IOC Report
EZrw1nNIpG.exe

loading gif

Files

File Path
Type
Category
Malicious
EZrw1nNIpG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000022001\3eb62d09c2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KKEBKJJDGH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\DGHIDAFCGIEHIEBFCFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGHIDAFCGIEHIEBFCFBAEGDGDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\ECGDHDHJEBGHJKFIECBG
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\GIEBFHCAKFBGDHIDHIDBKKKKKE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HCGCAAKJDHJJJJJKKKFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJKJEHJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IEHDAFHDHCBFIDGCFIDGHJDGDA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKEBKJJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\KKJDGDHIDBGIECBGHJDBAAKJDH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explortu.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EZrw1nNIpG.exe
"C:\Users\user\Desktop\EZrw1nNIpG.exe"
malicious
C:\Users\user\AppData\Local\Temp\KKEBKJJDGH.exe
"C:\Users\user\AppData\Local\Temp\KKEBKJJDGH.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
"C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\1000022001\3eb62d09c2.exe
"C:\Users\user\AppData\Local\Temp\1000022001\3eb62d09c2.exe"
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
C:\Users\user\AppData\Local\Temp\9217037dc9\explortu.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\KKEBKJJDGH.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\KJJJKFIIIJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://147.45.47.155/
unknown
malicious
http://85.28.47.4/
unknown
malicious
http://147.45.47.155/ku4Nor9/index.php
147.45.47.155
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
85.28.47.4/920475a59bac849d.php
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll0~
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://147.45.47.155/ku4Nor9/index.php17037dc9
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://85.28.47.4/920475a59bac849d.phpsHy~
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dlls9
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://147.45.47.155/ku4Nor9/index.phpft
unknown
http://147.45.47.155/ku4Nor9/index.phpspace
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://85.28.47.4/920475a59bac849d.php%
unknown
http://77.91.77.81/stealc/random.exeLL:
unknown
http://77.91.77.81/stealc/random.exe50673b5d
unknown
http://147.45.47.155/windows.storage.dllc
unknown
http://85.28.47.4/920475a59bac849d.php5
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://147.45.47.155/ku4Nor9/index.php-3693405117-
unknown
http://147.45.47.155/ku4Nor9/index.phpl2
unknown
http://147.45.47.155/ku4Nor9/index.phprsion
unknown
http://www.sqlite.org/copyright.html.
unknown
http://147.45.47.155/ku4Nor9/index.phpe
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://147.45.47.155/ku4Nor9/index.phpvJw
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.81/mine/amadka.exeK
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://147.45.47.155/ku4Nor9/index.phpE1
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
http://77.91.77.81/mine/amadka.exepera
unknown
https://www.ecosia.org/newtab/
unknown
http://85.28.47.4/69934896f997d5bb/sqlite3.dllb
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://147.45.47.155/SysWOW64
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dlli8
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
http://85.28.47.4/69934896f997d5bb/mozglue.dll-~
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://147.45.47.155/ku4Nor9/index.phpE
unknown
http://147.45.47.155/ku4Nor9/index.phpmL
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
http://85.28.47.4/69934896f997d5bb/sqlite3.dllq
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://85.28.47.4/920475a59bac849d.php%?
unknown
http://77.91.77.81/stealc/random.exeAL-
unknown
https://support.mozilla.org
unknown
http://147.45.47.155/ku4Nor9/index.phpM
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://147.45.47.155/ku4Nor9/index.php;R
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://147.45.47.155/ku4Nor9/index.phpH
unknown
http://77.91.77.81/cost/go.exeAppData
unknown
There are 66 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.47.155
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4F70000
direct allocation
page read and write
malicious
1614000
heap
page read and write
malicious
811000
unkown
page execute and read and write
malicious
D01000
unkown
page execute and read and write
malicious
221000
unkown
page execute and read and write
malicious
4A30000
direct allocation
page read and write
malicious
4E90000
direct allocation
page read and write
malicious
4A60000
direct allocation
page read and write
malicious
1CF5000
heap
page read and write
malicious
221000
unkown
page execute and read and write
malicious
251000
unkown
page execute and read and write
malicious
221000
unkown
page execute and read and write
malicious
221000
unkown
page execute and read and write
malicious
4E50000
direct allocation
page read and write
malicious
4591000
heap
page read and write
4591000
heap
page read and write
45C1000
heap
page read and write
3FDE000
stack
page read and write
55BD000
stack
page read and write
3AD0000
heap
page read and write
10E4000
heap
page read and write
22E9F000
heap
page read and write
22E8E000
heap
page read and write
2CF0000
direct allocation
page read and write
1718000
heap
page read and write
1D37000
heap
page read and write
59E0000
heap
page read and write
37D4000
direct allocation
page execute and read and write
2CDF000
stack
page read and write
19EE000
stack
page read and write
53BC000
stack
page read and write
2BD0000
heap
page read and write
345F000
stack
page read and write
D1C000
unkown
page execute and write copy
4591000
heap
page read and write
3D3E000
stack
page read and write
22E86000
heap
page read and write
45C1000
heap
page read and write
A4C000
unkown
page execute and read and write
4591000
heap
page read and write
22EA0000
heap
page read and write
12A0000
heap
page read and write
421F000
stack
page read and write
CDC000
stack
page read and write
22E91000
heap
page read and write
37D4000
direct allocation
page execute and read and write
361DC000
stack
page read and write
49A0000
direct allocation
page read and write
1CE11000
heap
page read and write
5160000
direct allocation
page execute and read and write
45C1000
heap
page read and write
4591000
heap
page read and write
DDD000
stack
page read and write
3A6E000
stack
page read and write
33EF000
stack
page read and write
22EA0000
heap
page read and write
49B1000
heap
page read and write
2D10000
direct allocation
page read and write
400F000
stack
page read and write
F64000
heap
page read and write
175B000
heap
page read and write
1190000
heap
page read and write
D20000
heap
page read and write
45C1000
heap
page read and write
3BBF000
stack
page read and write
2CDE000
stack
page read and write
220000
unkown
page read and write
172A000
heap
page read and write
499F000
stack
page read and write
49B1000
heap
page read and write
11EF000
stack
page read and write
D00000
unkown
page readonly
B20000
heap
page read and write
1D06E000
stack
page read and write
D20000
heap
page read and write
2F9E000
stack
page read and write
C30000
direct allocation
page read and write
4591000
heap
page read and write
22E94000
heap
page read and write
4C30000
direct allocation
page execute and read and write
A4C000
unkown
page execute and write copy
4FCF000
direct allocation
page read and write
10B5000
unkown
page execute and read and write
4ABF000
direct allocation
page read and write
331F000
stack
page read and write
3B6F000
stack
page read and write
D0B000
heap
page read and write
4690000
trusted library allocation
page read and write
1634000
heap
page read and write
2CF0000
direct allocation
page read and write
4C50000
direct allocation
page execute and read and write
4591000
heap
page read and write
45C1000
heap
page read and write
4A11000
heap
page read and write
1C03E000
stack
page read and write
14AF000
stack
page read and write
36DF000
stack
page read and write
2E1F000
stack
page read and write
61ED3000
direct allocation
page read and write
4A11000
heap
page read and write
1CD0000
heap
page read and write
37C3000
direct allocation
page execute and read and write
F64000
heap
page read and write
F64000
heap
page read and write
251000
unkown
page execute and write copy
4BE0000
direct allocation
page execute and read and write
164D000
heap
page read and write
4591000
heap
page read and write
4BE9000
stack
page read and write
475E000
stack
page read and write
F64000
heap
page read and write
4591000
heap
page read and write
61ED4000
direct allocation
page readonly
22E85000
heap
page read and write
AFA000
stack
page read and write
22EB1000
heap
page read and write
4591000
heap
page read and write
3D1F000
stack
page read and write
1D2CE000
stack
page read and write
4A6B000
stack
page read and write
33CE000
stack
page read and write
1086000
unkown
page execute and read and write
22EBD000
heap
page read and write
16D0000
unkown
page execute and write copy
A47000
unkown
page execute and read and write
309F000
stack
page read and write
B10000
heap
page read and write
D0D000
heap
page read and write
4591000
heap
page read and write
45C1000
heap
page read and write
1CDE000
heap
page read and write
22E9B000
heap
page read and write
4591000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
42EF000
stack
page read and write
2D10000
direct allocation
page read and write
45C1000
heap
page read and write
49DE000
stack
page read and write
C4A000
heap
page read and write
1BDFE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
119E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
4591000
heap
page read and write
4E8E000
stack
page read and write
349E000
stack
page read and write
1CE2D000
stack
page read and write
118E000
stack
page read and write
3DE0000
heap
page read and write
1144000
heap
page read and write
439E000
stack
page read and write
49A0000
direct allocation
page read and write
CD3000
heap
page read and write
CD9000
heap
page read and write
45C1000
heap
page read and write
4FCF000
stack
page read and write
D01000
unkown
page execute and write copy
6C83D000
unkown
page readonly
4591000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
499F000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
2D10000
direct allocation
page read and write
2F155000
heap
page read and write
69A0000
heap
page read and write
4591000
heap
page read and write
2F165000
heap
page read and write
5080000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
3EB4000
direct allocation
page execute and read and write
22E88000
heap
page read and write
22E9A000
heap
page read and write
45C1000
heap
page read and write
2CCE000
stack
page read and write
811000
unkown
page execute and write copy
4F8F000
stack
page read and write
34CF000
stack
page read and write
220000
unkown
page readonly
D29000
heap
page read and write
F64000
heap
page read and write
3EB4000
direct allocation
page execute and read and write
C30000
direct allocation
page read and write
3C8E000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4590000
heap
page read and write
45C1000
heap
page read and write
3EEF000
stack
page read and write
45C1000
heap
page read and write
2B2F000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4D5B000
stack
page read and write
4A20000
direct allocation
page read and write
C5A000
heap
page read and write
49A0000
direct allocation
page read and write
170E000
heap
page read and write
3D1F000
stack
page read and write
45C1000
heap
page read and write
AFD000
stack
page read and write
D29000
heap
page read and write
2D10000
direct allocation
page read and write
169B000
heap
page read and write
309F000
stack
page read and write
22EBF000
heap
page read and write
2CF0000
direct allocation
page read and write
411E000
stack
page read and write
C7D000
heap
page read and write
3A0E000
stack
page read and write
D60000
unkown
page execute and read and write
D24000
unkown
page execute and write copy
45C1000
heap
page read and write
54FE000
stack
page read and write
45C1000
heap
page read and write
3F2F000
stack
page read and write
166B000
heap
page read and write
343C000
heap
page read and write
4591000
heap
page read and write
63BC000
stack
page read and write
3AD3000
heap
page read and write
4A20000
direct allocation
page read and write
287000
unkown
page write copy
3CEE000
stack
page read and write
7F6C000
stack
page read and write
C30000
direct allocation
page read and write
385E000
stack
page read and write
2820000
direct allocation
page read and write
45C1000
heap
page read and write
22E98000
heap
page read and write
D1B000
heap
page read and write
5110000
direct allocation
page execute and read and write
D1C000
heap
page read and write
1D1C000
heap
page read and write
45C1000
heap
page read and write
22EBA000
heap
page read and write
4591000
heap
page read and write
50B0000
direct allocation
page execute and read and write
64DA000
heap
page read and write
49B0000
heap
page read and write
45C1000
heap
page read and write
4F60000
direct allocation
page read and write
2F2E000
stack
page read and write
350E000
stack
page read and write
22EB1000
heap
page read and write
3B1E000
stack
page read and write
1140000
heap
page read and write
B8E000
stack
page read and write
CA5000
heap
page read and write
45C1000
heap
page read and write
525000
unkown
page execute and read and write
2D10000
direct allocation
page read and write
46DF000
stack
page read and write
2CBF000
stack
page read and write
1C4BE000
stack
page read and write
5010000
direct allocation
page execute and read and write
2A7E000
stack
page read and write
D33000
heap
page read and write
3FBE000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
421F000
stack
page read and write
45C1000
heap
page read and write
2D10000
direct allocation
page read and write
2C8E000
stack
page read and write
4A50000
direct allocation
page read and write
2B8E000
stack
page read and write
6CA45000
unkown
page readonly
4591000
heap
page read and write
2A3F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
45C1000
heap
page read and write
45DF000
stack
page read and write
16D3000
unkown
page execute and write copy
D14000
heap
page read and write
D20000
heap
page read and write
C40000
heap
page read and write
6DE000
unkown
page execute and write copy
45C1000
heap
page read and write
22EBF000
heap
page read and write
1940000
heap
page read and write
2820000
direct allocation
page read and write
22EAF000
heap
page read and write
31DF000
stack
page read and write
129C000
stack
page read and write
D32000
heap
page read and write
2CF0000
direct allocation
page read and write
36DF000
stack
page read and write
4110000
heap
page read and write
CF3000
heap
page read and write
45C1000
heap
page read and write
4591000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
F64000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
4D8B000
stack
page read and write
45D0000
heap
page read and write
50F0000
direct allocation
page execute and read and write
461E000
stack
page read and write
437E000
stack
page read and write
406F000
stack
page read and write
D1B000
heap
page read and write
289000
unkown
page execute and read and write
15F0000
heap
page read and write
77C000
stack
page read and write
475E000
stack
page read and write
1D4CE000
stack
page read and write
D1B000
heap
page read and write
1CBEE000
stack
page read and write
5030000
direct allocation
page execute and read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
1930000
heap
page read and write
293F000
stack
page read and write
221000
unkown
page execute and write copy
45C1000
heap
page read and write
D20000
heap
page read and write
5050000
direct allocation
page execute and read and write
1C9AE000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
4BE0000
direct allocation
page execute and read and write
2CF0000
direct allocation
page read and write
1507000
heap
page read and write
4AE1000
heap
page read and write
1DEE000
stack
page read and write
11E2000
unkown
page execute and read and write
3ADE000
stack
page read and write
43CF000
stack
page read and write
10E4000
heap
page read and write
C30000
direct allocation
page read and write
2E1F000
stack
page read and write
15D0000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
14E0000
heap
page read and write
4591000
heap
page read and write
4C10000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
7D34000
heap
page read and write
48CF000
stack
page read and write
381F000
stack
page read and write
10BD000
unkown
page execute and read and write
411E000
stack
page read and write
2DFF000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
4591000
heap
page read and write
22E9A000
heap
page read and write
28AF000
stack
page read and write
6CA3F000
unkown
page write copy
1144000
heap
page read and write
45C1000
heap
page read and write
61EB4000
direct allocation
page read and write
F37000
unkown
page execute and read and write
501E000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
7F3000
stack
page read and write
22E9A000
heap
page read and write
45C1000
heap
page read and write
CA4000
heap
page read and write
40BF000
stack
page read and write
10E4000
heap
page read and write
3390000
direct allocation
page execute and read and write
4591000
heap
page read and write
4591000
heap
page read and write
699E000
heap
page read and write
3F0E000
stack
page read and write
53B000
unkown
page execute and write copy
485F000
stack
page read and write
342E000
stack
page read and write
95A000
unkown
page execute and read and write
F64000
heap
page read and write
BE7000
heap
page read and write
7FAE000
stack
page read and write
4A50000
direct allocation
page read and write
3D5E000
stack
page read and write
3F2E000
stack
page read and write
302F000
stack
page read and write
4591000
heap
page read and write
4C00000
direct allocation
page execute and read and write
50F0000
direct allocation
page execute and read and write
4E40000
direct allocation
page read and write
37D4000
direct allocation
page execute and read and write
22E9F000
heap
page read and write
1144000
heap
page read and write
D14000
heap
page read and write
5050000
direct allocation
page execute and read and write
2B0000
unkown
page execute and read and write
2BBE000
stack
page read and write
461E000
stack
page read and write
154E000
stack
page read and write
5020000
direct allocation
page execute and read and write
45C1000
heap
page read and write
16B2000
heap
page read and write
7F8000
stack
page read and write
418E000
stack
page read and write
22EB1000
heap
page read and write
36AE000
stack
page read and write
49B1000
heap
page read and write
C30000
direct allocation
page read and write
6DE000
unkown
page execute and write copy
22EBB000
heap
page read and write
45C1000
heap
page read and write
4591000
heap
page read and write
CD1000
heap
page read and write
40DF000
stack
page read and write
4591000
heap
page read and write
3B0F000
stack
page read and write
3FDD000
stack
page read and write
22EB9000
heap
page read and write
10DE000
stack
page read and write
381F000
stack
page read and write
4DA0000
heap
page read and write
2EEBE000
stack
page read and write
22EAF000
heap
page read and write
364E000
stack
page read and write
4591000
heap
page read and write
16B8000
heap
page read and write
478F000
stack
page read and write
4E40000
direct allocation
page read and write
4591000
heap
page read and write
CCC000
heap
page read and write
CF3000
heap
page read and write
4A50000
direct allocation
page read and write
412F000
stack
page read and write
22EAF000
heap
page read and write
6C9FF000
unkown
page readonly
6DC000
unkown
page execute and read and write
4FC0000
direct allocation
page execute and read and write
39A0000
heap
page read and write
4591000
heap
page read and write
16A6000
heap
page read and write
22EA0000
heap
page read and write
522000
unkown
page execute and read and write
D1B000
heap
page read and write
45C1000
heap
page read and write
446E000
stack
page read and write
BB8000
unkown
page execute and read and write
28A000
unkown
page execute and read and write
C5E000
heap
page read and write
388F000
stack
page read and write
45C1000
heap
page read and write
35FDB000
stack
page read and write
2A2E000
stack
page read and write
11F0000
heap
page read and write
7F210000
direct allocation
page execute and read and write
2D47000
heap
page read and write
44BE000
stack
page read and write
4591000
heap
page read and write
53B000
unkown
page execute and write copy
2820000
direct allocation
page read and write
C3E000
stack
page read and write
22EB1000
heap
page read and write
5000000
direct allocation
page execute and read and write
49A0000
direct allocation
page read and write
2820000
direct allocation
page read and write
45C1000
heap
page read and write
1713000
heap
page read and write
20CE000
stack
page read and write
5040000
direct allocation
page execute and read and write
45C1000
heap
page read and write
40DF000
stack
page read and write
4E9F000
stack
page read and write
349E000
stack
page read and write
45C1000
heap
page read and write
2E4F000
stack
page read and write
80AF000
stack
page read and write
22E93000
heap
page read and write
3BDF000
stack
page read and write
2CF0000
direct allocation
page read and write
6C861000
unkown
page execute read
22E9A000
heap
page read and write
834000
unkown
page execute and write copy
A47000
unkown
page execute and write copy
4591000
heap
page read and write
55B000
unkown
page execute and read and write
D0D000
heap
page read and write
4AE1000
heap
page read and write
5F46000
heap
page read and write
6CA3E000
unkown
page read and write
409E000
stack
page read and write
1144000
heap
page read and write
16D7000
heap
page read and write
2B7F000
stack
page read and write
287000
unkown
page write copy
CDC000
stack
page read and write
49B1000
heap
page read and write
3CAF000
stack
page read and write
4591000
heap
page read and write
6DC000
unkown
page execute and read and write
522000
unkown
page execute and read and write
4E40000
direct allocation
page read and write
50AF000
stack
page read and write
EFD000
stack
page read and write
4C50000
direct allocation
page execute and read and write
45C1000
heap
page read and write
D14000
heap
page read and write
614F000
stack
page read and write
449F000
stack
page read and write
2CF0000
direct allocation
page read and write
45C1000
heap
page read and write
35D9B000
stack
page read and write
52BD000
stack
page read and write
1C47F000
stack
page read and write
35DE000
stack
page read and write
40DE000
stack
page read and write
414F000
stack
page read and write
49A0000
direct allocation
page read and write
5F45000
heap
page read and write
316F000
stack
page read and write
10E0000
heap
page read and write
45C1000
heap
page read and write
2F3F000
stack
page read and write
3ABE000
stack
page read and write
4AE1000
heap
page read and write
45C1000
heap
page read and write
220000
unkown
page read and write
15E0000
heap
page read and write
2BBE000
stack
page read and write
53A000
unkown
page execute and read and write
22EBA000
heap
page read and write
2F5F000
stack
page read and write
22EBA000
heap
page read and write
289000
unkown
page execute and read and write
BA5000
heap
page read and write
22EBE000
heap
page read and write
45C1000
heap
page read and write
4C30000
direct allocation
page execute and read and write
2820000
direct allocation
page read and write
3CFF000
stack
page read and write
4AB0000
trusted library allocation
page read and write
53B000
unkown
page execute and write copy
4A9E000
stack
page read and write
22EAF000
heap
page read and write
3ADE000
stack
page read and write
435F000
stack
page read and write
7AB000
stack
page read and write
511E000
stack
page read and write
C4E000
heap
page read and write
22E85000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
29EF000
stack
page read and write
45C1000
heap
page read and write
2B7000
unkown
page write copy
27FB000
stack
page read and write
36BF000
stack
page read and write
4EAF000
direct allocation
page read and write
49A0000
direct allocation
page read and write
D6C000
unkown
page execute and read and write
3EB0000
direct allocation
page execute and read and write
1CBAE000
stack
page read and write
450F000
stack
page read and write
61ECC000
direct allocation
page read and write
411000
unkown
page execute and read and write
F3C000
unkown
page execute and read and write
45C1000
heap
page read and write
2820000
direct allocation
page read and write
2E5E000
stack
page read and write
383E000
stack
page read and write
3B80000
heap
page read and write
35F9C000
stack
page read and write
4B90000
direct allocation
page execute and read and write
5180000
direct allocation
page execute and read and write
42CE000
stack
page read and write
2D0E000
stack
page read and write
61ECD000
direct allocation
page readonly
BDE000
stack
page read and write
2D30000
direct allocation
page read and write
220000
unkown
page readonly
45C1000
heap
page read and write
4BE0000
trusted library allocation
page read and write
1144000
heap
page read and write
35BE000
stack
page read and write
45C1000
heap
page read and write
221000
unkown
page execute and write copy
64C0000
heap
page read and write
45C1000
heap
page read and write
22E93000
heap
page read and write
287000
unkown
page read and write
489E000
stack
page read and write
3AB000
stack
page read and write
1CF1B000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
22E98000
heap
page read and write
454E000
stack
page read and write
1725000
heap
page read and write
4FDF000
stack
page read and write
22EB9000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
6C7C1000
unkown
page execute read
4C70000
direct allocation
page execute and read and write
2CF0000
direct allocation
page read and write
32AF000
stack
page read and write
39CF000
stack
page read and write
471F000
stack
page read and write
F25000
unkown
page execute and read and write
8B6000
unkown
page execute and read and write
40AE000
stack
page read and write
2F9E000
stack
page read and write
3D5E000
stack
page read and write
810000
unkown
page readonly
B7C000
unkown
page execute and read and write
10E4000
heap
page read and write
4AE1000
heap
page read and write
F64000
heap
page read and write
4591000
heap
page read and write
287000
unkown
page write copy
198E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
3C1E000
stack
page read and write
45C1000
heap
page read and write
35DE000
stack
page read and write
2CF0000
direct allocation
page read and write
45C1000
heap
page read and write
D14000
heap
page read and write
4C20000
direct allocation
page execute and read and write
1505000
heap
page read and write
2D30000
direct allocation
page read and write
C25000
unkown
page execute and read and write
BFC000
stack
page read and write
45C1000
heap
page read and write
22EB3000
heap
page read and write
425E000
stack
page read and write
3C90000
direct allocation
page execute and read and write
800000
heap
page read and write
45C1000
heap
page read and write
5170000
direct allocation
page execute and read and write
5070000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
D1B000
heap
page read and write
371E000
stack
page read and write
6C860000
unkown
page readonly
D0F000
heap
page read and write
2CAE000
stack
page read and write
31BF000
stack
page read and write
393F000
stack
page read and write
142D000
unkown
page execute and read and write
22EB1000
heap
page read and write
16AB000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
4AE0000
heap
page read and write
2CF0000
direct allocation
page read and write
22EB9000
heap
page read and write
2CF0000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
335E000
stack
page read and write
4591000
heap
page read and write
3E5F000
stack
page read and write
F3C000
unkown
page execute and read and write
22EB1000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
4B9F000
stack
page read and write
D05000
heap
page read and write
37FF000
stack
page read and write
4591000
heap
page read and write
1C8FC000
stack
page read and write
2F7E000
stack
page read and write
2E3E000
stack
page read and write
44DE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
4591000
heap
page read and write
50C0000
direct allocation
page execute and read and write
22EB1000
heap
page read and write
374F000
stack
page read and write
49A0000
direct allocation
page read and write
4FE0000
direct allocation
page execute and read and write
22E9A000
heap
page read and write
490E000
stack
page read and write
37D4000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
2C8E000
stack
page read and write
70C000
unkown
page execute and read and write
4591000
heap
page read and write
5010000
direct allocation
page execute and read and write
F37000
unkown
page execute and write copy
D17000
heap
page read and write
16A0000
heap
page read and write
4C00000
direct allocation
page execute and read and write
328E000
stack
page read and write
1721000
heap
page read and write
13AF000
stack
page read and write
37D4000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
3C4F000
stack
page read and write
D20000
heap
page read and write
37D0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
4591000
heap
page read and write
45C1000
heap
page read and write
399E000
stack
page read and write
4591000
heap
page read and write
4A0C000
stack
page read and write
4591000
heap
page read and write
352F000
stack
page read and write
4591000
heap
page read and write
22EB1000
heap
page read and write
37D4000
direct allocation
page execute and read and write
22EA2000
heap
page read and write
289000
unkown
page execute and read and write
4FF0000
direct allocation
page execute and read and write
4A20000
direct allocation
page read and write
C30000
direct allocation
page read and write
3A90000
heap
page read and write
45BF000
stack
page read and write
22EB1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
CF3000
heap
page read and write
17A8000
heap
page read and write
F1F000
stack
page read and write
45B0000
heap
page read and write
399E000
stack
page read and write
2BC0000
heap
page read and write
3EBE000
direct allocation
page execute and read and write
49A0000
direct allocation
page read and write
221000
unkown
page execute and write copy
22EA0000
heap
page read and write
F64000
heap
page read and write
4591000
heap
page read and write
250000
unkown
page read and write
16D3000
unkown
page execute and read and write
45C1000
heap
page read and write
1D30000
heap
page read and write
16F7000
heap
page read and write
22E9A000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1507000
heap
page read and write
4591000
heap
page read and write
D14000
heap
page read and write
50F0000
direct allocation
page execute and read and write
287000
unkown
page write copy
5EEE000
stack
page read and write
45C1000
heap
page read and write
1144000
heap
page read and write
345F000
stack
page read and write
5060000
direct allocation
page execute and read and write
38EF000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
22EAF000
heap
page read and write
4A0F000
stack
page read and write
4D9E000
stack
page read and write
D0D000
heap
page read and write
1144000
heap
page read and write
280000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
22EBE000
heap
page read and write
321E000
stack
page read and write
411000
unkown
page execute and read and write
4591000
heap
page read and write
F64000
heap
page read and write
220000
unkown
page readonly
4591000
heap
page read and write
1144000
heap
page read and write
53FD000
stack
page read and write
22EB1000
heap
page read and write
56A000
unkown
page execute and read and write
37D4000
direct allocation
page execute and read and write
45C1000
heap
page read and write
49A0000
direct allocation
page read and write
45C1000
heap
page read and write
D29000
heap
page read and write
432E000
stack
page read and write
4591000
heap
page read and write
810000
unkown
page readonly
2D30000
direct allocation
page read and write
2F0BE000
stack
page read and write
6DE000
unkown
page execute and write copy
53A000
unkown
page execute and read and write
441000
unkown
page execute and read and write
BE5000
heap
page read and write
22EA0000
heap
page read and write
333E000
stack
page read and write
2830000
heap
page read and write
3B30000
heap
page read and write
5030000
direct allocation
page execute and read and write
22EA0000
heap
page read and write
2F4F000
stack
page read and write
4B6F000
stack
page read and write
4B10000
trusted library allocation
page read and write
3E2E000
stack
page read and write
6DC000
unkown
page execute and read and write
22EB1000
heap
page read and write
C50000
heap
page read and write
10E4000
heap
page read and write
CF3000
heap
page read and write
D20000
heap
page read and write
27BF000
stack
page read and write
331F000
stack
page read and write
D0D000
heap
page read and write
BBC000
stack
page read and write
F60000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1CE10000
heap
page read and write
287000
unkown
page read and write
4591000
heap
page read and write
69A0000
heap
page read and write
22EB1000
heap
page read and write
456F000
stack
page read and write
22EBA000
heap
page read and write
53A000
unkown
page execute and read and write
106C000
unkown
page execute and read and write
28A000
unkown
page execute and read and write
3BDF000
stack
page read and write
158E000
stack
page read and write
347E000
stack
page read and write
45C1000
heap
page read and write
4591000
heap
page read and write
11DF000
unkown
page execute and write copy
4591000
heap
page read and write
176F000
heap
page read and write
22E9C000
heap
page read and write
22EBA000
heap
page read and write
5010000
direct allocation
page execute and read and write
1CF10000
trusted library allocation
page read and write
335E000
stack
page read and write
4A10000
heap
page read and write
1CDA000
heap
page read and write
3700000
heap
page read and write
4591000
heap
page read and write
3790000
direct allocation
page execute and read and write
624F000
stack
page read and write
343F000
stack
page read and write
1C94D000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
4ECE000
stack
page read and write
44DE000
stack
page read and write
1CDEF000
stack
page read and write
C40000
heap
page read and write
5010000
direct allocation
page execute and read and write
22E9A000
heap
page read and write
37EE000
stack
page read and write
2E5C000
stack
page read and write
289000
unkown
page execute and read and write
2B9000
unkown
page execute and read and write
4ADF000
stack
page read and write
F90000
heap
page read and write
12BB000
heap
page read and write
109E000
stack
page read and write
1CE00000
heap
page read and write
45C1000
heap
page read and write
2820000
direct allocation
page read and write
53A000
unkown
page execute and read and write
4591000
heap
page read and write
D0B000
heap
page read and write
3BAE000
stack
page read and write
C30000
direct allocation
page read and write
C80000
heap
page read and write
D19000
heap
page read and write
464F000
stack
page read and write
45C1000
heap
page read and write
22E8E000
heap
page read and write
22E99000
heap
page read and write
70E000
unkown
page execute and write copy
485F000
stack
page read and write
314F000
stack
page read and write
61ED0000
direct allocation
page read and write
5060000
direct allocation
page execute and read and write
4FAE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
C2E000
stack
page read and write
423E000
stack
page read and write
22E99000
heap
page read and write
6DC000
unkown
page execute and read and write
4591000
heap
page read and write
10E4000
heap
page read and write
22E97000
heap
page read and write
22EA6000
heap
page read and write
5F2E000
stack
page read and write
F20000
heap
page read and write
45C1000
heap
page read and write
468E000
stack
page read and write
22E8E000
heap
page read and write
3A9F000
stack
page read and write
C30000
direct allocation
page read and write
10E4000
heap
page read and write
2820000
direct allocation
page read and write
45C1000
heap
page read and write
EFD000
stack
page read and write
3670000
heap
page read and write
49A0000
direct allocation
page read and write
45C1000
heap
page read and write
C82000
heap
page read and write
3A9F000
stack
page read and write
2CF0000
direct allocation
page read and write
15FA000
heap
page read and write
371E000
stack
page read and write
53A000
unkown
page execute and write copy
359F000
stack
page read and write
4A8F000
direct allocation
page read and write
10E4000
heap
page read and write
5EAE000
stack
page read and write
6C7C0000
unkown
page readonly
449F000
stack
page read and write
1710000
heap
page read and write
3EB4000
direct allocation
page execute and read and write
45C1000
heap
page read and write
D29000
heap
page read and write
4591000
heap
page read and write
46C0000
trusted library allocation
page read and write
22EB1000
heap
page read and write
F64000
heap
page read and write
306E000
stack
page read and write
22E8E000
heap
page read and write
442F000
stack
page read and write
22E9E000
heap
page read and write
3C1E000
stack
page read and write
53A000
unkown
page execute and write copy
522000
unkown
page execute and read and write
2CF0000
direct allocation
page read and write
2CF0000
direct allocation
page read and write
1CB4D000
stack
page read and write
4591000
heap
page read and write
F50000
heap
page read and write
41AF000
stack
page read and write
30DE000
stack
page read and write
BA0000
heap
page read and write
1BFFF000
stack
page read and write
22F80000
heap
page read and write
5070000
direct allocation
page execute and read and write
4591000
heap
page read and write
280000
unkown
page execute and read and write
D91000
unkown
page execute and read and write
433F000
stack
page read and write
C30000
direct allocation
page read and write
50D0000
direct allocation
page execute and read and write
2820000
direct allocation
page read and write
37DE000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
516E000
stack
page read and write
22E9A000
heap
page read and write
53B000
unkown
page execute and write copy
22EA2000
heap
page read and write
2D10000
heap
page read and write
2BD7000
heap
page read and write
45C1000
heap
page read and write
F60000
heap
page read and write
2F5F000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
411000
unkown
page execute and read and write
4BC0000
direct allocation
page execute and read and write
52B000
unkown
page execute and read and write
22E98000
heap
page read and write
39A3000
heap
page read and write
378E000
stack
page read and write
4591000
heap
page read and write
45C1000
heap
page read and write
22EB6000
heap
page read and write
5150000
direct allocation
page execute and read and write
2800000
heap
page read and write
22E9A000
heap
page read and write
3EB4000
direct allocation
page execute and read and write
7E6B000
stack
page read and write
356E000
stack
page read and write
45C1000
heap
page read and write
4F5000
unkown
page execute and read and write
2820000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
4BE0000
direct allocation
page execute and read and write
38CE000
stack
page read and write
3D8F000
stack
page read and write
634F000
stack
page read and write
D0D000
heap
page read and write
52B000
unkown
page execute and read and write
F9B000
heap
page read and write
1D02E000
stack
page read and write
10E4000
heap
page read and write
4F5000
unkown
page execute and read and write
1144000
heap
page read and write
45C1000
heap
page read and write
22EA2000
heap
page read and write
6C84E000
unkown
page read and write
22EA6000
heap
page read and write
3A2F000
stack
page read and write
22CF000
stack
page read and write
37DE000
direct allocation
page execute and read and write
12B0000
heap
page read and write
439E000
stack
page read and write
2F15D000
heap
page read and write
15FE000
heap
page read and write
52B000
unkown
page execute and read and write
395F000
stack
page read and write
129F000
stack
page read and write
10E4000
heap
page read and write
321E000
stack
page read and write
2D1E000
stack
page read and write
28EB000
stack
page read and write
4591000
heap
page read and write
3F9F000
stack
page read and write
4EEF000
direct allocation
page read and write
287000
unkown
page read and write
5130000
direct allocation
page execute and read and write
41FF000
stack
page read and write
428F000
stack
page read and write
4F5000
unkown
page execute and read and write
49A0000
direct allocation
page read and write
3E9E000
stack
page read and write
4C60000
direct allocation
page execute and read and write
3E3F000
stack
page read and write
4A11000
heap
page read and write
17DD000
heap
page read and write
2D10000
direct allocation
page read and write
10E4000
heap
page read and write
4C40000
direct allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
33FE000
stack
page read and write
45C1000
heap
page read and write
1D26C000
stack
page read and write
2C6F000
stack
page read and write
471F000
stack
page read and write
BE0000
heap
page read and write
45C1000
heap
page read and write
11B0000
heap
page read and write
45C1000
heap
page read and write
D1A000
heap
page read and write
366F000
stack
page read and write
31AE000
stack
page read and write
2820000
direct allocation
page read and write
125E000
stack
page read and write
4591000
heap
page read and write
7F2D0000
direct allocation
page execute and read and write
3540000
direct allocation
page execute and read and write
5090000
direct allocation
page execute and read and write
ADB000
stack
page read and write
2D10000
direct allocation
page read and write
1144000
heap
page read and write
3E70000
direct allocation
page execute and read and write
1C6FE000
stack
page read and write
56BE000
stack
page read and write
324F000
stack
page read and write
22EA0000
heap
page read and write
11BB000
heap
page read and write
BE0000
heap
page read and write
4C80000
direct allocation
page execute and read and write
82C000
unkown
page execute and write copy
522000
unkown
page execute and read and write
19CD000
stack
page read and write
4A11000
heap
page read and write
BED000
heap
page read and write
53A000
unkown
page execute and write copy
4591000
heap
page read and write
4F60000
direct allocation
page read and write
11E2000
unkown
page execute and write copy
3410000
heap
page read and write
45A0000
heap
page read and write
53A000
unkown
page execute and write copy
307F000
stack
page read and write
2837000
heap
page read and write
C97000
heap
page read and write
B96000
unkown
page execute and read and write
2CFE000
stack
page read and write
5010000
direct allocation
page execute and read and write
CAF000
heap
page read and write
D15000
heap
page read and write
2D10000
direct allocation
page read and write
3AA0000
direct allocation
page execute and read and write
50E0000
direct allocation
page execute and read and write
22EA6000
heap
page read and write
221000
unkown
page execute and write copy
526F000
stack
page read and write
359F000
stack
page read and write
45C1000
heap
page read and write
1144000
heap
page read and write
45C1000
heap
page read and write
5020000
direct allocation
page execute and read and write
13DE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
50F0000
direct allocation
page execute and read and write
56B000
unkown
page execute and write copy
1916000
heap
page read and write
4591000
heap
page read and write
220000
unkown
page read and write
36FE000
stack
page read and write
360F000
stack
page read and write
2F163000
heap
page read and write
D0D000
heap
page read and write
47CE000
stack
page read and write
1C27E000
stack
page read and write
48DF000
stack
page read and write
3F6E000
stack
page read and write
4F5000
unkown
page execute and read and write
1144000
heap
page read and write
22EB1000
heap
page read and write
D20000
heap
page read and write
220000
unkown
page read and write
3DF0000
heap
page read and write
CA2000
heap
page read and write
F3C000
unkown
page execute and write copy
4591000
heap
page read and write
3B4E000
stack
page read and write
22EA3000
heap
page read and write
D32000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
3EA3000
direct allocation
page execute and read and write
56A000
unkown
page execute and write copy
C30000
direct allocation
page read and write
45C1000
heap
page read and write
440E000
stack
page read and write
3A7F000
stack
page read and write
7E0000
heap
page read and write
45C1000
heap
page read and write
1910000
heap
page read and write
4591000
heap
page read and write
CD7000
stack
page read and write
4591000
heap
page read and write
45C1000
heap
page read and write
30BE000
stack
page read and write
4591000
heap
page read and write
45C1000
heap
page read and write
3B90000
direct allocation
page execute and read and write
C30000
direct allocation
page read and write
49A0000
direct allocation
page read and write
D14000
heap
page read and write
45C1000
heap
page read and write
5140000
direct allocation
page execute and read and write
2820000
direct allocation
page read and write
45C1000
heap
page read and write
2F16D000
heap
page read and write
45C1000
heap
page read and write
3B7E000
stack
page read and write
50A0000
direct allocation
page execute and read and write
22EA0000
heap
page read and write
4DA4000
heap
page read and write
3F7F000
stack
page read and write
3D90000
heap
page read and write
45C1000
heap
page read and write
1C96F000
stack
page read and write
6DE000
unkown
page execute and write copy
49A0000
direct allocation
page read and write
52B000
unkown
page execute and read and write
C30000
direct allocation
page read and write
3DEF000
stack
page read and write
45C1000
heap
page read and write
D1B000
heap
page read and write
4591000
heap
page read and write
22EB9000
heap
page read and write
2D10000
direct allocation
page read and write
A35000
unkown
page execute and read and write
10E4000
heap
page read and write
3E5F000
stack
page read and write
3BFD000
stack
page read and write
C30000
direct allocation
page read and write
2B6E000
stack
page read and write
22EAF000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
D1B000
heap
page read and write
CB1000
heap
page read and write
22EA6000
heap
page read and write
6C852000
unkown
page readonly
D14000
heap
page read and write
22EA0000
heap
page read and write
45C1000
heap
page read and write
10E4000
heap
page read and write
3EBE000
direct allocation
page execute and read and write
4570000
heap
page read and write
45C1000
heap
page read and write
3E00000
heap
page read and write
22EAF000
heap
page read and write
4591000
heap
page read and write
5F40000
heap
page read and write
1500000
heap
page read and write
45C0000
heap
page read and write
1CB9E000
stack
page read and write
F64000
heap
page read and write
2F0C0000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
4591000
heap
page read and write
411000
unkown
page execute and read and write
1CD9D000
stack
page read and write
4591000
heap
page read and write
12DE000
stack
page read and write
45C1000
heap
page read and write
489E000
stack
page read and write
45C1000
heap
page read and write
22EA6000
heap
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
17A8000
heap
page read and write
357F000
stack
page read and write
45C1000
heap
page read and write
4591000
heap
page read and write
22EBF000
heap
page read and write
2D10000
direct allocation
page read and write
3E9E000
stack
page read and write
40FE000
stack
page read and write
435F000
stack
page read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
D00000
unkown
page readonly
10E4000
heap
page read and write
1C23F000
stack
page read and write
BD0000
heap
page read and write
45C1000
heap
page read and write
404E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
C30000
direct allocation
page read and write
3710000
heap
page read and write
3DCE000
stack
page read and write
3EB4000
direct allocation
page execute and read and write
32FF000
stack
page read and write
3F9F000
stack
page read and write
2B7000
unkown
page read and write
220000
unkown
page readonly
3EA4000
direct allocation
page execute and read and write
4F60000
direct allocation
page read and write
395F000
stack
page read and write
D13000
heap
page read and write
4591000
heap
page read and write
D1C000
heap
page read and write
64BC000
stack
page read and write
1C76F000
stack
page read and write
4591000
heap
page read and write
30DE000
stack
page read and write
1CE11000
heap
page read and write
7F0000
heap
page read and write
2D10000
direct allocation
page read and write
447F000
stack
page read and write
3E7E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
45DF000
stack
page read and write
7D30000
heap
page read and write
4591000
heap
page read and write
22EBB000
heap
page read and write
61E01000
direct allocation
page execute read
4591000
heap
page read and write
280000
unkown
page execute and read and write
45C1000
heap
page read and write
16B7000
heap
page read and write
22E93000
heap
page read and write
31FE000
stack
page read and write
22EA4000
heap
page read and write
49A0000
direct allocation
page read and write
1C6BF000
stack
page read and write
552000
unkown
page execute and read and write
6370000
heap
page read and write
2D40000
heap
page read and write
3EB4000
direct allocation
page execute and read and write
6991000
heap
page read and write
1115000
unkown
page execute and read and write
2820000
direct allocation
page read and write
4591000
heap
page read and write
287000
unkown
page read and write
3EB4000
direct allocation
page execute and read and write
10E4000
heap
page read and write
1144000
heap
page read and write
397E000
stack
page read and write
41EE000
stack
page read and write
D0D000
heap
page read and write
45C1000
heap
page read and write
2D17000
heap
page read and write
2CE0000
heap
page read and write
2DAF000
stack
page read and write
338F000
stack
page read and write
45C1000
heap
page read and write
4591000
heap
page read and write
F64000
heap
page read and write
22EA0000
heap
page read and write
F64000
heap
page read and write
22E9D000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
D20000
heap
page read and write
37C4000
direct allocation
page execute and read and write
250000
unkown
page readonly
2820000
direct allocation
page read and write
280000
unkown
page execute and read and write
2D10000
direct allocation
page read and write
3440000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
F64000
heap
page read and write
3ECF000
stack
page read and write
3430000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
1144000
heap
page read and write
D1B000
heap
page read and write
6990000
heap
page read and write
2D10000
direct allocation
page read and write
4591000
heap
page read and write
37AF000
stack
page read and write
1040000
heap
page read and write
32EE000
stack
page read and write
392E000
stack
page read and write
4EDE000
stack
page read and write
CA7000
heap
page read and write
CC2000
heap
page read and write
4591000
heap
page read and write
50F0000
direct allocation
page execute and read and write
45C1000
heap
page read and write
45C1000
heap
page read and write
425E000
stack
page read and write
385E000
stack
page read and write
1144000
heap
page read and write
31DF000
stack
page read and write
1D4C000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
304F000
stack
page read and write
2DEE000
stack
page read and write
6CA40000
unkown
page read and write
4FD0000
direct allocation
page execute and read and write
858000
unkown
page execute and read and write
22EA0000
heap
page read and write
45C1000
heap
page read and write
There are 1304 hidden memdumps, click here to show them.