heap
page read and write
8272000
heap
page read and write
A60000
direct allocation
page execute and read and write
8244000
heap
page read and write
4F01000
heap
page read and write
F34000
heap
page read and write
8250000
heap
page read and write
5420000
direct allocation
page execute and read and write
4C00000
direct allocation
page read and write
584000
heap
page read and write
3BFF000
stack
page read and write
171E000
heap
page read and write
49E0000
direct allocation
page execute and read and write
D53000
unkown
page execute and write copy
4C70000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
400E000
stack
page read and write
8252000
heap
page read and write
40FF000
stack
page read and write
1113000
heap
page read and write
4C10000
direct allocation
page execute and read and write
8279000
heap
page read and write
383F000
stack
page read and write
F34000
heap
page read and write
420E000
stack
page read and write
8204000
heap
page read and write
BC0000
unkown
page execute and read and write
3F8E000
stack
page read and write
584000
heap
page read and write
8223000
heap
page read and write
F34000
heap
page read and write
8212000
heap
page read and write
8224000
heap
page read and write
5480000
direct allocation
page execute and read and write
D87000
unkown
page execute and read and write
16EA000
heap
page read and write
A70000
unkown
page readonly
39CE000
stack
page read and write
1760000
heap
page read and write
6ED000
heap
page read and write
4BD0000
direct allocation
page read and write
51D1000
heap
page read and write
56F0000
direct allocation
page execute and read and write
3D8E000
stack
page read and write
D53000
unkown
page execute and write copy
828F000
heap
page read and write
3ACF000
stack
page read and write
35FE000
stack
page read and write
12AE000
stack
page read and write
38CF000
stack
page read and write
5770000
direct allocation
page execute and read and write
6E5000
heap
page read and write
E40000
heap
page read and write
8214000
heap
page read and write
7EFF000
stack
page read and write
828F000
heap
page read and write
4950000
direct allocation
page execute and read and write
5180000
direct allocation
page execute and read and write
BB1000
unkown
page execute and read and write
16E0000
heap
page read and write
51D1000
heap
page read and write
56B0000
direct allocation
page execute and read and write
780000
unkown
page readonly
8222000
heap
page read and write
2F7F000
stack
page read and write
70BE000
stack
page read and write
50CE000
stack
page read and write
186E000
stack
page read and write
D5F000
unkown
page execute and write copy
50F0000
direct allocation
page execute and read and write
714E000
stack
page read and write
7D3E000
stack
page read and write
54B0000
direct allocation
page execute and read and write
110B000
heap
page read and write
81D9000
heap
page read and write
50F0000
direct allocation
page execute and read and write
14C0000
heap
page read and write
902000
unkown
page execute and read and write
333F000
stack
page read and write
584000
heap
page read and write
2FC7000
heap
page read and write
54F0000
direct allocation
page execute and read and write
8299000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4F01000
heap
page read and write
81F2000
heap
page read and write
8265000
heap
page read and write
51D1000
heap
page read and write
5210000
direct allocation
page execute and read and write
81F2000
heap
page read and write
6DFE000
stack
page read and write
51D1000
heap
page read and write
12F0000
heap
page read and write
51D1000
heap
page read and write
10EB000
stack
page read and write
51D1000
heap
page read and write
4C11000
heap
page read and write
9B0000
heap
page read and write
5140000
direct allocation
page execute and read and write
6E62000
heap
page read and write
4F01000
heap
page read and write
8279000
heap
page read and write
D52000
unkown
page execute and read and write
8250000
heap
page read and write
4960000
direct allocation
page execute and read and write
5780000
direct allocation
page execute and read and write
824D000
heap
page read and write
8222000
heap
page read and write
430E000
stack
page read and write
72DF000
heap
page read and write
4C11000
heap
page read and write
2FBE000
stack
page read and write
490E000
stack
page read and write
46CE000
stack
page read and write
4C11000
heap
page read and write
820E000
heap
page read and write
3AFE000
stack
page read and write
111D000
heap
page read and write
8259000
heap
page read and write
8271000
heap
page read and write
EB1000
unkown
page execute and write copy
8264000
heap
page read and write
347F000
stack
page read and write
8242000
heap
page read and write
4F01000
heap
page read and write
6D3000
heap
page read and write
4A40000
direct allocation
page execute and read and write
8224000
heap
page read and write
51D1000
heap
page read and write
44C1000
heap
page read and write
54A0000
direct allocation
page execute and read and write
3A4E000
stack
page read and write
820E000
heap
page read and write
584000
heap
page read and write
1048000
unkown
page execute and write copy
825E000
heap
page read and write
3B4F000
stack
page read and write
2FC0000
heap
page read and write
820E000
heap
page read and write
822F000
heap
page read and write
8256000
heap
page read and write
53E0000
direct allocation
page execute and read and write
2FBE000
stack
page read and write
3ECE000
stack
page read and write
51D1000
heap
page read and write
F34000
heap
page read and write
8238000
heap
page read and write
4970000
direct allocation
page execute and read and write
F34000
heap
page read and write
828F000
heap
page read and write
16CE000
stack
page read and write
785E000
stack
page read and write
107E000
stack
page read and write
5160000
direct allocation
page execute and read and write
F5C000
unkown
page read and write
990000
direct allocation
page read and write
8213000
heap
page read and write
1726000
heap
page read and write
4C11000
heap
page read and write
3530000
direct allocation
page read and write
68E000
stack
page read and write
D5B000
unkown
page execute and write copy
53E0000
direct allocation
page execute and read and write
3FBF000
stack
page read and write
3F4F000
stack
page read and write
5430000
direct allocation
page execute and read and write
113B000
heap
page read and write
8250000
heap
page read and write
BFF000
unkown
page read and write
56B0000
direct allocation
page execute and read and write
4EF0000
direct allocation
page read and write
827A000
heap
page read and write
11B2000
unkown
page execute and read and write
394E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
5521000
direct allocation
page read and write
293F000
stack
page read and write
56B0000
direct allocation
page execute and read and write
1124000
heap
page read and write
330E000
stack
page read and write
408F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
7A90000
remote allocation
page read and write
3C0F000
stack
page read and write
748F000
stack
page read and write
81F2000
heap
page read and write
1048000
unkown
page execute and write copy
4C60000
direct allocation
page execute and read and write
3FBF000
stack
page read and write
51D1000
heap
page read and write
8245000
heap
page read and write
44C1000
heap
page read and write
8233000
heap
page read and write
427E000
stack
page read and write
A71000
unkown
page execute and write copy
145E000
stack
page read and write
4DED000
stack
page read and write
824D000
heap
page read and write
6DD000
heap
page read and write
584000
heap
page read and write
1740000
heap
page read and write
4C10000
direct allocation
page execute and read and write
584000
heap
page read and write
8218000
heap
page read and write
1460000
heap
page read and write
44C1000
heap
page read and write
4C11000
heap
page read and write
51D1000
heap
page read and write
5390000
direct allocation
page read and write
19E9000
heap
page read and write
3D3F000
stack
page read and write
724C000
stack
page read and write
44C1000
heap
page read and write
EA1000
unkown
page execute and read and write
F34000
heap
page read and write
430F000
stack
page read and write
8206000
heap
page read and write
E52000
unkown
page execute and read and write
823C000
heap
page read and write
DD1000
unkown
page execute and read and write
7A90000
remote allocation
page read and write
EB0000
unkown
page execute and write copy
2F7E000
stack
page read and write
825A000
heap
page read and write
41CF000
stack
page read and write
5100000
direct allocation
page execute and read and write
4F10000
heap
page read and write
413E000
stack
page read and write
8216000
heap
page read and write
373E000
stack
page read and write
44C1000
heap
page read and write
488F000
stack
page read and write
51D1000
heap
page read and write
4F01000
heap
page read and write
7F3E000
stack
page read and write
4741000
heap
page read and write
7C7E000
stack
page read and write
36CE000
stack
page read and write
1990000
heap
page read and write
8222000
heap
page read and write
820C000
heap
page read and write
10CC000
heap
page read and write
8265000
heap
page read and write
387E000
stack
page read and write
707D000
stack
page read and write
1460000
heap
page read and write
F57000
unkown
page write copy
3EBE000
stack
page read and write
8232000
heap
page read and write
990000
direct allocation
page read and write
829D000
heap
page read and write
4740000
heap
page read and write
BF7000
unkown
page write copy
297E000
stack
page read and write
51D1000
heap
page read and write
5490000
direct allocation
page execute and read and write
4CCF000
stack
page read and write
4C00000
direct allocation
page read and write
8050000
remote allocation
page read and write
17CF000
heap
page read and write
90F000
unkown
page read and write
8214000
heap
page read and write
4F01000
heap
page read and write
4C11000
heap
page read and write
4C20000
heap
page read and write
10EF000
heap
page read and write
44C1000
heap
page read and write
4F01000
heap
page read and write
4C11000
heap
page read and write
16ED000
stack
page read and write
40FF000
stack
page read and write
3530000
direct allocation
page read and write
8250000
heap
page read and write
4F01000
heap
page read and write
4F01000
heap
page read and write
51D1000
heap
page read and write
7A8F000
heap
page read and write
4E40000
remote allocation
page read and write
150E000
stack
page read and write
5500000
direct allocation
page execute and read and write
4741000
heap
page read and write
14DF000
heap
page read and write
4F01000
heap
page read and write
499E000
stack
page read and write
56D0000
direct allocation
page execute and read and write
752F000
heap
page read and write
6CFD000
stack
page read and write
820E000
heap
page read and write
762E000
stack
page read and write
10EB000
heap
page read and write
8289000
heap
page read and write
822F000
heap
page read and write
4C11000
heap
page read and write
8279000
heap
page read and write
822F000
heap
page read and write
81DA000
heap
page read and write
51D1000
heap
page read and write
374E000
stack
page read and write
51D1000
heap
page read and write
8299000
heap
page read and write
44BF000
stack
page read and write
4741000
heap
page read and write
4741000
heap
page read and write
4F01000
heap
page read and write
A45000
direct allocation
page read and write
7A93000
heap
page read and write
10FC000
stack
page read and write
1042000
unkown
page execute and read and write
4BDF000
stack
page read and write
33CF000
stack
page read and write
4C11000
heap
page read and write
192E000
stack
page read and write
444F000
stack
page read and write
823A000
heap
page read and write
584000
heap
page read and write
51D1000
heap
page read and write
F34000
heap
page read and write
828F000
heap
page read and write
43CE000
stack
page read and write
BF2000
unkown
page execute and read and write
424F000
stack
page read and write
51D1000
heap
page read and write
1A2A000
heap
page read and write
4F01000
heap
page read and write
D58000
unkown
page execute and write copy
D5E000
unkown
page execute and read and write
4EF0000
direct allocation
page read and write
8204000
heap
page read and write
119B000
heap
page read and write
51D1000
heap
page read and write
51D1000
heap
page read and write
842A000
heap
page read and write
A70000
unkown
page readonly
A48000
direct allocation
page read and write
8204000
heap
page read and write
1510000
heap
page read and write
824D000
heap
page read and write
51D1000
heap
page read and write
4AA0000
heap
page read and write
3B8E000
stack
page read and write
4ED0000
heap
page read and write
337E000
stack
page read and write
540000
heap
page read and write
8245000
heap
page read and write
584000
heap
page read and write
51D1000
heap
page read and write
BF7000
unkown
page read and write
54C0000
direct allocation
page execute and read and write
4CB0000
direct allocation
page execute and read and write
30BF000
stack
page read and write
51D1000
heap
page read and write
822F000
heap
page read and write
3530000
direct allocation
page read and write
323E000
stack
page read and write
4741000
heap
page read and write
5790000
direct allocation
page execute and read and write
44C1000
heap
page read and write
13A3000
unkown
page execute and write copy
8218000
heap
page read and write
8690000
trusted library allocation
page read and write
13FF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
828F000
heap
page read and write
1126000
heap
page read and write
3530000
direct allocation
page read and write
F34000
heap
page read and write
990000
direct allocation
page read and write
F34000
heap
page read and write
825E000
heap
page read and write
81D8000
heap
page read and write
35BF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
174B000
heap
page read and write
4C11000
heap
page read and write
4F01000
heap
page read and write
4E4E000
stack
page read and write
4960000
direct allocation
page execute and read and write
3540000
heap
page read and write
53E0000
direct allocation
page execute and read and write
D5B000
unkown
page execute and write copy
12F5000
heap
page read and write
8224000
heap
page read and write
51D1000
heap
page read and write
F34000
heap
page read and write
2D3E000
stack
page read and write
706000
heap
page read and write
5170000
direct allocation
page execute and read and write
19F0000
heap
page read and write
828F000
heap
page read and write
44C1000
heap
page read and write
824F000
heap
page read and write
43BE000
stack
page read and write
3C8F000
stack
page read and write
428E000
stack
page read and write
7F2D000
stack
page read and write
4BC8000
direct allocation
page read and write
7C1E000
stack
page read and write
172A000
heap
page read and write
4F01000
heap
page read and write
32CF000
stack
page read and write
3BFF000
stack
page read and write
823F000
heap
page read and write
4960000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
F1E000
stack
page read and write
4C11000
heap
page read and write
8243000
heap
page read and write
11EC000
stack
page read and write
1115000
heap
page read and write
3E0E000
stack
page read and write
164E000
stack
page read and write
51D1000
heap
page read and write
4741000
heap
page read and write
EB0000
unkown
page execute and write copy
584000
heap
page read and write
5700000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
4F01000
heap
page read and write
822F000
heap
page read and write
4A50000
direct allocation
page execute and read and write
19F2000
heap
page read and write
56B0000
direct allocation
page execute and read and write
146D000
heap
page read and write
378F000
stack
page read and write
397F000
stack
page read and write
40CE000
stack
page read and write
51D1000
heap
page read and write
8245000
heap
page read and write
8690000
trusted library allocation
page read and write
44C1000
heap
page read and write
57B0000
direct allocation
page execute and read and write
820E000
heap
page read and write
D52000
unkown
page execute and read and write
3E7F000
stack
page read and write
584000
heap
page read and write
3BCE000
stack
page read and write
8218000
heap
page read and write
47CF000
stack
page read and write
1A36000
heap
page read and write
50A0000
direct allocation
page read and write
4F01000
heap
page read and write
4A8E000
stack
page read and write
81DC000
heap
page read and write
10FB000
heap
page read and write
2D3F000
stack
page read and write
71FE000
stack
page read and write
C04000
unkown
page execute and read and write
1080000
direct allocation
page read and write
69B000
heap
page read and write
4F01000
heap
page read and write
584000
heap
page read and write
81DC000
heap
page read and write
5110000
direct allocation
page execute and read and write
3D3F000
stack
page read and write
1080000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
4F01000
heap
page read and write
51D0000
heap
page read and write
4B0F000
stack
page read and write
842A000
heap
page read and write
8204000
heap
page read and write
8264000
heap
page read and write
340F000
stack
page read and write
7AFE000
stack
page read and write
584000
heap
page read and write
6FC000
stack
page read and write
81DC000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
4C11000
heap
page read and write
F30000
heap
page read and write
584000
heap
page read and write
580000
heap
page read and write
8690000
trusted library allocation
page read and write
525E000
stack
page read and write
4C11000
heap
page read and write
44C1000
heap
page read and write
437F000
stack
page read and write
414E000
stack
page read and write
584000
heap
page read and write
4F01000
heap
page read and write
51D1000
heap
page read and write
570000
heap
page read and write
51D1000
heap
page read and write
8224000
heap
page read and write
327F000
stack
page read and write
2C3F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
57F1000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
827A000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4C11000
heap
page read and write
4BC5000
direct allocation
page read and write
4C11000
heap
page read and write
F34000
heap
page read and write
3530000
direct allocation
page read and write
7DFD000
stack
page read and write
581D000
stack
page read and write
16F9000
stack
page read and write
BFC000
unkown
page read and write
81F3000
heap
page read and write
820E000
heap
page read and write
5150000
direct allocation
page execute and read and write
4960000
direct allocation
page execute and read and write
83FE000
stack
page read and write
8277000
heap
page read and write
19C000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4B4E000
stack
page read and write
1211000
unkown
page execute and write copy
50F0000
direct allocation
page execute and read and write
13AB000
unkown
page execute and write copy
51D1000
heap
page read and write
5760000
direct allocation
page execute and read and write
4F01000
heap
page read and write
173E000
heap
page read and write
584000
heap
page read and write
104B000
unkown
page execute and write copy
19DA000
heap
page read and write
56C0000
direct allocation
page execute and read and write
D5B000
unkown
page execute and write copy
1497000
heap
page read and write
30FE000
stack
page read and write
4C8E000
stack
page read and write
26FE000
stack
page read and write
438F000
stack
page read and write
842A000
heap
page read and write
4960000
direct allocation
page execute and read and write
44C1000
heap
page read and write
8214000
heap
page read and write
54E0000
direct allocation
page execute and read and write
584000
heap
page read and write
There are 1393 hidden memdumps, click here to show them.