IOC Report
Wf9qnVcbi8.exe

loading gif

Files

File Path
Type
Category
Malicious
Wf9qnVcbi8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\528307a0ac.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IDGHDGIDAK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AECAECFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AKJEGCFBGDHJJJJJKJEC
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\AKJEGCFBGDHJJJJJKJECFCFCAA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGIIDAEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CFHDHIJDGCBAKFIEGHCBGHJDAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GCGHJEBGHJKEBFHIJDHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIDAKFIJJKJJJKEBKJEHCBGDAK
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\KEBFBGDGHIIJJKEBKJDBKECGII
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJDGIJECFIEBFIDHCGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wf9qnVcbi8.exe
"C:\Users\user\Desktop\Wf9qnVcbi8.exe"
malicious
C:\Users\user\AppData\Local\Temp\IDGHDGIDAK.exe
"C:\Users\user\AppData\Local\Temp\IDGHDGIDAK.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\528307a0ac.exe
"C:\Users\user\AppData\Local\Temp\1000006001\528307a0ac.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\IDGHDGIDAK.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\CFHDHIJDGC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.phpf
unknown
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://77.91.77.82/Hun4Ko/index.php/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://77.91.77.81/mine/amadka.exephprefoxox
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exera
unknown
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exeVs-=
unknown
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
85.28.47.4/920475a59bac849d.php
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://77.91.77.82/Hun4Ko/index.phpP
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllnH
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://77.91.77.81/stealc/random.exe%
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://77.91.77.81/stealc/random.exe;
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://85.28.47.4/920475a59bac849d.phpUd
unknown
http://77.91.77.82/Hun4Ko/index.phpV
unknown
http://77.91.77.82/Hun4Ko/index.php2
unknown
http://77.91.77.82/Hun4Ko/index.php.
unknown
http://85.28.47.4/920475a59bac849d.phpGd
unknown
http://77.91.77.82/Hun4Ko/index.phpLb
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.4/69934896f997d5bb/msvcp140.dll-f
unknown
http://77.91.77.82/Hun4Ko/index.php:
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.phpr
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://77.91.77.81/cost/go.exepData
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dllrf
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dll#ab=
unknown
http://85.28.47.4/wd
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://85.28.47.4/920475a59bac849d.phpZ
unknown
http://upx.sf.net
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll:HK
unknown
http://85.28.47.4/920475a59bac849d.phpa
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://85.28.47.4/920475a59bac849d.phpDTo
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpq
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://77.91.77.82/Hun4Ko/index.phpl
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://85.28.47.4/920475a59bac849d.phpp
unknown
http://85.28.47.4/c9
unknown
http://pki-ocsp.symauth.com0
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org
unknown
http://77.91.77.82/Hun4Ko/index.php~
unknown
http://77.91.77.82/Hun4Ko/index.phpMq
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 67 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
4AD0000
direct allocation
page read and write
malicious
4AD0000
direct allocation
page read and write
malicious
551000
unkown
page execute and read and write
malicious
5D1000
unkown
page execute and read and write
malicious
185E000
heap
page read and write
malicious
4F50000
direct allocation
page read and write
malicious
4FF0000
direct allocation
page read and write
malicious
2F1000
unkown
page execute and read and write
malicious
1655000
heap
page read and write
malicious
AA1000
unkown
page execute and read and write
malicious
2F1000
unkown
page execute and read and write
malicious
2F1000
unkown
page execute and read and write
malicious
DB0000
heap
page read and write
4651000
heap
page read and write
5F5000
unkown
page execute and read and write
233FF000
heap
page read and write
36CF000
stack
page read and write
A34000
heap
page read and write
4E8000
unkown
page execute and read and write
4B50000
direct allocation
page read and write
36E0000
direct allocation
page execute and read and write
CF4000
heap
page read and write
118E000
heap
page read and write
775000
unkown
page execute and read and write
334E000
stack
page read and write
A34000
heap
page read and write
1800000
heap
page read and write
1246000
heap
page read and write
43CF000
stack
page read and write
3D0F000
stack
page read and write
168D000
heap
page read and write
389E000
stack
page read and write
233FF000
heap
page read and write
2ECE000
stack
page read and write
28D7000
heap
page read and write
A34000
heap
page read and write
1898000
heap
page read and write
35B000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
5FF000
unkown
page execute and read and write
1C4CE000
stack
page read and write
2D1F000
stack
page read and write
23276000
heap
page read and write
33CE000
stack
page read and write
4630000
direct allocation
page read and write
4AD1000
heap
page read and write
550000
unkown
page readonly
39C4000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
1CD8E000
stack
page read and write
398E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
A34000
heap
page read and write
34DE000
stack
page read and write
49CE000
stack
page read and write
4B50000
direct allocation
page read and write
233FE000
heap
page read and write
360BC000
stack
page read and write
3B80000
heap
page read and write
2BA0000
direct allocation
page read and write
5FF000
unkown
page execute and read and write
418E000
stack
page read and write
CF4000
heap
page read and write
CF4000
heap
page read and write
6526000
heap
page read and write
4AD1000
heap
page read and write
2F0000
unkown
page read and write
4C60000
direct allocation
page execute and read and write
CF4000
heap
page read and write
15FC000
stack
page read and write
CA4000
heap
page read and write
3B4E000
stack
page read and write
60E000
unkown
page execute and write copy
28A0000
direct allocation
page read and write
1CB4C000
stack
page read and write
DD4000
heap
page read and write
4651000
heap
page read and write
4E4E000
stack
page read and write
34CF000
stack
page read and write
39D4000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
233FD000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
233D3000
heap
page read and write
4AD1000
heap
page read and write
50E0000
direct allocation
page execute and read and write
416E000
stack
page read and write
8860000
heap
page read and write
233FF000
heap
page read and write
4AD1000
heap
page read and write
1248000
heap
page read and write
CF4000
heap
page read and write
4E8000
unkown
page execute and read and write
5F4000
unkown
page execute and write copy
233C6000
heap
page read and write
CF4000
heap
page read and write
30DF000
stack
page read and write
A34000
heap
page read and write
1CD3D000
stack
page read and write
2BA0000
direct allocation
page read and write
6C7C5000
unkown
page readonly
4AD1000
heap
page read and write
4651000
heap
page read and write
4AD1000
heap
page read and write
1557000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4C70000
direct allocation
page execute and read and write
A34000
heap
page read and write
5FF000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
4651000
heap
page read and write
1550000
heap
page read and write
56C000
unkown
page execute and write copy
503E000
stack
page read and write
5180000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
2F476000
heap
page read and write
338F000
stack
page read and write
CF4000
heap
page read and write
464F000
stack
page read and write
A34000
heap
page read and write
163E000
heap
page read and write
CF4000
heap
page read and write
61ED0000
direct allocation
page read and write
A34000
heap
page read and write
233E0000
heap
page read and write
335F000
stack
page read and write
2F0000
unkown
page readonly
17C0000
heap
page read and write
1C2E000
stack
page read and write
7AD000
unkown
page execute and read and write
4651000
heap
page read and write
233FF000
heap
page read and write
CF4000
heap
page read and write
DF0000
heap
page read and write
CF4000
heap
page read and write
4651000
heap
page read and write
3ECF000
stack
page read and write
925000
unkown
page execute and read and write
4AD1000
heap
page read and write
440E000
stack
page read and write
DD4000
heap
page read and write
2F470000
heap
page read and write
28C0000
heap
page read and write
7AF000
unkown
page execute and write copy
3A14000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
11FD000
heap
page read and write
4C60000
direct allocation
page execute and read and write
3A0E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
6CAB000
stack
page read and write
4A90000
trusted library allocation
page read and write
F5D000
unkown
page execute and read and write
B02000
unkown
page execute and read and write
233E0000
heap
page read and write
1C47F000
stack
page read and write
54CD000
stack
page read and write
A34000
heap
page read and write
4AD1000
heap
page read and write
4AD1000
heap
page read and write
384E000
stack
page read and write
4651000
heap
page read and write
359000
unkown
page write copy
4AD1000
heap
page read and write
233FB000
heap
page read and write
52D4000
heap
page read and write
4C40000
direct allocation
page execute and read and write
3E9F000
stack
page read and write
1797000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
47CE000
stack
page read and write
374F000
stack
page read and write
134E000
stack
page read and write
233E0000
heap
page read and write
676000
unkown
page execute and read and write
4651000
heap
page read and write
1180000
heap
page read and write
4630000
direct allocation
page read and write
106A000
stack
page read and write
402E000
stack
page read and write
CF4000
heap
page read and write
64CE000
stack
page read and write
4651000
heap
page read and write
3A8F000
stack
page read and write
348E000
stack
page read and write
3A10000
direct allocation
page execute and read and write
3C8E000
stack
page read and write
330F000
stack
page read and write
5220000
direct allocation
page execute and read and write
CEE000
stack
page read and write
4C1F000
stack
page read and write
4AD1000
heap
page read and write
4B50000
direct allocation
page read and write
233F4000
heap
page read and write
2BA0000
direct allocation
page read and write
174B000
heap
page read and write
43CF000
stack
page read and write
1260000
heap
page read and write
4B1E000
stack
page read and write
7ED30000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
6900000
heap
page read and write
4651000
heap
page read and write
233F9000
heap
page read and write
5160000
direct allocation
page execute and read and write
4651000
heap
page read and write
2F0000
unkown
page readonly
D5E000
stack
page read and write
29DF000
stack
page read and write
364E000
stack
page read and write
2BC0000
heap
page read and write
233F8000
heap
page read and write
3A14000
direct allocation
page execute and read and write
4651000
heap
page read and write
2F4F000
stack
page read and write
CF4000
heap
page read and write
360F000
stack
page read and write
4AD1000
heap
page read and write
FAF000
stack
page read and write
68F1000
heap
page read and write
344F000
stack
page read and write
31CF000
stack
page read and write
174F000
heap
page read and write
4B50000
direct allocation
page read and write
5D0000
unkown
page readonly
60E000
unkown
page execute and read and write
1C28F000
stack
page read and write
2D8E000
stack
page read and write
61E00000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
E1B000
heap
page read and write
3F8F000
stack
page read and write
1CCFE000
stack
page read and write
3C8E000
stack
page read and write
A34000
heap
page read and write
2BA0000
direct allocation
page read and write
6A30000
heap
page read and write
4651000
heap
page read and write
233D6000
heap
page read and write
2F0000
unkown
page readonly
A34000
heap
page read and write
60F000
unkown
page execute and write copy
4AD1000
heap
page read and write
3C4E000
stack
page read and write
4AD1000
heap
page read and write
FA8000
unkown
page execute and read and write
233D5000
heap
page read and write
4AD1000
heap
page read and write
233FF000
heap
page read and write
4AD1000
heap
page read and write
233DF000
heap
page read and write
4651000
heap
page read and write
CF4000
heap
page read and write
A30000
heap
page read and write
5B0000
unkown
page execute and read and write
18AD000
heap
page read and write
42AE000
stack
page read and write
3B0F000
stack
page read and write
1237000
heap
page read and write
300E000
stack
page read and write
2BA0000
direct allocation
page read and write
574000
unkown
page execute and write copy
4F50000
direct allocation
page read and write
362BC000
stack
page read and write
4AD0000
heap
page read and write
6D7C000
stack
page read and write
1CF3C000
stack
page read and write
2F1000
unkown
page execute and write copy
4C1F000
stack
page read and write
F4D000
stack
page read and write
3C5E000
stack
page read and write
233C5000
heap
page read and write
4B50000
direct allocation
page read and write
E5A000
heap
page read and write
15A0000
heap
page read and write
86BC000
stack
page read and write
43AF000
stack
page read and write
4630000
direct allocation
page read and write
4B50000
direct allocation
page read and write
4630000
direct allocation
page read and write
2BA0000
direct allocation
page read and write
4651000
heap
page read and write
39D4000
direct allocation
page execute and read and write
A34000
heap
page read and write
4651000
heap
page read and write
3A14000
direct allocation
page execute and read and write
1C87F000
stack
page read and write
5E1000
unkown
page execute and read and write
4AD1000
heap
page read and write
31B000
stack
page read and write
4AD1000
heap
page read and write
CA4000
heap
page read and write
454E000
stack
page read and write
349F000
stack
page read and write
2FCF000
stack
page read and write
233E0000
heap
page read and write
A34000
heap
page read and write
38D0000
direct allocation
page execute and read and write
6C7C0000
unkown
page read and write
4651000
heap
page read and write
3A14000
direct allocation
page execute and read and write
CF4000
heap
page read and write
11FA000
heap
page read and write
4AD0000
direct allocation
page read and write
233F1000
heap
page read and write
2D5E000
stack
page read and write
60F000
unkown
page execute and write copy
4B4F000
stack
page read and write
A34000
heap
page read and write
125D000
heap
page read and write
DBE000
unkown
page execute and write copy
CF4000
heap
page read and write
52CB000
stack
page read and write
4E8000
unkown
page execute and read and write
1241000
heap
page read and write
4B61000
heap
page read and write
34D0000
heap
page read and write
5CE000
stack
page read and write
2C2E000
stack
page read and write
4FA0000
trusted library allocation
page read and write
3C8E000
stack
page read and write
68F0000
heap
page read and write
2D4F000
stack
page read and write
513000
stack
page read and write
CF4000
heap
page read and write
BB0000
heap
page read and write
450F000
stack
page read and write
4AD1000
heap
page read and write
DE0000
heap
page read and write
4651000
heap
page read and write
454E000
stack
page read and write
4AD1000
heap
page read and write
6C7BE000
unkown
page read and write
4F50000
direct allocation
page read and write
6900000
heap
page read and write
233F1000
heap
page read and write
2BA0000
direct allocation
page read and write
4B61000
heap
page read and write
173A000
heap
page read and write
440E000
stack
page read and write
55CD000
stack
page read and write
885C000
stack
page read and write
233C6000
heap
page read and write
1205000
heap
page read and write
4C40000
direct allocation
page execute and read and write
807000
unkown
page execute and read and write
4B1B000
stack
page read and write
A34000
heap
page read and write
125E000
heap
page read and write
4AD1000
heap
page read and write
284E000
stack
page read and write
A34000
heap
page read and write
3C4F000
stack
page read and write
4B50000
direct allocation
page read and write
4651000
heap
page read and write
233DD000
heap
page read and write
5F5000
unkown
page execute and read and write
4F10000
trusted library allocation
page read and write
DAF000
unkown
page execute and read and write
448F000
stack
page read and write
965000
unkown
page execute and read and write
424E000
stack
page read and write
61E01000
direct allocation
page execute read
42CE000
stack
page read and write
508F000
stack
page read and write
2D0E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4640000
heap
page read and write
17C8000
heap
page read and write
4AD1000
heap
page read and write
4651000
heap
page read and write
450F000
stack
page read and write
6C5E1000
unkown
page execute read
61EB4000
direct allocation
page read and write
4651000
heap
page read and write
4A4E000
stack
page read and write
35B000
unkown
page execute and read and write
3ECF000
stack
page read and write
4AD1000
heap
page read and write
4651000
heap
page read and write
51E0000
direct allocation
page execute and read and write
34CF000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
464F000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
3ADF000
stack
page read and write
4651000
heap
page read and write
686F000
stack
page read and write
4AD1000
heap
page read and write
150D000
stack
page read and write
4C60000
direct allocation
page execute and read and write
80C000
unkown
page execute and write copy
3D5F000
stack
page read and write
BB0000
heap
page read and write
CA4000
heap
page read and write
3FCE000
stack
page read and write
50B0000
direct allocation
page execute and read and write
548C000
stack
page read and write
DBE000
unkown
page execute and read and write
2FDE000
stack
page read and write
2F1000
unkown
page execute and write copy
4AD0000
direct allocation
page read and write
A34000
heap
page read and write
4C90000
direct allocation
page execute and read and write
233E0000
heap
page read and write
4AD1000
heap
page read and write
3F0E000
stack
page read and write
4C60000
direct allocation
page execute and read and write
2FCF000
stack
page read and write
125E000
heap
page read and write
3D8F000
stack
page read and write
233E0000
heap
page read and write
1D300000
trusted library allocation
page read and write
1735000
heap
page read and write
5BC000
unkown
page execute and read and write
17AE000
stack
page read and write
45CF000
stack
page read and write
2BC7000
heap
page read and write
5180000
direct allocation
page execute and read and write
6C5E0000
unkown
page readonly
4F50000
direct allocation
page read and write
42CE000
stack
page read and write
4C60000
direct allocation
page execute and read and write
568D000
stack
page read and write
118A000
heap
page read and write
5150000
direct allocation
page execute and read and write
787000
unkown
page execute and write copy
4651000
heap
page read and write
CF4000
heap
page read and write
39C3000
direct allocation
page execute and read and write
5180000
direct allocation
page execute and read and write
16BD000
heap
page read and write
39DE000
direct allocation
page execute and read and write
4651000
heap
page read and write
39DE000
stack
page read and write
4AD1000
heap
page read and write
A34000
heap
page read and write
6C7BF000
unkown
page write copy
378E000
stack
page read and write
18CB000
heap
page read and write
35DF000
stack
page read and write
50E0000
direct allocation
page execute and read and write
5170000
direct allocation
page execute and read and write
4651000
heap
page read and write
314E000
stack
page read and write
1D200000
heap
page read and write
4641000
heap
page read and write
6C541000
unkown
page execute read
37C0000
heap
page read and write
1D18D000
stack
page read and write
40CF000
stack
page read and write
DCB000
heap
page read and write
4651000
heap
page read and write
1830000
direct allocation
page execute and read and write
124C000
heap
page read and write
233F8000
heap
page read and write
4A80000
trusted library allocation
page read and write
39D4000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
E8A000
heap
page read and write
3C1F000
stack
page read and write
662F000
stack
page read and write
11F8000
heap
page read and write
28A0000
direct allocation
page read and write
CF4000
heap
page read and write
A5C000
stack
page read and write
233C8000
heap
page read and write
378E000
stack
page read and write
410D000
stack
page read and write
50E0000
direct allocation
page execute and read and write
1678000
heap
page read and write
233D8000
heap
page read and write
CF4000
heap
page read and write
78C000
unkown
page execute and read and write
CA4000
heap
page read and write
233E0000
heap
page read and write
4F9E000
stack
page read and write
2BA0000
direct allocation
page read and write
A34000
heap
page read and write
1C94E000
stack
page read and write
6B6E000
stack
page read and write
1590000
direct allocation
page execute and read and write
470F000
stack
page read and write
4651000
heap
page read and write
1803000
heap
page read and write
233E5000
heap
page read and write
28A0000
direct allocation
page read and write
E58000
heap
page read and write
4651000
heap
page read and write
360F000
stack
page read and write
35CE000
stack
page read and write
364E000
stack
page read and write
2BA0000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
4ACF000
stack
page read and write
320E000
stack
page read and write
D6C000
stack
page read and write
672F000
stack
page read and write
233E0000
heap
page read and write
4AD1000
heap
page read and write
2E4C000
stack
page read and write
3BFE000
stack
page read and write
233FF000
heap
page read and write
233FF000
heap
page read and write
CA4000
heap
page read and write
233F1000
heap
page read and write
39CF000
stack
page read and write
4AD1000
heap
page read and write
4630000
direct allocation
page read and write
460E000
stack
page read and write
DFF000
stack
page read and write
308F000
stack
page read and write
1220000
heap
page read and write
3DCE000
stack
page read and write
1248000
heap
page read and write
1810000
heap
page read and write
4651000
heap
page read and write
394F000
stack
page read and write
4FF0000
direct allocation
page read and write
234C1000
heap
page read and write
4B50000
direct allocation
page read and write
513F000
stack
page read and write
233D4000
heap
page read and write
380E000
stack
page read and write
51A0000
direct allocation
page execute and read and write
28D0000
heap
page read and write
4C60000
direct allocation
page execute and read and write
361E000
stack
page read and write
3B0F000
stack
page read and write
4651000
heap
page read and write
233E0000
heap
page read and write
4AD1000
heap
page read and write
4651000
heap
page read and write
CF0000
heap
page read and write
2F8E000
stack
page read and write
28CE000
stack
page read and write
399F000
stack
page read and write
A70000
heap
page read and write
1E2E000
stack
page read and write
1850000
heap
page read and write
4651000
heap
page read and write
A34000
heap
page read and write
8BC000
unkown
page execute and read and write
3910000
heap
page read and write
AA1000
unkown
page execute and write copy
5F5000
unkown
page execute and read and write
A34000
heap
page read and write
4AD1000
heap
page read and write
A34000
heap
page read and write
2F3D0000
trusted library allocation
page read and write
233E0000
heap
page read and write
4AD1000
heap
page read and write
4E0B000
stack
page read and write
4AD1000
heap
page read and write
1D201000
heap
page read and write
618000
unkown
page execute and read and write
2F1000
unkown
page execute and write copy
4630000
direct allocation
page read and write
233D6000
heap
page read and write
16A9000
heap
page read and write
428F000
stack
page read and write
1A2E000
stack
page read and write
A34000
heap
page read and write
4630000
direct allocation
page read and write
F25000
unkown
page execute and write copy
F28000
unkown
page execute and write copy
4AD1000
heap
page read and write
426F000
stack
page read and write
3860000
heap
page read and write
4C90000
direct allocation
page execute and read and write
4AD0000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
2B0E000
stack
page read and write
37E0000
direct allocation
page execute and read and write
7AF000
unkown
page execute and write copy
124C000
heap
page read and write
60E000
unkown
page execute and read and write
28A0000
direct allocation
page read and write
28A0000
direct allocation
page read and write
1210000
heap
page read and write
4651000
heap
page read and write
3990000
direct allocation
page execute and read and write
3A04000
direct allocation
page execute and read and write
233E0000
heap
page read and write
5100000
direct allocation
page execute and read and write
550000
unkown
page readonly
233D1000
heap
page read and write
233D9000
heap
page read and write
3920000
heap
page read and write
A80000
heap
page read and write
370E000
stack
page read and write
3CA3000
heap
page read and write
310F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
4651000
heap
page read and write
4AD1000
heap
page read and write
DD4000
heap
page read and write
8861000
heap
page read and write
2BA0000
direct allocation
page read and write
35B000
unkown
page execute and read and write
A34000
heap
page read and write
4651000
heap
page read and write
6C5D2000
unkown
page readonly
4AD1000
heap
page read and write
233F8000
heap
page read and write
50E0000
direct allocation
page execute and read and write
DAE000
stack
page read and write
414F000
stack
page read and write
4AD1000
heap
page read and write
4AD1000
heap
page read and write
11FD000
heap
page read and write
5051000
direct allocation
page read and write
4AD0000
direct allocation
page read and write
A34000
heap
page read and write
4651000
heap
page read and write
38CE000
stack
page read and write
175E000
stack
page read and write
358F000
stack
page read and write
3A03000
direct allocation
page execute and read and write
CFE000
stack
page read and write
4AD1000
heap
page read and write
1CB8D000
stack
page read and write
3490000
heap
page read and write
3C4F000
stack
page read and write
4B50000
direct allocation
page read and write
400F000
stack
page read and write
359000
unkown
page read and write
DBB000
heap
page read and write
2F0000
unkown
page read and write
4AD0000
direct allocation
page read and write
388F000
stack
page read and write
A34000
heap
page read and write
4FB1000
direct allocation
page read and write
4AD1000
heap
page read and write
CA4000
heap
page read and write
2331F000
heap
page read and write
DD4000
heap
page read and write
3B4E000
stack
page read and write
2F468000
heap
page read and write
11FE000
heap
page read and write
2BA0000
direct allocation
page read and write
4AD1000
heap
page read and write
2C1E000
stack
page read and write
233FD000
heap
page read and write
4651000
heap
page read and write
48CF000
stack
page read and write
4FF0000
direct allocation
page read and write
350E000
stack
page read and write
4651000
heap
page read and write
16BA000
heap
page read and write
324F000
stack
page read and write
36DF000
stack
page read and write
4AD1000
heap
page read and write
E6F000
heap
page read and write
CF4000
heap
page read and write
4651000
heap
page read and write
18BE000
heap
page read and write
5180000
direct allocation
page execute and read and write
314E000
stack
page read and write
A34000
heap
page read and write
3B1E000
stack
page read and write
173D000
heap
page read and write
CF4000
heap
page read and write
233F1000
heap
page read and write
1743000
heap
page read and write
233C5000
heap
page read and write
1247000
heap
page read and write
80C000
unkown
page execute and read and write
39D0000
direct allocation
page execute and read and write
233D6000
heap
page read and write
52D0000
heap
page read and write
68FE000
heap
page read and write
DD4000
heap
page read and write
C98000
unkown
page execute and read and write
FA8000
unkown
page execute and write copy
4B61000
heap
page read and write
4AD1000
heap
page read and write
3ACE000
stack
page read and write
2C0F000
stack
page read and write
41FF000
stack
page read and write
CF4000
heap
page read and write
1241000
heap
page read and write
A34000
heap
page read and write
37CC000
heap
page read and write
488E000
stack
page read and write
144F000
stack
page read and write
233E0000
heap
page read and write
2BA0000
direct allocation
page read and write
A34000
heap
page read and write
4630000
direct allocation
page read and write
A34000
heap
page read and write
5D1000
unkown
page execute and write copy
CF4000
heap
page read and write
578E000
stack
page read and write
4630000
direct allocation
page read and write
17AD000
heap
page read and write
11E0000
heap
page read and write
13BE000
stack
page read and write
2E0F000
stack
page read and write
5180000
direct allocation
page execute and read and write
1220000
heap
page read and write
1580000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
3840000
heap
page read and write
4651000
heap
page read and write
CF4000
heap
page read and write
233FD000
heap
page read and write
364FD000
stack
page read and write
328E000
stack
page read and write
438E000
stack
page read and write
484F000
stack
page read and write
233D5000
heap
page read and write
1C4E000
stack
page read and write
4651000
heap
page read and write
5110000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
6890000
heap
page read and write
233D7000
heap
page read and write
B0B000
unkown
page execute and read and write
124C000
heap
page read and write
A34000
heap
page read and write
6525000
heap
page read and write
CA4000
heap
page read and write
420F000
stack
page read and write
60E000
unkown
page execute and write copy
DD4000
heap
page read and write
676E000
stack
page read and write
325E000
stack
page read and write
A34000
heap
page read and write
61ECD000
direct allocation
page readonly
233D9000
heap
page read and write
37CC000
heap
page read and write
121E000
heap
page read and write
4AD1000
heap
page read and write
5170000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
4AD1000
heap
page read and write
7F5000
unkown
page execute and read and write
4651000
heap
page read and write
18D4000
heap
page read and write
452E000
stack
page read and write
4630000
direct allocation
page read and write
28A0000
direct allocation
page read and write
4651000
heap
page read and write
28A0000
direct allocation
page read and write
F5F000
unkown
page execute and write copy
11DF000
heap
page read and write
4AD1000
heap
page read and write
CF4000
heap
page read and write
CF4000
heap
page read and write
DD4000
heap
page read and write
8D6000
unkown
page execute and read and write
4B50000
direct allocation
page read and write
4651000
heap
page read and write
6520000
heap
page read and write
4651000
heap
page read and write
CF4000
heap
page read and write
1C90F000
stack
page read and write
37C8000
heap
page read and write
3BBE000
stack
page read and write
3A14000
direct allocation
page execute and read and write
233FF000
heap
page read and write
414F000
stack
page read and write
4A90000
heap
page read and write
A34000
heap
page read and write
4B60000
heap
page read and write
43EF000
stack
page read and write
44CE000
stack
page read and write
51CF000
stack
page read and write
4670000
heap
page read and write
28A0000
direct allocation
page read and write
A34000
heap
page read and write
428F000
stack
page read and write
125E000
heap
page read and write
4C80000
direct allocation
page execute and read and write
123E000
heap
page read and write
1170000
heap
page read and write
4651000
heap
page read and write
185A000
heap
page read and write
4AD1000
heap
page read and write
2F9F000
stack
page read and write
1D305000
heap
page read and write
5140000
direct allocation
page execute and read and write
DD4000
heap
page read and write
4AD1000
heap
page read and write
4B50000
direct allocation
page read and write
6C6E000
stack
page read and write
1242000
heap
page read and write
3900000
heap
page read and write
CA4000
heap
page read and write
4651000
heap
page read and write
104E000
stack
page read and write
28A0000
direct allocation
page read and write
4AD1000
heap
page read and write
28A0000
direct allocation
page read and write
352000
unkown
page execute and read and write
509F000
stack
page read and write
375E000
stack
page read and write
1D201000
heap
page read and write
6C5CE000
unkown
page read and write
233C6000
heap
page read and write
5210000
direct allocation
page execute and read and write
233E0000
heap
page read and write
4AD1000
heap
page read and write
3D8F000
stack
page read and write
233E0000
heap
page read and write
CF4000
heap
page read and write
4C30000
direct allocation
page execute and read and write
2ECE000
stack
page read and write
4AD1000
heap
page read and write
650E000
stack
page read and write
347E000
stack
page read and write
5190000
direct allocation
page execute and read and write
3EA0000
heap
page read and write
533F000
stack
page read and write
4651000
heap
page read and write
3A14000
direct allocation
page execute and read and write
1CABD000
stack
page read and write
4651000
heap
page read and write
43FF000
stack
page read and write
4AD1000
heap
page read and write
CA4000
heap
page read and write
4AD1000
heap
page read and write
233F1000
heap
page read and write
233FF000
heap
page read and write
A34000
heap
page read and write
DD0000
heap
page read and write
2E9E000
stack
page read and write
288B000
stack
page read and write
3B4E000
stack
page read and write
CA0000
heap
page read and write
5950000
heap
page read and write
233E0000
heap
page read and write
4B50000
direct allocation
page read and write
CF4000
heap
page read and write
4651000
heap
page read and write
3A1E000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
7AD000
unkown
page execute and read and write
61ED4000
direct allocation
page readonly
93C000
unkown
page execute and read and write
60E000
unkown
page execute and read and write
4B50000
direct allocation
page read and write
4AD1000
heap
page read and write
A34000
heap
page read and write
DBF000
unkown
page execute and write copy
6C5BD000
unkown
page readonly
28A0000
direct allocation
page read and write
1C67E000
stack
page read and write
4651000
heap
page read and write
404E000
stack
page read and write
28C7000
heap
page read and write
523E000
stack
page read and write
4651000
heap
page read and write
4C60000
direct allocation
page execute and read and write
E00000
heap
page read and write
4651000
heap
page read and write
233E0000
heap
page read and write
4630000
direct allocation
page read and write
2D8E000
stack
page read and write
CF4000
heap
page read and write
50B0000
heap
page read and write
343E000
stack
page read and write
400F000
stack
page read and write
5CB000
unkown
page execute and read and write
359000
unkown
page read and write
2F470000
heap
page read and write
1738000
heap
page read and write
E10000
heap
page read and write
B09000
unkown
page read and write
2E8F000
stack
page read and write
CF4000
heap
page read and write
A34000
heap
page read and write
FA5000
unkown
page execute and write copy
51C000
stack
page read and write
233D8000
heap
page read and write
39D4000
direct allocation
page execute and read and write
311E000
stack
page read and write
1555000
heap
page read and write
3C0E000
stack
page read and write
4C70000
direct allocation
page execute and read and write
121A000
heap
page read and write
154E000
stack
page read and write
DD4000
heap
page read and write
1557000
heap
page read and write
352000
unkown
page execute and read and write
4651000
heap
page read and write
28A0000
direct allocation
page read and write
4B31000
direct allocation
page read and write
4AD1000
heap
page read and write
29CF000
stack
page read and write
10FD000
stack
page read and write
4660000
heap
page read and write
233FD000
heap
page read and write
CF4000
heap
page read and write
DD4000
heap
page read and write
4641000
heap
page read and write
4AD1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
310F000
stack
page read and write
E40000
heap
page read and write
28A0000
direct allocation
page read and write
B09000
unkown
page write copy
4651000
heap
page read and write
233D5000
heap
page read and write
DD4000
heap
page read and write
580000
heap
page read and write
5CB000
unkown
page execute and read and write
2ADF000
stack
page read and write
38CE000
stack
page read and write
233F1000
heap
page read and write
51C9000
stack
page read and write
4AD1000
heap
page read and write
60F000
unkown
page execute and write copy
4630000
direct allocation
page read and write
1754000
heap
page read and write
CF4000
heap
page read and write
D00000
heap
page read and write
4AD1000
heap
page read and write
233D8000
heap
page read and write
CF4000
heap
page read and write
4C6C000
stack
page read and write
71A000
unkown
page execute and read and write
4C60000
direct allocation
page execute and read and write
CF4000
heap
page read and write
3A1E000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
11DB000
stack
page read and write
4651000
heap
page read and write
404E000
stack
page read and write
28A0000
direct allocation
page read and write
2890000
heap
page read and write
39CF000
stack
page read and write
1820000
heap
page read and write
CF4000
heap
page read and write
380F000
stack
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
4AE1000
heap
page read and write
328E000
stack
page read and write
4AD1000
heap
page read and write
233D6000
heap
page read and write
6C77F000
unkown
page readonly
CF4000
heap
page read and write
359000
unkown
page write copy
A34000
heap
page read and write
3EEE000
stack
page read and write
4AD1000
heap
page read and write
CF4000
heap
page read and write
1238000
heap
page read and write
CF4000
heap
page read and write
300E000
stack
page read and write
125E000
heap
page read and write
233F8000
heap
page read and write
4B50000
direct allocation
page read and write
3FEF000
stack
page read and write
B5D000
stack
page read and write
4AD1000
heap
page read and write
288E000
stack
page read and write
11D0000
heap
page read and write
AA0000
unkown
page read and write
5180000
direct allocation
page execute and read and write
498F000
stack
page read and write
233F1000
heap
page read and write
4AD1000
heap
page read and write
321F000
stack
page read and write
61ECC000
direct allocation
page read and write
DA5000
unkown
page execute and read and write
352000
unkown
page execute and read and write
3E4F000
stack
page read and write
233D6000
heap
page read and write
1710000
heap
page read and write
4AD1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
3C30000
heap
page read and write
9A5000
unkown
page execute and read and write
2F468000
heap
page read and write
5150000
direct allocation
page execute and read and write
CF4000
heap
page read and write
61ED3000
direct allocation
page read and write
4AD1000
heap
page read and write
39D0000
direct allocation
page execute and read and write
4651000
heap
page read and write
39D4000
direct allocation
page execute and read and write
44EF000
stack
page read and write
4AD1000
heap
page read and write
C80000
unkown
page execute and read and write
4FF0000
direct allocation
page read and write
15F7000
stack
page read and write
A34000
heap
page read and write
5EC000
unkown
page execute and write copy
4651000
heap
page read and write
3A0E000
stack
page read and write
233D9000
heap
page read and write
78C000
unkown
page execute and write copy
43EE000
stack
page read and write
4651000
heap
page read and write
1CDCD000
stack
page read and write
17C5000
heap
page read and write
50D0000
direct allocation
page execute and read and write
5200000
direct allocation
page execute and read and write
4651000
heap
page read and write
12BE000
stack
page read and write
538D000
stack
page read and write
35D0000
direct allocation
page execute and read and write
474E000
stack
page read and write
4AD1000
heap
page read and write
4664000
heap
page read and write
4AD1000
heap
page read and write
3F0E000
stack
page read and write
4651000
heap
page read and write
956000
unkown
page execute and read and write
5CB000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
1220000
heap
page read and write
A34000
heap
page read and write
4AD1000
heap
page read and write
7AF000
unkown
page execute and write copy
3DCE000
stack
page read and write
4AD1000
heap
page read and write
338F000
stack
page read and write
4AD1000
heap
page read and write
468E000
stack
page read and write
2D47000
heap
page read and write
551000
unkown
page execute and write copy
51B0000
direct allocation
page execute and read and write
388F000
stack
page read and write
4D00000
direct allocation
page execute and read and write
2B9E000
stack
page read and write
4650000
heap
page read and write
1630000
heap
page read and write
6C540000
unkown
page readonly
787000
unkown
page execute and read and write
233F1000
heap
page read and write
F28000
unkown
page execute and read and write
385F000
stack
page read and write
CF4000
heap
page read and write
4AD1000
heap
page read and write
233D3000
heap
page read and write
1C27F000
stack
page read and write
2E8F000
stack
page read and write
7F4B0000
direct allocation
page execute and read and write
2F0000
unkown
page read and write
2D40000
heap
page read and write
233E0000
heap
page read and write
350E000
stack
page read and write
4641000
heap
page read and write
A5C000
stack
page read and write
3B0E000
stack
page read and write
1246000
heap
page read and write
233F1000
heap
page read and write
233F2000
heap
page read and write
CF4000
heap
page read and write
7AD000
unkown
page execute and read and write
CF4000
heap
page read and write
3D4E000
stack
page read and write
412F000
stack
page read and write
18CE000
heap
page read and write
233D3000
heap
page read and write
359000
unkown
page write copy
DD4000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
374F000
stack
page read and write
163A000
heap
page read and write
B5D000
stack
page read and write
DD4000
heap
page read and write
339E000
stack
page read and write
4AD1000
heap
page read and write
D00000
unkown
page execute and read and write
1630000
heap
page read and write
359000
unkown
page read and write
2D30000
heap
page read and write
490E000
stack
page read and write
887E000
heap
page read and write
518000
stack
page read and write
4AD1000
heap
page read and write
A34000
heap
page read and write
51F0000
direct allocation
page execute and read and write
9E5000
unkown
page execute and read and write
16C2000
heap
page read and write
A34000
heap
page read and write
A34000
heap
page read and write
1CAFE000
stack
page read and write
233E0000
heap
page read and write
2ACF000
stack
page read and write
28CB000
heap
page read and write
4AD1000
heap
page read and write
3A14000
direct allocation
page execute and read and write
1695000
heap
page read and write
CA4000
heap
page read and write
4AD1000
heap
page read and write
2BDF000
stack
page read and write
807000
unkown
page execute and write copy
4651000
heap
page read and write
DD4000
heap
page read and write
2BA0000
direct allocation
page read and write
50CE000
stack
page read and write
CF4000
heap
page read and write
4A0F000
stack
page read and write
1CFCE000
stack
page read and write
1CF8D000
stack
page read and write
478F000
stack
page read and write
1C8BE000
stack
page read and write
462F000
stack
page read and write
5D0000
unkown
page readonly
5120000
direct allocation
page execute and read and write
33CE000
stack
page read and write
1D1F0000
heap
page read and write
233E0000
heap
page read and write
4AD1000
heap
page read and write
D7B000
unkown
page execute and read and write
2C4E000
stack
page read and write
4AD1000
heap
page read and write
3BCF000
stack
page read and write
39DE000
direct allocation
page execute and read and write
A34000
heap
page read and write
418E000
stack
page read and write
4AD1000
heap
page read and write
4B31000
direct allocation
page read and write
DD4000
heap
page read and write
41EF000
stack
page read and write
2BA0000
direct allocation
page read and write
CF4000
heap
page read and write
4651000
heap
page read and write
2E5F000
stack
page read and write
1C48F000
stack
page read and write
60E000
unkown
page execute and write copy
1C70E000
stack
page read and write
51C0000
direct allocation
page execute and read and write
3CA0000
heap
page read and write
CF4000
heap
page read and write
4651000
heap
page read and write
233E0000
heap
page read and write
5160000
direct allocation
page execute and read and write
39D4000
direct allocation
page execute and read and write
CF4000
heap
page read and write
CF4000
heap
page read and write
4AD0000
direct allocation
page read and write
7FB000
stack
page read and write
A34000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
284F000
stack
page read and write
1C6CF000
stack
page read and write
4651000
heap
page read and write
4F4F000
stack
page read and write
324F000
stack
page read and write
CA4000
heap
page read and write
2D2F000
stack
page read and write
CA4000
heap
page read and write
570000
heap
page read and write
11D4000
heap
page read and write
160E000
stack
page read and write
3810000
heap
page read and write
2CCE000
stack
page read and write
233D6000
heap
page read and write
61EB7000
direct allocation
page readonly
5180000
direct allocation
page execute and read and write
233FF000
heap
page read and write
4AD1000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
4651000
heap
page read and write
4F8E000
stack
page read and write
4651000
heap
page read and write
3D9E000
stack
page read and write
30CE000
stack
page read and write
371F000
stack
page read and write
39D4000
direct allocation
page execute and read and write
4651000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
3E8E000
stack
page read and write
4630000
direct allocation
page read and write
4630000
direct allocation
page read and write
362FC000
stack
page read and write
AA0000
unkown
page readonly
4651000
heap
page read and write
50C0000
direct allocation
page execute and read and write
4AD1000
heap
page read and write
5130000
direct allocation
page execute and read and write
17C6000
heap
page read and write
1246000
heap
page read and write
4651000
heap
page read and write
434F000
stack
page read and write
3850000
heap
page read and write
There are 1185 hidden memdumps, click here to show them.