IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\dca3d29d0f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IIEBGIDAAF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGHIDGCAFCBAAAAAFHDAEHCFIE
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\DBKEGCAEGIIJKFIEHIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCGCFCBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCFIIIJJKJKFHIDGDBAK
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\HCFIIIJJKJKFHIDGDBAKJEBKEG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIDHDGDHJEGHIDGDHCGCBAKFHI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJEHIJEBKEBFBFHIIDHIIDGIJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JKKEHJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KKJKFBKKECFHJKEBKEHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\IIEBGIDAAF.exe
"C:\Users\user\AppData\Local\Temp\IIEBGIDAAF.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\dca3d29d0f.exe
"C:\Users\user~1\AppData\Local\Temp\1000006001\dca3d29d0f.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user~1\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\IIEBGIDAAF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\IJEGDBGDBF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://77.91.77.82/Hun4Ko/index.php/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://77.91.77.81/stealc/random.exe50673b5d764U
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.82/Hun4Ko/index.phpO
unknown
http://77.91.77.82/Hun4Ko/index.phpM
unknown
http://77.91.77.81/mine/amadka.exeOpera
unknown
http://77.91.77.82/Hun4Ko/index.phpH
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.phpW
unknown
http://77.91.77.82/Hun4Ko/index.phpa
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://85.28.47.4/F
unknown
http://77.91.77.82/Hun4Ko/index.phpvA
unknown
http://77.91.77.82/Hun4Ko/index.phpmespace
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://77.91.77.82/Hun4Ko/index.php%
unknown
http://77.91.77.82/Hun4Ko/index.phpC
unknown
http://77.91.77.82/Hun4Ko/index.php9
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://85.28.47.4/g
unknown
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.phpu
unknown
http://www.sqlite.org/copyright.html.
unknown
http://85.28.47.4/920475a59bac849d.phpF
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dllr
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://77.91.77.81/stealc/random.exeurlencoded
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.81/stealc/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://77.91.77.81/cost/go.exe00
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dllh
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ac.ecopnacl
unknown
http://85.28.47.4/920475a59bac849d.phpl
unknown
http://85.28.47.4/920475a59bac849d.phpq
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://77.91.77.82/Hun4Ko/index.phpk
unknown
http://pki-ocsp.symauth.com0
unknown
http://85.28.47.4/920475a59bac849d.phpt
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://support.mozilla.org
unknown
https://ac.ecop
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 60 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5440000
direct allocation
page read and write
malicious
4DA0000
direct allocation
page read and write
malicious
192E000
heap
page read and write
malicious
61000
unkown
page execute and read and write
malicious
4EA0000
direct allocation
page read and write
malicious
EB1000
unkown
page execute and read and write
malicious
5F1000
unkown
page execute and read and write
malicious
52B0000
direct allocation
page read and write
malicious
54F0000
direct allocation
page read and write
malicious
5680000
direct allocation
page read and write
malicious
158E000
heap
page read and write
malicious
EB1000
unkown
page execute and read and write
malicious
EB1000
unkown
page execute and read and write
malicious
951000
unkown
page execute and read and write
malicious
EB1000
unkown
page execute and read and write
malicious
EB1000
unkown
page execute and read and write
malicious
5070000
direct allocation
page read and write
malicious
EB1000
unkown
page execute and read and write
malicious
342E000
stack
page read and write
35F1C000
stack
page read and write
369F000
stack
page read and write
694F000
stack
page read and write
1BF5F000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
9B2000
unkown
page execute and read and write
4BF1000
heap
page read and write
4A9F000
stack
page read and write
173C000
heap
page read and write
6D9C000
stack
page read and write
4911000
heap
page read and write
297000
unkown
page execute and write copy
F54000
heap
page read and write
10A1000
unkown
page execute and read and write
A74000
heap
page read and write
5650000
direct allocation
page execute and read and write
57E0000
direct allocation
page execute and read and write
1F1E000
stack
page read and write
4911000
heap
page read and write
DFB000
stack
page read and write
A57000
heap
page read and write
51E0000
direct allocation
page read and write
409E000
stack
page read and write
41EE000
stack
page read and write
11B7000
unkown
page execute and read and write
4BF1000
heap
page read and write
4B9F000
stack
page read and write
1367000
unkown
page execute and write copy
5440000
direct allocation
page execute and read and write
4911000
heap
page read and write
F54000
heap
page read and write
340E000
stack
page read and write
11C6000
unkown
page execute and write copy
343C000
heap
page read and write
1667000
stack
page read and write
37EF000
stack
page read and write
11C6000
unkown
page execute and write copy
496F000
stack
page read and write
4BF1000
heap
page read and write
548E000
stack
page read and write
2EC5E000
heap
page read and write
EB0000
unkown
page read and write
5170000
trusted library allocation
page read and write
5810000
direct allocation
page execute and read and write
37FE000
stack
page read and write
46DF000
stack
page read and write
5090000
direct allocation
page execute and read and write
41DE000
stack
page read and write
EB1000
unkown
page execute and write copy
3820000
heap
page read and write
16F2000
heap
page read and write
A74000
heap
page read and write
5640000
direct allocation
page execute and read and write
4A21000
heap
page read and write
5830000
direct allocation
page execute and read and write
F54000
heap
page read and write
13D0000
heap
page read and write
2EC56000
heap
page read and write
304E000
stack
page read and write
3DEE000
stack
page read and write
C74000
heap
page read and write
1910000
heap
page read and write
13B3000
heap
page read and write
12F0000
direct allocation
page read and write
F54000
heap
page read and write
4EEE000
stack
page read and write
13B3000
heap
page read and write
432E000
stack
page read and write
4E2F000
stack
page read and write
F60000
heap
page read and write
4BF1000
heap
page read and write
3F5F000
stack
page read and write
41DF000
stack
page read and write
4911000
heap
page read and write
54A0000
direct allocation
page execute and read and write
1C41E000
stack
page read and write
5440000
direct allocation
page read and write
3C6F000
stack
page read and write
3A1E000
stack
page read and write
4BAF000
stack
page read and write
506F000
stack
page read and write
54B0000
direct allocation
page execute and read and write
12F0000
direct allocation
page read and write
4BF1000
heap
page read and write
5670000
direct allocation
page execute and read and write
4FB1000
heap
page read and write
3300000
direct allocation
page read and write
F1B000
unkown
page execute and read and write
4911000
heap
page read and write
14F0000
direct allocation
page read and write
17C4000
heap
page read and write
827000
unkown
page execute and write copy
15F9000
heap
page read and write
6D025000
unkown
page readonly
4911000
heap
page read and write
4BF1000
heap
page read and write
46EF000
stack
page read and write
5020000
direct allocation
page execute and read and write
55D0000
direct allocation
page execute and read and write
4EA0000
direct allocation
page read and write
A74000
heap
page read and write
51E0000
direct allocation
page read and write
976000
unkown
page execute and read and write
4BF1000
heap
page read and write
6B0B000
stack
page read and write
11AE000
unkown
page execute and read and write
395E000
stack
page read and write
3BAF000
stack
page read and write
4BF1000
heap
page read and write
13FC000
stack
page read and write
38AF000
stack
page read and write
1924000
heap
page read and write
4BF1000
heap
page read and write
37AE000
stack
page read and write
F54000
heap
page read and write
5350000
heap
page read and write
9D0000
heap
page read and write
4FA0000
direct allocation
page read and write
51D0000
direct allocation
page execute and read and write
3D5E000
stack
page read and write
5680000
direct allocation
page read and write
C74000
heap
page read and write
4FB0000
heap
page read and write
1CEAE000
stack
page read and write
EA0000
direct allocation
page read and write
4FC0000
direct allocation
page execute and read and write
5710000
direct allocation
page execute and read and write
3CBE000
stack
page read and write
5600000
direct allocation
page execute and read and write
4CAF000
stack
page read and write
481E000
stack
page read and write
3AB0000
heap
page read and write
12F0000
direct allocation
page read and write
1367000
unkown
page execute and write copy
4BF1000
heap
page read and write
EA0000
direct allocation
page read and write
32CE000
stack
page read and write
10A1000
unkown
page execute and read and write
F54000
heap
page read and write
65C6000
heap
page read and write
C74000
heap
page read and write
4FA0000
direct allocation
page read and write
11B7000
unkown
page execute and read and write
B10000
direct allocation
page read and write
3CAF000
stack
page read and write
441F000
stack
page read and write
95D000
stack
page read and write
6980000
heap
page read and write
11C7000
unkown
page execute and write copy
F19000
unkown
page write copy
22BD1000
heap
page read and write
F54000
heap
page read and write
22BDF000
heap
page read and write
5250000
direct allocation
page execute and read and write
4FA0000
direct allocation
page read and write
681000
unkown
page execute and read and write
13F1000
heap
page read and write
1C6AF000
stack
page read and write
17C4000
heap
page read and write
1365000
unkown
page execute and read and write
4D50000
heap
page read and write
37AF000
stack
page read and write
3D9D000
stack
page read and write
3300000
direct allocation
page read and write
F70000
heap
page read and write
36C0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
F54000
heap
page read and write
51E0000
direct allocation
page read and write
4911000
heap
page read and write
17E0000
heap
page read and write
376F000
stack
page read and write
5810000
direct allocation
page execute and read and write
17C4000
heap
page read and write
18E9000
heap
page read and write
F19000
unkown
page read and write
47EF000
stack
page read and write
3DAF000
stack
page read and write
4BF1000
heap
page read and write
4F30000
direct allocation
page execute and read and write
BC4000
heap
page read and write
A74000
heap
page read and write
1C85C000
stack
page read and write
14F0000
direct allocation
page read and write
405E000
stack
page read and write
EB0000
unkown
page readonly
F54000
heap
page read and write
1365000
heap
page read and write
4911000
heap
page read and write
39E0000
direct allocation
page execute and read and write
3B9E000
stack
page read and write
329E000
stack
page read and write
22BC9000
heap
page read and write
4BF1000
heap
page read and write
5030000
direct allocation
page execute and read and write
52F0000
trusted library allocation
page read and write
11AE000
unkown
page execute and read and write
17C4000
heap
page read and write
B2A000
heap
page read and write
22BDB000
heap
page read and write
B10000
direct allocation
page read and write
6FA0000
heap
page read and write
4BF1000
heap
page read and write
392E000
stack
page read and write
14F0000
direct allocation
page read and write
17C4000
heap
page read and write
4ADE000
stack
page read and write
40EE000
stack
page read and write
A74000
heap
page read and write
51E0000
direct allocation
page read and write
496E000
stack
page read and write
11C6000
unkown
page execute and read and write
A74000
heap
page read and write
166C000
stack
page read and write
4911000
heap
page read and write
485E000
stack
page read and write
4BF1000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
E6E000
stack
page read and write
EB1000
unkown
page execute and write copy
54F0000
direct allocation
page read and write
3E6000
unkown
page execute and read and write
16D4000
heap
page read and write
361F000
stack
page read and write
38EF000
stack
page read and write
3430000
heap
page read and write
4911000
heap
page read and write
4F2F000
stack
page read and write
29C000
unkown
page execute and read and write
4BF1000
heap
page read and write
B10000
direct allocation
page read and write
A74000
heap
page read and write
4BF1000
heap
page read and write
4FB1000
heap
page read and write
42EF000
stack
page read and write
1365000
unkown
page execute and read and write
51F0000
direct allocation
page execute and read and write
352F000
stack
page read and write
1367000
unkown
page execute and write copy
3D2E000
stack
page read and write
C74000
heap
page read and write
1524000
heap
page read and write
3BEE000
stack
page read and write
4BF1000
heap
page read and write
1920000
heap
page read and write
4D1F000
stack
page read and write
3A4E000
stack
page read and write
13D0000
heap
page read and write
461F000
stack
page read and write
525E000
stack
page read and write
305F000
stack
page read and write
33DE000
stack
page read and write
5810000
direct allocation
page execute and read and write
13D5000
heap
page read and write
3633000
direct allocation
page execute and read and write
564D000
stack
page read and write
A74000
heap
page read and write
4BF1000
heap
page read and write
13F3000
heap
page read and write
2EAE000
stack
page read and write
F0B000
stack
page read and write
3E50000
heap
page read and write
342F000
stack
page read and write
3644000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
5440000
direct allocation
page read and write
574D000
stack
page read and write
16D4000
heap
page read and write
39E4000
direct allocation
page execute and read and write
4A21000
heap
page read and write
4911000
heap
page read and write
16C0000
heap
page read and write
4911000
heap
page read and write
1710000
heap
page read and write
4BF1000
heap
page read and write
EB0000
unkown
page read and write
55D0000
direct allocation
page execute and read and write
38A0000
direct allocation
page execute and read and write
12F0000
direct allocation
page read and write
41AE000
stack
page read and write
16D4000
heap
page read and write
F54000
heap
page read and write
456E000
stack
page read and write
1924000
heap
page read and write
56C0000
direct allocation
page execute and read and write
22BDF000
heap
page read and write
684E000
stack
page read and write
17DF000
stack
page read and write
22BB5000
heap
page read and write
405F000
stack
page read and write
F1B000
unkown
page execute and read and write
42EE000
stack
page read and write
3644000
direct allocation
page execute and read and write
4910000
heap
page read and write
55D0000
direct allocation
page execute and read and write
22BA6000
heap
page read and write
17F7000
heap
page read and write
22BA6000
heap
page read and write
11B7000
unkown
page execute and read and write
853C000
stack
page read and write
4911000
heap
page read and write
EB1000
unkown
page execute and write copy
F54000
heap
page read and write
58A0000
direct allocation
page execute and read and write
5070000
heap
page read and write
6D01F000
unkown
page write copy
50D1000
direct allocation
page read and write
186E000
stack
page read and write
22BC0000
heap
page read and write
950000
unkown
page readonly
51D0000
direct allocation
page execute and read and write
5490000
direct allocation
page execute and read and write
5680000
direct allocation
page execute and read and write
1924000
heap
page read and write
1C1DE000
stack
page read and write
3300000
direct allocation
page read and write
14DA000
heap
page read and write
17E0000
heap
page read and write
1924000
heap
page read and write
17E6000
heap
page read and write
5CF0000
heap
page read and write
F19000
unkown
page write copy
DBE000
stack
page read and write
3577D000
stack
page read and write
1365000
unkown
page execute and read and write
3B6F000
stack
page read and write
C70000
heap
page read and write
1924000
heap
page read and write
38DF000
stack
page read and write
4A1F000
stack
page read and write
BBA000
heap
page read and write
449E000
stack
page read and write
2EBEE000
stack
page read and write
445E000
stack
page read and write
1924000
heap
page read and write
B10000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
445F000
stack
page read and write
1CB31000
heap
page read and write
4CDF000
stack
page read and write
50B0000
direct allocation
page execute and read and write
441E000
stack
page read and write
F54000
heap
page read and write
5030000
direct allocation
page execute and read and write
12E0000
heap
page read and write
B10000
direct allocation
page read and write
18CF000
stack
page read and write
4BF1000
heap
page read and write
22BBD000
heap
page read and write
432F000
stack
page read and write
A74000
heap
page read and write
7F0000
heap
page read and write
A74000
heap
page read and write
4911000
heap
page read and write
16D4000
heap
page read and write
1397000
heap
page read and write
61E00000
direct allocation
page execute and read and write
5650000
direct allocation
page execute and read and write
6CDA0000
unkown
page readonly
578E000
stack
page read and write
4C04000
heap
page read and write
4BF1000
heap
page read and write
13DB000
heap
page read and write
4BF1000
heap
page read and write
1510000
direct allocation
page read and write
FB6000
unkown
page execute and read and write
492F000
stack
page read and write
B00000
heap
page read and write
390E000
stack
page read and write
1517000
heap
page read and write
341E000
stack
page read and write
4BF1000
heap
page read and write
5460000
direct allocation
page execute and read and write
17C4000
heap
page read and write
39E4000
direct allocation
page execute and read and write
5480000
direct allocation
page execute and read and write
F12000
unkown
page execute and read and write
F54000
heap
page read and write
39EF000
stack
page read and write
4911000
heap
page read and write
419F000
stack
page read and write
1524000
heap
page read and write
22BB9000
heap
page read and write
482E000
stack
page read and write
51E0000
direct allocation
page read and write
482F000
stack
page read and write
429F000
stack
page read and write
12F0000
direct allocation
page read and write
3AAE000
stack
page read and write
32DF000
stack
page read and write
C23000
unkown
page execute and read and write
1924000
heap
page read and write
4911000
heap
page read and write
441F000
stack
page read and write
14F0000
direct allocation
page read and write
1820000
heap
page read and write
4911000
heap
page read and write
50AE000
stack
page read and write
13B3000
heap
page read and write
4F6E000
stack
page read and write
4BF1000
heap
page read and write
36AE000
stack
page read and write
4911000
heap
page read and write
22BD4000
heap
page read and write
13D0000
heap
page read and write
471E000
stack
page read and write
4BF1000
heap
page read and write
F54000
heap
page read and write
197F000
stack
page read and write
4BF1000
heap
page read and write
17C4000
heap
page read and write
4BF1000
heap
page read and write
32EE000
stack
page read and write
F54000
heap
page read and write
5030000
direct allocation
page execute and read and write
4EA0000
direct allocation
page read and write
22BB5000
heap
page read and write
13B3000
heap
page read and write
EB1000
unkown
page execute and write copy
5890000
direct allocation
page execute and read and write
F54000
heap
page read and write
42DE000
stack
page read and write
452F000
stack
page read and write
22BD4000
heap
page read and write
1981000
heap
page read and write
1D1F000
stack
page read and write
F50000
heap
page read and write
F19000
unkown
page read and write
C74000
heap
page read and write
85C000
stack
page read and write
4FA0000
direct allocation
page read and write
4911000
heap
page read and write
E05000
unkown
page execute and read and write
469F000
stack
page read and write
4911000
heap
page read and write
22BB1000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
55A0000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
2FEF000
stack
page read and write
46CE000
stack
page read and write
3A9E000
stack
page read and write
35F0000
heap
page read and write
1CC35000
heap
page read and write
4930000
heap
page read and write
22BDF000
heap
page read and write
5270000
direct allocation
page execute and read and write
5210000
direct allocation
page execute and read and write
5660000
direct allocation
page execute and read and write
3320000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
C74000
heap
page read and write
381E000
stack
page read and write
55B0000
direct allocation
page execute and read and write
EA0000
direct allocation
page read and write
350F000
stack
page read and write
3E5E000
stack
page read and write
10A1000
unkown
page execute and read and write
51E0000
direct allocation
page read and write
170E000
stack
page read and write
4AEE000
stack
page read and write
4E31000
heap
page read and write
5420000
direct allocation
page execute and read and write
190E000
stack
page read and write
FBE000
stack
page read and write
C74000
heap
page read and write
4E5E000
stack
page read and write
4BF1000
heap
page read and write
5880000
direct allocation
page execute and read and write
342F000
stack
page read and write
51E0000
direct allocation
page read and write
22BB5000
heap
page read and write
1C3DF000
stack
page read and write
4E2E000
stack
page read and write
5680000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
1524000
heap
page read and write
EB0000
unkown
page readonly
A74000
heap
page read and write
EB0000
unkown
page read and write
51E0000
direct allocation
page read and write
39EE000
direct allocation
page execute and read and write
13F2000
stack
page read and write
4BF1000
heap
page read and write
61ECD000
direct allocation
page readonly
17C4000
heap
page read and write
4911000
heap
page read and write
392F000
stack
page read and write
51E0000
direct allocation
page read and write
408E000
stack
page read and write
3DDE000
stack
page read and write
E07000
heap
page read and write
1530000
heap
page read and write
39D3000
direct allocation
page execute and read and write
368E000
stack
page read and write
1924000
heap
page read and write
4BF1000
heap
page read and write
11B7000
unkown
page execute and read and write
EB1000
unkown
page execute and write copy
4BF1000
heap
page read and write
1365000
unkown
page execute and read and write
5860000
direct allocation
page execute and read and write
5050000
direct allocation
page execute and read and write
146B000
stack
page read and write
326F000
stack
page read and write
4BF1000
heap
page read and write
4A10000
trusted library allocation
page read and write
F1B000
unkown
page execute and read and write
3300000
direct allocation
page read and write
D7F000
stack
page read and write
594D000
stack
page read and write
4B20000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
1C8AF000
stack
page read and write
C66000
unkown
page execute and write copy
300F000
stack
page read and write
3E0E000
stack
page read and write
4911000
heap
page read and write
BB0000
heap
page read and write
A74000
heap
page read and write
F19000
unkown
page write copy
EA0000
direct allocation
page read and write
3300000
direct allocation
page read and write
1524000
heap
page read and write
3644000
direct allocation
page execute and read and write
C67000
unkown
page execute and write copy
4AAE000
stack
page read and write
5420000
direct allocation
page execute and read and write
16D4000
heap
page read and write
6CFDF000
unkown
page readonly
431F000
stack
page read and write
401F000
stack
page read and write
136F000
heap
page read and write
3300000
direct allocation
page read and write
EA0000
direct allocation
page read and write
11C7000
unkown
page execute and write copy
4F5F000
stack
page read and write
E7E000
stack
page read and write
65C5000
heap
page read and write
55E0000
direct allocation
page execute and read and write
51E0000
direct allocation
page execute and read and write
4C1E000
stack
page read and write
3800000
heap
page read and write
B10000
direct allocation
page read and write
5410000
direct allocation
page execute and read and write
49AE000
stack
page read and write
4BF1000
heap
page read and write
4911000
heap
page read and write
37EE000
stack
page read and write
54F0000
direct allocation
page read and write
4BF1000
heap
page read and write
5040000
direct allocation
page execute and read and write
22BC7000
heap
page read and write
1367000
unkown
page execute and write copy
138C000
heap
page read and write
B10000
direct allocation
page read and write
2DEE000
stack
page read and write
B41000
unkown
page execute and read and write
138A000
heap
page read and write
13EF000
heap
page read and write
4A21000
heap
page read and write
4F20000
direct allocation
page execute and read and write
50CB000
stack
page read and write
EA0000
direct allocation
page read and write
C57000
unkown
page execute and read and write
509F000
stack
page read and write
4FB1000
heap
page read and write
13E2000
heap
page read and write
F54000
heap
page read and write
F54000
heap
page read and write
418F000
stack
page read and write
1183000
unkown
page execute and read and write
F19000
unkown
page write copy
14F0000
direct allocation
page read and write
43DF000
stack
page read and write
5420000
direct allocation
page execute and read and write
41CE000
stack
page read and write
1524000
heap
page read and write
2EB0000
direct allocation
page read and write
4BF1000
heap
page read and write
1510000
heap
page read and write
36DE000
stack
page read and write
13F1000
heap
page read and write
22BD4000
heap
page read and write
486E000
stack
page read and write
4BF1000
heap
page read and write
3B6E000
stack
page read and write
C74000
heap
page read and write
3300000
direct allocation
page read and write
1C89D000
stack
page read and write
51F1000
heap
page read and write
22BDD000
heap
page read and write
173D000
heap
page read and write
F54000
heap
page read and write
4BF1000
heap
page read and write
40CF000
stack
page read and write
160F000
stack
page read and write
1CCAC000
stack
page read and write
4BF1000
heap
page read and write
17F7000
heap
page read and write
13DB000
heap
page read and write
16D4000
heap
page read and write
13CF000
heap
page read and write
11AE000
unkown
page execute and read and write
22BB8000
heap
page read and write
E90000
heap
page read and write
EA0000
direct allocation
page read and write
1365000
unkown
page execute and read and write
F12000
unkown
page execute and read and write
22BD1000
heap
page read and write
138B000
heap
page read and write
32EE000
stack
page read and write
7C000
unkown
page execute and write copy
4911000
heap
page read and write
490F000
stack
page read and write
4918000
heap
page read and write
182B000
heap
page read and write
51F1000
heap
page read and write
61EB4000
direct allocation
page read and write
4911000
heap
page read and write
C74000
heap
page read and write
A74000
heap
page read and write
13E2000
heap
page read and write
4F90000
direct allocation
page execute and read and write
5240000
direct allocation
page execute and read and write
32AF000
stack
page read and write
4BF0000
heap
page read and write
13F8000
stack
page read and write
4911000
heap
page read and write
950000
unkown
page read and write
42AF000
stack
page read and write
EA0000
direct allocation
page read and write
1999000
heap
page read and write
3BAE000
stack
page read and write
47AF000
stack
page read and write
4FA0000
direct allocation
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
A74000
heap
page read and write
6FA1000
heap
page read and write
4BF1000
heap
page read and write
53F0000
direct allocation
page execute and read and write
362F000
stack
page read and write
36AF000
stack
page read and write
51D0000
direct allocation
page execute and read and write
40AF000
stack
page read and write
459E000
stack
page read and write
A74000
heap
page read and write
A70000
heap
page read and write
5030000
direct allocation
page execute and read and write
406F000
stack
page read and write
E80000
heap
page read and write
192A000
heap
page read and write
5071000
heap
page read and write
DEF000
stack
page read and write
C66000
unkown
page execute and read and write
4F30000
direct allocation
page execute and read and write
1356000
heap
page read and write
1CC30000
trusted library allocation
page read and write
66CF000
stack
page read and write
14F0000
direct allocation
page read and write
8540000
heap
page read and write
1524000
heap
page read and write
5030000
direct allocation
page execute and read and write
57F0000
direct allocation
page execute and read and write
5260000
direct allocation
page execute and read and write
3A5F000
stack
page read and write
45AF000
stack
page read and write
4BF1000
heap
page read and write
1365000
unkown
page execute and read and write
4FEF000
stack
page read and write
1760000
heap
page read and write
35AE000
stack
page read and write
455F000
stack
page read and write
382E000
stack
page read and write
328F000
stack
page read and write
1360000
heap
page read and write
4FA0000
direct allocation
page read and write
150E000
stack
page read and write
366F000
stack
page read and write
F54000
heap
page read and write
455E000
stack
page read and write
4AAF000
stack
page read and write
4BF1000
heap
page read and write
1890000
heap
page read and write
3B8E000
stack
page read and write
5311000
direct allocation
page read and write
4911000
heap
page read and write
13E2000
heap
page read and write
F54000
heap
page read and write
4BF1000
heap
page read and write
4A21000
heap
page read and write
50DE000
stack
page read and write
EA0000
direct allocation
page read and write
3B2E000
stack
page read and write
5680000
direct allocation
page execute and read and write
13D5000
heap
page read and write
F54000
heap
page read and write
50B0000
trusted library allocation
page read and write
4BF1000
heap
page read and write
F54000
heap
page read and write
22BD1000
heap
page read and write
3B2F000
stack
page read and write
E90000
heap
page read and write
435E000
stack
page read and write
45EE000
stack
page read and write
EB0000
unkown
page readonly
14CB000
heap
page read and write
1524000
heap
page read and write
C74000
heap
page read and write
55D0000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
5000000
direct allocation
page execute and read and write
11C6000
unkown
page execute and write copy
4BF1000
heap
page read and write
2EC53000
heap
page read and write
5630000
direct allocation
page execute and read and write
A74000
heap
page read and write
196D000
heap
page read and write
379F000
stack
page read and write
1C65D000
stack
page read and write
3B5F000
stack
page read and write
3634000
direct allocation
page execute and read and write
4911000
heap
page read and write
4DA0000
direct allocation
page read and write
32EF000
stack
page read and write
4F30000
direct allocation
page execute and read and write
366E000
stack
page read and write
11C7000
unkown
page execute and write copy
45DE000
stack
page read and write
1524000
heap
page read and write
4920000
heap
page read and write
11C6000
unkown
page execute and write copy
3CDF000
stack
page read and write
4BF1000
heap
page read and write
4911000
heap
page read and write
EB0000
unkown
page readonly
4BF1000
heap
page read and write
5680000
direct allocation
page read and write
A26000
unkown
page execute and read and write
B10000
direct allocation
page read and write
4BF1000
heap
page read and write
5050000
heap
page read and write
22BDD000
heap
page read and write
5680000
direct allocation
page execute and read and write
3C9E000
stack
page read and write
11C7000
unkown
page execute and write copy
1524000
heap
page read and write
17C4000
heap
page read and write
A74000
heap
page read and write
14F0000
direct allocation
page read and write
56D0000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
1765000
heap
page read and write
31DE000
stack
page read and write
4BF1000
heap
page read and write
F54000
heap
page read and write
14F0000
direct allocation
page read and write
F54000
heap
page read and write
4BF1000
heap
page read and write
F19000
unkown
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
22BDF000
heap
page read and write
A8000
unkown
page execute and read and write
4BF1000
heap
page read and write
4911000
heap
page read and write
55C0000
direct allocation
page execute and read and write
5010000
direct allocation
page execute and read and write
1C19E000
stack
page read and write
2D0F000
stack
page read and write
5551000
direct allocation
page read and write
69CE000
stack
page read and write
EAE000
stack
page read and write
22CA8000
heap
page read and write
4911000
heap
page read and write
1924000
heap
page read and write
4BAE000
stack
page read and write
1183000
unkown
page execute and read and write
545B000
stack
page read and write
3E2F000
stack
page read and write
4BF1000
heap
page read and write
4BF1000
heap
page read and write
47DF000
stack
page read and write
41AF000
stack
page read and write
131E000
heap
page read and write
451F000
stack
page read and write
535F000
stack
page read and write
22BD4000
heap
page read and write
3D1E000
stack
page read and write
4911000
heap
page read and write
55D0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
2E6E000
stack
page read and write
56F0000
direct allocation
page execute and read and write
4911000
heap
page read and write
EB0000
unkown
page readonly
442E000
stack
page read and write
11C6000
unkown
page execute and write copy
C74000
heap
page read and write
5071000
heap
page read and write
4911000
heap
page read and write
5230000
direct allocation
page execute and read and write
34DF000
stack
page read and write
51E0000
direct allocation
page read and write
DAC000
stack
page read and write
5F0000
unkown
page readonly
EA0000
direct allocation
page read and write
F19000
unkown
page write copy
5060000
direct allocation
page execute and read and write
3300000
direct allocation
page read and write
60000
unkown
page readonly
1510000
direct allocation
page read and write
1810000
heap
page read and write
4911000
heap
page read and write
365E000
stack
page read and write
364E000
direct allocation
page execute and read and write
1920000
heap
page read and write
10A1000
unkown
page execute and read and write
22BA5000
heap
page read and write
4BF1000
heap
page read and write
3320000
heap
page read and write
1580000
heap
page read and write
22BDE000
heap
page read and write
52EE000
stack
page read and write
12F0000
direct allocation
page read and write
285000
unkown
page execute and read and write
39E4000
direct allocation
page execute and read and write
16D4000
heap
page read and write
4CEE000
stack
page read and write
16D4000
heap
page read and write
3980000
heap
page read and write
4DEB000
stack
page read and write
5440000
direct allocation
page read and write
22BB5000
heap
page read and write
369E000
stack
page read and write
491F000
stack
page read and write
B20000
heap
page read and write
4BF1000
heap
page read and write
2ED0000
direct allocation
page execute and read and write
F1B000
unkown
page execute and read and write
75C000
stack
page read and write
4EEF000
stack
page read and write
373E000
stack
page read and write
BE0000
heap
page read and write
B10000
direct allocation
page read and write
4BF1000
heap
page read and write
17BE000
stack
page read and write
A74000
heap
page read and write
8559000
heap
page read and write
65BE000
stack
page read and write
3F6E000
stack
page read and write
2E0F000
stack
page read and write
1524000
heap
page read and write
BAC000
heap
page read and write
1367000
unkown
page execute and write copy
4BEE000
stack
page read and write
31AF000
stack
page read and write
3300000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
138F000
heap
page read and write
EAD000
stack
page read and write
2EE7000
heap
page read and write
4F30000
direct allocation
page execute and read and write
4911000
heap
page read and write
356E000
stack
page read and write
51D0000
direct allocation
page execute and read and write
345E000
stack
page read and write
4911000
heap
page read and write
3F5E000
stack
page read and write
1AA000
unkown
page execute and read and write
6FB0000
heap
page read and write
3D9F000
stack
page read and write
827000
unkown
page execute and read and write
51F1000
heap
page read and write
3CC000
unkown
page execute and read and write
41EF000
stack
page read and write
1924000
heap
page read and write
4F9F000
stack
page read and write
4911000
heap
page read and write
1540000
direct allocation
page execute and read and write
C5E000
stack
page read and write
5030000
direct allocation
page execute and read and write
E4E000
stack
page read and write
4E31000
heap
page read and write
4F00000
direct allocation
page execute and read and write
3300000
direct allocation
page read and write
32F0000
heap
page read and write
4E5F000
stack
page read and write
53EF000
stack
page read and write
37DE000
stack
page read and write
158A000
heap
page read and write
51F0000
heap
page read and write
12F0000
direct allocation
page read and write
5F1000
unkown
page execute and write copy
17C4000
heap
page read and write
4BF1000
heap
page read and write
F19000
unkown
page read and write
4FA0000
direct allocation
page read and write
4E9E000
stack
page read and write
3BDE000
stack
page read and write
A74000
heap
page read and write
39EE000
direct allocation
page execute and read and write
378F000
stack
page read and write
1610000
heap
page read and write
22BB4000
heap
page read and write
F54000
heap
page read and write
56B0000
direct allocation
page execute and read and write
1C4AF000
stack
page read and write
4911000
heap
page read and write
3E2E000
stack
page read and write
2EC4B000
heap
page read and write
A50000
heap
page read and write
2F0F000
stack
page read and write
1800000
heap
page read and write
3F2F000
stack
page read and write
339F000
stack
page read and write
84000
unkown
page execute and write copy
495F000
stack
page read and write
355E000
stack
page read and write
3E1E000
stack
page read and write
39DF000
stack
page read and write
4BF1000
heap
page read and write
B10000
direct allocation
page read and write
3780000
heap
page read and write
A05000
unkown
page execute and read and write
11C6000
unkown
page execute and read and write
479F000
stack
page read and write
365F000
stack
page read and write
22BDB000
heap
page read and write
E8E000
stack
page read and write
E07000
unkown
page execute and write copy
5610000
direct allocation
page execute and read and write
16D4000
heap
page read and write
39E4000
direct allocation
page execute and read and write
17C4000
heap
page read and write
17C4000
heap
page read and write
22BD9000
heap
page read and write
14F0000
direct allocation
page read and write
10A1000
unkown
page execute and read and write
11C6000
unkown
page execute and read and write
A74000
heap
page read and write
22BD1000
heap
page read and write
4911000
heap
page read and write
13EE000
stack
page read and write
3DDF000
stack
page read and write
4911000
heap
page read and write
54C0000
direct allocation
page execute and read and write
EA0000
direct allocation
page read and write
3640000
direct allocation
page execute and read and write
1524000
heap
page read and write
11B7000
unkown
page execute and read and write
EB0000
unkown
page read and write
61ED3000
direct allocation
page read and write
4911000
heap
page read and write
16FD000
stack
page read and write
4911000
heap
page read and write
E3E000
stack
page read and write
421E000
stack
page read and write
4BDE000
stack
page read and write
4911000
heap
page read and write
5690000
direct allocation
page execute and read and write
12F0000
direct allocation
page read and write
5840000
direct allocation
page execute and read and write
341F000
stack
page read and write
38CF000
stack
page read and write
1924000
heap
page read and write
588C000
stack
page read and write
314F000
stack
page read and write
379E000
stack
page read and write
46DE000
stack
page read and write
13C9000
heap
page read and write
A74000
heap
page read and write
4E01000
direct allocation
page read and write
E2C000
stack
page read and write
E00000
heap
page read and write
3B6E000
stack
page read and write
1183000
unkown
page execute and read and write
1AFF000
stack
page read and write
F12000
unkown
page execute and read and write
458E000
stack
page read and write
22BB3000
heap
page read and write
18DB000
heap
page read and write
4BF1000
heap
page read and write
A74000
heap
page read and write
FB6000
unkown
page execute and write copy
495E000
stack
page read and write
4BF1000
heap
page read and write
5354000
heap
page read and write
17C4000
heap
page read and write
4BF1000
heap
page read and write
CFC000
stack
page read and write
12F0000
direct allocation
page read and write
469E000
stack
page read and write
4FA0000
direct allocation
page read and write
3B83000
heap
page read and write
5810000
direct allocation
page execute and read and write
2EBB0000
trusted library allocation
page read and write
680F000
stack
page read and write
4911000
heap
page read and write
3C9F000
stack
page read and write
419E000
stack
page read and write
4FA0000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
4BF1000
heap
page read and write
B2E000
heap
page read and write
3300000
direct allocation
page read and write
6CE32000
unkown
page readonly
5800000
direct allocation
page execute and read and write
297000
unkown
page execute and read and write
51DF000
stack
page read and write
22BCF000
heap
page read and write
1629000
heap
page read and write
6CE1D000
unkown
page readonly
14C0000
heap
page read and write
4CF0000
trusted library allocation
page read and write
4BF1000
heap
page read and write
4911000
heap
page read and write
4BF1000
heap
page read and write
161B000
heap
page read and write
39A0000
direct allocation
page execute and read and write
48EF000
stack
page read and write
3C5F000
stack
page read and write
17A0000
heap
page read and write
65C0000
heap
page read and write
1CB20000
heap
page read and write
C74000
heap
page read and write
4BDF000
stack
page read and write
54A1000
direct allocation
page read and write
14AE000
stack
page read and write
12F0000
direct allocation
page read and write
4BF1000
heap
page read and write
550E000
stack
page read and write
3F4D000
stack
page read and write
17C4000
heap
page read and write
13E2000
heap
page read and write
56CE000
stack
page read and write
472E000
stack
page read and write
B61000
heap
page read and write
480E000
stack
page read and write
6FB0000
heap
page read and write
39E4000
direct allocation
page execute and read and write
1517000
heap
page read and write
16D4000
heap
page read and write
4CEF000
stack
page read and write
2EB0000
direct allocation
page read and write
3890000
heap
page read and write
492E000
stack
page read and write
A74000
heap
page read and write
5620000
direct allocation
page execute and read and write
4911000
heap
page read and write
22BB7000
heap
page read and write
A74000
heap
page read and write
431E000
stack
page read and write
22BDF000
heap
page read and write
22BC0000
heap
page read and write
3CDE000
stack
page read and write
4BF1000
heap
page read and write
12F0000
direct allocation
page read and write
31EF000
stack
page read and write
3B1F000
stack
page read and write
3600000
direct allocation
page execute and read and write
784000
unkown
page execute and read and write
29C000
unkown
page execute and write copy
5420000
direct allocation
page execute and read and write
3F2E000
stack
page read and write
16D4000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
EA0000
direct allocation
page read and write
4BF1000
heap
page read and write
13AE000
stack
page read and write
9B9000
unkown
page read and write
FB3000
unkown
page execute and write copy
C74000
heap
page read and write
14F0000
direct allocation
page read and write
13D5000
heap
page read and write
4E31000
heap
page read and write
466F000
stack
page read and write
16D0000
heap
page read and write
406E000
stack
page read and write
3A2F000
stack
page read and write
3440000
direct allocation
page execute and read and write
5680000
direct allocation
page read and write
4FA0000
direct allocation
page read and write
2EB0000
direct allocation
page read and write
4911000
heap
page read and write
A74000
heap
page read and write
6CE2E000
unkown
page read and write
4911000
heap
page read and write
3740000
heap
page read and write
8FB000
stack
page read and write
51AF000
stack
page read and write
BB1000
heap
page read and write
1CB31000
heap
page read and write
4F9E000
stack
page read and write
52B9000
stack
page read and write
3644000
direct allocation
page execute and read and write
3300000
direct allocation
page read and write
6D01E000
unkown
page read and write
11AE000
unkown
page execute and read and write
1370000
heap
page read and write
36EE000
stack
page read and write
4911000
heap
page read and write
D14000
unkown
page execute and read and write
4911000
heap
page read and write
F54000
heap
page read and write
4911000
heap
page read and write
4A6E000
stack
page read and write
4BF1000
heap
page read and write
A74000
heap
page read and write
396E000
stack
page read and write
EB0000
unkown
page readonly
4C00000
heap
page read and write
C4E000
unkown
page execute and read and write
38DE000
stack
page read and write
5700000
direct allocation
page execute and read and write
38EE000
stack
page read and write
30EF000
stack
page read and write
33DF000
stack
page read and write
5810000
direct allocation
page execute and read and write
4BF1000
heap
page read and write
5820000
direct allocation
page execute and read and write
11B7000
unkown
page execute and read and write
18D0000
heap
page read and write
1924000
heap
page read and write
22BDF000
heap
page read and write
9BB000
unkown
page execute and read and write
1310000
heap
page read and write
1BF9E000
stack
page read and write
182E000
stack
page read and write
4BF1000
heap
page read and write
22BD4000
heap
page read and write
563F000
stack
page read and write
F0A000
stack
page read and write
22BB5000
heap
page read and write
106000
unkown
page execute and read and write
35CDC000
stack
page read and write
2F5F000
stack
page read and write
454F000
stack
page read and write
4DEF000
stack
page read and write
FEE000
stack
page read and write
6C0C000
stack
page read and write
C74000
heap
page read and write
4BF1000
heap
page read and write
15DF000
heap
page read and write
A26000
unkown
page execute and write copy
16D4000
heap
page read and write
4911000
heap
page read and write
A74000
heap
page read and write
4BF1000
heap
page read and write
11C6000
unkown
page execute and read and write
F54000
heap
page read and write
430E000
stack
page read and write
415F000
stack
page read and write
4FA0000
direct allocation
page read and write
4BF1000
heap
page read and write
C74000
heap
page read and write
22BBC000
heap
page read and write
331B000
stack
page read and write
150E000
stack
page read and write
4BF1000
heap
page read and write
F54000
heap
page read and write
4911000
heap
page read and write
318E000
stack
page read and write
1524000
heap
page read and write
3327000
heap
page read and write
5670000
direct allocation
page execute and read and write
444E000
stack
page read and write
2EE0000
heap
page read and write
13FC000
stack
page read and write
FAE000
stack
page read and write
33EF000
stack
page read and write
4911000
heap
page read and write
3E6E000
stack
page read and write
346E000
stack
page read and write
4E30000
heap
page read and write
17C4000
heap
page read and write
3550000
heap
page read and write
4911000
heap
page read and write
180B000
heap
page read and write
16D4000
heap
page read and write
3810000
heap
page read and write
16D4000
heap
page read and write
422E000
stack
page read and write
7EB30000
direct allocation
page execute and read and write
4F30000
trusted library allocation
page read and write
2E2C000
stack
page read and write
EB1000
unkown
page execute and write copy
5071000
heap
page read and write
1C61F000
stack
page read and write
391E000
stack
page read and write
5850000
direct allocation
page execute and read and write
13D5000
heap
page read and write
468F000
stack
page read and write
22BB4000
heap
page read and write
3C8F000
stack
page read and write
351F000
stack
page read and write
391F000
stack
page read and write
3770000
heap
page read and write
48DF000
stack
page read and write
4A5F000
stack
page read and write
F54000
heap
page read and write
4911000
heap
page read and write
4BF1000
heap
page read and write
5200000
direct allocation
page execute and read and write
F54000
heap
page read and write
F54000
heap
page read and write
650000
unkown
page execute and read and write
4DA0000
direct allocation
page read and write
12F0000
direct allocation
page read and write
12F0000
direct allocation
page read and write
146F000
stack
page read and write
4E31000
heap
page read and write
54F0000
direct allocation
page read and write
553E000
stack
page read and write
40DE000
stack
page read and write
EB0000
unkown
page read and write
19FF000
stack
page read and write
3F6F000
stack
page read and write
8342000
heap
page read and write
491E000
stack
page read and write
46EE000
stack
page read and write
11C6000
unkown
page execute and write copy
55D0000
direct allocation
page execute and read and write
14F0000
direct allocation
page read and write
42DF000
stack
page read and write
B10000
direct allocation
page read and write
EA0000
direct allocation
page read and write
3F0F000
stack
page read and write
F54000
heap
page read and write
364F000
stack
page read and write
F20000
heap
page read and write
56A0000
direct allocation
page execute and read and write
6CDA1000
unkown
page execute read
331E000
stack
page read and write
22BA6000
heap
page read and write
EA0000
direct allocation
page read and write
3CEF000
stack
page read and write
4911000
heap
page read and write
4C10000
heap
page read and write
3CAE000
stack
page read and write
22BD9000
heap
page read and write
4BF1000
heap
page read and write
A74000
heap
page read and write
1183000
unkown
page execute and read and write
B10000
direct allocation
page read and write
16D4000
heap
page read and write
6CE41000
unkown
page execute read
22BB4000
heap
page read and write
5450000
direct allocation
page execute and read and write
22BBB000
heap
page read and write
355F000
stack
page read and write
4FA0000
direct allocation
page read and write
3300000
direct allocation
page read and write
352F000
stack
page read and write
55F0000
direct allocation
page execute and read and write
61000
unkown
page execute and write copy
F54000
heap
page read and write
22BC8000
heap
page read and write
17C0000
heap
page read and write
4911000
heap
page read and write
4BF1000
heap
page read and write
F54000
heap
page read and write
E87000
heap
page read and write
416F000
stack
page read and write
1924000
heap
page read and write
3A2E000
stack
page read and write
14EE000
stack
page read and write
1924000
heap
page read and write
F12000
unkown
page execute and read and write
4911000
heap
page read and write
4EA0000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
4B6F000
stack
page read and write
A74000
heap
page read and write
65C000
unkown
page execute and read and write
3A6F000
stack
page read and write
4A6F000
stack
page read and write
13EE000
heap
page read and write
4BF1000
heap
page read and write
51E0000
direct allocation
page read and write
95C000
unkown
page execute and read and write
1515000
heap
page read and write
5420000
direct allocation
page execute and read and write
51C0000
direct allocation
page execute and read and write
146D000
stack
page read and write
3644000
direct allocation
page execute and read and write
459F000
stack
page read and write
5420000
direct allocation
page execute and read and write
11C7000
unkown
page execute and write copy
4911000
heap
page read and write
4BF1000
heap
page read and write
1CA9D000
stack
page read and write
56E1000
direct allocation
page read and write
35ADB000
stack
page read and write
47EE000
stack
page read and write
4BF1000
heap
page read and write
AFD000
stack
page read and write
32DE000
stack
page read and write
46AF000
stack
page read and write
4D2E000
stack
page read and write
17CE000
stack
page read and write
45AE000
stack
page read and write
5220000
direct allocation
page execute and read and write
F54000
heap
page read and write
9C0000
heap
page read and write
AFE000
stack
page read and write
3FAE000
stack
page read and write
4F10000
direct allocation
page execute and read and write
4E1F000
stack
page read and write
436E000
stack
page read and write
1524000
heap
page read and write
4BF1000
heap
page read and write
51E0000
direct allocation
page read and write
4BF1000
heap
page read and write
11C6000
unkown
page execute and read and write
14F0000
direct allocation
page read and write
F30000
heap
page read and write
7F880000
direct allocation
page execute and read and write
4911000
heap
page read and write
13C8000
heap
page read and write
951000
unkown
page execute and write copy
DFD000
stack
page read and write
F19000
unkown
page read and write
1524000
heap
page read and write
13D2000
heap
page read and write
F54000
heap
page read and write
5720000
direct allocation
page execute and read and write
C0E000
stack
page read and write
332E000
stack
page read and write
F54000
heap
page read and write
4A2F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
3983000
heap
page read and write
1510000
direct allocation
page read and write
4911000
heap
page read and write
4F01000
direct allocation
page read and write
1CB30000
heap
page read and write
4BF1000
heap
page read and write
4911000
heap
page read and write
F54000
heap
page read and write
1367000
unkown
page execute and write copy
6ACE000
stack
page read and write
4BF1000
heap
page read and write
1737000
heap
page read and write
F54000
heap
page read and write
442F000
stack
page read and write
61EB7000
direct allocation
page readonly
3644000
direct allocation
page execute and read and write
F12000
unkown
page execute and read and write
4911000
heap
page read and write
1CAAF000
stack
page read and write
4F3C000
stack
page read and write
51E0000
direct allocation
page read and write
F1B000
unkown
page execute and read and write
2E5F000
stack
page read and write
4BF1000
heap
page read and write
815000
unkown
page execute and read and write
3B9F000
stack
page read and write
1826000
heap
page read and write
6FAE000
heap
page read and write
F19000
unkown
page read and write
4BF1000
heap
page read and write
12F0000
direct allocation
page read and write
51E0000
direct allocation
page read and write
3B4F000
stack
page read and write
446E000
stack
page read and write
11AE000
unkown
page execute and read and write
4911000
heap
page read and write
22BAC000
heap
page read and write
180F000
stack
page read and write
A23000
unkown
page execute and write copy
3CEE000
stack
page read and write
351E000
stack
page read and write
5A4E000
stack
page read and write
8340000
heap
page read and write
4911000
heap
page read and write
5680000
direct allocation
page execute and read and write
560F000
stack
page read and write
13D0000
heap
page read and write
4BF1000
heap
page read and write
11C7000
unkown
page execute and write copy
40AE000
stack
page read and write
3B80000
heap
page read and write
4F30000
direct allocation
page execute and read and write
396E000
stack
page read and write
4BF1000
heap
page read and write
558F000
stack
page read and write
4BF1000
heap
page read and write
4F70000
direct allocation
page execute and read and write
F12000
unkown
page execute and read and write
446F000
stack
page read and write
359E000
stack
page read and write
4A9E000
stack
page read and write
176E000
stack
page read and write
4D1E000
stack
page read and write
51F1000
heap
page read and write
3F1E000
stack
page read and write
61E01000
direct allocation
page execute read
82C000
unkown
page execute and write copy
181C000
heap
page read and write
6CE40000
unkown
page readonly
9B9000
unkown
page write copy
5680000
direct allocation
page execute and read and write
57CF000
stack
page read and write
481F000
stack
page read and write
3EDF000
stack
page read and write
22BD1000
heap
page read and write
39E4000
direct allocation
page execute and read and write
1704000
heap
page read and write
475000
unkown
page execute and read and write
4911000
heap
page read and write
4FA0000
direct allocation
page read and write
456E000
stack
page read and write
42CF000
stack
page read and write
6D020000
unkown
page read and write
3F9E000
stack
page read and write
4D5E000
stack
page read and write
1524000
heap
page read and write
50D0000
direct allocation
page execute and read and write
B4C000
stack
page read and write
BA1000
heap
page read and write
44AE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
3CCE000
stack
page read and write
22BB6000
heap
page read and write
389F000
stack
page read and write
4911000
heap
page read and write
3300000
direct allocation
page read and write
22BB9000
heap
page read and write
11AE000
unkown
page execute and read and write
1520000
heap
page read and write
499E000
stack
page read and write
3A1F000
stack
page read and write
F1B000
unkown
page execute and read and write
58B0000
direct allocation
page execute and read and write
17D0000
heap
page read and write
3B5E000
stack
page read and write
670E000
stack
page read and write
61ED0000
direct allocation
page read and write
4911000
heap
page read and write
F54000
heap
page read and write
10A1000
unkown
page execute and read and write
364E000
direct allocation
page execute and read and write
3D0E000
stack
page read and write
56E0000
direct allocation
page execute and read and write
375F000
stack
page read and write
354E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
B10000
direct allocation
page read and write
17F0000
heap
page read and write
392E000
stack
page read and write
E60000
heap
page read and write
47CF000
stack
page read and write
F54000
heap
page read and write
5660000
direct allocation
page execute and read and write
39E4000
direct allocation
page execute and read and write
4FA0000
direct allocation
page read and write
5070000
direct allocation
page execute and read and write
7C0000
heap
page read and write
4911000
heap
page read and write
402F000
stack
page read and write
4BEF000
stack
page read and write
A74000
heap
page read and write
22BC0000
heap
page read and write
39D4000
direct allocation
page execute and read and write
35D1B000
stack
page read and write
18A0000
direct allocation
page execute and read and write
37DF000
stack
page read and write
4911000
heap
page read and write
F54000
heap
page read and write
13D5000
heap
page read and write
315F000
stack
page read and write
5080000
direct allocation
page execute and read and write
3A5E000
stack
page read and write
5870000
direct allocation
page execute and read and write
1924000
heap
page read and write
4BF1000
heap
page read and write
4FB1000
heap
page read and write
60C000
unkown
page execute and write copy
356F000
stack
page read and write
404F000
stack
page read and write
4F40000
direct allocation
page execute and read and write
3F1F000
stack
page read and write
30AF000
stack
page read and write
440F000
stack
page read and write
82C000
unkown
page execute and read and write
2EC59000
heap
page read and write
1183000
unkown
page execute and read and write
5810000
direct allocation
page execute and read and write
465F000
stack
page read and write
33CF000
stack
page read and write
4911000
heap
page read and write
3A0F000
stack
page read and write
4BF1000
heap
page read and write
614000
unkown
page execute and write copy
11C6000
unkown
page execute and read and write
3644000
direct allocation
page execute and read and write
3A6E000
stack
page read and write
325F000
stack
page read and write
14F0000
direct allocation
page read and write
EB0000
unkown
page read and write
3DEF000
stack
page read and write
171C000
heap
page read and write
EA0000
heap
page read and write
5F0000
unkown
page readonly
43EF000
stack
page read and write
1183000
unkown
page execute and read and write
14AE000
stack
page read and write
A5D000
heap
page read and write
22BD1000
heap
page read and write
A74000
heap
page read and write
47DE000
stack
page read and write
A74000
heap
page read and write
4DA0000
direct allocation
page read and write
F19000
unkown
page write copy
F54000
heap
page read and write
37CE000
stack
page read and write
17C4000
heap
page read and write
17F0000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4A20000
heap
page read and write
46AE000
stack
page read and write
4911000
heap
page read and write
B87000
heap
page read and write
32AE000
stack
page read and write
50A0000
direct allocation
page execute and read and write
14F0000
direct allocation
page read and write
3DCF000
stack
page read and write
4911000
heap
page read and write
22BDE000
heap
page read and write
A3E000
stack
page read and write
3EEF000
stack
page read and write
60000
unkown
page readonly
F54000
heap
page read and write
409F000
stack
page read and write
4BF1000
heap
page read and write
183A000
heap
page read and write
B10000
direct allocation
page read and write
4911000
heap
page read and write
3ECF000
stack
page read and write
22BC0000
heap
page read and write
5071000
heap
page read and write
There are 1556 hidden memdumps, click here to show them.