IOC Report
j7iUba2bki.exe

loading gif

Files

File Path
Type
Category
Malicious
j7iUba2bki.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\8550c65a2f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FCFBGIDAEH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AECAKJJECAEGCBGDHDHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKJEHCAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CFIJEBFCGDAAKFHIDBFIDBKFHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GDHIIIIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GIEHIDHJDBFIIECAKECBKJJKKE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IEBAAFCAFCBKFHJJJKKFHIDAAK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIEHJEHDBGHIDGDGHCBGDGCBFI
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JDBGDHIIDAEBFHJJDBFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJECFHCBKKEBAKFIJDHI
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\j7iUba2bki.exe
"C:\Users\user\Desktop\j7iUba2bki.exe"
malicious
C:\Users\user\AppData\Local\Temp\FCFBGIDAEH.exe
"C:\Users\user\AppData\Local\Temp\FCFBGIDAEH.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\8550c65a2f.exe
"C:\Users\user\AppData\Local\Temp\1000006001\8550c65a2f.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\FCFBGIDAEH.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\BKJEHCAKFB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll:h
unknown
malicious
http://77.91.77.81/cost/go.exe
unknown
malicious
http://77.91.77.81/mine/amadka.exeAm
unknown
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://77.91.77.81/mine/amadka.exephprefoxox
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exera
unknown
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exeOm
unknown
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://77.91.77.81/cost/go.exepData
unknown
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://77.91.77.81/cost/go.exe00
unknown
malicious
85.28.47.4/920475a59bac849d.php
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://77.91.77.82/Hun4Ko/index.php$R
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://77.91.77.81/stealc/random.exe9
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://77.91.77.82/Hun4Ko/index.php0R
unknown
http://77.91.77.82/Hun4Ko/index.php-
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.4/920475a59bac849d.php&a
unknown
http://77.91.77.82/Hun4Ko/index.phpFRk
unknown
http://85.28.47.4/i
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.82/Hun4Ko/index.php~RC
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://85.28.47.4/dows
unknown
http://85.28.47.4ProgramData=
unknown
http://77.91.77.81/stealc/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://77.91.77.82/Hun4Ko/index.php6S
unknown
http://upx.sf.net
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll:f
unknown
http://77.91.77.82/Hun4Ko/index.php.R
unknown
https://www.ecosia.org/newtab/
unknown
http://85.28.47.4/920475a59bac849d.phpc
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://77.91.77.82/Hun4Ko/index.phptRY
unknown
http://85.28.47.4/69934896f997d5bb/msvcp140.dllfh
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.82/Hun4Ko/index.phps
unknown
http://85.28.47.4/20475a59bac849d.phpCa
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://77.91.77.82/Hun4Ko/index.php:R
unknown
http://77.91.77.82/Hun4Ko/index.phpf
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://77.91.77.82/Hun4Ko/index.phphRu
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://77.91.77.81/stealc/random.exe50673
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dll~B
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.82/t%
unknown
There are 65 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4A50000
direct allocation
page read and write
malicious
4800000
direct allocation
page read and write
malicious
261000
unkown
page execute and read and write
malicious
261000
unkown
page execute and read and write
malicious
261000
unkown
page execute and read and write
malicious
261000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page read and write
malicious
4A30000
direct allocation
page read and write
malicious
5240000
direct allocation
page read and write
malicious
4A30000
direct allocation
page read and write
malicious
31000
unkown
page execute and read and write
malicious
142E000
heap
page read and write
malicious
3E1000
unkown
page execute and read and write
malicious
4C90000
direct allocation
page read and write
malicious
261000
unkown
page execute and read and write
malicious
301000
unkown
page execute and read and write
malicious
1744000
heap
page read and write
malicious
261000
unkown
page execute and read and write
malicious
47F1000
heap
page read and write
C1F000
heap
page read and write
C14000
heap
page read and write
4E00000
direct allocation
page execute and read and write
17C7000
heap
page read and write
4371000
heap
page read and write
3710000
heap
page read and write
2C6F000
stack
page read and write
2CB000
unkown
page execute and read and write
D34000
heap
page read and write
4A30000
direct allocation
page execute and read and write
563000
unkown
page execute and read and write
3814000
direct allocation
page execute and read and write
446E000
stack
page read and write
23086000
heap
page read and write
31000
unkown
page execute and write copy
C14000
heap
page read and write
2F8E000
stack
page read and write
12F0000
direct allocation
page execute and read and write
C14000
heap
page read and write
7FEC000
stack
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
4DC0000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
EA4000
heap
page read and write
261000
unkown
page execute and write copy
49FF000
stack
page read and write
37EE000
stack
page read and write
2A8E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
454000
unkown
page execute and read and write
23088000
heap
page read and write
6C590000
unkown
page read and write
4BC0000
direct allocation
page execute and read and write
70F000
unkown
page execute and write copy
CCF000
unkown
page execute and write copy
70D000
unkown
page execute and read and write
33BE000
stack
page read and write
BE4000
heap
page read and write
1360000
heap
page read and write
292E000
stack
page read and write
3BBE000
stack
page read and write
61EB7000
direct allocation
page readonly
47EF000
stack
page read and write
3CFE000
stack
page read and write
32EE000
stack
page read and write
CBA000
heap
page read and write
CAA000
heap
page read and write
4371000
heap
page read and write
14B0000
direct allocation
page read and write
2308E000
heap
page read and write
34FE000
stack
page read and write
4960000
direct allocation
page execute and read and write
4371000
heap
page read and write
53F0000
direct allocation
page execute and read and write
C6E000
stack
page read and write
4390000
heap
page read and write
C14000
heap
page read and write
1000000
direct allocation
page read and write
C14000
heap
page read and write
2F6F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
525000
unkown
page execute and read and write
4371000
heap
page read and write
28EE000
stack
page read and write
14B0000
direct allocation
page read and write
47B0000
trusted library allocation
page read and write
17BB000
heap
page read and write
35EE000
stack
page read and write
2E6E000
stack
page read and write
40BE000
stack
page read and write
22F30000
heap
page read and write
4590000
direct allocation
page read and write
53B0000
direct allocation
page execute and read and write
B74000
heap
page read and write
4A30000
direct allocation
page read and write
1000000
direct allocation
page read and write
3763000
heap
page read and write
61C000
unkown
page execute and read and write
29FF000
stack
page read and write
36BE000
stack
page read and write
3AFF000
stack
page read and write
9D4000
heap
page read and write
261000
unkown
page execute and write copy
4371000
heap
page read and write
4A7E000
stack
page read and write
C14000
heap
page read and write
3F6E000
stack
page read and write
C14000
heap
page read and write
B74000
heap
page read and write
410E000
stack
page read and write
2F0BE000
stack
page read and write
2F3E000
stack
page read and write
C14000
heap
page read and write
4C50000
direct allocation
page execute and read and write
367F000
stack
page read and write
14B0000
direct allocation
page read and write
4E20000
direct allocation
page execute and read and write
7AC000
stack
page read and write
C8C000
heap
page read and write
124E000
stack
page read and write
9D4000
heap
page read and write
52A1000
direct allocation
page read and write
9D4000
heap
page read and write
260000
unkown
page readonly
D5E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
230AE000
heap
page read and write
4371000
heap
page read and write
290F000
stack
page read and write
4A91000
direct allocation
page read and write
33EF000
stack
page read and write
B70000
heap
page read and write
C34000
heap
page read and write
2F362000
heap
page read and write
4A30000
direct allocation
page read and write
334E000
stack
page read and write
1680000
heap
page read and write
C14000
heap
page read and write
61ECD000
direct allocation
page readonly
C14000
heap
page read and write
35B4000
direct allocation
page execute and read and write
2C9000
unkown
page read and write
23095000
heap
page read and write
344F000
stack
page read and write
4371000
heap
page read and write
38BE000
stack
page read and write
F8C000
stack
page read and write
4A80000
direct allocation
page execute and read and write
434F000
stack
page read and write
3A8F000
stack
page read and write
357E000
stack
page read and write
C5D000
heap
page read and write
4590000
direct allocation
page read and write
4C00000
direct allocation
page execute and read and write
40AE000
stack
page read and write
31BE000
stack
page read and write
403E000
stack
page read and write
3570000
direct allocation
page execute and read and write
4CDE000
stack
page read and write
1C0AF000
stack
page read and write
4371000
heap
page read and write
9D4000
heap
page read and write
2308B000
heap
page read and write
CC0000
direct allocation
page read and write
23090000
heap
page read and write
4EDE000
stack
page read and write
EA4000
heap
page read and write
2E2F000
stack
page read and write
C14000
heap
page read and write
443F000
stack
page read and write
C37000
heap
page read and write
2BAF000
stack
page read and write
1547000
heap
page read and write
1870000
heap
page read and write
4A3E000
stack
page read and write
CA0000
direct allocation
page read and write
31CF000
stack
page read and write
317F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
35B4000
direct allocation
page execute and read and write
4800000
direct allocation
page read and write
3814000
direct allocation
page execute and read and write
3C7E000
stack
page read and write
34E0000
heap
page read and write
4371000
heap
page read and write
4C90000
direct allocation
page read and write
3EFE000
stack
page read and write
C9F000
heap
page read and write
7E0000
heap
page read and write
4371000
heap
page read and write
C7E000
heap
page read and write
1CFC3000
heap
page read and write
172E000
heap
page read and write
17C2000
heap
page read and write
9D4000
heap
page read and write
C34000
heap
page read and write
4C20000
direct allocation
page execute and read and write
9D4000
heap
page read and write
4C10000
heap
page read and write
230A1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
9D4000
heap
page read and write
4E30000
direct allocation
page execute and read and write
2F0F000
stack
page read and write
5CB0000
heap
page read and write
42EF000
stack
page read and write
47F1000
heap
page read and write
260000
unkown
page read and write
4BC0000
direct allocation
page execute and read and write
399E000
stack
page read and write
B74000
heap
page read and write
C14000
heap
page read and write
27EC000
stack
page read and write
C14000
heap
page read and write
6760000
heap
page read and write
4590000
direct allocation
page read and write
36CF000
stack
page read and write
4A20000
direct allocation
page execute and read and write
25DB000
stack
page read and write
4A7E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
4C40000
direct allocation
page execute and read and write
D30000
direct allocation
page read and write
B7E000
stack
page read and write
401F000
stack
page read and write
B3E000
stack
page read and write
31BE000
stack
page read and write
7AC000
stack
page read and write
53BD000
stack
page read and write
2C9000
unkown
page write copy
381E000
direct allocation
page execute and read and write
1540000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4590000
direct allocation
page read and write
61ED0000
direct allocation
page read and write
1CC1C000
stack
page read and write
3CFE000
stack
page read and write
5CB5000
heap
page read and write
4371000
heap
page read and write
AFC000
stack
page read and write
294C000
stack
page read and write
1000000
direct allocation
page read and write
4371000
heap
page read and write
C34000
heap
page read and write
304F000
stack
page read and write
4921000
direct allocation
page read and write
14B0000
direct allocation
page read and write
6C58F000
unkown
page write copy
4C20000
direct allocation
page execute and read and write
C14000
heap
page read and write
377E000
stack
page read and write
23088000
heap
page read and write
36EF000
stack
page read and write
4B7E000
stack
page read and write
EA4000
heap
page read and write
398E000
stack
page read and write
617000
unkown
page execute and write copy
9D4000
heap
page read and write
14B0000
direct allocation
page read and write
5F0000
heap
page read and write
9D4000
heap
page read and write
230AF000
heap
page read and write
33C0000
heap
page read and write
4C90000
direct allocation
page read and write
3BEF000
stack
page read and write
4990000
direct allocation
page execute and read and write
2308A000
heap
page read and write
35B4000
direct allocation
page execute and read and write
C14000
heap
page read and write
45CF000
stack
page read and write
39A0000
heap
page read and write
573000
unkown
page execute and read and write
34F0000
heap
page read and write
C14000
heap
page read and write
45A1000
heap
page read and write
B74000
heap
page read and write
1000000
direct allocation
page read and write
4990000
direct allocation
page execute and read and write
6770000
heap
page read and write
35CE000
stack
page read and write
CCF000
unkown
page execute and read and write
27E0000
direct allocation
page read and write
605000
unkown
page execute and read and write
2BCE000
stack
page read and write
49F0000
direct allocation
page execute and read and write
37C0000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
3CEE000
stack
page read and write
2DAF000
stack
page read and write
4371000
heap
page read and write
2E0F000
stack
page read and write
4371000
heap
page read and write
37FE000
stack
page read and write
C3C000
stack
page read and write
4590000
direct allocation
page read and write
32B000
unkown
page execute and read and write
4371000
heap
page read and write
2C2000
unkown
page execute and read and write
4371000
heap
page read and write
306E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
9D4000
heap
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
BB0000
direct allocation
page read and write
418F000
stack
page read and write
B1B000
heap
page read and write
4371000
heap
page read and write
2DFE000
stack
page read and write
343E000
stack
page read and write
357E000
stack
page read and write
23088000
heap
page read and write
B74000
heap
page read and write
3CAF000
stack
page read and write
F0E000
stack
page read and write
574000
unkown
page execute and write copy
B60000
heap
page read and write
C14000
heap
page read and write
CE0000
heap
page read and write
2CB000
unkown
page execute and read and write
4DC1000
heap
page read and write
53C000
unkown
page execute and read and write
C14000
heap
page read and write
B8E000
stack
page read and write
3D2F000
stack
page read and write
D7B000
heap
page read and write
4590000
direct allocation
page read and write
14E0000
heap
page read and write
46AF000
stack
page read and write
4371000
heap
page read and write
35B4000
direct allocation
page execute and read and write
1364000
heap
page read and write
54FE000
stack
page read and write
3F7E000
stack
page read and write
23084000
heap
page read and write
52E000
unkown
page execute and read and write
40EF000
stack
page read and write
3F7E000
stack
page read and write
30000
unkown
page readonly
C14000
heap
page read and write
454000
unkown
page execute and read and write
2F368000
heap
page read and write
391000
unkown
page execute and read and write
4371000
heap
page read and write
4A20000
direct allocation
page execute and read and write
6C58E000
unkown
page read and write
358E000
stack
page read and write
61C000
unkown
page execute and write copy
2A3E000
stack
page read and write
380E000
stack
page read and write
563000
unkown
page execute and read and write
4AC0000
direct allocation
page execute and read and write
4371000
heap
page read and write
D6B000
heap
page read and write
2FAE000
stack
page read and write
3CBF000
stack
page read and write
47BE000
stack
page read and write
46EE000
stack
page read and write
1364000
heap
page read and write
EA4000
heap
page read and write
14B0000
direct allocation
page read and write
31AE000
stack
page read and write
C14000
heap
page read and write
255F000
stack
page read and write
573000
unkown
page execute and read and write
224000
unkown
page execute and read and write
4371000
heap
page read and write
23075000
heap
page read and write
101B000
heap
page read and write
FA0000
heap
page read and write
324000
unkown
page execute and write copy
149E000
stack
page read and write
23076000
heap
page read and write
C8C000
heap
page read and write
C14000
heap
page read and write
4580000
heap
page read and write
4371000
heap
page read and write
2C9000
unkown
page write copy
4A91000
direct allocation
page read and write
384E000
stack
page read and write
29EF000
stack
page read and write
3D7F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
42BE000
stack
page read and write
9D4000
heap
page read and write
261000
unkown
page execute and write copy
C96000
heap
page read and write
391E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
30BF000
stack
page read and write
2F2E000
stack
page read and write
4A50000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
100F000
stack
page read and write
2807000
heap
page read and write
14EB000
heap
page read and write
C14000
heap
page read and write
3100000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
9D4000
heap
page read and write
AFD000
stack
page read and write
C14000
heap
page read and write
4590000
direct allocation
page read and write
4371000
heap
page read and write
30AF000
stack
page read and write
353F000
stack
page read and write
C14000
heap
page read and write
CA0000
direct allocation
page read and write
4590000
direct allocation
page read and write
EA4000
heap
page read and write
40CE000
stack
page read and write
3C2E000
stack
page read and write
BE4000
heap
page read and write
300000
unkown
page readonly
C14000
heap
page read and write
6C595000
unkown
page readonly
C43000
heap
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
BE4000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
B0B000
unkown
page execute and read and write
45A1000
heap
page read and write
4A30000
direct allocation
page read and write
CE7000
heap
page read and write
32C0000
direct allocation
page execute and read and write
C85000
heap
page read and write
2EEF000
stack
page read and write
C14000
heap
page read and write
4A20000
direct allocation
page execute and read and write
28AF000
stack
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
30FE000
stack
page read and write
4B7F000
stack
page read and write
4990000
direct allocation
page execute and read and write
3BC0000
heap
page read and write
3E0000
unkown
page readonly
41EE000
stack
page read and write
BB0000
direct allocation
page read and write
1364000
heap
page read and write
1000000
direct allocation
page read and write
148A000
heap
page read and write
C14000
heap
page read and write
5200000
trusted library allocation
page read and write
C14000
heap
page read and write
28FF000
stack
page read and write
3BBD000
stack
page read and write
407F000
stack
page read and write
5C7E000
stack
page read and write
EAF000
stack
page read and write
4371000
heap
page read and write
BCE000
stack
page read and write
1720000
heap
page read and write
393E000
stack
page read and write
9D4000
heap
page read and write
5390000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
4371000
heap
page read and write
C14000
heap
page read and write
1495000
heap
page read and write
9D4000
heap
page read and write
14C0000
heap
page read and write
35B4000
direct allocation
page execute and read and write
B74000
heap
page read and write
2308E000
heap
page read and write
2C2000
unkown
page execute and read and write
394E000
stack
page read and write
6151000
heap
page read and write
BE4000
heap
page read and write
C14000
heap
page read and write
4E90000
direct allocation
page execute and read and write
70D000
unkown
page execute and read and write
4380000
heap
page read and write
43BF000
stack
page read and write
B74000
heap
page read and write
D50000
direct allocation
page execute and read and write
C8C000
heap
page read and write
4A8B000
stack
page read and write
3FCE000
stack
page read and write
14B0000
direct allocation
page read and write
2CB000
unkown
page execute and read and write
259E000
stack
page read and write
CC0000
direct allocation
page read and write
80EC000
stack
page read and write
C14000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
23090000
heap
page read and write
303F000
stack
page read and write
4371000
heap
page read and write
2C8F000
stack
page read and write
4371000
heap
page read and write
27AE000
stack
page read and write
2CBE000
stack
page read and write
37BF000
stack
page read and write
563000
unkown
page execute and read and write
443F000
stack
page read and write
56DE000
stack
page read and write
4A30000
direct allocation
page read and write
4590000
direct allocation
page read and write
99000
unkown
page read and write
1000000
direct allocation
page read and write
3E1000
unkown
page execute and write copy
BB0000
direct allocation
page read and write
41FE000
stack
page read and write
230AF000
heap
page read and write
27E0000
direct allocation
page read and write
3F8F000
stack
page read and write
1866000
heap
page read and write
4371000
heap
page read and write
537000
unkown
page execute and read and write
BE4000
heap
page read and write
456F000
stack
page read and write
BB0000
direct allocation
page read and write
35AF000
stack
page read and write
394F000
stack
page read and write
363DC000
stack
page read and write
420F000
stack
page read and write
55B000
unkown
page execute and read and write
30FB000
stack
page read and write
55B000
unkown
page execute and read and write
52A000
unkown
page execute and read and write
260000
unkown
page readonly
DB000
stack
page read and write
6150000
heap
page read and write
715000
unkown
page execute and read and write
1CEC0000
heap
page read and write
34BF000
stack
page read and write
230AF000
heap
page read and write
454000
unkown
page execute and read and write
CA0000
direct allocation
page read and write
5420000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
35A3000
direct allocation
page execute and read and write
453E000
stack
page read and write
1364000
heap
page read and write
70F000
unkown
page execute and write copy
C14000
heap
page read and write
E90000
heap
page read and write
C10000
heap
page read and write
C40000
heap
page read and write
61EB4000
direct allocation
page read and write
45A0000
heap
page read and write
C34000
heap
page read and write
23174000
heap
page read and write
14B0000
direct allocation
page read and write
4DF0000
direct allocation
page execute and read and write
3BAE000
stack
page read and write
6C310000
unkown
page readonly
1C8B0000
heap
page read and write
BB0000
direct allocation
page read and write
C14000
heap
page read and write
1CEC1000
heap
page read and write
2308D000
heap
page read and write
2C9000
unkown
page write copy
537F000
stack
page read and write
9D4000
heap
page read and write
35B4000
direct allocation
page execute and read and write
23087000
heap
page read and write
4371000
heap
page read and write
BB0000
direct allocation
page read and write
4371000
heap
page read and write
2E4E000
stack
page read and write
2A2E000
stack
page read and write
4E40000
direct allocation
page execute and read and write
2A6F000
stack
page read and write
4590000
direct allocation
page read and write
23090000
heap
page read and write
3E0000
unkown
page readonly
4E20000
direct allocation
page execute and read and write
23084000
heap
page read and write
C14000
heap
page read and write
30CE000
stack
page read and write
CC0000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
31CE000
stack
page read and write
BB0000
direct allocation
page read and write
261000
unkown
page execute and write copy
C34000
heap
page read and write
420E000
stack
page read and write
C14000
heap
page read and write
574000
unkown
page execute and write copy
2CCF000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
2CB000
unkown
page execute and read and write
2AAE000
stack
page read and write
2DFE000
stack
page read and write
B74000
heap
page read and write
B74000
heap
page read and write
770000
heap
page read and write
BE4000
heap
page read and write
9D4000
heap
page read and write
BE4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
2CBE000
stack
page read and write
260000
unkown
page read and write
4371000
heap
page read and write
6770000
heap
page read and write
1364000
heap
page read and write
179C000
heap
page read and write
4DF000
unkown
page execute and write copy
EA4000
heap
page read and write
C34000
heap
page read and write
C14000
heap
page read and write
3814000
direct allocation
page execute and read and write
C7F000
stack
page read and write
EA0000
heap
page read and write
4A20000
direct allocation
page execute and read and write
16FE000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
3A4F000
stack
page read and write
4CF1000
direct allocation
page read and write
CCC000
unkown
page execute and write copy
22FD1000
heap
page read and write
CA0000
direct allocation
page read and write
14B0000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
33FF000
stack
page read and write
387F000
stack
page read and write
99000
unkown
page write copy
373F000
stack
page read and write
41FE000
stack
page read and write
4371000
heap
page read and write
C14000
heap
page read and write
230AF000
heap
page read and write
404000
unkown
page execute and write copy
7E7C000
stack
page read and write
33C0000
direct allocation
page execute and read and write
54E000
unkown
page execute and read and write
367F000
stack
page read and write
66C000
unkown
page execute and read and write
C14000
heap
page read and write
3BCF000
stack
page read and write
C14000
heap
page read and write
7B00000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
C14000
heap
page read and write
52E000
unkown
page execute and read and write
B74000
heap
page read and write
BE4000
heap
page read and write
4371000
heap
page read and write
C14000
heap
page read and write
230AC000
heap
page read and write
38EF000
stack
page read and write
BB0000
direct allocation
page read and write
484E000
stack
page read and write
2308E000
heap
page read and write
2308B000
heap
page read and write
230A6000
heap
page read and write
23090000
heap
page read and write
14A8000
heap
page read and write
9D4000
heap
page read and write
C14000
heap
page read and write
23081000
heap
page read and write
3814000
direct allocation
page execute and read and write
C14000
heap
page read and write
42FF000
stack
page read and write
573000
unkown
page execute and read and write
1CEB0000
heap
page read and write
C34000
heap
page read and write
3814000
direct allocation
page execute and read and write
363E000
stack
page read and write
C20000
heap
page read and write
1360000
heap
page read and write
230A1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
37AF000
stack
page read and write
230A1000
heap
page read and write
3B3E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
3850000
heap
page read and write
150E000
stack
page read and write
40BE000
stack
page read and write
422F000
stack
page read and write
1B1E000
stack
page read and write
BE4000
heap
page read and write
4970000
direct allocation
page execute and read and write
4590000
direct allocation
page read and write
3A3F000
stack
page read and write
1364000
heap
page read and write
436F000
stack
page read and write
C97000
heap
page read and write
2D2E000
stack
page read and write
BB0000
direct allocation
page read and write
2DEE000
stack
page read and write
B5E000
stack
page read and write
4E50000
direct allocation
page execute and read and write
260000
unkown
page readonly
70D000
unkown
page execute and read and write
C14000
heap
page read and write
2800000
heap
page read and write
4371000
heap
page read and write
6171000
heap
page read and write
B0E000
stack
page read and write
33FF000
stack
page read and write
C90000
heap
page read and write
D1E000
heap
page read and write
CA0000
direct allocation
page read and write
35D0000
direct allocation
page execute and read and write
3F4F000
stack
page read and write
3D4E000
stack
page read and write
BB0000
direct allocation
page read and write
D60000
heap
page read and write
4371000
heap
page read and write
3814000
direct allocation
page execute and read and write
343E000
stack
page read and write
C8C000
heap
page read and write
348E000
stack
page read and write
BE4000
heap
page read and write
2C9000
unkown
page write copy
32FE000
stack
page read and write
1000000
direct allocation
page read and write
537000
unkown
page execute and write copy
9D4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
C14000
heap
page read and write
4371000
heap
page read and write
33CC000
heap
page read and write
4590000
direct allocation
page read and write
2D0E000
stack
page read and write
6C54F000
unkown
page readonly
147F000
heap
page read and write
4371000
heap
page read and write
454000
unkown
page execute and read and write
2887000
heap
page read and write
55B000
unkown
page execute and read and write
3FEE000
stack
page read and write
12FD000
stack
page read and write
9D4000
heap
page read and write
1000000
direct allocation
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
2B3F000
stack
page read and write
5400000
direct allocation
page execute and read and write
424E000
stack
page read and write
36AE000
stack
page read and write
676E000
heap
page read and write
442F000
stack
page read and write
353F000
stack
page read and write
4A20000
direct allocation
page execute and read and write
3120000
direct allocation
page execute and read and write
2BEE000
stack
page read and write
D30000
direct allocation
page read and write
28EE000
stack
page read and write
C34000
heap
page read and write
527E000
stack
page read and write
3F2F000
stack
page read and write
224000
unkown
page execute and read and write
4590000
direct allocation
page read and write
54A000
unkown
page execute and read and write
C14000
heap
page read and write
4DDF000
stack
page read and write
37D0000
direct allocation
page execute and read and write
4371000
heap
page read and write
7B02000
heap
page read and write
4B90000
direct allocation
page execute and read and write
342E000
stack
page read and write
438E000
stack
page read and write
C14000
heap
page read and write
298F000
stack
page read and write
19DF000
stack
page read and write
E9E000
stack
page read and write
49E0000
trusted library allocation
page read and write
4371000
heap
page read and write
43FD000
stack
page read and write
3D0F000
stack
page read and write
230A1000
heap
page read and write
3FAF000
stack
page read and write
563000
unkown
page execute and read and write
9D4000
heap
page read and write
C14000
heap
page read and write
A2B000
unkown
page execute and read and write
3C3F000
stack
page read and write
4371000
heap
page read and write
16DF000
stack
page read and write
563000
unkown
page execute and read and write
49E0000
trusted library allocation
page read and write
3B8D000
stack
page read and write
230A0000
heap
page read and write
7D3E000
stack
page read and write
9D4000
heap
page read and write
2F2BF000
stack
page read and write
C14000
heap
page read and write
9D4000
heap
page read and write
C14000
heap
page read and write
4C40000
direct allocation
page execute and read and write
4371000
heap
page read and write
390F000
stack
page read and write
52E000
unkown
page execute and read and write
1872000
heap
page read and write
1000000
direct allocation
page read and write
17AE000
heap
page read and write
4371000
heap
page read and write
434E000
stack
page read and write
4A30000
direct allocation
page execute and read and write
61E00000
direct allocation
page execute and read and write
2F2C0000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
CA0000
direct allocation
page read and write
EA4000
heap
page read and write
382F000
stack
page read and write
7AC000
stack
page read and write
230A1000
heap
page read and write
1010000
heap
page read and write
1364000
heap
page read and write
2FBE000
stack
page read and write
39A3000
heap
page read and write
53FD000
stack
page read and write
3AEE000
stack
page read and write
4371000
heap
page read and write
447E000
stack
page read and write
3D0E000
stack
page read and write
CC0000
direct allocation
page read and write
53A0000
direct allocation
page execute and read and write
4590000
direct allocation
page read and write
3760000
heap
page read and write
3A7E000
stack
page read and write
1364000
heap
page read and write
54C000
unkown
page execute and read and write
31AE000
stack
page read and write
1C61E000
stack
page read and write
261000
unkown
page execute and write copy
C14000
heap
page read and write
EA4000
heap
page read and write
5FFF000
stack
page read and write
CC0000
direct allocation
page read and write
D30000
direct allocation
page read and write
23076000
heap
page read and write
3EAE000
stack
page read and write
CA0000
direct allocation
page read and write
B2C000
heap
page read and write
2C9000
unkown
page read and write
3B4D000
stack
page read and write
A3E000
stack
page read and write
486000
unkown
page execute and read and write
4371000
heap
page read and write
9B000
unkown
page execute and read and write
9D4000
heap
page read and write
CA0000
direct allocation
page read and write
2B6E000
stack
page read and write
3F8E000
stack
page read and write
3E2D000
stack
page read and write
1CE8D000
stack
page read and write
3AFE000
stack
page read and write
322E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
C14000
heap
page read and write
282F000
stack
page read and write
C3C000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4371000
heap
page read and write
47F1000
heap
page read and write
333000
unkown
page execute and read and write
5430000
direct allocation
page execute and read and write
B10000
heap
page read and write
574000
unkown
page execute and write copy
EEE000
stack
page read and write
102B000
heap
page read and write
1420000
heap
page read and write
C3A000
heap
page read and write
230A6000
heap
page read and write
2308E000
heap
page read and write
9D4000
heap
page read and write
BB0000
direct allocation
page read and write
4861000
direct allocation
page read and write
3500000
heap
page read and write
9D4000
heap
page read and write
BB0000
direct allocation
page read and write
C14000
heap
page read and write
260000
unkown
page readonly
C14000
heap
page read and write
516E000
stack
page read and write
4590000
direct allocation
page read and write
617000
unkown
page execute and read and write
272F000
stack
page read and write
260000
unkown
page read and write
2C9000
unkown
page write copy
3E8E000
stack
page read and write
C14000
heap
page read and write
7C3E000
stack
page read and write
573000
unkown
page execute and write copy
BE4000
heap
page read and write
4371000
heap
page read and write
230AF000
heap
page read and write
4440000
heap
page read and write
4371000
heap
page read and write
6140000
heap
page read and write
427F000
stack
page read and write
9D4000
heap
page read and write
3AAF000
stack
page read and write
4DC1000
heap
page read and write
7DE000
stack
page read and write
1545000
heap
page read and write
C14000
heap
page read and write
3D6E000
stack
page read and write
C14000
heap
page read and write
2DC000
stack
page read and write
230A1000
heap
page read and write
BC0000
heap
page read and write
352F000
stack
page read and write
4A40000
direct allocation
page execute and read and write
2CAE000
stack
page read and write
393E000
stack
page read and write
44CE000
stack
page read and write
4E80000
direct allocation
page execute and read and write
23088000
heap
page read and write
14B0000
direct allocation
page read and write
7F5000
unkown
page execute and read and write
CC0000
direct allocation
page read and write
3E3E000
stack
page read and write
230A1000
heap
page read and write
142A000
heap
page read and write
1C2AF000
stack
page read and write
230AC000
heap
page read and write
1440000
heap
page read and write
35CE000
stack
page read and write
C14000
heap
page read and write
346F000
stack
page read and write
3100000
direct allocation
page read and write
2F4F000
stack
page read and write
4E60000
direct allocation
page execute and read and write
2CB000
unkown
page execute and read and write
1BEAF000
stack
page read and write
34AE000
stack
page read and write
2C2000
unkown
page execute and read and write
45A1000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
FEF000
stack
page read and write
4590000
direct allocation
page read and write
3100000
direct allocation
page read and write
467E000
stack
page read and write
3E4F000
stack
page read and write
2F3E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
9D4000
heap
page read and write
D70000
heap
page read and write
4371000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
C14000
heap
page read and write
55B000
unkown
page execute and read and write
C14000
heap
page read and write
358F000
stack
page read and write
4C7F000
stack
page read and write
4371000
heap
page read and write
444F000
stack
page read and write
4800000
direct allocation
page read and write
189C000
heap
page read and write
6C3B0000
unkown
page readonly
230A1000
heap
page read and write
4371000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
92000
unkown
page execute and read and write
129E000
stack
page read and write
344000
unkown
page execute and write copy
52E000
unkown
page execute and read and write
C14000
heap
page read and write
BB0000
direct allocation
page read and write
C14000
heap
page read and write
18B8000
heap
page read and write
B10000
heap
page read and write
260000
unkown
page read and write
4BA0000
direct allocation
page execute and read and write
2DBF000
stack
page read and write
4DD000
unkown
page execute and read and write
307E000
stack
page read and write
2B7E000
stack
page read and write
B80000
heap
page read and write
48FE000
stack
page read and write
C5D000
heap
page read and write
35BE000
direct allocation
page execute and read and write
2C9000
unkown
page read and write
1CC8E000
stack
page read and write
13C0000
heap
page read and write
3BCD000
stack
page read and write
1364000
heap
page read and write
382D000
stack
page read and write
4371000
heap
page read and write
2308F000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
C14000
heap
page read and write
4A00000
direct allocation
page execute and read and write
2C9000
unkown
page write copy
1000000
direct allocation
page read and write
370E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
37FE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
1CFC0000
trusted library allocation
page read and write
CB0000
heap
page read and write
3619C000
stack
page read and write
5E0000
heap
page read and write
6761000
heap
page read and write
6C38D000
unkown
page readonly
12E0000
heap
page read and write
337F000
stack
page read and write
2A4F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
230A7000
heap
page read and write
301000
unkown
page execute and write copy
340F000
stack
page read and write
1895000
heap
page read and write
C85000
heap
page read and write
4A30000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
573000
unkown
page execute and write copy
6C3A2000
unkown
page readonly
C14000
heap
page read and write
BF0000
heap
page read and write
4371000
heap
page read and write
41BF000
stack
page read and write
C5A000
heap
page read and write
3B7F000
stack
page read and write
432E000
stack
page read and write
CA0000
direct allocation
page read and write
C34000
heap
page read and write
172A000
heap
page read and write
1364000
heap
page read and write
C5D000
heap
page read and write
300000
unkown
page readonly
32AF000
stack
page read and write
3A2F000
stack
page read and write
9D4000
heap
page read and write
177F000
heap
page read and write
2C7F000
stack
page read and write
57B000
stack
page read and write
EA4000
heap
page read and write
C34000
heap
page read and write
CC0000
direct allocation
page read and write
4DBF000
stack
page read and write
4A20000
direct allocation
page execute and read and write
31B0000
heap
page read and write
3750000
heap
page read and write
C11000
heap
page read and write
4371000
heap
page read and write
280B000
heap
page read and write
6C3B1000
unkown
page execute read
B74000
heap
page read and write
4E20000
direct allocation
page execute and read and write
45A1000
heap
page read and write
2880000
heap
page read and write
5380000
direct allocation
page execute and read and write
41BF000
stack
page read and write
CA0000
direct allocation
page read and write
35B4000
direct allocation
page execute and read and write
3730000
heap
page read and write
B74000
heap
page read and write
A0000
unkown
page execute and read and write
125B000
stack
page read and write
4371000
heap
page read and write
CC0000
direct allocation
page read and write
4FDF000
stack
page read and write
3A6E000
stack
page read and write
4371000
heap
page read and write
C7D000
heap
page read and write
1C81F000
stack
page read and write
3120000
heap
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
C14000
heap
page read and write
457F000
stack
page read and write
4B8F000
stack
page read and write
573000
unkown
page execute and write copy
9D4000
heap
page read and write
4590000
direct allocation
page read and write
3F3F000
stack
page read and write
574000
unkown
page execute and write copy
4371000
heap
page read and write
361DB000
stack
page read and write
368F000
stack
page read and write
3CBF000
stack
page read and write
1547000
heap
page read and write
4D5B000
stack
page read and write
308F000
stack
page read and write
1CA1D000
stack
page read and write
1CEC1000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
52BD000
stack
page read and write
4371000
heap
page read and write
9D4000
heap
page read and write
230A1000
heap
page read and write
23090000
heap
page read and write
FF0000
heap
page read and write
1364000
heap
page read and write
39FE000
stack
page read and write
49D0000
direct allocation
page execute and read and write
C47000
heap
page read and write
17B0000
heap
page read and write
C14000
heap
page read and write
37CF000
stack
page read and write
574000
unkown
page execute and write copy
454000
unkown
page execute and read and write
2937000
heap
page read and write
33BF000
stack
page read and write
4A4C000
stack
page read and write
70F000
unkown
page execute and write copy
2EFF000
stack
page read and write
4371000
heap
page read and write
4C14000
heap
page read and write
14B0000
direct allocation
page read and write
135E000
stack
page read and write
296E000
stack
page read and write
4371000
heap
page read and write
4CBE000
stack
page read and write
45A0000
heap
page read and write
C14000
heap
page read and write
766000
unkown
page execute and read and write
CC0000
direct allocation
page read and write
2627000
heap
page read and write
336E000
stack
page read and write
BE0000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
F9F000
stack
page read and write
4800000
direct allocation
page read and write
C14000
heap
page read and write
CC0000
direct allocation
page read and write
1469000
heap
page read and write
6C39E000
unkown
page read and write
9D4000
heap
page read and write
2C9000
unkown
page read and write
1C41F000
stack
page read and write
61E01000
direct allocation
page execute read
9D4000
heap
page read and write
3137000
heap
page read and write
430F000
stack
page read and write
C94000
heap
page read and write
52E000
unkown
page execute and read and write
316F000
stack
page read and write
2F35A000
heap
page read and write
C76000
heap
page read and write
573000
unkown
page execute and read and write
23086000
heap
page read and write
32BF000
stack
page read and write
2FE000
unkown
page execute and read and write
603E000
stack
page read and write
53C000
unkown
page execute and write copy
308E000
stack
page read and write
360000
unkown
page execute and read and write
261E000
stack
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
C14000
heap
page read and write
686000
unkown
page execute and read and write
C14000
heap
page read and write
61ED4000
direct allocation
page readonly
4371000
heap
page read and write
C7E000
heap
page read and write
2308B000
heap
page read and write
3B8F000
stack
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
23076000
heap
page read and write
39AE000
stack
page read and write
4590000
direct allocation
page read and write
CA0000
direct allocation
page read and write
4371000
heap
page read and write
32CF000
stack
page read and write
4386000
heap
page read and write
2870000
heap
page read and write
23083000
heap
page read and write
4A60000
direct allocation
page execute and read and write
C14000
heap
page read and write
366F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
1458000
stack
page read and write
4990000
direct allocation
page execute and read and write
9D4000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
3ACE000
stack
page read and write
4A30000
direct allocation
page read and write
9D4000
heap
page read and write
14B0000
direct allocation
page read and write
1000000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
37EE000
stack
page read and write
49FF000
stack
page read and write
3DBE000
stack
page read and write
4371000
heap
page read and write
412E000
stack
page read and write
2C2000
unkown
page execute and read and write
7D7B000
stack
page read and write
2C9000
unkown
page read and write
2308E000
heap
page read and write
38FF000
stack
page read and write
36BE000
stack
page read and write
354F000
stack
page read and write
CC0000
direct allocation
page read and write
4371000
heap
page read and write
C85000
heap
page read and write
14C000
stack
page read and write
C14000
heap
page read and write
3DFF000
stack
page read and write
45D1000
heap
page read and write
C5D000
heap
page read and write
CA0000
direct allocation
page read and write
3814000
direct allocation
page execute and read and write
17AB000
heap
page read and write
C14000
heap
page read and write
3DFF000
stack
page read and write
45D1000
heap
page read and write
CEE000
heap
page read and write
BE4000
heap
page read and write
380F000
stack
page read and write
C82000
heap
page read and write
B74000
heap
page read and write
392E000
stack
page read and write
32FE000
stack
page read and write
4A10000
trusted library allocation
page read and write
396F000
stack
page read and write
9D4000
heap
page read and write
C85000
heap
page read and write
C14000
heap
page read and write
407F000
stack
page read and write
282E000
stack
page read and write
230A6000
heap
page read and write
307E000
stack
page read and write
2B7E000
stack
page read and write
35FF000
stack
page read and write
70D000
unkown
page execute and read and write
260000
unkown
page read and write
4590000
direct allocation
page read and write
BA0000
heap
page read and write
3A7E000
stack
page read and write
2308A000
heap
page read and write
417E000
stack
page read and write
23083000
heap
page read and write
39BF000
stack
page read and write
4371000
heap
page read and write
18B6000
heap
page read and write
2B8F000
stack
page read and write
260000
unkown
page readonly
23088000
heap
page read and write
EA4000
heap
page read and write
4B7F000
stack
page read and write
356E000
stack
page read and write
CC0000
direct allocation
page read and write
4371000
heap
page read and write
32BF000
stack
page read and write
CBE000
stack
page read and write
C14000
heap
page read and write
260000
unkown
page read and write
4590000
direct allocation
page read and write
2B3F000
stack
page read and write
42FF000
stack
page read and write
C34000
heap
page read and write
36C000
unkown
page execute and read and write
386E000
stack
page read and write
BE4000
heap
page read and write
14FC000
heap
page read and write
BCA000
heap
page read and write
9D0000
heap
page read and write
1453000
stack
page read and write
30000
unkown
page read and write
302F000
stack
page read and write
2F367000
heap
page read and write
463E000
stack
page read and write
C9D000
heap
page read and write
C87000
heap
page read and write
4E20000
direct allocation
page execute and read and write
4371000
heap
page read and write
BCE000
heap
page read and write
408F000
stack
page read and write
3EBF000
stack
page read and write
E5F000
stack
page read and write
70F000
unkown
page execute and write copy
3A3F000
stack
page read and write
5440000
direct allocation
page execute and read and write
1690000
direct allocation
page execute and read and write
6C311000
unkown
page execute read
1C21F000
stack
page read and write
4880000
trusted library allocation
page read and write
2F4E000
stack
page read and write
323F000
stack
page read and write
C14000
heap
page read and write
458F000
stack
page read and write
3A8E000
stack
page read and write
C14000
heap
page read and write
4441000
heap
page read and write
230AF000
heap
page read and write
C14000
heap
page read and write
181E000
stack
page read and write
4371000
heap
page read and write
448F000
stack
page read and write
C14000
heap
page read and write
4C50000
direct allocation
page execute and read and write
B10000
heap
page read and write
2A3F000
stack
page read and write
BE4000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4590000
direct allocation
page read and write
4590000
direct allocation
page read and write
23090000
heap
page read and write
477F000
stack
page read and write
4370000
heap
page read and write
9D4000
heap
page read and write
E70000
heap
page read and write
45A1000
heap
page read and write
1365000
heap
page read and write
DAF000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
3740000
heap
page read and write
C34000
heap
page read and write
286E000
stack
page read and write
4590000
direct allocation
page read and write
27E0000
direct allocation
page read and write
1C4AF000
stack
page read and write
40CF000
stack
page read and write
17B2000
heap
page read and write
14B0000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
C14000
heap
page read and write
30EE000
stack
page read and write
18E0000
heap
page read and write
C14000
heap
page read and write
C87000
heap
page read and write
17B5000
heap
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
EA4000
heap
page read and write
230AF000
heap
page read and write
4371000
heap
page read and write
2C2000
unkown
page execute and read and write
4371000
heap
page read and write
3DEF000
stack
page read and write
E97000
heap
page read and write
13AE000
stack
page read and write
52E000
unkown
page execute and read and write
31EF000
stack
page read and write
4B90000
direct allocation
page execute and read and write
2C2000
unkown
page execute and read and write
4BC0000
direct allocation
page execute and read and write
5EFE000
stack
page read and write
C14000
heap
page read and write
4E70000
direct allocation
page execute and read and write
573000
unkown
page execute and read and write
49A0000
direct allocation
page execute and read and write
3130000
heap
page read and write
C14000
heap
page read and write
1200000
heap
page read and write
381E000
direct allocation
page execute and read and write
4441000
heap
page read and write
C14000
heap
page read and write
574000
unkown
page execute and write copy
3E4E000
stack
page read and write
9D4000
heap
page read and write
9D4000
heap
page read and write
5EBF000
stack
page read and write
4E20000
direct allocation
page execute and read and write
1000000
direct allocation
page read and write
4371000
heap
page read and write
2F35F000
heap
page read and write
C14000
heap
page read and write
37BF000
stack
page read and write
454000
unkown
page execute and read and write
230A1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
27FF000
stack
page read and write
3F3F000
stack
page read and write
55B000
unkown
page execute and read and write
433E000
stack
page read and write
4371000
heap
page read and write
35BE000
direct allocation
page execute and read and write
428000
unkown
page execute and read and write
4371000
heap
page read and write
573000
unkown
page execute and read and write
9D4000
heap
page read and write
C14000
heap
page read and write
1364000
heap
page read and write
260000
unkown
page readonly
23084000
heap
page read and write
CA0000
direct allocation
page read and write
C14000
heap
page read and write
14B0000
direct allocation
page read and write
44FF000
stack
page read and write
4371000
heap
page read and write
4A70000
direct allocation
page execute and read and write
2A8F000
stack
page read and write
C14000
heap
page read and write
4A10000
direct allocation
page execute and read and write
74C000
unkown
page execute and read and write
C7E000
heap
page read and write
DAF000
unkown
page execute and read and write
C97000
heap
page read and write
494F000
stack
page read and write
5500000
heap
page read and write
4B3F000
stack
page read and write
35A4000
direct allocation
page execute and read and write
37AE000
stack
page read and write
61ECC000
direct allocation
page read and write
344E000
stack
page read and write
3E1F000
stack
page read and write
573000
unkown
page execute and write copy
23083000
heap
page read and write
1364000
heap
page read and write
C14000
heap
page read and write
C30000
heap
page read and write
EA4000
heap
page read and write
9D4000
heap
page read and write
47F0000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
433E000
stack
page read and write
426E000
stack
page read and write
1882000
heap
page read and write
330F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4590000
direct allocation
page read and write
4590000
direct allocation
page read and write
C14000
heap
page read and write
4590000
direct allocation
page read and write
27CE000
stack
page read and write
F20000
heap
page read and write
343000
unkown
page execute and read and write
2EFF000
stack
page read and write
2E0E000
stack
page read and write
2930000
heap
page read and write
2B2F000
stack
page read and write
41AF000
stack
page read and write
35F9C000
stack
page read and write
3FC000
unkown
page execute and write copy
CBE000
heap
page read and write
372E000
stack
page read and write
48BF000
stack
page read and write
C10000
heap
page read and write
C14000
heap
page read and write
2C7F000
stack
page read and write
C14000
heap
page read and write
9D4000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
1000000
direct allocation
page read and write
3B6F000
stack
page read and write
2B8F000
stack
page read and write
41CF000
stack
page read and write
31C000
unkown
page execute and write copy
C14000
heap
page read and write
303F000
stack
page read and write
4C10000
direct allocation
page execute and read and write
4590000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
2DBF000
stack
page read and write
573000
unkown
page execute and write copy
9D4000
heap
page read and write
7EDA0000
direct allocation
page execute and read and write
2CB000
unkown
page execute and read and write
1364000
heap
page read and write
D16000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
165E000
stack
page read and write
448E000
stack
page read and write
526F000
stack
page read and write
3803000
direct allocation
page execute and read and write
4960000
heap
page read and write
2CEF000
stack
page read and write
4371000
heap
page read and write
3804000
direct allocation
page execute and read and write
4371000
heap
page read and write
9D4000
heap
page read and write
4C90000
direct allocation
page read and write
4A00000
direct allocation
page execute and read and write
C14000
heap
page read and write
4C30000
direct allocation
page execute and read and write
230A1000
heap
page read and write
45D1000
heap
page read and write
4990000
direct allocation
page execute and read and write
BB0000
direct allocation
page read and write
B74000
heap
page read and write
1C8AE000
stack
page read and write
C14000
heap
page read and write
BE4000
heap
page read and write
70F000
unkown
page execute and write copy
EA4000
heap
page read and write
C14000
heap
page read and write
4371000
heap
page read and write
D3D000
stack
page read and write
3B7F000
stack
page read and write
35B0000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
4590000
direct allocation
page read and write
14C0000
heap
page read and write
146B000
heap
page read and write
4371000
heap
page read and write
48FE000
stack
page read and write
3E3E000
stack
page read and write
C14000
heap
page read and write
2308B000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
AFD000
stack
page read and write
613F000
stack
page read and write
135E000
stack
page read and write
C77000
heap
page read and write
4A90000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
53D0000
direct allocation
page execute and read and write
70D000
unkown
page execute and read and write
DAC000
unkown
page execute and write copy
C14000
heap
page read and write
230AE000
heap
page read and write
49E0000
direct allocation
page execute and read and write
C9D000
heap
page read and write
4371000
heap
page read and write
9D4000
heap
page read and write
C85000
heap
page read and write
45AE000
stack
page read and write
4C40000
trusted library allocation
page read and write
4371000
heap
page read and write
C34000
heap
page read and write
3810000
direct allocation
page execute and read and write
C14000
heap
page read and write
1364000
heap
page read and write
2C9000
unkown
page read and write
330E000
stack
page read and write
14B0000
direct allocation
page read and write
38FF000
stack
page read and write
370E000
stack
page read and write
2CCE000
stack
page read and write
4371000
heap
page read and write
327E000
stack
page read and write
5CB6000
heap
page read and write
D2E000
stack
page read and write
176C000
heap
page read and write
C3E000
stack
page read and write
61ED3000
direct allocation
page read and write
316E000
stack
page read and write
2DCF000
stack
page read and write
343000
unkown
page execute and write copy
9D4000
heap
page read and write
55DD000
stack
page read and write
230AF000
heap
page read and write
48F0000
heap
page read and write
B74000
heap
page read and write
CA0000
direct allocation
page read and write
1000000
direct allocation
page read and write
320E000
stack
page read and write
1C6AC000
stack
page read and write
4980000
direct allocation
page execute and read and write
55B000
unkown
page execute and read and write
406F000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
563000
unkown
page execute and read and write
3FFF000
stack
page read and write
C14000
heap
page read and write
332F000
stack
page read and write
4371000
heap
page read and write
45D2000
heap
page read and write
3CCF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
292F000
stack
page read and write
F5F000
stack
page read and write
4C10000
direct allocation
page execute and read and write
70D000
unkown
page execute and read and write
C47000
heap
page read and write
413F000
stack
page read and write
EA4000
heap
page read and write
C14000
heap
page read and write
70F000
unkown
page execute and write copy
2FC0000
direct allocation
page execute and read and write
318F000
stack
page read and write
4371000
heap
page read and write
438F000
stack
page read and write
4AB1000
direct allocation
page read and write
C14000
heap
page read and write
3C0E000
stack
page read and write
2D7000
stack
page read and write
C14000
heap
page read and write
8FA000
stack
page read and write
24D000
stack
page read and write
4441000
heap
page read and write
2620000
heap
page read and write
C14000
heap
page read and write
59B0000
heap
page read and write
7F4C0000
direct allocation
page execute and read and write
49C0000
direct allocation
page execute and read and write
4990000
direct allocation
page execute and read and write
395E000
stack
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
EA4000
heap
page read and write
261000
unkown
page execute and write copy
36CE000
stack
page read and write
573000
unkown
page execute and write copy
317F000
stack
page read and write
There are 1578 hidden memdumps, click here to show them.