IOC Report
ukuWaeRgPR.exe

loading gif

Files

File Path
Type
Category
Malicious
ukuWaeRgPR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\a3b2c9311b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EHDHDHIECG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAAKEBGDAFHIIDHIIECFBKFIJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\AFIIEBGCAAECBGCBGCBKEHIJEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\AKFHDBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\BAFIEGIECGCBKFIEBGCA
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\CBAKEBGIIDAFIDHIIECFCFIEGH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBAEGCGCGIEGDHIDHJJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCGDGHCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HDGIJJDGCBKFIDHIEBKECGIJDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IIJKJDAFHJDHIEBGCFID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ukuWaeRgPR.exe
"C:\Users\user\Desktop\ukuWaeRgPR.exe"
malicious
C:\Users\user\AppData\Local\Temp\EHDHDHIECG.exe
"C:\Users\user\AppData\Local\Temp\EHDHDHIECG.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\a3b2c9311b.exe
"C:\Users\user\AppData\Local\Temp\1000006001\a3b2c9311b.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\EHDHDHIECG.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\EGCGHCBKFC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://85.28.47.4/a81-46d0-b6b6-535557bcc5fapN9U
unknown
http://77.91.77.82/Hun4Ko/index.phpsa3b2c9311b.exe
unknown
http://77.91.77.82/Hun4Ko/index.phpI
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dllT
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://85.28.47.4/920475a59bac849d.php:9y
unknown
http://77.91.77.82/Hun4Ko/index.phpU
unknown
http://85.28.47.4/920475a59bac849d.php)
unknown
http://85.28.47.4/pl
unknown
http://77.91.77.82/Hun4Ko/index.php0
unknown
http://85.28.47.4/69934896f997d5bb/softokn3.dll$
unknown
http://77.91.77.81/stealc/random.exe50673b5d7
unknown
http://77.91.77.82/Hun4Ko/index.php-
unknown
http://85.28.47.4/920475a59bac849d.php1
unknown
http://77.91.77.82/Hun4Ko/index.php)
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.4/920475a59bac849d.phpC9B
unknown
http://77.91.77.82/Hun4Ko/index.php%
unknown
http://77.91.77.81/mine/amadka.exephprefoxox
unknown
http://85.28.47.4/20475a59bac849d.php
unknown
http://77.91.77.81/mine/amadka.exera
unknown
http://85.28.47.4/920475a59bac849d.phpi94
unknown
http://85.28.47.4/69934896f997d5bb/mozglue.dlll
unknown
http://85.28.47.4;
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.82/Hun4Ko/index.php5
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://85.28.47.4/920475a59bac849d.phpFl
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://77.91.77.81/cost/go.exepData
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dlly
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
http://85.28.47.4/69934896f997d5bb/sqlite3.dllc
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.81/stealc/random.exeH
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://77.91.77.82/Hun4Ko/index.phpn
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://77.91.77.82/Hun4Ko/index.phpk
unknown
http://pki-ocsp.symauth.com0
unknown
http://77.91.77.82/Hun4Ko/index.phplF~n
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://77.91.77.81/stealc/random.exe50673
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 66 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4F80000
direct allocation
page read and write
malicious
6D1000
unkown
page execute and read and write
malicious
5100000
direct allocation
page read and write
malicious
4A1000
unkown
page execute and read and write
malicious
4A1000
unkown
page execute and read and write
malicious
4A1000
unkown
page execute and read and write
malicious
61000
unkown
page execute and read and write
malicious
52F0000
direct allocation
page read and write
malicious
C81000
unkown
page execute and read and write
malicious
1FEE000
heap
page read and write
malicious
12DE000
heap
page read and write
malicious
4BD0000
direct allocation
page read and write
malicious
4C60000
direct allocation
page read and write
E04000
heap
page read and write
5480000
direct allocation
page execute and read and write
214C000
heap
page read and write
5500000
direct allocation
page execute and read and write
13AF000
heap
page read and write
134E000
heap
page read and write
4A1000
unkown
page execute and write copy
2ED0000
heap
page read and write
29C000
unkown
page execute and read and write
23750000
heap
page read and write
4C71000
heap
page read and write
3280000
heap
page read and write
349F000
stack
page read and write
4AF1000
heap
page read and write
3FAF000
stack
page read and write
7C9000
unkown
page execute and write copy
5320000
direct allocation
page execute and read and write
509000
unkown
page write copy
4AF1000
heap
page read and write
4E50000
direct allocation
page read and write
E04000
heap
page read and write
23766000
heap
page read and write
4C71000
heap
page read and write
5150000
direct allocation
page execute and read and write
414E000
stack
page read and write
23750000
heap
page read and write
1034000
heap
page read and write
1CD1F000
stack
page read and write
4C60000
direct allocation
page read and write
4C71000
heap
page read and write
6C54F000
unkown
page readonly
7C9000
unkown
page execute and write copy
4AF1000
heap
page read and write
B60000
heap
page read and write
40CE000
stack
page read and write
6D0000
unkown
page read and write
4C71000
heap
page read and write
DFD000
stack
page read and write
11E0000
heap
page read and write
4AF1000
heap
page read and write
7AF000
unkown
page execute and read and write
13DE000
stack
page read and write
61E01000
direct allocation
page execute read
DD0000
direct allocation
page read and write
1DF3000
stack
page read and write
5A7C000
stack
page read and write
3FF0000
direct allocation
page execute and read and write
E04000
heap
page read and write
4D20000
direct allocation
page execute and read and write
53FF000
stack
page read and write
509000
unkown
page read and write
6C3B0000
unkown
page readonly
4AF1000
heap
page read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
61EB7000
direct allocation
page readonly
3EAE000
stack
page read and write
13AB000
heap
page read and write
34AE000
stack
page read and write
1D51C000
stack
page read and write
2142000
heap
page read and write
4C71000
heap
page read and write
CA4000
unkown
page execute and write copy
1D71E000
stack
page read and write
20EE000
heap
page read and write
1034000
heap
page read and write
52FE000
stack
page read and write
2E10000
direct allocation
page read and write
83E4000
heap
page read and write
411F000
stack
page read and write
438F000
stack
page read and write
1350000
heap
page read and write
3D6E000
stack
page read and write
30F0000
heap
page read and write
9F0000
heap
page read and write
4AF1000
heap
page read and write
41CF000
stack
page read and write
57EF000
stack
page read and write
543E000
stack
page read and write
3FEE000
stack
page read and write
1534000
heap
page read and write
E00000
heap
page read and write
4A0000
unkown
page readonly
105B000
stack
page read and write
1250000
heap
page read and write
1534000
heap
page read and write
692E000
stack
page read and write
383D000
stack
page read and write
372E000
stack
page read and write
4C71000
heap
page read and write
15BF000
stack
page read and write
33DE000
stack
page read and write
3AAF000
stack
page read and write
7050000
heap
page read and write
1034000
heap
page read and write
2374E000
heap
page read and write
1940000
direct allocation
page execute and read and write
2374D000
heap
page read and write
1D11F000
stack
page read and write
2374F000
heap
page read and write
4ACE000
stack
page read and write
4C71000
heap
page read and write
E8A000
heap
page read and write
5290000
direct allocation
page execute and read and write
B0B000
stack
page read and write
4E50000
direct allocation
page read and write
215F000
heap
page read and write
D25000
heap
page read and write
340F000
stack
page read and write
4D4E000
stack
page read and write
13B8000
heap
page read and write
2F960000
trusted library allocation
page read and write
138A000
heap
page read and write
61ED3000
direct allocation
page read and write
4C71000
heap
page read and write
29C000
unkown
page execute and write copy
4FCB000
stack
page read and write
150E000
stack
page read and write
410F000
stack
page read and write
4C71000
heap
page read and write
4D60000
direct allocation
page execute and read and write
1034000
heap
page read and write
339E000
stack
page read and write
30CF000
stack
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
4C60000
direct allocation
page read and write
13AA000
unkown
page execute and read and write
2ADE000
stack
page read and write
11EB000
heap
page read and write
4C71000
heap
page read and write
1227000
heap
page read and write
4AF1000
heap
page read and write
412E000
stack
page read and write
401E000
stack
page read and write
1034000
heap
page read and write
1534000
heap
page read and write
4C71000
heap
page read and write
502000
unkown
page execute and read and write
2AF0000
direct allocation
page execute and read and write
6A4000
unkown
page execute and read and write
4AF1000
heap
page read and write
89EC000
heap
page read and write
3C0F000
stack
page read and write
4C8F000
stack
page read and write
4AF1000
heap
page read and write
2376F000
heap
page read and write
388E000
stack
page read and write
5190000
direct allocation
page execute and read and write
4BCF000
stack
page read and write
321F000
stack
page read and write
1034000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
739000
unkown
page write copy
4301000
heap
page read and write
54E0000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
1530000
heap
page read and write
4034000
direct allocation
page execute and read and write
1034000
heap
page read and write
45CE000
stack
page read and write
13CB000
heap
page read and write
BA1000
unkown
page execute and read and write
4AF1000
heap
page read and write
11F7000
stack
page read and write
BA3000
unkown
page execute and write copy
462E000
stack
page read and write
61000
unkown
page execute and write copy
11C0000
heap
page read and write
13B8000
heap
page read and write
3F0E000
stack
page read and write
3F70000
heap
page read and write
E8E000
heap
page read and write
4C71000
heap
page read and write
167E000
stack
page read and write
6C3B1000
unkown
page execute read
68EF000
stack
page read and write
4D0F000
stack
page read and write
11AE000
stack
page read and write
2E10000
direct allocation
page read and write
1534000
heap
page read and write
1034000
heap
page read and write
23750000
heap
page read and write
5330000
direct allocation
page execute and read and write
23761000
heap
page read and write
9B1000
unkown
page execute and read and write
291F000
stack
page read and write
4C71000
heap
page read and write
295E000
stack
page read and write
1340000
heap
page read and write
3ADF000
stack
page read and write
115A000
stack
page read and write
422F000
stack
page read and write
35CF000
stack
page read and write
430F000
stack
page read and write
4C71000
heap
page read and write
2178000
heap
page read and write
37CF000
stack
page read and write
5410000
heap
page read and write
3574000
direct allocation
page execute and read and write
EBC000
unkown
page execute and write copy
2376F000
heap
page read and write
3E6F000
stack
page read and write
4751000
heap
page read and write
61ECC000
direct allocation
page read and write
382F000
stack
page read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1534000
heap
page read and write
23743000
heap
page read and write
4AF1000
heap
page read and write
297000
unkown
page execute and write copy
43DE000
stack
page read and write
1006000
unkown
page execute and read and write
346F000
stack
page read and write
4C5F000
stack
page read and write
13AA000
heap
page read and write
11B0000
heap
page read and write
23750000
heap
page read and write
4C60000
direct allocation
page read and write
4E50000
direct allocation
page read and write
1034000
heap
page read and write
4AF1000
heap
page read and write
583D000
stack
page read and write
3E9F000
stack
page read and write
1034000
heap
page read and write
4E50000
direct allocation
page read and write
16EC000
heap
page read and write
3CCF000
stack
page read and write
23746000
heap
page read and write
49DF000
stack
page read and write
4A0000
unkown
page read and write
9FA000
unkown
page execute and write copy
374E000
stack
page read and write
4AF1000
heap
page read and write
16CE000
stack
page read and write
2376C000
heap
page read and write
12DA000
heap
page read and write
3FDF000
stack
page read and write
23741000
heap
page read and write
4C71000
heap
page read and write
3D6E000
stack
page read and write
1FEA000
heap
page read and write
4C71000
heap
page read and write
732000
unkown
page execute and read and write
4C71000
heap
page read and write
67AF000
stack
page read and write
13A2000
heap
page read and write
403E000
direct allocation
page execute and read and write
13CE000
heap
page read and write
41D0000
heap
page read and write
61EB4000
direct allocation
page read and write
23761000
heap
page read and write
1034000
heap
page read and write
50B000
unkown
page execute and read and write
23736000
heap
page read and write
B70000
heap
page read and write
2E27000
heap
page read and write
5310000
direct allocation
page execute and read and write
851B000
stack
page read and write
C80000
unkown
page readonly
4C71000
heap
page read and write
2E10000
direct allocation
page read and write
380E000
stack
page read and write
2E10000
direct allocation
page read and write
2376A000
heap
page read and write
2C0F000
stack
page read and write
7CA000
unkown
page execute and write copy
4AF1000
heap
page read and write
1034000
heap
page read and write
5110000
direct allocation
page execute and read and write
5170000
direct allocation
page execute and read and write
451E000
stack
page read and write
6C58E000
unkown
page read and write
36EF000
stack
page read and write
6C38D000
unkown
page readonly
4C71000
heap
page read and write
4C71000
heap
page read and write
163F000
stack
page read and write
2374E000
heap
page read and write
4C71000
heap
page read and write
5460000
direct allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
297000
unkown
page execute and read and write
2376C000
heap
page read and write
2F9FF000
heap
page read and write
4A8F000
stack
page read and write
4AF1000
heap
page read and write
420E000
stack
page read and write
4400000
trusted library allocation
page read and write
4C71000
heap
page read and write
46CF000
stack
page read and write
2374B000
heap
page read and write
4034000
direct allocation
page execute and read and write
132E000
heap
page read and write
6C310000
unkown
page readonly
1034000
heap
page read and write
5110000
direct allocation
page execute and read and write
1C53F000
stack
page read and write
125C000
heap
page read and write
3B8F000
stack
page read and write
509000
unkown
page write copy
4C71000
heap
page read and write
4AF1000
heap
page read and write
13CE000
heap
page read and write
4C60000
direct allocation
page read and write
398F000
stack
page read and write
61ED0000
direct allocation
page read and write
6D1000
unkown
page execute and write copy
20E5000
heap
page read and write
4C71000
heap
page read and write
107F000
stack
page read and write
C17000
heap
page read and write
448E000
stack
page read and write
354F000
stack
page read and write
7AF000
unkown
page execute and read and write
4023000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4E60000
heap
page read and write
4301000
heap
page read and write
13CC000
heap
page read and write
1034000
heap
page read and write
2FDF000
stack
page read and write
1DFC000
stack
page read and write
4C71000
heap
page read and write
3100000
heap
page read and write
13A2000
heap
page read and write
5290000
direct allocation
page execute and read and write
1534000
heap
page read and write
C17000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4E50000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
403E000
direct allocation
page execute and read and write
429E000
stack
page read and write
6590000
heap
page read and write
13A2000
heap
page read and write
3570000
direct allocation
page execute and read and write
1BF3F000
stack
page read and write
F1000
unkown
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
7B9000
unkown
page execute and read and write
4C71000
heap
page read and write
2374E000
heap
page read and write
2E10000
direct allocation
page read and write
3ACF000
stack
page read and write
4C60000
direct allocation
page read and write
2374E000
heap
page read and write
6A4000
unkown
page execute and read and write
23744000
heap
page read and write
1376000
heap
page read and write
44CF000
stack
page read and write
4E61000
heap
page read and write
3070000
direct allocation
page execute and read and write
4408000
heap
page read and write
3D2E000
stack
page read and write
4AF1000
heap
page read and write
1510000
heap
page read and write
203D000
heap
page read and write
25DE000
stack
page read and write
4C80000
heap
page read and write
FEC000
unkown
page execute and read and write
439E000
stack
page read and write
4C71000
heap
page read and write
461F000
stack
page read and write
5290000
direct allocation
page execute and read and write
3BCE000
stack
page read and write
23735000
heap
page read and write
489F000
stack
page read and write
376E000
stack
page read and write
5160000
direct allocation
page execute and read and write
330F000
stack
page read and write
1369000
heap
page read and write
13A3000
heap
page read and write
4AF1000
heap
page read and write
6C311000
unkown
page execute read
4C71000
heap
page read and write
A2C000
unkown
page execute and write copy
E04000
heap
page read and write
5110000
direct allocation
page execute and read and write
1252000
heap
page read and write
4C71000
heap
page read and write
30AB000
stack
page read and write
13B8000
heap
page read and write
344E000
stack
page read and write
23766000
heap
page read and write
4C60000
direct allocation
page read and write
4AF1000
heap
page read and write
136D000
stack
page read and write
A2F000
unkown
page execute and write copy
23746000
heap
page read and write
2E10000
direct allocation
page read and write
3C5E000
stack
page read and write
3D4F000
stack
page read and write
480F000
stack
page read and write
2129000
heap
page read and write
4C60000
direct allocation
page read and write
D9E000
stack
page read and write
2375D000
heap
page read and write
4AF1000
heap
page read and write
971000
unkown
page execute and read and write
1034000
heap
page read and write
335F000
stack
page read and write
4AF1000
heap
page read and write
336E000
stack
page read and write
126A000
heap
page read and write
DF0000
direct allocation
page read and write
3E4E000
stack
page read and write
1534000
heap
page read and write
4E50000
direct allocation
page read and write
4AF1000
heap
page read and write
138E000
heap
page read and write
3420000
heap
page read and write
4C71000
heap
page read and write
5110000
direct allocation
page execute and read and write
1534000
heap
page read and write
464E000
stack
page read and write
EA5000
unkown
page execute and read and write
4AF1000
heap
page read and write
2369B000
heap
page read and write
509000
unkown
page read and write
5161000
direct allocation
page read and write
4C71000
heap
page read and write
593D000
stack
page read and write
60000
unkown
page readonly
3230000
heap
page read and write
357E000
direct allocation
page execute and read and write
4034000
direct allocation
page execute and read and write
4A1E000
stack
page read and write
3DAE000
stack
page read and write
341E000
stack
page read and write
3310000
heap
page read and write
3D8E000
stack
page read and write
DD0000
direct allocation
page read and write
30EE000
stack
page read and write
781000
unkown
page execute and read and write
6C595000
unkown
page readonly
543F000
stack
page read and write
120F000
heap
page read and write
4C71000
heap
page read and write
2AF0000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
D40000
heap
page read and write
4AF1000
heap
page read and write
43CE000
stack
page read and write
1034000
heap
page read and write
3AEE000
stack
page read and write
23743000
heap
page read and write
1034000
heap
page read and write
4AF1000
heap
page read and write
37B3000
heap
page read and write
4C71000
heap
page read and write
4A8F000
stack
page read and write
3A8E000
stack
page read and write
164C000
unkown
page execute and write copy
1034000
heap
page read and write
2AE0000
direct allocation
page execute and read and write
3F80000
heap
page read and write
1534000
heap
page read and write
4C71000
heap
page read and write
138E000
heap
page read and write
DD0000
direct allocation
page read and write
E04000
heap
page read and write
1034000
heap
page read and write
84000
unkown
page execute and write copy
131B000
heap
page read and write
1030000
heap
page read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
1CB1F000
stack
page read and write
2374A000
heap
page read and write
54F0000
direct allocation
page execute and read and write
1335000
heap
page read and write
39AE000
stack
page read and write
606E000
stack
page read and write
321E000
stack
page read and write
4A0000
unkown
page readonly
23750000
heap
page read and write
971000
unkown
page execute and read and write
2E10000
direct allocation
page read and write
3B1E000
stack
page read and write
3430000
direct allocation
page execute and read and write
1FE0000
heap
page read and write
4C71000
heap
page read and write
44C0000
heap
page read and write
2383A000
heap
page read and write
7CA000
unkown
page execute and write copy
DD0000
direct allocation
page read and write
4C71000
heap
page read and write
52F0000
direct allocation
page read and write
474F000
stack
page read and write
4C71000
heap
page read and write
E04000
heap
page read and write
151E000
stack
page read and write
4F80000
direct allocation
page read and write
657E000
stack
page read and write
3F8E000
stack
page read and write
3E8E000
stack
page read and write
83E0000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
C81000
unkown
page execute and write copy
4E61000
heap
page read and write
7C9000
unkown
page execute and read and write
141E000
stack
page read and write
1034000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
4D10000
direct allocation
page execute and read and write
23736000
heap
page read and write
7C000
unkown
page execute and write copy
23748000
heap
page read and write
CC8000
unkown
page execute and read and write
4AF1000
heap
page read and write
1F90000
heap
page read and write
23748000
heap
page read and write
23761000
heap
page read and write
23743000
heap
page read and write
4C71000
heap
page read and write
DD0000
direct allocation
page read and write
CC000
unkown
page execute and read and write
BFD000
stack
page read and write
320F000
stack
page read and write
48DE000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
390F000
stack
page read and write
324E000
stack
page read and write
4C71000
heap
page read and write
567E000
stack
page read and write
88CC000
stack
page read and write
11FC000
stack
page read and write
3574000
direct allocation
page execute and read and write
704E000
heap
page read and write
21A0000
heap
page read and write
2AF0000
direct allocation
page execute and read and write
4A0000
unkown
page read and write
4E50000
direct allocation
page read and write
4BF0000
trusted library allocation
page read and write
3D2F000
stack
page read and write
2E8E000
stack
page read and write
E04000
heap
page read and write
7AF000
unkown
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
52F0000
direct allocation
page read and write
52B0000
direct allocation
page execute and read and write
322E000
stack
page read and write
4030000
direct allocation
page execute and read and write
357E000
direct allocation
page execute and read and write
129E000
stack
page read and write
60000
unkown
page readonly
52A0000
direct allocation
page execute and read and write
4D50000
direct allocation
page execute and read and write
484E000
stack
page read and write
4034000
direct allocation
page execute and read and write
56EE000
stack
page read and write
30AF000
stack
page read and write
400E000
stack
page read and write
3563000
direct allocation
page execute and read and write
2376F000
heap
page read and write
5180000
direct allocation
page execute and read and write
4C71000
heap
page read and write
2F8F000
stack
page read and write
470E000
stack
page read and write
45EF000
stack
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
48AE000
stack
page read and write
4AF1000
heap
page read and write
394E000
stack
page read and write
E04000
heap
page read and write
4C60000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
EB7000
unkown
page execute and read and write
136B000
heap
page read and write
5480000
direct allocation
page execute and read and write
1034000
heap
page read and write
13B2000
heap
page read and write
399F000
stack
page read and write
23761000
heap
page read and write
2E6C000
stack
page read and write
4C71000
heap
page read and write
CDB000
stack
page read and write
2E10000
direct allocation
page read and write
134A000
heap
page read and write
4AF1000
heap
page read and write
3A4F000
stack
page read and write
476E000
stack
page read and write
4AF1000
heap
page read and write
61ED4000
direct allocation
page readonly
23766000
heap
page read and write
4C71000
heap
page read and write
50B000
unkown
page execute and read and write
3E0F000
stack
page read and write
4E50000
direct allocation
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
2E2B000
heap
page read and write
4C71000
heap
page read and write
486F000
stack
page read and write
2CFE000
stack
page read and write
1CF1F000
stack
page read and write
3330000
heap
page read and write
4AF1000
heap
page read and write
1255000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4D70000
direct allocation
page execute and read and write
1534000
heap
page read and write
597D000
stack
page read and write
4C71000
heap
page read and write
C70000
heap
page read and write
334F000
stack
page read and write
19AE000
stack
page read and write
65A6000
heap
page read and write
3320000
heap
page read and write
2E10000
direct allocation
page read and write
509000
unkown
page write copy
78A000
unkown
page execute and read and write
4E50000
direct allocation
page read and write
1034000
heap
page read and write
13B2000
heap
page read and write
20DD000
heap
page read and write
971000
unkown
page execute and read and write
2E20000
heap
page read and write
2374B000
heap
page read and write
7C9000
unkown
page execute and read and write
4D30000
direct allocation
page execute and read and write
4C71000
heap
page read and write
494F000
stack
page read and write
524F000
stack
page read and write
4AF1000
heap
page read and write
5DF0000
heap
page read and write
43AE000
stack
page read and write
C15000
heap
page read and write
202C000
heap
page read and write
5B3E000
stack
page read and write
2B00000
heap
page read and write
2376E000
heap
page read and write
4C71000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4E61000
heap
page read and write
DD0000
direct allocation
page read and write
2100000
heap
page read and write
5130000
direct allocation
page execute and read and write
30DF000
stack
page read and write
54B0000
direct allocation
page execute and read and write
40C000
stack
page read and write
1034000
heap
page read and write
41D3000
heap
page read and write
5100000
direct allocation
page read and write
23761000
heap
page read and write
3ECE000
stack
page read and write
4C71000
heap
page read and write
1343000
heap
page read and write
5100000
direct allocation
page read and write
4AF1000
heap
page read and write
1034000
heap
page read and write
12F0000
heap
page read and write
4AF1000
heap
page read and write
325E000
stack
page read and write
4C71000
heap
page read and write
E04000
heap
page read and write
23761000
heap
page read and write
2376F000
heap
page read and write
1034000
heap
page read and write
23748000
heap
page read and write
30EE000
stack
page read and write
1034000
heap
page read and write
13CF000
heap
page read and write
65A0000
heap
page read and write
3C2E000
stack
page read and write
20E8000
heap
page read and write
DD0000
direct allocation
page read and write
2374B000
heap
page read and write
7050000
heap
page read and write
4B1F000
stack
page read and write
1034000
heap
page read and write
42F0000
heap
page read and write
4E50000
direct allocation
page read and write
2069000
heap
page read and write
20DC000
heap
page read and write
4850000
trusted library allocation
page read and write
553F000
stack
page read and write
1034000
heap
page read and write
67EE000
stack
page read and write
470000
heap
page read and write
CFC000
stack
page read and write
D20000
heap
page read and write
1034000
heap
page read and write
4AF1000
heap
page read and write
23755000
heap
page read and write
385F000
stack
page read and write
2142000
heap
page read and write
2F74E000
stack
page read and write
1034000
heap
page read and write
41CE000
stack
page read and write
5C3F000
stack
page read and write
89CC000
stack
page read and write
4AEF000
stack
page read and write
3530000
direct allocation
page execute and read and write
4C71000
heap
page read and write
2FA07000
heap
page read and write
4C71000
heap
page read and write
2176000
heap
page read and write
2F6F000
stack
page read and write
7C9000
unkown
page execute and write copy
3EAF000
stack
page read and write
40AF000
stack
page read and write
4750000
heap
page read and write
2073000
heap
page read and write
4C71000
heap
page read and write
3D9E000
stack
page read and write
3E6000
unkown
page execute and read and write
1034000
heap
page read and write
2FAE000
stack
page read and write
44EE000
stack
page read and write
5480000
direct allocation
page execute and read and write
34CE000
stack
page read and write
16D0000
heap
page read and write
1070000
heap
page read and write
4751000
heap
page read and write
4C71000
heap
page read and write
2376F000
heap
page read and write
4AF1000
heap
page read and write
7EAE0000
direct allocation
page execute and read and write
41C000
unkown
page execute and read and write
2EA0000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4F30000
heap
page read and write
1034000
heap
page read and write
739000
unkown
page read and write
4C71000
heap
page read and write
12D0000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
7C9000
unkown
page execute and read and write
973000
unkown
page execute and write copy
3BF0000
direct allocation
page execute and read and write
475000
unkown
page execute and read and write
1C33F000
stack
page read and write
4C0E000
stack
page read and write
3DC0000
heap
page read and write
2E10000
direct allocation
page read and write
861C000
stack
page read and write
4AF1000
heap
page read and write
1534000
heap
page read and write
2AF0000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
54A0000
direct allocation
page execute and read and write
1534000
heap
page read and write
1C73D000
stack
page read and write
4AF1000
heap
page read and write
6C39E000
unkown
page read and write
49EE000
stack
page read and write
4AF1000
heap
page read and write
5480000
direct allocation
page execute and read and write
4C71000
heap
page read and write
332F000
stack
page read and write
4AF1000
heap
page read and write
3C1F000
stack
page read and write
3C4E000
stack
page read and write
DCA000
unkown
page execute and read and write
DD0000
direct allocation
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
7B9000
unkown
page execute and read and write
7B9000
unkown
page execute and read and write
4751000
heap
page read and write
13A2000
heap
page read and write
5290000
direct allocation
page execute and read and write
1034000
heap
page read and write
3BEF000
stack
page read and write
4C71000
heap
page read and write
4E50000
direct allocation
page read and write
4C71000
heap
page read and write
61E00000
direct allocation
page execute and read and write
4C71000
heap
page read and write
23748000
heap
page read and write
EB7000
unkown
page execute and write copy
23761000
heap
page read and write
4C71000
heap
page read and write
1034000
heap
page read and write
4C71000
heap
page read and write
89D0000
heap
page read and write
6A2F000
stack
page read and write
23761000
heap
page read and write
4E4F000
stack
page read and write
557E000
stack
page read and write
4C71000
heap
page read and write
6C590000
unkown
page read and write
1034000
heap
page read and write
1034000
heap
page read and write
E04000
heap
page read and write
2E9C000
stack
page read and write
3D0E000
stack
page read and write
4C60000
direct allocation
page read and write
9E9000
unkown
page execute and read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
2376A000
heap
page read and write
4C60000
direct allocation
page read and write
5490000
direct allocation
page execute and read and write
371F000
stack
page read and write
5110000
direct allocation
page execute and read and write
2AF0000
direct allocation
page execute and read and write
4C70000
heap
page read and write
54D0000
direct allocation
page execute and read and write
480000
heap
page read and write
444F000
stack
page read and write
502000
unkown
page execute and read and write
306F000
stack
page read and write
C80000
unkown
page readonly
4C71000
heap
page read and write
475F000
stack
page read and write
5414000
heap
page read and write
4F80000
direct allocation
page read and write
4300000
heap
page read and write
2DFF000
stack
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
9DF000
unkown
page execute and read and write
2AF0000
direct allocation
page execute and read and write
3687B000
stack
page read and write
2E10000
direct allocation
page read and write
361E000
stack
page read and write
4AF1000
heap
page read and write
338E000
stack
page read and write
4C71000
heap
page read and write
20E0000
heap
page read and write
511C000
stack
page read and write
396F000
stack
page read and write
425F000
stack
page read and write
7041000
heap
page read and write
4C71000
heap
page read and write
4C60000
direct allocation
page read and write
32FE000
stack
page read and write
3574000
direct allocation
page execute and read and write
54C0000
direct allocation
page execute and read and write
20FA000
heap
page read and write
360E000
stack
page read and write
35EE000
stack
page read and write
39DE000
stack
page read and write
4A1000
unkown
page execute and write copy
4AF1000
heap
page read and write
4D40000
direct allocation
page execute and read and write
5270000
direct allocation
page execute and read and write
C60000
heap
page read and write
164F000
unkown
page execute and read and write
D50000
heap
page read and write
4C71000
heap
page read and write
1D724000
heap
page read and write
498E000
stack
page read and write
3F5E000
stack
page read and write
3107000
heap
page read and write
4C71000
heap
page read and write
358E000
stack
page read and write
1034000
heap
page read and write
509000
unkown
page read and write
2153000
heap
page read and write
973000
unkown
page execute and write copy
23761000
heap
page read and write
35DF000
stack
page read and write
8D4000
unkown
page execute and read and write
2ED7000
heap
page read and write
23748000
heap
page read and write
E04000
heap
page read and write
4AF1000
heap
page read and write
20E3000
heap
page read and write
4AF1000
heap
page read and write
3B0E000
stack
page read and write
4AF1000
heap
page read and write
5290000
direct allocation
page execute and read and write
23760000
heap
page read and write
1034000
heap
page read and write
2376E000
heap
page read and write
3D5F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
E60000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
2374B000
heap
page read and write
35AF000
stack
page read and write
370F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1534000
heap
page read and write
4C71000
heap
page read and write
1095000
unkown
page execute and read and write
4C71000
heap
page read and write
1DF8000
stack
page read and write
310E000
stack
page read and write
4C71000
heap
page read and write
23744000
heap
page read and write
36CE000
stack
page read and write
3574000
direct allocation
page execute and read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
2376F000
heap
page read and write
73B000
unkown
page execute and read and write
13BB000
heap
page read and write
2F94F000
stack
page read and write
49AF000
stack
page read and write
1034000
heap
page read and write
2B07000
heap
page read and write
2056000
heap
page read and write
C0000
unkown
page execute and read and write
4034000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
4C71000
heap
page read and write
4AF1000
heap
page read and write
44AF000
stack
page read and write
52E0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
20F6000
heap
page read and write
424F000
stack
page read and write
2A5F000
stack
page read and write
4E50000
direct allocation
page read and write
5470000
direct allocation
page execute and read and write
4FE1000
direct allocation
page read and write
E70000
direct allocation
page execute and read and write
3F60000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
DF0000
direct allocation
page read and write
4D0F000
stack
page read and write
206E000
heap
page read and write
E04000
heap
page read and write
51A0000
direct allocation
page execute and read and write
40EF000
stack
page read and write
5480000
direct allocation
page execute and read and write
973000
unkown
page execute and write copy
502000
unkown
page execute and read and write
2D4E000
stack
page read and write
4AF1000
heap
page read and write
13D0000
heap
page read and write
3564000
direct allocation
page execute and read and write
2FA04000
heap
page read and write
4F60000
trusted library allocation
page read and write
1034000
heap
page read and write
1034000
heap
page read and write
138E000
heap
page read and write
52C0000
direct allocation
page execute and read and write
4E50000
direct allocation
page read and write
4AF1000
heap
page read and write
1034000
heap
page read and write
4C71000
heap
page read and write
13BB000
heap
page read and write
9F9000
unkown
page execute and read and write
44DF000
stack
page read and write
4C31000
direct allocation
page read and write
1CB3C000
stack
page read and write
12EE000
stack
page read and write
19EE000
stack
page read and write
23767000
heap
page read and write
2376F000
heap
page read and write
4C71000
heap
page read and write
23DE000
stack
page read and write
412E000
stack
page read and write
123E000
stack
page read and write
2E10000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
436F000
stack
page read and write
2F9FC000
heap
page read and write
4C71000
heap
page read and write
375E000
stack
page read and write
6C58F000
unkown
page write copy
31A0000
heap
page read and write
2374E000
heap
page read and write
164F000
unkown
page execute and write copy
11D0000
heap
page read and write
1034000
heap
page read and write
465E000
stack
page read and write
479E000
stack
page read and write
126C000
stack
page read and write
52D0000
direct allocation
page execute and read and write
3663B000
stack
page read and write
2376C000
heap
page read and write
1C93F000
stack
page read and write
3FCF000
stack
page read and write
4AF1000
heap
page read and write
3574000
direct allocation
page execute and read and write
3EDE000
stack
page read and write
52F0000
direct allocation
page read and write
460F000
stack
page read and write
4C71000
heap
page read and write
23744000
heap
page read and write
533E000
stack
page read and write
426E000
stack
page read and write
DD0000
direct allocation
page read and write
1034000
heap
page read and write
514B000
stack
page read and write
34DE000
stack
page read and write
51B0000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
865E000
stack
page read and write
1034000
heap
page read and write
472F000
stack
page read and write
2376F000
heap
page read and write
7F9E0000
direct allocation
page execute and read and write
23736000
heap
page read and write
EBC000
unkown
page execute and read and write
616F000
stack
page read and write
2E5E000
stack
page read and write
1229000
heap
page read and write
384F000
stack
page read and write
2E10000
direct allocation
page read and write
1D31D000
stack
page read and write
36A7D000
stack
page read and write
306F000
stack
page read and write
65A5000
heap
page read and write
13A3000
heap
page read and write
4A0000
unkown
page readonly
386E000
stack
page read and write
4AF1000
heap
page read and write
2A9E000
stack
page read and write
89D1000
heap
page read and write
23761000
heap
page read and write
3CC000
unkown
page execute and read and write
4C60000
direct allocation
page read and write
320F000
stack
page read and write
4D70000
trusted library allocation
page read and write
13CE000
heap
page read and write
2E4F000
stack
page read and write
4E61000
heap
page read and write
13CB000
heap
page read and write
3683C000
stack
page read and write
212D000
heap
page read and write
4C71000
heap
page read and write
206D000
heap
page read and write
781000
unkown
page execute and read and write
1534000
heap
page read and write
2FA0A000
heap
page read and write
6D0000
unkown
page readonly
DD0000
direct allocation
page read and write
52BB000
stack
page read and write
9CE000
stack
page read and write
E4E000
stack
page read and write
3DD0000
direct allocation
page execute and read and write
2FCE000
stack
page read and write
434E000
stack
page read and write
D26000
unkown
page execute and read and write
1C13F000
stack
page read and write
7040000
heap
page read and write
13A2000
heap
page read and write
4C71000
heap
page read and write
9F9000
unkown
page execute and write copy
1034000
heap
page read and write
A2F000
unkown
page execute and read and write
450E000
stack
page read and write
123D000
heap
page read and write
50CF000
stack
page read and write
428E000
stack
page read and write
4C71000
heap
page read and write
781000
unkown
page execute and read and write
1534000
heap
page read and write
4C71000
heap
page read and write
4024000
direct allocation
page execute and read and write
4C71000
heap
page read and write
5100000
direct allocation
page read and write
4E50000
direct allocation
page read and write
875F000
stack
page read and write
4B5E000
stack
page read and write
103C000
unkown
page execute and read and write
3574000
direct allocation
page execute and read and write
5520000
direct allocation
page execute and read and write
368F000
stack
page read and write
4C71000
heap
page read and write
2E10000
direct allocation
page read and write
4AF1000
heap
page read and write
4C60000
direct allocation
page read and write
285000
unkown
page execute and read and write
31B0000
direct allocation
page execute and read and write
12FE000
heap
page read and write
3574000
direct allocation
page execute and read and write
E04000
heap
page read and write
408F000
stack
page read and write
458E000
stack
page read and write
2E00000
heap
page read and write
4034000
direct allocation
page execute and read and write
1034000
heap
page read and write
389E000
stack
page read and write
4C71000
heap
page read and write
C9C000
unkown
page execute and write copy
4A1000
unkown
page execute and write copy
327E000
stack
page read and write
415E000
stack
page read and write
5110000
direct allocation
page execute and read and write
38E0000
heap
page read and write
31EF000
stack
page read and write
4AF1000
heap
page read and write
5140000
direct allocation
page execute and read and write
23747000
heap
page read and write
4C71000
heap
page read and write
4034000
direct allocation
page execute and read and write
DF0000
direct allocation
page read and write
C10000
heap
page read and write
4AF1000
heap
page read and write
DEE000
stack
page read and write
1034000
heap
page read and write
4C0E000
stack
page read and write
7CA000
unkown
page execute and write copy
4AF1000
heap
page read and write
1350000
heap
page read and write
6A4000
unkown
page execute and read and write
2374A000
heap
page read and write
4AF1000
heap
page read and write
DD0000
direct allocation
page read and write
5351000
direct allocation
page read and write
4C71000
heap
page read and write
CFD000
stack
page read and write
311E000
stack
page read and write
5300000
direct allocation
page execute and read and write
348F000
stack
page read and write
5260000
direct allocation
page execute and read and write
5510000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
6C3A2000
unkown
page readonly
50E0000
direct allocation
page execute and read and write
12FA000
heap
page read and write
E04000
heap
page read and write
39CE000
stack
page read and write
3F4F000
stack
page read and write
11FE000
stack
page read and write
52F0000
direct allocation
page execute and read and write
16DB000
heap
page read and write
4C71000
heap
page read and write
23750000
heap
page read and write
50B000
unkown
page execute and read and write
138E000
heap
page read and write
13B5000
heap
page read and write
E04000
heap
page read and write
4F80000
direct allocation
page read and write
4AF0000
heap
page read and write
DD0000
direct allocation
page read and write
387D000
stack
page read and write
16CF000
stack
page read and write
37FE000
stack
page read and write
37B0000
heap
page read and write
DD0000
direct allocation
page read and write
2D0F000
stack
page read and write
61ECD000
direct allocation
page readonly
5280000
direct allocation
page execute and read and write
4751000
heap
page read and write
2EB0000
heap
page read and write
E80000
heap
page read and write
13B2000
heap
page read and write
BBE000
stack
page read and write
C6C000
heap
page read and write
1034000
heap
page read and write
4A0000
unkown
page read and write
1034000
heap
page read and write
There are 1168 hidden memdumps, click here to show them.