IOC Report
SecuriteInfo.com.Win32.PWSX-gen.20622.25663.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.20622.25663.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\a37ec701f3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BGIIDAEBGC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBFIJEGIDBGIECAKKEGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFHDHIJDGCBAKFIEGHCBGHJDAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\CGIJKJJKEBGHJKFIDGCA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGCAAAFCBFBAKFHJDBKJJJJJJD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHJJKFCBGIDGHIECGCBKFHIEBG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FCFBFHIE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKKJKEBKFCAAECAAAAAE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.20622.25663.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.20622.25663.exe"
malicious
C:\Users\user\AppData\Local\Temp\BGIIDAEBGC.exe
"C:\Users\user\AppData\Local\Temp\BGIIDAEBGC.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000006001\a37ec701f3.exe
"C:\Users\user\AppData\Local\Temp\1000006001\a37ec701f3.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\BGIIDAEBGC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\ECGHCBGCBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://77.91.77.81/mine/amadka.exea
unknown
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://77.91.77.81/mine/amadka.exem
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://77.91.77.82/Hun4Ko/index.phpQ
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://85.28.47.4/920475a59bac849d.phpFBF
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dll=
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://77.91.77.82/Hun4Ko/index.phpV
unknown
http://77.91.77.82/Hun4Ko/index.php4
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://77.91.77.82/Hun4Ko/index.phpmespace
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dll2
unknown
http://85.28.47.4/920475a59bac849d.php4
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://85.28.47.4/a
unknown
http://85.28.47.4/rBJ
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.82/Hun4Ko/index.phpmW
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.82/Hun4Ko/index.phpqWp
unknown
http://77.91.77.81/cost/go.exeData
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://77.91.77.82/Hun4Ko/index.phpSW
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://77.91.77.82/Hun4Ko/index.phpgW
unknown
http://77.91.77.82/Hun4Ko/index.phpl
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://85.28.47.4/920475a59bac849d.phpnB~
unknown
http://77.91.77.82/Hun4Ko/index.phpYW(
unknown
https://support.mozilla.org
unknown
http://77.91.77.82/Hun4Ko/index.php5W
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllS
unknown
http://77.91.77.81/stealc/random.exe50673b5d7X
unknown
There are 60 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
7C1000
unkown
page execute and read and write
malicious
7C1000
unkown
page execute and read and write
malicious
4DD0000
direct allocation
page read and write
malicious
52A0000
direct allocation
page read and write
malicious
1ABE000
heap
page read and write
malicious
1414000
heap
page read and write
malicious
4B1000
unkown
page execute and read and write
malicious
DE1000
unkown
page execute and read and write
malicious
7C1000
unkown
page execute and read and write
malicious
7C1000
unkown
page execute and read and write
malicious
121000
unkown
page execute and read and write
malicious
49C0000
direct allocation
page read and write
malicious
5270000
direct allocation
page read and write
malicious
7C1000
unkown
page execute and read and write
malicious
4F80000
direct allocation
page read and write
malicious
4A20000
direct allocation
page read and write
malicious
BF4000
heap
page read and write
12A0000
heap
page read and write
3F3E000
stack
page read and write
3DDF000
stack
page read and write
5460000
direct allocation
page execute and read and write
22E3D000
heap
page read and write
CC0000
direct allocation
page read and write
22E29000
heap
page read and write
132E000
stack
page read and write
829000
unkown
page write copy
BF4000
heap
page read and write
34B0000
direct allocation
page execute and read and write
1380000
heap
page read and write
ABC000
unkown
page execute and read and write
4B01000
heap
page read and write
7C1000
unkown
page execute and write copy
22E20000
heap
page read and write
4B00000
direct allocation
page execute and read and write
174F000
stack
page read and write
11FC000
stack
page read and write
1484000
heap
page read and write
BE0000
direct allocation
page execute and read and write
22E34000
heap
page read and write
4541000
heap
page read and write
12F7000
heap
page read and write
45A0000
heap
page read and write
20AE000
stack
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
D9B000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
BF4000
heap
page read and write
394E000
stack
page read and write
BF4000
heap
page read and write
2A3F000
stack
page read and write
22E07000
heap
page read and write
5AB000
stack
page read and write
1154000
heap
page read and write
47DF000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
C60000
unkown
page execute and read and write
11C0000
direct allocation
page read and write
34BE000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
390F000
stack
page read and write
BF4000
heap
page read and write
583D000
stack
page read and write
417F000
stack
page read and write
443E000
stack
page read and write
BF4000
heap
page read and write
30FE000
stack
page read and write
7C0000
unkown
page readonly
AE4000
heap
page read and write
1B1000
unkown
page execute and read and write
AE0000
heap
page read and write
AE4000
heap
page read and write
4541000
heap
page read and write
5220000
trusted library allocation
page read and write
CF4000
heap
page read and write
22E2F000
heap
page read and write
27FE000
stack
page read and write
449E000
stack
page read and write
4B01000
heap
page read and write
22E3A000
heap
page read and write
427E000
stack
page read and write
22E20000
heap
page read and write
5490000
direct allocation
page execute and read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
C62000
unkown
page execute and write copy
22E06000
heap
page read and write
4B01000
heap
page read and write
7C1000
unkown
page execute and write copy
308E000
stack
page read and write
37DE000
stack
page read and write
53BF000
stack
page read and write
407E000
stack
page read and write
5400000
direct allocation
page execute and read and write
29184000
heap
page read and write
4F50000
direct allocation
page execute and read and write
BF0000
heap
page read and write
1154000
heap
page read and write
117E000
stack
page read and write
473F000
stack
page read and write
BF4000
heap
page read and write
302E000
stack
page read and write
4F40000
trusted library allocation
page read and write
BB0000
heap
page read and write
2DDF000
stack
page read and write
AE4000
heap
page read and write
1484000
heap
page read and write
1154000
heap
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
BF4000
heap
page read and write
D40000
heap
page read and write
22E24000
heap
page read and write
2D7F000
stack
page read and write
4BDE000
stack
page read and write
4B01000
heap
page read and write
358E000
stack
page read and write
BF4000
heap
page read and write
CC0000
direct allocation
page read and write
38FE000
stack
page read and write
1BE0000
heap
page read and write
1154000
heap
page read and write
D2A000
heap
page read and write
4DD1000
heap
page read and write
319E000
stack
page read and write
6C53D000
unkown
page readonly
68C000
stack
page read and write
1484000
heap
page read and write
BF4000
heap
page read and write
ACA000
unkown
page execute and read and write
4541000
heap
page read and write
418E000
stack
page read and write
453F000
stack
page read and write
42EF000
stack
page read and write
39CF000
stack
page read and write
BF4000
heap
page read and write
22E20000
heap
page read and write
4541000
heap
page read and write
22E06000
heap
page read and write
D5B000
heap
page read and write
34F4000
direct allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
1B0C000
heap
page read and write
22E3D000
heap
page read and write
7BB000
unkown
page execute and write copy
4541000
heap
page read and write
409F000
stack
page read and write
45A1000
heap
page read and write
BF4000
heap
page read and write
409E000
stack
page read and write
3880000
heap
page read and write
129E000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
BF5000
heap
page read and write
779000
unkown
page execute and read and write
1154000
heap
page read and write
4B6F000
stack
page read and write
380E000
stack
page read and write
22E3A000
heap
page read and write
C60000
unkown
page execute and read and write
33BF000
stack
page read and write
AE4000
heap
page read and write
4B01000
heap
page read and write
BF4000
heap
page read and write
6C552000
unkown
page readonly
3970000
heap
page read and write
698000
unkown
page execute and read and write
7C0000
unkown
page read and write
3021C000
stack
page read and write
430F000
stack
page read and write
420E000
stack
page read and write
1CB7D000
stack
page read and write
5110000
direct allocation
page execute and read and write
4C8F000
stack
page read and write
4541000
heap
page read and write
3980000
heap
page read and write
4F50000
direct allocation
page execute and read and write
5150000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
1324000
heap
page read and write
3E4F000
stack
page read and write
40FF000
stack
page read and write
7AC000
unkown
page execute and read and write
405F000
stack
page read and write
BF4000
heap
page read and write
2B5F000
stack
page read and write
11F5000
unkown
page execute and read and write
BF4000
heap
page read and write
5430000
direct allocation
page execute and read and write
BF4000
heap
page read and write
144000
unkown
page execute and write copy
DFD000
stack
page read and write
52A0000
direct allocation
page read and write
BF4000
heap
page read and write
822000
unkown
page execute and read and write
2B8F000
stack
page read and write
34F4000
direct allocation
page execute and read and write
365F000
stack
page read and write
BF4000
heap
page read and write
7C0000
unkown
page read and write
BF4000
heap
page read and write
28B0000
direct allocation
page read and write
CF4000
heap
page read and write
3150000
heap
page read and write
41CF000
stack
page read and write
3340000
heap
page read and write
BF4000
heap
page read and write
7BA000
unkown
page execute and read and write
BF4000
heap
page read and write
CEA000
heap
page read and write
43CF000
stack
page read and write
5460000
direct allocation
page execute and read and write
120B000
heap
page read and write
7C0000
unkown
page readonly
AE4000
heap
page read and write
413E000
stack
page read and write
46CF000
stack
page read and write
28D7000
heap
page read and write
454E000
stack
page read and write
2FEE000
stack
page read and write
4B01000
heap
page read and write
511C000
stack
page read and write
354F000
stack
page read and write
4B01000
heap
page read and write
490E000
stack
page read and write
341F000
stack
page read and write
4541000
heap
page read and write
2F7F000
stack
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
28B0000
direct allocation
page read and write
4B01000
heap
page read and write
CF4000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
1154000
heap
page read and write
47CE000
stack
page read and write
BF4000
heap
page read and write
4B1000
unkown
page execute and write copy
3C8E000
stack
page read and write
3170000
direct allocation
page read and write
22E3A000
heap
page read and write
11C0000
direct allocation
page read and write
3F9E000
stack
page read and write
289F000
stack
page read and write
4541000
heap
page read and write
4B01000
heap
page read and write
3130000
direct allocation
page read and write
684000
heap
page read and write
11BE000
stack
page read and write
2EC000
stack
page read and write
5400000
direct allocation
page execute and read and write
477E000
stack
page read and write
2917E000
heap
page read and write
3CDF000
stack
page read and write
BF4000
heap
page read and write
DE0000
unkown
page readonly
2C9F000
stack
page read and write
179F000
unkown
page execute and write copy
CF0000
heap
page read and write
597E000
stack
page read and write
AE4000
heap
page read and write
BF4000
heap
page read and write
3AFE000
stack
page read and write
1230000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
22E31000
heap
page read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
4B01000
heap
page read and write
3E0F000
stack
page read and write
DF0000
heap
page read and write
369F000
stack
page read and write
BF4000
heap
page read and write
5160000
direct allocation
page execute and read and write
1C56000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
11BE000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
61ED4000
direct allocation
page readonly
383E000
stack
page read and write
2EFE000
stack
page read and write
BF4000
heap
page read and write
448E000
stack
page read and write
4541000
heap
page read and write
1ABA000
heap
page read and write
4541000
heap
page read and write
3A3E000
stack
page read and write
4B01000
heap
page read and write
48BE000
stack
page read and write
3130000
direct allocation
page read and write
1484000
heap
page read and write
22E22000
heap
page read and write
BF5000
heap
page read and write
4541000
heap
page read and write
4A20000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
3170000
direct allocation
page read and write
4B01000
heap
page read and write
AE4000
heap
page read and write
1154000
heap
page read and write
46DE000
stack
page read and write
22E1A000
heap
page read and write
22E3A000
heap
page read and write
4B20000
direct allocation
page execute and read and write
3A34000
direct allocation
page execute and read and write
BF4000
heap
page read and write
22E22000
heap
page read and write
BF4000
heap
page read and write
48C000
unkown
page execute and read and write
E04000
unkown
page execute and write copy
AE4000
heap
page read and write
D80000
heap
page read and write
49FE000
stack
page read and write
313F000
stack
page read and write
4541000
heap
page read and write
519000
unkown
page write copy
1154000
heap
page read and write
5470000
direct allocation
page execute and read and write
2E1E000
stack
page read and write
68F1000
heap
page read and write
3320000
heap
page read and write
4FE1000
direct allocation
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
22E38000
heap
page read and write
CF4000
heap
page read and write
3130000
direct allocation
page read and write
4BB0000
direct allocation
page execute and read and write
4D14000
heap
page read and write
391F000
stack
page read and write
3B8F000
stack
page read and write
BF4000
heap
page read and write
1154000
heap
page read and write
4541000
heap
page read and write
DE1000
unkown
page execute and write copy
28B0000
direct allocation
page read and write
31DE000
stack
page read and write
BF4000
heap
page read and write
3960000
heap
page read and write
1C57F000
stack
page read and write
6C560000
unkown
page readonly
1154000
heap
page read and write
4541000
heap
page read and write
ACB000
unkown
page execute and write copy
C62000
unkown
page execute and write copy
22E3D000
heap
page read and write
BF4000
heap
page read and write
2820000
direct allocation
page execute and read and write
22E20000
heap
page read and write
464F000
stack
page read and write
3170000
direct allocation
page read and write
1BEDF000
stack
page read and write
13AE000
stack
page read and write
4541000
heap
page read and write
37DE000
stack
page read and write
1C95E000
stack
page read and write
404F000
stack
page read and write
829000
unkown
page read and write
CC0000
direct allocation
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
5450000
direct allocation
page execute and read and write
A00000
heap
page read and write
AE4000
heap
page read and write
4541000
heap
page read and write
4B01000
heap
page read and write
34F4000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
450F000
stack
page read and write
3170000
direct allocation
page read and write
ACA000
unkown
page execute and read and write
28B0000
direct allocation
page read and write
444F000
stack
page read and write
A89000
unkown
page execute and read and write
827C000
stack
page read and write
BF4000
heap
page read and write
1154000
heap
page read and write
1154000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
2800000
direct allocation
page read and write
146C000
heap
page read and write
441F000
stack
page read and write
5301000
direct allocation
page read and write
35C000
unkown
page execute and read and write
2CCE000
stack
page read and write
AE4000
heap
page read and write
36DE000
stack
page read and write
364E000
stack
page read and write
BF4000
heap
page read and write
1540000
heap
page read and write
5430000
direct allocation
page execute and read and write
41DF000
stack
page read and write
1344000
heap
page read and write
BF4000
heap
page read and write
A89000
unkown
page execute and read and write
13FA000
heap
page read and write
3A23000
direct allocation
page execute and read and write
1154000
heap
page read and write
22E3A000
heap
page read and write
616F000
stack
page read and write
355E000
stack
page read and write
D9C000
heap
page read and write
4B01000
heap
page read and write
4B30000
direct allocation
page execute and read and write
1484000
heap
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
6C54E000
unkown
page read and write
1154000
heap
page read and write
5490000
direct allocation
page execute and read and write
E28000
unkown
page execute and read and write
130F000
heap
page read and write
11C0000
direct allocation
page read and write
22E39000
heap
page read and write
303E000
stack
page read and write
4B01000
heap
page read and write
829000
unkown
page read and write
2C3F000
stack
page read and write
1230000
direct allocation
page read and write
22E34000
heap
page read and write
602F000
stack
page read and write
1154000
heap
page read and write
BF4000
heap
page read and write
82B000
unkown
page execute and read and write
6C4C1000
unkown
page execute read
337E000
stack
page read and write
470E000
stack
page read and write
4541000
heap
page read and write
DC0000
heap
page read and write
3170000
direct allocation
page read and write
650000
heap
page read and write
3130000
direct allocation
page read and write
1BDA000
heap
page read and write
387E000
stack
page read and write
829000
unkown
page read and write
37C0000
direct allocation
page execute and read and write
842000
unkown
page execute and read and write
368F000
stack
page read and write
34F4000
direct allocation
page execute and read and write
1C99D000
stack
page read and write
1230000
direct allocation
page read and write
11C0000
direct allocation
page read and write
350E000
stack
page read and write
5410000
direct allocation
page execute and read and write
4541000
heap
page read and write
8280000
heap
page read and write
3130000
direct allocation
page read and write
4541000
heap
page read and write
28B0000
direct allocation
page read and write
33B0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
5440000
direct allocation
page execute and read and write
2FDDB000
stack
page read and write
1344000
heap
page read and write
BF4000
heap
page read and write
45A1000
heap
page read and write
4A21000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
4B01000
heap
page read and write
7DCB000
stack
page read and write
3E5E000
stack
page read and write
3170000
direct allocation
page read and write
BF4000
heap
page read and write
7C0000
unkown
page readonly
4DD1000
heap
page read and write
11C0000
direct allocation
page read and write
440D000
stack
page read and write
11C0000
direct allocation
page read and write
34F0000
direct allocation
page execute and read and write
800F000
stack
page read and write
11C0000
direct allocation
page read and write
22E34000
heap
page read and write
AE4000
heap
page read and write
345E000
stack
page read and write
4B01000
heap
page read and write
1BC8000
heap
page read and write
4B01000
heap
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
40CE000
stack
page read and write
28B0000
direct allocation
page read and write
1344000
heap
page read and write
32BE000
stack
page read and write
1220000
heap
page read and write
1005000
unkown
page execute and read and write
22E2F000
heap
page read and write
3170000
direct allocation
page read and write
D80000
heap
page read and write
BF4000
heap
page read and write
3130000
direct allocation
page read and write
BF4000
heap
page read and write
2EBF000
stack
page read and write
22E3D000
heap
page read and write
822000
unkown
page execute and read and write
4E21000
heap
page read and write
31FE000
stack
page read and write
459F000
stack
page read and write
BF4000
heap
page read and write
22E2F000
heap
page read and write
51B0000
direct allocation
page execute and read and write
3B9E000
stack
page read and write
11E0000
direct allocation
page read and write
4B01000
heap
page read and write
331E000
stack
page read and write
445F000
stack
page read and write
28B0000
direct allocation
page read and write
BF4000
heap
page read and write
1344000
heap
page read and write
82B000
unkown
page execute and read and write
50CF000
stack
page read and write
BF4000
heap
page read and write
4D1E000
stack
page read and write
414F000
stack
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
4541000
heap
page read and write
4B01000
heap
page read and write
DAE000
heap
page read and write
4B01000
heap
page read and write
1257000
heap
page read and write
4C00000
direct allocation
page execute and read and write
7C1000
unkown
page execute and write copy
1C77F000
stack
page read and write
3A5F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
52A0000
direct allocation
page read and write
1B64000
heap
page read and write
5A7E000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
3F1F000
stack
page read and write
BF4000
heap
page read and write
22E2F000
heap
page read and write
133D000
stack
page read and write
4C50000
direct allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
2DBE000
stack
page read and write
3EFF000
stack
page read and write
30EF000
stack
page read and write
3C3E000
stack
page read and write
3130000
direct allocation
page read and write
4B01000
heap
page read and write
DAA000
heap
page read and write
11C0000
direct allocation
page read and write
2F5E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
4F40000
heap
page read and write
40DE000
stack
page read and write
22E3A000
heap
page read and write
4E1F000
stack
page read and write
AB3000
unkown
page execute and read and write
34F4000
direct allocation
page execute and read and write
BF5000
heap
page read and write
D5B000
heap
page read and write
1154000
heap
page read and write
AE4000
heap
page read and write
684000
heap
page read and write
4980000
trusted library allocation
page read and write
408F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4FCC000
stack
page read and write
3D3F000
stack
page read and write
1C51E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
3F5E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
22E1A000
heap
page read and write
3130000
direct allocation
page read and write
341E000
stack
page read and write
33DF000
stack
page read and write
1344000
heap
page read and write
22E3D000
heap
page read and write
4541000
heap
page read and write
DE7000
heap
page read and write
1344000
heap
page read and write
4541000
heap
page read and write
ACB000
unkown
page execute and write copy
BF4000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
36DE000
stack
page read and write
4541000
heap
page read and write
27BE000
stack
page read and write
52A0000
direct allocation
page read and write
4BF0000
direct allocation
page execute and read and write
1BCF000
heap
page read and write
13C0000
heap
page read and write
22E3A000
heap
page read and write
28B0000
direct allocation
page read and write
5110000
direct allocation
page execute and read and write
2800000
direct allocation
page read and write
BF4000
heap
page read and write
1230000
direct allocation
page read and write
3B4E000
stack
page read and write
519000
unkown
page read and write
3F5F000
stack
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
12AA000
heap
page read and write
4B01000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
22E20000
heap
page read and write
34FF000
stack
page read and write
125B000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
22E2F000
heap
page read and write
28ECE000
stack
page read and write
3B6E000
stack
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
4541000
heap
page read and write
22E3D000
heap
page read and write
AB3000
unkown
page execute and read and write
329F000
stack
page read and write
2830000
heap
page read and write
30BF000
stack
page read and write
ACA000
unkown
page execute and read and write
AE2000
unkown
page execute and write copy
11C0000
direct allocation
page read and write
49FE000
stack
page read and write
1B5D000
heap
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
817C000
stack
page read and write
BF4000
heap
page read and write
114C000
unkown
page execute and read and write
ACA000
unkown
page execute and write copy
1A7E000
stack
page read and write
CF4000
heap
page read and write
BF4000
heap
page read and write
4F50000
direct allocation
page execute and read and write
5EE0000
heap
page read and write
FDE000
stack
page read and write
A80000
heap
page read and write
4541000
heap
page read and write
ACB000
unkown
page execute and write copy
DFC000
unkown
page execute and write copy
22E1F000
heap
page read and write
C7E000
stack
page read and write
35FE000
stack
page read and write
3FFE000
stack
page read and write
7A3000
unkown
page execute and read and write
12D5000
heap
page read and write
1484000
heap
page read and write
2917C000
heap
page read and write
3A0E000
stack
page read and write
BF4000
heap
page read and write
137B000
heap
page read and write
829000
unkown
page read and write
AE4000
heap
page read and write
E7E000
stack
page read and write
4541000
heap
page read and write
1230000
direct allocation
page read and write
2DCF000
stack
page read and write
ABC000
unkown
page execute and read and write
AB3000
unkown
page execute and read and write
BF4000
heap
page read and write
3CCF000
stack
page read and write
22E2F000
heap
page read and write
2C8F000
stack
page read and write
4B01000
heap
page read and write
1484000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
3A34000
direct allocation
page execute and read and write
113F000
stack
page read and write
4A6000
unkown
page execute and read and write
4CCE000
stack
page read and write
BF4000
heap
page read and write
B2E000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
CC0000
direct allocation
page read and write
37CF000
stack
page read and write
5420000
direct allocation
page execute and read and write
4B01000
heap
page read and write
4951000
heap
page read and write
1CD80000
heap
page read and write
829000
unkown
page write copy
4541000
heap
page read and write
4A81000
direct allocation
page read and write
4B70000
direct allocation
page execute and read and write
512000
unkown
page execute and read and write
22E2F000
heap
page read and write
D66000
heap
page read and write
9A8000
unkown
page execute and read and write
1191000
unkown
page execute and read and write
7C1000
unkown
page execute and write copy
BF4000
heap
page read and write
3B2E000
stack
page read and write
4B20000
direct allocation
page execute and read and write
4B01000
heap
page read and write
2A1F000
stack
page read and write
3A34000
direct allocation
page execute and read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
34E3000
direct allocation
page execute and read and write
35C000
unkown
page execute and write copy
BF5000
heap
page read and write
BF4000
heap
page read and write
DC0000
heap
page read and write
1230000
direct allocation
page read and write
61E01000
direct allocation
page execute read
BD0000
heap
page read and write
484E000
stack
page read and write
FEC000
stack
page read and write
9A8000
unkown
page execute and read and write
3EBE000
stack
page read and write
950000
unkown
page execute and read and write
36FF000
stack
page read and write
1C75E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
AE4000
heap
page read and write
BF4000
heap
page read and write
CC0000
direct allocation
page read and write
3130000
direct allocation
page read and write
1C71D000
stack
page read and write
52EE000
stack
page read and write
317E000
stack
page read and write
4541000
heap
page read and write
CBB000
stack
page read and write
4541000
heap
page read and write
4541000
heap
page read and write
1230000
direct allocation
page read and write
3B0F000
stack
page read and write
1C34000
heap
page read and write
53F0000
direct allocation
page execute and read and write
3170000
direct allocation
page read and write
404E000
stack
page read and write
4E21000
heap
page read and write
DA2000
heap
page read and write
684000
heap
page read and write
4F20000
direct allocation
page execute and read and write
4BB0000
direct allocation
page execute and read and write
5450000
direct allocation
page execute and read and write
1C4DF000
stack
page read and write
1BC6000
heap
page read and write
61ED3000
direct allocation
page read and write
7C0000
unkown
page read and write
22E19000
heap
page read and write
1468000
heap
page read and write
2FD80000
heap
page read and write
684000
heap
page read and write
120000
unkown
page readonly
BF4000
heap
page read and write
4B01000
heap
page read and write
22E35000
heap
page read and write
54A0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
2F0F000
stack
page read and write
1344000
heap
page read and write
1484000
heap
page read and write
49E0000
trusted library allocation
page read and write
1AB0000
heap
page read and write
22E19000
heap
page read and write
4A6E000
stack
page read and write
318E000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
4B01000
heap
page read and write
3001B000
stack
page read and write
22E1B000
heap
page read and write
101C000
unkown
page execute and write copy
13FE000
heap
page read and write
3170000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
22E13000
heap
page read and write
3330000
heap
page read and write
BF4000
heap
page read and write
333F000
stack
page read and write
5ADE000
stack
page read and write
184F000
stack
page read and write
3BB3000
heap
page read and write
C62000
unkown
page execute and write copy
1B75000
heap
page read and write
4541000
heap
page read and write
12DE000
heap
page read and write
829000
unkown
page write copy
309E000
stack
page read and write
4B9F000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
1154000
heap
page read and write
22E31000
heap
page read and write
11C0000
direct allocation
page read and write
684000
heap
page read and write
28B0000
direct allocation
page read and write
68F0000
heap
page read and write
1CE9A000
heap
page read and write
290E0000
trusted library allocation
page read and write
4B01000
heap
page read and write
101C000
unkown
page execute and read and write
22E25000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
D94000
heap
page read and write
359E000
stack
page read and write
AE4000
heap
page read and write
11E0000
direct allocation
page read and write
455F000
stack
page read and write
ACA000
unkown
page execute and write copy
7C0000
unkown
page readonly
ADF000
unkown
page execute and write copy
1C37F000
stack
page read and write
BF4000
heap
page read and write
5400000
direct allocation
page execute and read and write
4A20000
direct allocation
page read and write
DA5000
heap
page read and write
4F50000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
ACB000
unkown
page execute and write copy
544E000
stack
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
383F000
stack
page read and write
BF4000
heap
page read and write
1BBC000
heap
page read and write
61EB4000
direct allocation
page read and write
DA5000
heap
page read and write
17A2000
unkown
page execute and write copy
4B01000
heap
page read and write
1CDA1000
heap
page read and write
434E000
stack
page read and write
45CE000
stack
page read and write
480F000
stack
page read and write
22E1D000
heap
page read and write
1154000
heap
page read and write
4541000
heap
page read and write
1344000
heap
page read and write
2FFF000
stack
page read and write
3B7E000
stack
page read and write
2F4E000
stack
page read and write
149F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
4541000
heap
page read and write
5140000
direct allocation
page execute and read and write
BF4000
heap
page read and write
1C58000
heap
page read and write
EDF000
stack
page read and write
3C4F000
stack
page read and write
41BE000
stack
page read and write
AB3000
unkown
page execute and read and write
478F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
1360000
heap
page read and write
ACA000
unkown
page execute and write copy
18C000
unkown
page execute and read and write
3A3E000
direct allocation
page execute and read and write
13F0000
heap
page read and write
3C9F000
stack
page read and write
6C73F000
unkown
page write copy
DE0000
heap
page read and write
291E000
stack
page read and write
3CDE000
stack
page read and write
4A4E000
stack
page read and write
17E0000
heap
page read and write
36CE000
stack
page read and write
330E000
stack
page read and write
1154000
heap
page read and write
43FF000
stack
page read and write
62AF000
stack
page read and write
4B10000
heap
page read and write
2C7E000
stack
page read and write
82B000
unkown
page execute and read and write
684000
heap
page read and write
1216000
heap
page read and write
AE4000
heap
page read and write
42BF000
stack
page read and write
4E0E000
stack
page read and write
1344000
heap
page read and write
495E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
CF4000
heap
page read and write
11C0000
direct allocation
page read and write
458F000
stack
page read and write
D30000
heap
page read and write
4541000
heap
page read and write
1344000
heap
page read and write
4B10000
direct allocation
page execute and read and write
1340000
heap
page read and write
3CEE000
stack
page read and write
CEE000
heap
page read and write
22E2F000
heap
page read and write
388F000
stack
page read and write
E86000
unkown
page execute and read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
1154000
heap
page read and write
790000
heap
page read and write
7F0D000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
B6E000
stack
page read and write
4B01000
heap
page read and write
A89000
unkown
page execute and read and write
50F0000
direct allocation
page execute and read and write
428F000
stack
page read and write
1166000
unkown
page execute and read and write
28B0000
direct allocation
page read and write
4B01000
heap
page read and write
5190000
direct allocation
page execute and read and write
AE4000
heap
page read and write
494F000
stack
page read and write
1230000
direct allocation
page read and write
1B69000
heap
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
4B20000
direct allocation
page execute and read and write
1CD91000
heap
page read and write
6C6FF000
unkown
page readonly
BF4000
heap
page read and write
379F000
stack
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
4B00000
heap
page read and write
103E000
stack
page read and write
4541000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
AE4000
heap
page read and write
4541000
heap
page read and write
5400000
direct allocation
page execute and read and write
28B0000
direct allocation
page read and write
1250000
heap
page read and write
5EE6000
heap
page read and write
1154000
heap
page read and write
ACB000
unkown
page execute and write copy
5430000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4541000
heap
page read and write
5430000
direct allocation
page execute and read and write
37DF000
stack
page read and write
4541000
heap
page read and write
42CE000
stack
page read and write
4D90000
trusted library allocation
page read and write
17DF000
stack
page read and write
BFE000
stack
page read and write
A89000
unkown
page execute and read and write
468E000
stack
page read and write
D9E000
heap
page read and write
1B7C000
heap
page read and write
12FD000
stack
page read and write
535000
unkown
page execute and read and write
5430000
direct allocation
page execute and read and write
34CF000
stack
page read and write
3A34000
direct allocation
page execute and read and write
1CB9C000
stack
page read and write
4950000
heap
page read and write
684000
heap
page read and write
155B000
heap
page read and write
4B01000
heap
page read and write
11F0000
heap
page read and write
4541000
heap
page read and write
13C3000
heap
page read and write
4B90000
direct allocation
page execute and read and write
1484000
heap
page read and write
BF4000
heap
page read and write
312F000
stack
page read and write
4B20000
direct allocation
page execute and read and write
1484000
heap
page read and write
5410000
direct allocation
page execute and read and write
290CE000
stack
page read and write
22E20000
heap
page read and write
29186000
heap
page read and write
1154000
heap
page read and write
1CD90000
heap
page read and write
606E000
stack
page read and write
381E000
stack
page read and write
4541000
heap
page read and write
463E000
stack
page read and write
A70000
heap
page read and write
CC0000
direct allocation
page read and write
CC0000
direct allocation
page read and write
4F50000
direct allocation
page execute and read and write
16DE000
stack
page read and write
BF4000
heap
page read and write
1C48000
heap
page read and write
3DCE000
stack
page read and write
1484000
heap
page read and write
1150000
heap
page read and write
39FF000
stack
page read and write
ACA000
unkown
page execute and read and write
C62000
unkown
page execute and write copy
1C2DE000
stack
page read and write
3130000
direct allocation
page read and write
BF4000
heap
page read and write
3BB0000
heap
page read and write
22E22000
heap
page read and write
22E1D000
heap
page read and write
4B20000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
1360000
heap
page read and write
1154000
heap
page read and write
49BF000
stack
page read and write
33CE000
stack
page read and write
431E000
stack
page read and write
BF4000
heap
page read and write
4F90000
direct allocation
page execute and read and write
3B3F000
stack
page read and write
22E34000
heap
page read and write
BF4000
heap
page read and write
39F0000
direct allocation
page execute and read and write
5440000
direct allocation
page execute and read and write
3E7F000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
1230000
direct allocation
page read and write
22E1D000
heap
page read and write
44EF000
stack
page read and write
31CE000
stack
page read and write
4E20000
heap
page read and write
49A0000
heap
page read and write
11C0000
direct allocation
page read and write
44FE000
stack
page read and write
5F2E000
stack
page read and write
BF4000
heap
page read and write
33FE000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
22E34000
heap
page read and write
BF4000
heap
page read and write
12D0000
heap
page read and write
BF4000
heap
page read and write
4B0000
unkown
page readonly
4D10000
heap
page read and write
4541000
heap
page read and write
AE4000
heap
page read and write
12E1000
heap
page read and write
4B60000
direct allocation
page execute and read and write
2E0E000
stack
page read and write
357000
unkown
page execute and write copy
DAE000
heap
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
3A4F000
stack
page read and write
CC0000
direct allocation
page read and write
7C0000
unkown
page readonly
1CD91000
heap
page read and write
4541000
heap
page read and write
1154000
heap
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
7C0000
unkown
page read and write
3FBF000
stack
page read and write
AE4000
heap
page read and write
DAE000
heap
page read and write
4F40000
direct allocation
page execute and read and write
7BA000
unkown
page execute and write copy
BF4000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
BF4000
heap
page read and write
4F70000
direct allocation
page execute and read and write
39BE000
stack
page read and write
4541000
heap
page read and write
3187000
heap
page read and write
DAE000
heap
page read and write
377F000
stack
page read and write
82B000
unkown
page execute and read and write
4541000
heap
page read and write
BF4000
heap
page read and write
22E2A000
heap
page read and write
52D1000
direct allocation
page read and write
6AD000
heap
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
3170000
direct allocation
page read and write
61ECD000
direct allocation
page readonly
1BC1000
heap
page read and write
AE4000
heap
page read and write
150E000
stack
page read and write
397F000
stack
page read and write
1502000
unkown
page execute and read and write
4541000
heap
page read and write
3A5E000
stack
page read and write
2837000
heap
page read and write
328F000
stack
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
32CF000
stack
page read and write
4541000
heap
page read and write
421E000
stack
page read and write
AE4000
heap
page read and write
34F4000
direct allocation
page execute and read and write
4B01000
heap
page read and write
1B9C000
heap
page read and write
123C000
stack
page read and write
C60000
unkown
page execute and read and write
CF4000
heap
page read and write
6C73E000
unkown
page read and write
C3E000
stack
page read and write
4B01000
heap
page read and write
1154000
heap
page read and write
BF4000
heap
page read and write
13E0000
heap
page read and write
4A5F000
stack
page read and write
3130000
direct allocation
page read and write
1154000
heap
page read and write
4541000
heap
page read and write
35BF000
stack
page read and write
3A34000
direct allocation
page execute and read and write
1344000
heap
page read and write
1370000
heap
page read and write
28B0000
direct allocation
page read and write
56EE000
stack
page read and write
D94000
heap
page read and write
BF4000
heap
page read and write
491F000
stack
page read and write
50E0000
direct allocation
page execute and read and write
1550000
heap
page read and write
6C4C0000
unkown
page readonly
327F000
stack
page read and write
1C97F000
stack
page read and write
44BF000
stack
page read and write
AE2000
unkown
page execute and read and write
3130000
direct allocation
page read and write
4B01000
heap
page read and write
1154000
heap
page read and write
22F09000
heap
page read and write
2918A000
heap
page read and write
22E20000
heap
page read and write
38FE000
stack
page read and write
4541000
heap
page read and write
5E70000
heap
page read and write
ABC000
unkown
page execute and read and write
BF4000
heap
page read and write
690000
heap
page read and write
5430000
direct allocation
page execute and read and write
CF4000
heap
page read and write
1344000
heap
page read and write
4B01000
heap
page read and write
684000
heap
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
379E000
stack
page read and write
43BE000
stack
page read and write
1A3C000
heap
page read and write
1510000
heap
page read and write
481E000
stack
page read and write
9FC000
stack
page read and write
345000
unkown
page execute and read and write
3C7F000
stack
page read and write
3220000
direct allocation
page execute and read and write
22E31000
heap
page read and write
22E13000
heap
page read and write
419F000
stack
page read and write
5400000
direct allocation
page execute and read and write
120000
unkown
page readonly
CC0000
direct allocation
page read and write
4B01000
heap
page read and write
4951000
heap
page read and write
4541000
heap
page read and write
437F000
stack
page read and write
28B0000
direct allocation
page read and write
5270000
direct allocation
page read and write
316E000
stack
page read and write
3130000
direct allocation
page read and write
373E000
stack
page read and write
4541000
heap
page read and write
822000
unkown
page execute and read and write
D5C000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
3ECF000
stack
page read and write
5180000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
4B01000
heap
page read and write
680000
heap
page read and write
C60000
unkown
page execute and read and write
3A1F000
stack
page read and write
5BDE000
stack
page read and write
EBE000
stack
page read and write
1484000
heap
page read and write
DA5000
heap
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
5110000
direct allocation
page execute and read and write
11C0000
direct allocation
page read and write
38CE000
stack
page read and write
1230000
direct allocation
page read and write
403F000
stack
page read and write
FBF000
stack
page read and write
1BCD000
heap
page read and write
22E1D000
heap
page read and write
1A30000
heap
page read and write
4B0000
unkown
page read and write
BF4000
heap
page read and write
374F000
stack
page read and write
4541000
heap
page read and write
68FE000
heap
page read and write
3E1E000
stack
page read and write
338F000
stack
page read and write
4541000
heap
page read and write
CA0000
heap
page read and write
82B000
unkown
page execute and read and write
1C27000
heap
page read and write
2FFDC000
stack
page read and write
AE4000
heap
page read and write
CF4000
heap
page read and write
4541000
heap
page read and write
11E0000
direct allocation
page read and write
F2A000
unkown
page execute and read and write
5EE5000
heap
page read and write
3E1F000
stack
page read and write
684000
heap
page read and write
431F000
stack
page read and write
4541000
heap
page read and write
318F000
stack
page read and write
1484000
heap
page read and write
22E20000
heap
page read and write
22E1B000
heap
page read and write
9A8000
unkown
page execute and read and write
4B01000
heap
page read and write
340F000
stack
page read and write
6900000
heap
page read and write
393E000
stack
page read and write
4B01000
heap
page read and write
C60000
unkown
page execute and read and write
34FE000
direct allocation
page execute and read and write
445E000
stack
page read and write
5480000
direct allocation
page execute and read and write
4541000
heap
page read and write
3D0E000
stack
page read and write
5100000
direct allocation
page execute and read and write
1480000
heap
page read and write
3180000
heap
page read and write
53E0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
395E000
stack
page read and write
1154000
heap
page read and write
BF4000
heap
page read and write
4A9E000
stack
page read and write
ACA000
unkown
page execute and write copy
4B01000
heap
page read and write
4541000
heap
page read and write
D96000
heap
page read and write
4B90000
direct allocation
page execute and read and write
11F7000
stack
page read and write
487F000
stack
page read and write
357000
unkown
page execute and read and write
391E000
stack
page read and write
BF4000
heap
page read and write
4540000
heap
page read and write
4951000
heap
page read and write
293F000
stack
page read and write
4B01000
heap
page read and write
D5D000
heap
page read and write
4B01000
heap
page read and write
BF4000
heap
page read and write
AE4000
heap
page read and write
4541000
heap
page read and write
7C0000
unkown
page read and write
4B01000
heap
page read and write
9A8000
unkown
page execute and read and write
1344000
heap
page read and write
4B01000
heap
page read and write
3B9F000
stack
page read and write
ACA000
unkown
page execute and write copy
22E3A000
heap
page read and write
DE0000
unkown
page readonly
CC0000
direct allocation
page read and write
22E3D000
heap
page read and write
BF4000
heap
page read and write
1230000
direct allocation
page read and write
54B0000
direct allocation
page execute and read and write
CF4000
heap
page read and write
22E37000
heap
page read and write
22E1D000
heap
page read and write
BF4000
heap
page read and write
4B4F000
stack
page read and write
3170000
direct allocation
page read and write
2A5E000
stack
page read and write
3BAD000
stack
page read and write
4541000
heap
page read and write
5130000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
3BCE000
stack
page read and write
159E000
stack
page read and write
22E07000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
37BE000
stack
page read and write
13C000
unkown
page execute and write copy
1017000
unkown
page execute and read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
53EF000
stack
page read and write
1BD4000
heap
page read and write
279E000
stack
page read and write
BF4000
heap
page read and write
5420000
direct allocation
page execute and read and write
CD0000
heap
page read and write
4CDF000
stack
page read and write
3A8E000
stack
page read and write
28B0000
direct allocation
page read and write
5270000
direct allocation
page read and write
9F3000
stack
page read and write
C62000
unkown
page execute and write copy
BF4000
heap
page read and write
22E22000
heap
page read and write
3ED000
stack
page read and write
4A20000
direct allocation
page read and write
4B01000
heap
page read and write
4ED0000
heap
page read and write
4B01000
heap
page read and write
4541000
heap
page read and write
5260000
trusted library allocation
page read and write
D80000
heap
page read and write
4550000
heap
page read and write
1140000
heap
page read and write
AE4000
heap
page read and write
1CE90000
trusted library allocation
page read and write
4541000
heap
page read and write
AE4000
heap
page read and write
554F000
stack
page read and write
1369000
heap
page read and write
344E000
stack
page read and write
BF4000
heap
page read and write
12AE000
heap
page read and write
22E13000
heap
page read and write
4AFF000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
4E31000
direct allocation
page read and write
BF4000
heap
page read and write
9F8000
stack
page read and write
4541000
heap
page read and write
DA5000
heap
page read and write
1154000
heap
page read and write
4B01000
heap
page read and write
22E3D000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
4541000
heap
page read and write
4541000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
CF4000
heap
page read and write
CC0000
direct allocation
page read and write
4541000
heap
page read and write
3130000
direct allocation
page read and write
952000
unkown
page execute and write copy
435E000
stack
page read and write
D3D000
heap
page read and write
1344000
heap
page read and write
22E3A000
heap
page read and write
61ED0000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
459E000
stack
page read and write
ABC000
unkown
page execute and read and write
4F80000
direct allocation
page read and write
355F000
stack
page read and write
34FE000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4A0F000
stack
page read and write
28D0000
heap
page read and write
D94000
heap
page read and write
822000
unkown
page execute and read and write
2E3F000
stack
page read and write
45FF000
stack
page read and write
1307000
heap
page read and write
CE0000
heap
page read and write
ABC000
unkown
page execute and read and write
323E000
stack
page read and write
121000
unkown
page execute and write copy
2800000
direct allocation
page read and write
DA5000
heap
page read and write
684000
heap
page read and write
169F000
stack
page read and write
52BB000
stack
page read and write
57EF000
stack
page read and write
5120000
direct allocation
page execute and read and write
4B01000
heap
page read and write
22E1E000
heap
page read and write
42FE000
stack
page read and write
4B8E000
stack
page read and write
378E000
stack
page read and write
ACA000
unkown
page execute and read and write
BF4000
heap
page read and write
4541000
heap
page read and write
45B000
stack
page read and write
5110000
direct allocation
page execute and read and write
829000
unkown
page write copy
4F80000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
138A000
heap
page read and write
1B7B000
heap
page read and write
3170000
direct allocation
page read and write
4DD1000
heap
page read and write
3F0E000
stack
page read and write
400F000
stack
page read and write
AE4000
heap
page read and write
469F000
stack
page read and write
36E0000
heap
page read and write
BF4000
heap
page read and write
367E000
stack
page read and write
AE4000
heap
page read and write
7C1000
unkown
page execute and write copy
4541000
heap
page read and write
7F770000
direct allocation
page execute and read and write
5110000
direct allocation
page execute and read and write
AE4000
heap
page read and write
684000
heap
page read and write
1EAE000
stack
page read and write
22E1D000
heap
page read and write
3CBE000
stack
page read and write
6900000
heap
page read and write
4B01000
heap
page read and write
3A24000
direct allocation
page execute and read and write
7ECC000
stack
page read and write
1C0DF000
stack
page read and write
4B01000
heap
page read and write
4E21000
heap
page read and write
351F000
stack
page read and write
4541000
heap
page read and write
4D1000
unkown
page execute and read and write
4DCF000
stack
page read and write
AB3000
unkown
page execute and read and write
22E06000
heap
page read and write
684000
heap
page read and write
BF4000
heap
page read and write
3B5F000
stack
page read and write
AE0000
heap
page read and write
DA7000
heap
page read and write
DC1000
heap
page read and write
4B01000
heap
page read and write
3A30000
direct allocation
page execute and read and write
1C16000
heap
page read and write
4541000
heap
page read and write
5110000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
62D0000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
48CF000
stack
page read and write
305F000
stack
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
3BFF000
stack
page read and write
22E14000
heap
page read and write
22E20000
heap
page read and write
4C40000
direct allocation
page execute and read and write
1344000
heap
page read and write
22E20000
heap
page read and write
22E3D000
heap
page read and write
69B000
heap
page read and write
4541000
heap
page read and write
22E1C000
heap
page read and write
1CD7D000
stack
page read and write
BF4000
heap
page read and write
319F000
stack
page read and write
BF4000
heap
page read and write
22E3D000
heap
page read and write
4541000
heap
page read and write
D3D000
heap
page read and write
1230000
direct allocation
page read and write
BF4000
heap
page read and write
3E4E000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
78D000
stack
page read and write
304F000
stack
page read and write
BF4000
heap
page read and write
5270000
direct allocation
page read and write
32DF000
stack
page read and write
353E000
stack
page read and write
38DF000
stack
page read and write
BF4000
heap
page read and write
4541000
heap
page read and write
375E000
stack
page read and write
3DBF000
stack
page read and write
2FBE000
stack
page read and write
22E35000
heap
page read and write
45A1000
heap
page read and write
4B01000
heap
page read and write
3170000
direct allocation
page read and write
363F000
stack
page read and write
6C740000
unkown
page read and write
1B2A000
heap
page read and write
CF4000
heap
page read and write
822000
unkown
page execute and read and write
BF4000
heap
page read and write
34F4000
direct allocation
page execute and read and write
42DF000
stack
page read and write
D95000
heap
page read and write
A5A000
stack
page read and write
4B20000
direct allocation
page execute and read and write
1B6E000
heap
page read and write
4541000
heap
page read and write
19FE000
stack
page read and write
1154000
heap
page read and write
4B80000
direct allocation
page execute and read and write
AE4000
heap
page read and write
BF4000
heap
page read and write
3157000
heap
page read and write
BF4000
heap
page read and write
3190000
direct allocation
page execute and read and write
DAA000
heap
page read and write
1154000
heap
page read and write
180000
unkown
page execute and read and write
3D20000
heap
page read and write
BF4000
heap
page read and write
61AE000
stack
page read and write
DF0000
heap
page read and write
8281000
heap
page read and write
9A8000
unkown
page execute and read and write
BF4000
heap
page read and write
3D8F000
stack
page read and write
5170000
direct allocation
page execute and read and write
7F0D0000
direct allocation
page execute and read and write
CFC000
stack
page read and write
4541000
heap
page read and write
4DD0000
heap
page read and write
1CD91000
heap
page read and write
12E0000
heap
page read and write
4B01000
heap
page read and write
CC0000
direct allocation
page read and write
AE4000
heap
page read and write
1230000
direct allocation
page read and write
4541000
heap
page read and write
1484000
heap
page read and write
369E000
stack
page read and write
4F0F000
stack
page read and write
2E7B000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
1060000
heap
page read and write
28A0000
heap
page read and write
1230000
direct allocation
page read and write
4FE0000
direct allocation
page execute and read and write
17EE000
stack
page read and write
593C000
stack
page read and write
4F80000
direct allocation
page read and write
51B000
unkown
page execute and read and write
1154000
heap
page read and write
3210000
heap
page read and write
7C90000
heap
page read and write
54C0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
3D1E000
stack
page read and write
36C0000
direct allocation
page execute and read and write
3A9E000
stack
page read and write
11C0000
direct allocation
page read and write
2B9E000
stack
page read and write
4541000
heap
page read and write
6C561000
unkown
page execute read
11FA000
heap
page read and write
360F000
stack
page read and write
829000
unkown
page write copy
38BF000
stack
page read and write
4B01000
heap
page read and write
AD0000
heap
page read and write
4541000
heap
page read and write
2CDE000
stack
page read and write
52BE000
stack
page read and write
4C10000
direct allocation
page execute and read and write
4541000
heap
page read and write
347F000
stack
page read and write
3A34000
direct allocation
page execute and read and write
D7E000
stack
page read and write
3A3E000
direct allocation
page execute and read and write
4B01000
heap
page read and write
1484000
heap
page read and write
AE4000
heap
page read and write
A89000
unkown
page execute and read and write
423E000
stack
page read and write
2B3F000
stack
page read and write
4AFF000
stack
page read and write
D3E000
heap
page read and write
4B01000
heap
page read and write
17A2000
unkown
page execute and read and write
BF4000
heap
page read and write
BF5000
heap
page read and write
DAE000
heap
page read and write
312B000
stack
page read and write
BF4000
heap
page read and write
4B01000
heap
page read and write
144B000
heap
page read and write
6C745000
unkown
page readonly
4B80000
direct allocation
page execute and read and write
14CE000
stack
page read and write
22E2F000
heap
page read and write
DA5000
heap
page read and write
61EB7000
direct allocation
page readonly
3F4F000
stack
page read and write
4B01000
heap
page read and write
22E20000
heap
page read and write
3A34000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
BF4000
heap
page read and write
3F8E000
stack
page read and write
1154000
heap
page read and write
1154000
heap
page read and write
BF4000
heap
page read and write
829000
unkown
page read and write
22E3A000
heap
page read and write
1154000
heap
page read and write
3170000
direct allocation
page read and write
22E3A000
heap
page read and write
4541000
heap
page read and write
41DE000
stack
page read and write
2F1F000
stack
page read and write
4541000
heap
page read and write
4B01000
heap
page read and write
22E31000
heap
page read and write
51A0000
direct allocation
page execute and read and write
1017000
unkown
page execute and write copy
34E4000
direct allocation
page execute and read and write
31FF000
stack
page read and write
32DE000
stack
page read and write
3DFE000
stack
page read and write
There are 1621 hidden memdumps, click here to show them.