IOC Report
Rnteb46TuM.exe

loading gif

Files

File Path
Type
Category
Malicious
Rnteb46TuM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\6e6e496542.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AFBFHDBKJE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAEHIDAKECFIEBGDHJEBKKKKJK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKJEGDGIJECGCBGCGHDGIEGCBF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EBFBKFBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GIIEGHIDBGHIECAAECGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IEHJDGIDBAAFIDGCGCAK
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\IIECFHDBAAECAAKFHDHIIJKFHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JEBKECAFIDAFIECBKEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKKEHJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KEBGHCBAEGDHIDGCBAECGIECGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Rnteb46TuM.exe
"C:\Users\user\Desktop\Rnteb46TuM.exe"
malicious
C:\Users\user\AppData\Local\Temp\AFBFHDBKJE.exe
"C:\Users\user\AppData\Local\Temp\AFBFHDBKJE.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\6e6e496542.exe
"C:\Users\user\AppData\Local\Temp\1000006001\6e6e496542.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\AFBFHDBKJE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\GCGHCBKFCF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllm
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dllBn
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dllb
unknown
http://77.91.77.82/Hun4Ko/index.phpV
unknown
http://85.28.47.4/69934896f997d5bb/mozglue.dllV
unknown
http://77.91.77.82/Hun4Ko/index.php-
unknown
http://85.28.47.4/y
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://77.91.77.82/Hun4Ko/index.phpa=
unknown
http://77.91.77.82/Hun4Ko/index.php=
unknown
http://85.28.47.4A
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.81/mine/amadka.exe-Disposition:
unknown
http://77.91.77.82/Hun4Ko/index.php5
unknown
https://cdn.epnacl
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://77.91.77.81/stealc/random.exeurlencoded
unknown
https://mozilla.org0/
unknown
http://77.91.77.81/stealc/random.exe5067
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://85.28.47.4/920475a59bac849d.phpZ
unknown
http://upx.sf.net
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://cdn.ep
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://85.28.47.4/69934896f997d5bb/softokn3.dllh
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://85.28.47.4/920475a59bac849d.phps
unknown
http://85.28.47.4/920475a59bac849d.phpu
unknown
http://77.91.77.82/Hun4Ko/index.phpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://77.91.77.81/mine/amadka.exeFr
unknown
http://77.91.77.82/Hun4Ko/index.phpe
unknown
http://85.28.47.4/6
unknown
http://77.91.77.81/stealc/random.exeX
unknown
https://support.mozilla.org
unknown
http://77.91.77.81/stealc/random.exeS
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://85.28.47.4/920475a59bac849d.phpft
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://77.91.77.81/cost/go.exeAppData
unknown
There are 61 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
F11000
unkown
page execute and read and write
malicious
501000
unkown
page execute and read and write
malicious
F11000
unkown
page execute and read and write
malicious
F1000
unkown
page execute and read and write
malicious
4D20000
direct allocation
page read and write
malicious
1715000
heap
page read and write
malicious
4CF0000
direct allocation
page read and write
malicious
56F0000
direct allocation
page read and write
malicious
411000
unkown
page execute and read and write
malicious
1A05000
heap
page read and write
malicious
F11000
unkown
page execute and read and write
malicious
55A0000
direct allocation
page read and write
malicious
1C68F000
stack
page read and write
4E80000
direct allocation
page execute and read and write
EFE000
stack
page read and write
4D5E000
stack
page read and write
4851000
heap
page read and write
61E00000
direct allocation
page execute and read and write
18D6000
heap
page read and write
2308F000
heap
page read and write
5271000
heap
page read and write
10C0000
heap
page read and write
5271000
heap
page read and write
1B25000
heap
page read and write
176A000
heap
page read and write
4851000
heap
page read and write
2306E000
heap
page read and write
4FDF000
stack
page read and write
380F000
stack
page read and write
2E4E000
stack
page read and write
35AF000
stack
page read and write
4D81000
direct allocation
page read and write
3A10000
direct allocation
page execute and read and write
17D0000
heap
page read and write
1B63000
heap
page read and write
1151000
heap
page read and write
638E000
stack
page read and write
64A000
unkown
page execute and read and write
1149000
heap
page read and write
1226000
unkown
page execute and read and write
58F0000
direct allocation
page execute and read and write
23091000
heap
page read and write
5271000
heap
page read and write
5271000
heap
page read and write
1970000
direct allocation
page read and write
4EAF000
stack
page read and write
572C000
stack
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
B45000
unkown
page execute and read and write
4851000
heap
page read and write
4851000
heap
page read and write
31CF000
stack
page read and write
2309F000
heap
page read and write
2BF0000
direct allocation
page read and write
5E4E000
stack
page read and write
407000
unkown
page execute and write copy
1C55F000
stack
page read and write
112E000
heap
page read and write
1CFF1000
heap
page read and write
5700000
direct allocation
page execute and read and write
2308F000
heap
page read and write
5271000
heap
page read and write
1114000
heap
page read and write
5271000
heap
page read and write
2309F000
heap
page read and write
3C2000
unkown
page execute and read and write
47C000
unkown
page execute and read and write
4851000
heap
page read and write
40CF000
stack
page read and write
E84000
heap
page read and write
460E000
stack
page read and write
6C790000
unkown
page readonly
371E000
stack
page read and write
1210000
unkown
page execute and read and write
19E0000
heap
page read and write
2BF0000
direct allocation
page read and write
40EF000
stack
page read and write
3C2E000
stack
page read and write
2309E000
heap
page read and write
725000
unkown
page execute and read and write
3D6E000
stack
page read and write
796000
unkown
page execute and read and write
1984000
heap
page read and write
23086000
heap
page read and write
1C7AF000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
4851000
heap
page read and write
11F0000
heap
page read and write
689A000
heap
page read and write
4E80000
direct allocation
page execute and read and write
347E000
stack
page read and write
10F0000
heap
page read and write
34DF000
stack
page read and write
F10000
unkown
page readonly
1970000
direct allocation
page read and write
1132000
heap
page read and write
13C4000
unkown
page execute and write copy
930000
heap
page read and write
500000
unkown
page readonly
4851000
heap
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
1984000
heap
page read and write
36DF000
stack
page read and write
1C9FD000
stack
page read and write
1CFF1000
heap
page read and write
4F20000
direct allocation
page execute and read and write
4851000
heap
page read and write
1B1C000
heap
page read and write
934000
heap
page read and write
394F000
stack
page read and write
1984000
heap
page read and write
D3A000
stack
page read and write
F79000
unkown
page read and write
10E1000
heap
page read and write
4851000
heap
page read and write
2BF0000
direct allocation
page read and write
F72000
unkown
page execute and read and write
4851000
heap
page read and write
1970000
direct allocation
page read and write
EB0000
heap
page read and write
58D0000
direct allocation
page execute and read and write
E80000
heap
page read and write
1984000
heap
page read and write
4870000
direct allocation
page read and write
4870000
direct allocation
page read and write
112E000
heap
page read and write
4880000
heap
page read and write
320E000
stack
page read and write
4851000
heap
page read and write
ED7000
unkown
page execute and read and write
35AB000
heap
page read and write
6206000
heap
page read and write
4E2F000
stack
page read and write
1970000
direct allocation
page read and write
4851000
heap
page read and write
35AD000
heap
page read and write
2308F000
heap
page read and write
412E000
stack
page read and write
5751000
direct allocation
page read and write
4870000
direct allocation
page read and write
1142000
heap
page read and write
328E000
stack
page read and write
1217000
unkown
page execute and read and write
4EF0000
direct allocation
page execute and read and write
E2E000
stack
page read and write
4B1E000
stack
page read and write
A60000
heap
page read and write
23080000
heap
page read and write
406000
unkown
page execute and write copy
66B0000
heap
page read and write
5271000
heap
page read and write
4870000
direct allocation
page read and write
2F11B000
heap
page read and write
3A14000
direct allocation
page execute and read and write
F1000
unkown
page execute and write copy
5271000
heap
page read and write
E84000
heap
page read and write
32D0000
heap
page read and write
3AC0000
heap
page read and write
3FAF000
stack
page read and write
4851000
heap
page read and write
6C20000
heap
page read and write
421F000
stack
page read and write
4851000
heap
page read and write
35F51000
heap
page read and write
4851000
heap
page read and write
4D5F000
stack
page read and write
1984000
heap
page read and write
411000
unkown
page execute and write copy
4E5F000
stack
page read and write
3590000
direct allocation
page read and write
1970000
direct allocation
page read and write
4851000
heap
page read and write
E84000
heap
page read and write
2C6F000
stack
page read and write
5271000
heap
page read and write
DDF000
stack
page read and write
4851000
heap
page read and write
6C831000
unkown
page execute read
3790000
heap
page read and write
4D10000
direct allocation
page read and write
E6E000
stack
page read and write
23080000
heap
page read and write
167E000
stack
page read and write
17D0000
heap
page read and write
624E000
stack
page read and write
5220000
trusted library allocation
page read and write
2306E000
heap
page read and write
23078000
heap
page read and write
4881000
heap
page read and write
37AC000
heap
page read and write
526F000
stack
page read and write
17D3000
heap
page read and write
647000
unkown
page execute and read and write
5271000
heap
page read and write
461E000
stack
page read and write
E84000
heap
page read and write
E84000
heap
page read and write
4870000
direct allocation
page read and write
1984000
heap
page read and write
5271000
heap
page read and write
2BF0000
direct allocation
page read and write
23091000
heap
page read and write
2309A000
heap
page read and write
448F000
stack
page read and write
5271000
heap
page read and write
3840000
heap
page read and write
15FC000
stack
page read and write
2309A000
heap
page read and write
1107000
unkown
page execute and read and write
6870000
heap
page read and write
180E000
stack
page read and write
384E000
stack
page read and write
3A03000
direct allocation
page execute and read and write
4851000
heap
page read and write
3BCF000
stack
page read and write
410E000
stack
page read and write
4EEE000
stack
page read and write
4851000
heap
page read and write
396F000
stack
page read and write
485F000
stack
page read and write
2F070000
trusted library allocation
page read and write
1984000
heap
page read and write
3D5E000
stack
page read and write
3BEF000
stack
page read and write
45DF000
stack
page read and write
4851000
heap
page read and write
61ED4000
direct allocation
page readonly
6C830000
unkown
page readonly
13E0000
direct allocation
page read and write
36EF000
stack
page read and write
1984000
heap
page read and write
587C000
stack
page read and write
1BA7000
heap
page read and write
330F000
stack
page read and write
187A000
heap
page read and write
4D6F000
stack
page read and write
934000
heap
page read and write
5720000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
4851000
heap
page read and write
737000
unkown
page execute and write copy
13E0000
direct allocation
page read and write
23084000
heap
page read and write
2309A000
heap
page read and write
7EEC0000
direct allocation
page execute and read and write
4851000
heap
page read and write
FFF000
stack
page read and write
C3B000
stack
page read and write
4EDE000
stack
page read and write
23091000
heap
page read and write
39AE000
stack
page read and write
4881000
heap
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
4CE0000
direct allocation
page read and write
3590000
direct allocation
page read and write
18F1000
heap
page read and write
2309D000
heap
page read and write
13C2000
unkown
page execute and read and write
2BEE000
stack
page read and write
2307A000
heap
page read and write
6C9CF000
unkown
page readonly
1217000
unkown
page execute and read and write
43FF000
stack
page read and write
2B6F000
stack
page read and write
1984000
heap
page read and write
4C6E000
stack
page read and write
F10000
unkown
page read and write
44AF000
stack
page read and write
5271000
heap
page read and write
80FE000
stack
page read and write
499F000
stack
page read and write
3E8D000
stack
page read and write
4E50000
direct allocation
page execute and read and write
5870000
direct allocation
page execute and read and write
4851000
heap
page read and write
1CB4E000
stack
page read and write
23086000
heap
page read and write
3AC3000
heap
page read and write
5A4000
unkown
page execute and write copy
4F30000
direct allocation
page execute and read and write
3AAF000
stack
page read and write
6200000
heap
page read and write
1CFBD000
stack
page read and write
23091000
heap
page read and write
2D6F000
stack
page read and write
3FDE000
stack
page read and write
548000
unkown
page execute and read and write
4851000
heap
page read and write
B9E000
stack
page read and write
2E6F000
stack
page read and write
F7B000
unkown
page execute and read and write
1984000
heap
page read and write
2308F000
heap
page read and write
5280000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
4851000
heap
page read and write
1CDBE000
stack
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
2307F000
heap
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
633E000
stack
page read and write
635000
unkown
page execute and read and write
4EA0000
direct allocation
page execute and read and write
4F10000
direct allocation
page execute and read and write
5271000
heap
page read and write
112E000
heap
page read and write
1108000
heap
page read and write
1B12000
heap
page read and write
3490000
direct allocation
page execute and read and write
F0000
unkown
page readonly
3A14000
direct allocation
page execute and read and write
23078000
heap
page read and write
1070000
heap
page read and write
373E000
stack
page read and write
4851000
heap
page read and write
475E000
stack
page read and write
5121000
heap
page read and write
1217000
unkown
page execute and read and write
112A000
heap
page read and write
6C30000
heap
page read and write
1870000
heap
page read and write
11E0000
heap
page read and write
CDE000
stack
page read and write
2307A000
heap
page read and write
3844000
direct allocation
page execute and read and write
4EC0000
direct allocation
page execute and read and write
3D2F000
stack
page read and write
35C0000
heap
page read and write
2BF0000
direct allocation
page read and write
5890000
direct allocation
page execute and read and write
4851000
heap
page read and write
116E000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
23098000
heap
page read and write
6CA0F000
unkown
page write copy
1A69000
heap
page read and write
2306E000
heap
page read and write
4851000
heap
page read and write
934000
heap
page read and write
EAE000
stack
page read and write
4851000
heap
page read and write
501000
unkown
page execute and write copy
484F000
stack
page read and write
3EAD000
stack
page read and write
3A8F000
stack
page read and write
23080000
heap
page read and write
3BEF000
stack
page read and write
44AF000
stack
page read and write
370E000
stack
page read and write
5271000
heap
page read and write
DEC000
unkown
page execute and write copy
4851000
heap
page read and write
1C28F000
stack
page read and write
F10000
unkown
page read and write
5271000
heap
page read and write
3F9F000
stack
page read and write
3590000
direct allocation
page read and write
35CE000
stack
page read and write
1CEF000
stack
page read and write
372E000
stack
page read and write
4F10000
direct allocation
page execute and read and write
2E0F000
stack
page read and write
1C5AE000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
5271000
heap
page read and write
1C48F000
stack
page read and write
5121000
heap
page read and write
1850000
direct allocation
page read and write
39D0000
direct allocation
page execute and read and write
1850000
direct allocation
page read and write
13C2000
unkown
page execute and read and write
4EF0000
direct allocation
page execute and read and write
4851000
heap
page read and write
DEF000
unkown
page execute and read and write
58E0000
direct allocation
page execute and read and write
5870000
direct allocation
page execute and read and write
5601000
direct allocation
page read and write
7F7A0000
direct allocation
page execute and read and write
174E000
stack
page read and write
582F000
stack
page read and write
F79000
unkown
page write copy
4851000
heap
page read and write
23083000
heap
page read and write
116F000
heap
page read and write
5880000
direct allocation
page execute and read and write
4851000
heap
page read and write
5870000
direct allocation
page execute and read and write
10DC000
heap
page read and write
E84000
heap
page read and write
56E0000
direct allocation
page execute and read and write
23091000
heap
page read and write
23073000
heap
page read and write
11E2000
unkown
page execute and read and write
3FCE000
stack
page read and write
64CE000
stack
page read and write
4851000
heap
page read and write
3E6F000
stack
page read and write
E84000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
4D10000
direct allocation
page read and write
344F000
stack
page read and write
13C4000
unkown
page execute and write copy
1984000
heap
page read and write
17A0000
heap
page read and write
23091000
heap
page read and write
3D4E000
stack
page read and write
3A14000
direct allocation
page execute and read and write
1984000
heap
page read and write
EB5000
heap
page read and write
3AEE000
stack
page read and write
1CC3C000
stack
page read and write
1984000
heap
page read and write
5A2000
unkown
page execute and read and write
372E000
stack
page read and write
23082000
heap
page read and write
1107000
unkown
page execute and read and write
934000
heap
page read and write
1984000
heap
page read and write
3D6E000
stack
page read and write
422F000
stack
page read and write
3844000
direct allocation
page execute and read and write
5BAE000
stack
page read and write
13E0000
direct allocation
page read and write
1156000
heap
page read and write
44EE000
stack
page read and write
18DE000
heap
page read and write
38D0000
direct allocation
page execute and read and write
1BEDE000
stack
page read and write
23093000
heap
page read and write
410000
unkown
page readonly
2309F000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
4A1000
unkown
page execute and read and write
4851000
heap
page read and write
308F000
stack
page read and write
35A7000
heap
page read and write
2C00000
heap
page read and write
4870000
direct allocation
page read and write
324E000
stack
page read and write
188B000
heap
page read and write
2307B000
heap
page read and write
1A6F000
stack
page read and write
36CF000
stack
page read and write
17F5000
heap
page read and write
634F000
stack
page read and write
1984000
heap
page read and write
43AE000
stack
page read and write
406000
unkown
page execute and read and write
E84000
heap
page read and write
58B0000
direct allocation
page execute and read and write
5271000
heap
page read and write
4B2E000
stack
page read and write
3A14000
direct allocation
page execute and read and write
118B000
stack
page read and write
2F112000
heap
page read and write
3C2E000
stack
page read and write
4851000
heap
page read and write
4C1F000
stack
page read and write
2BF0000
direct allocation
page read and write
5B6F000
stack
page read and write
5870000
direct allocation
page execute and read and write
4851000
heap
page read and write
435F000
stack
page read and write
410000
unkown
page readonly
1A28000
heap
page read and write
5270000
heap
page read and write
49EE000
stack
page read and write
4851000
heap
page read and write
1B16000
heap
page read and write
395F000
stack
page read and write
E3C000
stack
page read and write
5850000
direct allocation
page execute and read and write
5271000
heap
page read and write
5CC000
stack
page read and write
37A0000
heap
page read and write
23065000
heap
page read and write
5910000
direct allocation
page execute and read and write
17B0000
direct allocation
page execute and read and write
F7B000
unkown
page execute and read and write
1A58000
heap
page read and write
4851000
heap
page read and write
43AE000
stack
page read and write
4851000
heap
page read and write
4F00000
direct allocation
page execute and read and write
4851000
heap
page read and write
2F4F000
stack
page read and write
3E9E000
stack
page read and write
A40000
heap
page read and write
5271000
heap
page read and write
1984000
heap
page read and write
5271000
heap
page read and write
1210000
unkown
page execute and read and write
116E000
heap
page read and write
4851000
heap
page read and write
F11000
unkown
page execute and write copy
13D0000
heap
page read and write
115B000
heap
page read and write
64C000
unkown
page execute and read and write
5750000
direct allocation
page execute and read and write
23091000
heap
page read and write
F0000
unkown
page read and write
381F000
stack
page read and write
4980000
trusted library allocation
page read and write
4950000
trusted library allocation
page read and write
1984000
heap
page read and write
382F000
stack
page read and write
15F8000
stack
page read and write
152000
unkown
page execute and read and write
4851000
heap
page read and write
1226000
unkown
page execute and write copy
384E000
direct allocation
page execute and read and write
5271000
heap
page read and write
4851000
heap
page read and write
F79000
unkown
page write copy
1157000
heap
page read and write
4851000
heap
page read and write
5740000
direct allocation
page execute and read and write
4E90000
direct allocation
page execute and read and write
5271000
heap
page read and write
1984000
heap
page read and write
3844000
direct allocation
page execute and read and write
2306E000
heap
page read and write
486F000
stack
page read and write
1227000
unkown
page execute and write copy
4851000
heap
page read and write
5121000
heap
page read and write
426E000
stack
page read and write
4851000
heap
page read and write
686C000
stack
page read and write
5271000
heap
page read and write
3E5F000
stack
page read and write
2307A000
heap
page read and write
426E000
stack
page read and write
4881000
heap
page read and write
56DF000
stack
page read and write
1227000
unkown
page execute and write copy
EEE000
stack
page read and write
13E0000
direct allocation
page read and write
10EF000
heap
page read and write
2F8E000
stack
page read and write
5770000
direct allocation
page execute and read and write
4851000
heap
page read and write
6CA15000
unkown
page readonly
5271000
heap
page read and write
476E000
stack
page read and write
E84000
heap
page read and write
40DF000
stack
page read and write
4851000
heap
page read and write
4D51000
direct allocation
page read and write
1984000
heap
page read and write
35DF000
stack
page read and write
934000
heap
page read and write
1860000
heap
page read and write
358F000
stack
page read and write
A79000
heap
page read and write
3E6F000
stack
page read and write
1870000
heap
page read and write
23091000
heap
page read and write
5271000
heap
page read and write
1132000
heap
page read and write
4D2E000
stack
page read and write
34AE000
stack
page read and write
13E0000
direct allocation
page read and write
159000
unkown
page write copy
3F7000
unkown
page execute and read and write
5710000
direct allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
500000
unkown
page readonly
5121000
heap
page read and write
11E0000
heap
page read and write
1850000
direct allocation
page read and write
4851000
heap
page read and write
1155000
heap
page read and write
F00000
heap
page read and write
5870000
direct allocation
page execute and read and write
623D000
stack
page read and write
4851000
heap
page read and write
23098000
heap
page read and write
4F40000
direct allocation
page execute and read and write
F79000
unkown
page read and write
5271000
heap
page read and write
31EF000
stack
page read and write
1226000
unkown
page execute and write copy
1984000
heap
page read and write
39F0000
heap
page read and write
1984000
heap
page read and write
3730000
heap
page read and write
472F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
5271000
heap
page read and write
159000
unkown
page read and write
2307F000
heap
page read and write
3F8F000
stack
page read and write
3BFE000
stack
page read and write
23079000
heap
page read and write
1CD4C000
stack
page read and write
940000
heap
page read and write
1C6CE000
stack
page read and write
13C2000
unkown
page execute and read and write
1B86000
heap
page read and write
4E60000
direct allocation
page execute and read and write
382E000
stack
page read and write
3FEE000
stack
page read and write
19CE000
stack
page read and write
5271000
heap
page read and write
3844000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
511F000
stack
page read and write
6C81E000
unkown
page read and write
3770000
heap
page read and write
2C07000
heap
page read and write
2BF0000
direct allocation
page read and write
5870000
direct allocation
page execute and read and write
1984000
heap
page read and write
4870000
direct allocation
page read and write
1090000
heap
page read and write
2307A000
heap
page read and write
23068000
heap
page read and write
382F000
stack
page read and write
6C822000
unkown
page readonly
4851000
heap
page read and write
E84000
heap
page read and write
1158000
heap
page read and write
E84000
heap
page read and write
486F000
stack
page read and write
1970000
direct allocation
page read and write
2F113000
heap
page read and write
23086000
heap
page read and write
3A9F000
stack
page read and write
4851000
heap
page read and write
23082000
heap
page read and write
476E000
stack
page read and write
23091000
heap
page read and write
1226000
unkown
page execute and write copy
1C8CF000
stack
page read and write
F11000
unkown
page execute and write copy
E80000
heap
page read and write
5271000
heap
page read and write
61EB4000
direct allocation
page read and write
1984000
heap
page read and write
4851000
heap
page read and write
346F000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
4851000
heap
page read and write
11E5000
heap
page read and write
512F000
stack
page read and write
425E000
stack
page read and write
4870000
direct allocation
page read and write
1970000
direct allocation
page read and write
23080000
heap
page read and write
5730000
direct allocation
page execute and read and write
23073000
heap
page read and write
163E000
stack
page read and write
1D0FF000
heap
page read and write
4E70000
direct allocation
page execute and read and write
49AF000
stack
page read and write
4851000
heap
page read and write
1CA3D000
stack
page read and write
23098000
heap
page read and write
1B28000
heap
page read and write
F10000
unkown
page readonly
4D9E000
stack
page read and write
5DEF000
stack
page read and write
5271000
heap
page read and write
2307D000
heap
page read and write
4851000
heap
page read and write
434000
unkown
page execute and write copy
462E000
stack
page read and write
1109000
heap
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
2FAE000
stack
page read and write
1AEF000
stack
page read and write
1B74000
heap
page read and write
23086000
heap
page read and write
A6B000
heap
page read and write
4851000
heap
page read and write
4E70000
direct allocation
page execute and read and write
5840000
direct allocation
page execute and read and write
2309B000
heap
page read and write
F10000
unkown
page read and write
109E000
heap
page read and write
1227000
unkown
page execute and write copy
15F3000
stack
page read and write
386E000
stack
page read and write
647000
unkown
page execute and write copy
3C0E000
stack
page read and write
4851000
heap
page read and write
3844000
direct allocation
page execute and read and write
5F9D000
stack
page read and write
3F0000
unkown
page execute and read and write
5710000
direct allocation
page execute and read and write
E84000
heap
page read and write
23091000
heap
page read and write
61ECD000
direct allocation
page readonly
61ECC000
direct allocation
page read and write
60DE000
stack
page read and write
61ED0000
direct allocation
page read and write
4851000
heap
page read and write
23091000
heap
page read and write
1157000
heap
page read and write
5271000
heap
page read and write
3834000
direct allocation
page execute and read and write
4851000
heap
page read and write
5710000
direct allocation
page execute and read and write
434F000
stack
page read and write
3BDF000
stack
page read and write
64C000
unkown
page execute and write copy
5271000
heap
page read and write
436F000
stack
page read and write
5271000
heap
page read and write
39AE000
stack
page read and write
F79000
unkown
page write copy
32D7000
heap
page read and write
DEF000
unkown
page execute and write copy
1984000
heap
page read and write
4851000
heap
page read and write
13E0000
direct allocation
page read and write
3844000
direct allocation
page execute and read and write
6600000
heap
page read and write
4851000
heap
page read and write
2309B000
heap
page read and write
385E000
stack
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
4870000
direct allocation
page read and write
4861000
heap
page read and write
3A14000
direct allocation
page execute and read and write
4851000
heap
page read and write
4851000
heap
page read and write
1970000
direct allocation
page read and write
1970000
direct allocation
page read and write
17F7000
heap
page read and write
5CAF000
stack
page read and write
2BAC000
stack
page read and write
114D000
heap
page read and write
3800000
direct allocation
page execute and read and write
E84000
heap
page read and write
2A2E000
stack
page read and write
86C000
unkown
page execute and read and write
E84000
heap
page read and write
2309E000
heap
page read and write
1226000
unkown
page execute and read and write
37EE000
stack
page read and write
438E000
stack
page read and write
1157000
heap
page read and write
15B000
unkown
page execute and read and write
3C30000
heap
page read and write
372E000
stack
page read and write
4851000
heap
page read and write
5030000
heap
page read and write
23065000
heap
page read and write
1C90D000
stack
page read and write
4851000
heap
page read and write
4CE0000
direct allocation
page read and write
411E000
stack
page read and write
1148000
heap
page read and write
55DE000
stack
page read and write
449F000
stack
page read and write
10AB000
stack
page read and write
934000
heap
page read and write
422F000
stack
page read and write
934000
heap
page read and write
16D0000
heap
page read and write
5CEE000
stack
page read and write
42C000
unkown
page execute and write copy
170E000
stack
page read and write
16F0000
heap
page read and write
C9F000
stack
page read and write
5780000
direct allocation
page execute and read and write
5271000
heap
page read and write
474E000
stack
page read and write
4851000
heap
page read and write
1C0DF000
stack
page read and write
4851000
heap
page read and write
4870000
direct allocation
page read and write
934000
heap
page read and write
112E000
heap
page read and write
1BAD000
heap
page read and write
4851000
heap
page read and write
5760000
direct allocation
page execute and read and write
5710000
direct allocation
page execute and read and write
1970000
direct allocation
page read and write
4881000
heap
page read and write
7FC0000
heap
page read and write
41FF000
stack
page read and write
5271000
heap
page read and write
1CFF0000
heap
page read and write
5A6E000
stack
page read and write
3844000
direct allocation
page execute and read and write
1C35E000
stack
page read and write
EE0000
heap
page read and write
4C5E000
stack
page read and write
5A1B000
stack
page read and write
516E000
stack
page read and write
1100000
heap
page read and write
3A1E000
direct allocation
page execute and read and write
2F10A000
heap
page read and write
3ADE000
stack
page read and write
13E0000
direct allocation
page read and write
57A0000
direct allocation
page execute and read and write
2307A000
heap
page read and write
676C000
stack
page read and write
F7B000
unkown
page execute and read and write
23091000
heap
page read and write
4C2F000
stack
page read and write
F11000
unkown
page execute and write copy
1984000
heap
page read and write
23071000
heap
page read and write
35EC000
stack
page read and write
EB0000
heap
page read and write
4851000
heap
page read and write
19EE000
heap
page read and write
4E70000
direct allocation
page execute and read and write
386E000
stack
page read and write
10D7000
heap
page read and write
5271000
heap
page read and write
2309A000
heap
page read and write
4870000
direct allocation
page read and write
4851000
heap
page read and write
5271000
heap
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
5370000
trusted library allocation
page read and write
1984000
heap
page read and write
1210000
unkown
page execute and read and write
1107000
unkown
page execute and read and write
398E000
stack
page read and write
30CE000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
40EF000
stack
page read and write
5271000
heap
page read and write
2308F000
heap
page read and write
8FD000
stack
page read and write
17F7000
heap
page read and write
4851000
heap
page read and write
1984000
heap
page read and write
3833000
direct allocation
page execute and read and write
1158000
heap
page read and write
23080000
heap
page read and write
2E7000
unkown
page execute and read and write
4851000
heap
page read and write
3840000
direct allocation
page execute and read and write
1BAD000
heap
page read and write
3A1E000
direct allocation
page execute and read and write
648F000
stack
page read and write
4DAE000
stack
page read and write
110C000
heap
page read and write
1C7FD000
stack
page read and write
23066000
heap
page read and write
4851000
heap
page read and write
1132000
heap
page read and write
3C1E000
stack
page read and write
1157000
heap
page read and write
1984000
heap
page read and write
23091000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
2D0F000
stack
page read and write
1150000
heap
page read and write
35EE000
stack
page read and write
4851000
heap
page read and write
16FD000
stack
page read and write
23082000
heap
page read and write
18B1000
heap
page read and write
32CE000
stack
page read and write
2BF0000
direct allocation
page read and write
30AF000
stack
page read and write
3790000
heap
page read and write
23098000
heap
page read and write
5271000
heap
page read and write
886000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
470000
unkown
page execute and read and write
5271000
heap
page read and write
13E0000
direct allocation
page read and write
15FC000
stack
page read and write
81FE000
stack
page read and write
915000
unkown
page execute and read and write
412E000
stack
page read and write
5710000
direct allocation
page execute and read and write
45CF000
stack
page read and write
F72000
unkown
page execute and read and write
115B000
heap
page read and write
23080000
heap
page read and write
5271000
heap
page read and write
58A0000
direct allocation
page execute and read and write
57B0000
direct allocation
page execute and read and write
6C791000
unkown
page execute read
2F118000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
2307A000
heap
page read and write
1984000
heap
page read and write
471F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
5900000
direct allocation
page execute and read and write
6CA10000
unkown
page read and write
1060000
heap
page read and write
396F000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
5290000
heap
page read and write
4851000
heap
page read and write
44EE000
stack
page read and write
61DD000
stack
page read and write
4851000
heap
page read and write
13E0000
direct allocation
page read and write
3D2F000
stack
page read and write
4851000
heap
page read and write
4E9F000
stack
page read and write
35D4B000
stack
page read and write
609C000
stack
page read and write
13E0000
direct allocation
page read and write
15F7000
stack
page read and write
5120000
heap
page read and write
4870000
direct allocation
page read and write
5271000
heap
page read and write
1150000
heap
page read and write
2308F000
heap
page read and write
4CE0000
direct allocation
page read and write
23079000
heap
page read and write
61E01000
direct allocation
page execute read
1132000
heap
page read and write
5271000
heap
page read and write
833C000
stack
page read and write
524000
unkown
page execute and write copy
5271000
heap
page read and write
1970000
direct allocation
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
175D000
stack
page read and write
1984000
heap
page read and write
502E000
stack
page read and write
35F0000
heap
page read and write
16E0000
direct allocation
page execute and read and write
4851000
heap
page read and write
1984000
heap
page read and write
35F0000
direct allocation
page execute and read and write
4ED0000
direct allocation
page execute and read and write
3A14000
direct allocation
page execute and read and write
4851000
heap
page read and write
4870000
direct allocation
page read and write
4851000
heap
page read and write
2BF0000
direct allocation
page read and write
2307C000
heap
page read and write
336E000
stack
page read and write
6C80D000
unkown
page readonly
4E70000
direct allocation
page execute and read and write
4851000
heap
page read and write
1226000
unkown
page execute and read and write
1980000
heap
page read and write
2307A000
heap
page read and write
1984000
heap
page read and write
357F000
stack
page read and write
322E000
stack
page read and write
174E000
heap
page read and write
51C000
unkown
page execute and write copy
EF7000
heap
page read and write
4851000
heap
page read and write
1FDF000
stack
page read and write
436F000
stack
page read and write
44CE000
stack
page read and write
13C4000
unkown
page execute and write copy
2308D000
heap
page read and write
36EF000
stack
page read and write
1B14000
heap
page read and write
1984000
heap
page read and write
6C21000
heap
page read and write
6205000
heap
page read and write
5271000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
5271000
heap
page read and write
ED4000
unkown
page execute and write copy
23091000
heap
page read and write
1970000
direct allocation
page read and write
4851000
heap
page read and write
35F51000
heap
page read and write
56B0000
heap
page read and write
115B000
heap
page read and write
F79000
unkown
page read and write
5790000
direct allocation
page execute and read and write
4851000
heap
page read and write
3600000
direct allocation
page execute and read and write
4851000
heap
page read and write
3D1F000
stack
page read and write
13E0000
direct allocation
page read and write
6CA0E000
unkown
page read and write
4EA0000
direct allocation
page execute and read and write
13E0000
direct allocation
page read and write
23080000
heap
page read and write
187B000
heap
page read and write
3D0F000
stack
page read and write
4ADF000
stack
page read and write
2308F000
heap
page read and write
4FEF000
stack
page read and write
4851000
heap
page read and write
6C30000
heap
page read and write
5860000
direct allocation
page execute and read and write
501E000
stack
page read and write
1107000
heap
page read and write
13E0000
direct allocation
page read and write
5271000
heap
page read and write
334E000
stack
page read and write
462E000
stack
page read and write
23080000
heap
page read and write
1B2E000
heap
page read and write
23077000
heap
page read and write
5271000
heap
page read and write
934000
heap
page read and write
23080000
heap
page read and write
5271000
heap
page read and write
44DE000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
489E000
stack
page read and write
8BA000
unkown
page execute and read and write
49DE000
stack
page read and write
420F000
stack
page read and write
420F000
stack
page read and write
48AE000
stack
page read and write
501B000
stack
page read and write
934000
heap
page read and write
3ACE000
stack
page read and write
4F00000
direct allocation
page execute and read and write
4D10000
direct allocation
page read and write
823C000
stack
page read and write
11E2000
unkown
page execute and read and write
35F4C000
stack
page read and write
23086000
heap
page read and write
1CB0E000
stack
page read and write
3850000
heap
page read and write
4E70000
direct allocation
page execute and read and write
934000
heap
page read and write
33DF000
stack
page read and write
35E0000
heap
page read and write
23074000
heap
page read and write
5271000
heap
page read and write
23166000
heap
page read and write
5A6000
unkown
page execute and read and write
77C000
unkown
page execute and read and write
1DDE000
stack
page read and write
1984000
heap
page read and write
1C11E000
stack
page read and write
2307A000
heap
page read and write
5710000
direct allocation
page execute and read and write
16FE000
heap
page read and write
5271000
heap
page read and write
3608B000
stack
page read and write
19EA000
heap
page read and write
472F000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
1CFE0000
heap
page read and write
2307E000
heap
page read and write
2A6E000
stack
page read and write
6C2E000
heap
page read and write
56F0000
direct allocation
page execute and read and write
F72000
unkown
page execute and read and write
16FA000
heap
page read and write
737000
unkown
page execute and read and write
5271000
heap
page read and write
104E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
17C0000
heap
page read and write
4851000
heap
page read and write
5271000
heap
page read and write
5F4F000
stack
page read and write
45EF000
stack
page read and write
4851000
heap
page read and write
1984000
heap
page read and write
F10000
unkown
page readonly
3FEE000
stack
page read and write
2F6F000
stack
page read and write
1970000
direct allocation
page read and write
2BF0000
direct allocation
page read and write
1D0F0000
trusted library allocation
page read and write
30EE000
stack
page read and write
4E79000
stack
page read and write
4851000
heap
page read and write
1970000
direct allocation
page read and write
5271000
heap
page read and write
73C000
unkown
page execute and read and write
4870000
direct allocation
page read and write
4851000
heap
page read and write
1140000
heap
page read and write
3AAF000
stack
page read and write
399E000
stack
page read and write
439E000
stack
page read and write
3EAE000
stack
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
3A04000
direct allocation
page execute and read and write
934000
heap
page read and write
C2F000
unkown
page execute and read and write
1C31F000
stack
page read and write
5271000
heap
page read and write
5271000
heap
page read and write
1A3F000
heap
page read and write
470F000
stack
page read and write
5271000
heap
page read and write
165C000
stack
page read and write
3628C000
stack
page read and write
73C000
unkown
page execute and write copy
23080000
heap
page read and write
2309A000
heap
page read and write
65CF000
stack
page read and write
5271000
heap
page read and write
45EF000
stack
page read and write
3AEE000
stack
page read and write
5271000
heap
page read and write
384E000
direct allocation
page execute and read and write
23078000
heap
page read and write
5271000
heap
page read and write
4851000
heap
page read and write
4851000
heap
page read and write
35A0000
heap
page read and write
11E2000
unkown
page execute and read and write
5271000
heap
page read and write
ED7000
unkown
page execute and write copy
2BF0000
direct allocation
page read and write
5271000
heap
page read and write
5271000
heap
page read and write
1B65000
heap
page read and write
E84000
heap
page read and write
825000
unkown
page execute and read and write
3E4F000
stack
page read and write
4850000
heap
page read and write
4AEE000
stack
page read and write
2BF0000
direct allocation
page read and write
5271000
heap
page read and write
2307A000
heap
page read and write
400F000
stack
page read and write
13E0000
direct allocation
page read and write
424E000
stack
page read and write
58C0000
direct allocation
page execute and read and write
23073000
heap
page read and write
5271000
heap
page read and write
5271000
heap
page read and write
187E000
heap
page read and write
17F0000
heap
page read and write
23096000
heap
page read and write
2BF0000
direct allocation
page read and write
5271000
heap
page read and write
11F0000
heap
page read and write
3A14000
direct allocation
page execute and read and write
3FAF000
stack
page read and write
3780000
heap
page read and write
2BF0000
direct allocation
page read and write
332F000
stack
page read and write
4851000
heap
page read and write
23080000
heap
page read and write
EF0000
heap
page read and write
DA0000
heap
page read and write
5034000
heap
page read and write
348E000
stack
page read and write
3ABE000
stack
page read and write
184E000
stack
page read and write
There are 1153 hidden memdumps, click here to show them.