IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\19a0b0f0ae.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\GCGCBAECFC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BFHDHJKKJDHJJJJKEGHIDGDHDA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DHDHCGHDHIDHCBGCBGCAEBAKEH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DHIDHIEGIIIECAKEBFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EHDGIJJDGCBKFIDHIEBKECGIJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\FHCGCFHDHIIIDGCAAEGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HCAEBFBK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IECFHDBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJJKKJJDAAAAAKFHJJDG
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\GCGCBAECFC.exe
"C:\Users\user\AppData\Local\Temp\GCGCBAECFC.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\19a0b0f0ae.exe
"C:\Users\user\AppData\Local\Temp\1000006001\19a0b0f0ae.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\GCGCBAECFC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\KJEHDHIEGI.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://77.91.77.82/Hun4Ko/index.php/Hun4Ko/index.php
unknown
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
85.28.47.4/920475a59bac849d.php
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
http://77.91.77.82/Hun4Ko/index.phpS
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.91.77.81/cost/go.exe
unknown
http://77.91.77.82/Hun4Ko/index.phpG
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dll-y
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://85.28.47.4/69934896f997d5bb/vcruntime140.dllr
unknown
http://77.91.77.82/Hun4Ko/index.phpY
unknown
http://85.28.47.4/69934896f997d5bb/nss3.dlla
unknown
http://77.91.77.82/Hun4Ko/index.php-
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://85.28.47.4/920475a59bac849d.php3
unknown
http://77.91.77.82/Hun4Ko/index.phpmespace
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://85.28.47.43
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016.exe
unknown
http://77.91.77.82/Hun4Ko/index.php/skR
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://77.91.77.81/mine/amadka.exephprefoxx
unknown
http://77.91.77.81/mine/amadka.exe00
unknown
http://85.28.47.4/920475a59bac849d.phpNu
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://77.91.77.82/Hun4Ko/index.phpy6o
unknown
https://mozilla.org0/
unknown
http://85.28.47.4/920475a59bac849d.phpRLH_
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://77.91.77.81/cost/go.exeData
unknown
http://77.91.77.81/stealc/random.exe
unknown
http://77.91.77.82/Hun4Ko/index.php$
unknown
http://77.91.77.81/cost/go.exe00
unknown
http://77.91.77.81/mine/amadka.exea
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://85.28.47.4/69934896f997d5bb/freebl3.dllGy
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
http://77.91.77.81/stealc/random.exerlencoded
unknown
http://85.28.47.4s
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 58 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious
77.91.77.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
71000
unkown
page execute and read and write
malicious
71000
unkown
page execute and read and write
malicious
8D1000
unkown
page execute and read and write
malicious
187E000
heap
page read and write
malicious
4C00000
direct allocation
page read and write
malicious
4AB0000
direct allocation
page read and write
malicious
71000
unkown
page execute and read and write
malicious
4870000
direct allocation
page read and write
malicious
71000
unkown
page execute and read and write
malicious
4BB0000
direct allocation
page read and write
malicious
4860000
direct allocation
page read and write
malicious
51C0000
direct allocation
page read and write
malicious
4D70000
direct allocation
page read and write
malicious
1B14000
heap
page read and write
malicious
71000
unkown
page execute and read and write
malicious
791000
unkown
page execute and read and write
malicious
6C1000
unkown
page execute and read and write
malicious
1CF71000
heap
page read and write
415E000
stack
page read and write
429E000
stack
page read and write
32FF000
stack
page read and write
AF5000
unkown
page execute and read and write
43D1000
heap
page read and write
43C0000
direct allocation
page read and write
39A4000
direct allocation
page execute and read and write
70000
unkown
page read and write
43D1000
heap
page read and write
AA3000
unkown
page execute and read and write
1C84E000
stack
page read and write
4700000
direct allocation
page read and write
49AF000
stack
page read and write
37B000
unkown
page execute and read and write
B3D000
stack
page read and write
6E4000
unkown
page execute and write copy
1AF0000
heap
page read and write
43D1000
heap
page read and write
4711000
heap
page read and write
43D1000
heap
page read and write
2300F000
heap
page read and write
4711000
heap
page read and write
43D1000
heap
page read and write
4711000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
B0C000
unkown
page execute and write copy
2730000
direct allocation
page read and write
4711000
heap
page read and write
22FE6000
heap
page read and write
DC9000
heap
page read and write
7FC000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
49E0000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
31CE000
stack
page read and write
2730000
direct allocation
page read and write
3EDE000
stack
page read and write
393000
unkown
page execute and write copy
108D000
unkown
page execute and write copy
2A30000
direct allocation
page read and write
1B4D000
heap
page read and write
D3E000
stack
page read and write
431F000
stack
page read and write
53B000
unkown
page execute and read and write
2FFAB000
stack
page read and write
2300F000
heap
page read and write
FF4000
heap
page read and write
974000
heap
page read and write
1937000
heap
page read and write
4621000
heap
page read and write
974000
heap
page read and write
375E000
stack
page read and write
393000
unkown
page execute and write copy
70000
unkown
page readonly
39A4000
direct allocation
page execute and read and write
397E000
stack
page read and write
C84000
heap
page read and write
43D1000
heap
page read and write
30E0000
direct allocation
page read and write
71000
unkown
page execute and write copy
187A000
heap
page read and write
39A0000
direct allocation
page execute and read and write
3ABE000
stack
page read and write
390F000
stack
page read and write
2300F000
heap
page read and write
530000
heap
page read and write
1C43E000
stack
page read and write
42CE000
stack
page read and write
8D1000
unkown
page execute and write copy
35DF000
stack
page read and write
499F000
stack
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
1710000
heap
page read and write
43D1000
heap
page read and write
4D30000
direct allocation
page execute and read and write
43D1000
heap
page read and write
4711000
heap
page read and write
1456000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4700000
direct allocation
page read and write
3B8F000
stack
page read and write
FA4000
heap
page read and write
4C10000
direct allocation
page execute and read and write
298F000
stack
page read and write
22FFA000
heap
page read and write
2300F000
heap
page read and write
49E0000
direct allocation
page execute and read and write
4A80000
direct allocation
page execute and read and write
1BB6000
heap
page read and write
5DFE000
stack
page read and write
4D30000
direct allocation
page execute and read and write
4711000
heap
page read and write
23011000
heap
page read and write
16C3000
heap
page read and write
4711000
heap
page read and write
2301D000
heap
page read and write
5380000
direct allocation
page execute and read and write
36A4000
direct allocation
page execute and read and write
37FF000
stack
page read and write
30F7000
heap
page read and write
DFF000
heap
page read and write
1CABC000
stack
page read and write
F90000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
325E000
stack
page read and write
2D1F000
stack
page read and write
43D0000
heap
page read and write
378E000
stack
page read and write
37B0000
heap
page read and write
D2000
unkown
page execute and read and write
974000
heap
page read and write
3993000
direct allocation
page execute and read and write
6C82F000
unkown
page readonly
DE9000
unkown
page execute and read and write
23011000
heap
page read and write
129A000
unkown
page execute and write copy
67B0000
heap
page read and write
26E0000
direct allocation
page read and write
26E0000
direct allocation
page read and write
3F7F000
stack
page read and write
414F000
stack
page read and write
2AFE000
stack
page read and write
273C000
stack
page read and write
8FC000
unkown
page execute and read and write
E2A000
heap
page read and write
447F000
stack
page read and write
427F000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
393000
unkown
page execute and write copy
6560000
heap
page read and write
71000
unkown
page execute and write copy
4DB0000
direct allocation
page execute and read and write
4850000
direct allocation
page read and write
770000
heap
page read and write
E34000
heap
page read and write
3ECF000
stack
page read and write
26E0000
direct allocation
page read and write
4711000
heap
page read and write
428F000
stack
page read and write
23011000
heap
page read and write
790000
unkown
page read and write
2301D000
heap
page read and write
4711000
heap
page read and write
43D1000
heap
page read and write
1CF70000
heap
page read and write
303EC000
stack
page read and write
392000
unkown
page execute and write copy
1E6E000
stack
page read and write
1C3AE000
stack
page read and write
2300F000
heap
page read and write
43C0000
direct allocation
page read and write
3F8E000
stack
page read and write
DB6000
heap
page read and write
404E000
stack
page read and write
34C000
unkown
page execute and read and write
4AA0000
direct allocation
page read and write
3C8E000
stack
page read and write
43D1000
heap
page read and write
4AA0000
direct allocation
page read and write
FA4000
heap
page read and write
2BFF000
stack
page read and write
20EE000
stack
page read and write
23000000
heap
page read and write
4BF0000
direct allocation
page read and write
10F0000
direct allocation
page read and write
59E000
stack
page read and write
3B1E000
stack
page read and write
6C870000
unkown
page read and write
26E0000
direct allocation
page read and write
4D3F000
stack
page read and write
43D1000
heap
page read and write
4C30000
direct allocation
page execute and read and write
392000
unkown
page execute and write copy
43D1000
heap
page read and write
49B0000
direct allocation
page execute and read and write
301AC000
stack
page read and write
284F000
stack
page read and write
E1D000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
6C0000
unkown
page readonly
E90000
heap
page read and write
70000
unkown
page read and write
311E000
stack
page read and write
2D3F000
stack
page read and write
39A4000
direct allocation
page execute and read and write
1CF60000
heap
page read and write
4A30000
direct allocation
page execute and read and write
1B9C000
heap
page read and write
30E0000
direct allocation
page read and write
26A000
unkown
page execute and read and write
36A4000
direct allocation
page execute and read and write
1420000
direct allocation
page read and write
4711000
heap
page read and write
4E40000
trusted library allocation
page read and write
B07000
unkown
page execute and read and write
465E000
stack
page read and write
4711000
heap
page read and write
38BE000
stack
page read and write
5360000
direct allocation
page execute and read and write
271E000
stack
page read and write
29367000
heap
page read and write
7C7E000
stack
page read and write
43D1000
heap
page read and write
4C3E000
stack
page read and write
6DC000
unkown
page execute and write copy
C84000
heap
page read and write
17F3000
stack
page read and write
70000
unkown
page read and write
16C0000
heap
page read and write
3C23000
heap
page read and write
4711000
heap
page read and write
33CE000
stack
page read and write
2E7F000
stack
page read and write
35FE000
stack
page read and write
3A8E000
stack
page read and write
43D1000
heap
page read and write
D2000
unkown
page execute and read and write
2C8F000
stack
page read and write
461F000
stack
page read and write
304F000
stack
page read and write
6C67E000
unkown
page read and write
2C5F000
stack
page read and write
DF4000
heap
page read and write
26A000
unkown
page execute and read and write
616F000
stack
page read and write
43D1000
heap
page read and write
FA4000
heap
page read and write
567E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
2E5F000
stack
page read and write
394E000
stack
page read and write
43C0000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
D2000
unkown
page execute and read and write
4A20000
direct allocation
page execute and read and write
791000
unkown
page execute and write copy
411F000
stack
page read and write
FF4000
heap
page read and write
DE8000
heap
page read and write
4711000
heap
page read and write
393000
unkown
page execute and write copy
C3C000
unkown
page execute and read and write
49F0000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
43D1000
heap
page read and write
42BE000
stack
page read and write
5C7000
heap
page read and write
459F000
stack
page read and write
4AEE000
stack
page read and write
144C000
heap
page read and write
2D5E000
stack
page read and write
80A000
unkown
page execute and read and write
7F9000
unkown
page write copy
3C5E000
stack
page read and write
D6E000
heap
page read and write
41CF000
stack
page read and write
417E000
stack
page read and write
318F000
stack
page read and write
1CF71000
heap
page read and write
37D0000
heap
page read and write
22FFD000
heap
page read and write
162F000
stack
page read and write
3E9F000
stack
page read and write
10F0000
direct allocation
page read and write
D74000
heap
page read and write
67A0000
heap
page read and write
3C40000
heap
page read and write
2B00000
direct allocation
page read and write
34DE000
stack
page read and write
23014000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4D30000
direct allocation
page execute and read and write
3D3E000
stack
page read and write
2FB000
stack
page read and write
403E000
stack
page read and write
4D80000
direct allocation
page execute and read and write
23000000
heap
page read and write
43C0000
direct allocation
page read and write
EB000
stack
page read and write
3D5F000
stack
page read and write
2ACF000
stack
page read and write
3AA0000
heap
page read and write
53B000
unkown
page execute and read and write
FF0000
heap
page read and write
49C0000
direct allocation
page execute and read and write
1C67D000
stack
page read and write
22FE6000
heap
page read and write
4621000
heap
page read and write
3D9E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
308B000
stack
page read and write
D40000
heap
page read and write
29BE000
stack
page read and write
10F0000
direct allocation
page read and write
D70000
heap
page read and write
392000
unkown
page execute and read and write
43D1000
heap
page read and write
2CCE000
stack
page read and write
4720000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
35BE000
stack
page read and write
26E0000
direct allocation
page read and write
FA4000
heap
page read and write
AB2000
unkown
page execute and read and write
F2C000
stack
page read and write
43D1000
heap
page read and write
23014000
heap
page read and write
2F0F000
stack
page read and write
350000
heap
page read and write
274C000
stack
page read and write
67AE000
heap
page read and write
2A2E000
stack
page read and write
338F000
stack
page read and write
5350000
direct allocation
page execute and read and write
FF9000
unkown
page execute and read and write
2E8F000
stack
page read and write
4700000
direct allocation
page read and write
4CC0000
direct allocation
page execute and read and write
296E000
stack
page read and write
43C0000
direct allocation
page read and write
26DF000
stack
page read and write
5E20000
heap
page read and write
5DBE000
stack
page read and write
AC0000
heap
page read and write
2B5F000
stack
page read and write
22FFB000
heap
page read and write
4A90000
direct allocation
page execute and read and write
39A0000
heap
page read and write
34CF000
stack
page read and write
5320000
direct allocation
page execute and read and write
2300F000
heap
page read and write
3E4E000
stack
page read and write
49F0000
trusted library allocation
page read and write
4711000
heap
page read and write
4D60000
direct allocation
page execute and read and write
108A000
unkown
page execute and write copy
392000
unkown
page execute and read and write
D74000
heap
page read and write
16B0000
heap
page read and write
357F000
stack
page read and write
2300F000
heap
page read and write
10F0000
direct allocation
page read and write
2F9F000
stack
page read and write
43D1000
heap
page read and write
4C60000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2A7E000
stack
page read and write
D74000
heap
page read and write
2730000
direct allocation
page read and write
1CEDD000
stack
page read and write
290BE000
stack
page read and write
2935E000
heap
page read and write
424F000
stack
page read and write
4CEF000
stack
page read and write
2300F000
heap
page read and write
450000
heap
page read and write
385F000
stack
page read and write
D9000
unkown
page write copy
2301A000
heap
page read and write
DB000
unkown
page execute and read and write
23000000
heap
page read and write
449E000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
53D000
unkown
page execute and write copy
974000
heap
page read and write
E8E000
stack
page read and write
363E000
stack
page read and write
190D000
stack
page read and write
61EB7000
direct allocation
page readonly
22FF9000
heap
page read and write
6DF000
stack
page read and write
B07000
unkown
page execute and write copy
36FE000
stack
page read and write
C84000
heap
page read and write
43D1000
heap
page read and write
E14000
heap
page read and write
606E000
stack
page read and write
23002000
heap
page read and write
36A0000
direct allocation
page execute and read and write
34FE000
stack
page read and write
36AE000
direct allocation
page execute and read and write
4BA0000
direct allocation
page read and write
2B8F000
stack
page read and write
330E000
stack
page read and write
96C000
stack
page read and write
23005000
heap
page read and write
553D000
stack
page read and write
31FF000
stack
page read and write
4711000
heap
page read and write
439F000
stack
page read and write
E24000
heap
page read and write
3ADF000
stack
page read and write
4A50000
direct allocation
page execute and read and write
4EB0000
direct allocation
page execute and read and write
23011000
heap
page read and write
43CF000
stack
page read and write
FF4000
heap
page read and write
2730000
direct allocation
page read and write
4711000
heap
page read and write
3F6F000
stack
page read and write
2300F000
heap
page read and write
3A4F000
stack
page read and write
2700000
heap
page read and write
1420000
direct allocation
page read and write
DFF000
heap
page read and write
43D1000
heap
page read and write
71000
unkown
page execute and write copy
43D0000
heap
page read and write
118F000
stack
page read and write
43D1000
heap
page read and write
2A30000
direct allocation
page read and write
433F000
stack
page read and write
4711000
heap
page read and write
3C7E000
stack
page read and write
E1C000
heap
page read and write
E24000
heap
page read and write
43C0000
direct allocation
page read and write
3FDF000
stack
page read and write
2C3E000
stack
page read and write
7F1F0000
direct allocation
page execute and read and write
230E9000
heap
page read and write
D5E000
stack
page read and write
43D1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4711000
heap
page read and write
4850000
direct allocation
page read and write
E14000
heap
page read and write
7F2000
unkown
page execute and read and write
1BA5000
heap
page read and write
43D1000
heap
page read and write
4621000
heap
page read and write
4BA0000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
4B84000
heap
page read and write
4B80000
heap
page read and write
3700000
direct allocation
page execute and read and write
4D80000
direct allocation
page execute and read and write
4760000
heap
page read and write
C80000
heap
page read and write
10F0000
direct allocation
page read and write
1930000
heap
page read and write
43D1000
heap
page read and write
344E000
stack
page read and write
2750000
heap
page read and write
E2A000
heap
page read and write
22FF4000
heap
page read and write
43D1000
heap
page read and write
22FE7000
heap
page read and write
53D000
unkown
page execute and write copy
22FF3000
heap
page read and write
26E0000
direct allocation
page read and write
3B4E000
stack
page read and write
29CE000
stack
page read and write
40FE000
stack
page read and write
36CE000
stack
page read and write
30DF000
stack
page read and write
3A70000
heap
page read and write
3EDE000
stack
page read and write
354F000
stack
page read and write
2757000
heap
page read and write
387F000
stack
page read and write
3D0E000
stack
page read and write
43D1000
heap
page read and write
2D8E000
stack
page read and write
3A7F000
stack
page read and write
4BFF000
stack
page read and write
5340000
direct allocation
page execute and read and write
421E000
stack
page read and write
39DE000
stack
page read and write
4720000
heap
page read and write
4C50000
direct allocation
page execute and read and write
43D1000
heap
page read and write
4711000
heap
page read and write
328E000
stack
page read and write
4711000
heap
page read and write
2C4E000
stack
page read and write
10F0000
direct allocation
page read and write
4621000
heap
page read and write
1420000
direct allocation
page read and write
8FD000
stack
page read and write
26E0000
direct allocation
page read and write
4AA0000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
44DF000
stack
page read and write
3693000
direct allocation
page execute and read and write
EBE000
stack
page read and write
3E9F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
4711000
heap
page read and write
3BFE000
stack
page read and write
48AE000
stack
page read and write
4A20000
direct allocation
page execute and read and write
304F000
stack
page read and write
437E000
stack
page read and write
FF4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
1410000
heap
page read and write
61ECD000
direct allocation
page readonly
61E00000
direct allocation
page execute and read and write
1420000
direct allocation
page read and write
23004000
heap
page read and write
67B0000
heap
page read and write
34C000
unkown
page execute and read and write
22FFE000
heap
page read and write
DDB000
heap
page read and write
396E000
stack
page read and write
30E0000
direct allocation
page read and write
4711000
heap
page read and write
4711000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
23002000
heap
page read and write
4BF0000
direct allocation
page read and write
129D000
unkown
page execute and write copy
56DE000
stack
page read and write
2301A000
heap
page read and write
2A30000
direct allocation
page read and write
22FF3000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4700000
direct allocation
page read and write
49E0000
direct allocation
page execute and read and write
23000000
heap
page read and write
E14000
heap
page read and write
23014000
heap
page read and write
FA4000
heap
page read and write
B80000
heap
page read and write
46E0000
heap
page read and write
E40000
heap
page read and write
26E0000
direct allocation
page read and write
4711000
heap
page read and write
4C30000
direct allocation
page execute and read and write
418E000
stack
page read and write
708000
unkown
page execute and read and write
48D1000
direct allocation
page read and write
43C0000
direct allocation
page read and write
2301D000
heap
page read and write
6C690000
unkown
page readonly
43D1000
heap
page read and write
1420000
direct allocation
page read and write
43D1000
heap
page read and write
2A40000
heap
page read and write
E17000
heap
page read and write
30CE000
stack
page read and write
4D41000
heap
page read and write
1C8BD000
stack
page read and write
310F000
stack
page read and write
314E000
stack
page read and write
39AE000
direct allocation
page execute and read and write
43D1000
heap
page read and write
4711000
heap
page read and write
16A0000
heap
page read and write
4D80000
direct allocation
page execute and read and write
6180000
heap
page read and write
3ADF000
stack
page read and write
4761000
heap
page read and write
FF4000
heap
page read and write
10F0000
direct allocation
page read and write
10F0000
direct allocation
page read and write
43D1000
heap
page read and write
2FDE000
stack
page read and write
37C0000
heap
page read and write
8F7000
unkown
page execute and read and write
43DE000
stack
page read and write
4700000
direct allocation
page read and write
6C5F0000
unkown
page readonly
43D1000
heap
page read and write
4A10000
direct allocation
page execute and read and write
3D5E000
stack
page read and write
DB000
unkown
page execute and read and write
4D80000
direct allocation
page execute and read and write
17F8000
stack
page read and write
43D1000
heap
page read and write
71000
unkown
page execute and write copy
D5D000
heap
page read and write
43D1000
heap
page read and write
70000
unkown
page readonly
43D1000
heap
page read and write
4711000
heap
page read and write
4D3F000
stack
page read and write
D52000
heap
page read and write
43C0000
direct allocation
page read and write
E9B000
heap
page read and write
D9000
unkown
page read and write
2A30000
direct allocation
page read and write
5AE0000
heap
page read and write
FA4000
heap
page read and write
CBF000
stack
page read and write
E40000
heap
page read and write
4711000
heap
page read and write
389E000
stack
page read and write
483F000
stack
page read and write
FF4000
heap
page read and write
2C1E000
stack
page read and write
D6A000
heap
page read and write
10F0000
direct allocation
page read and write
339E000
stack
page read and write
CE5000
unkown
page execute and read and write
5340000
direct allocation
page execute and read and write
1420000
direct allocation
page read and write
1CCDD000
stack
page read and write
43D1000
heap
page read and write
7B44000
heap
page read and write
93C000
unkown
page execute and read and write
43D1000
heap
page read and write
61EB4000
direct allocation
page read and write
26A000
unkown
page execute and read and write
22FFD000
heap
page read and write
D60000
heap
page read and write
AD5000
unkown
page execute and read and write
1CA9D000
stack
page read and write
4711000
heap
page read and write
38CE000
stack
page read and write
515F000
stack
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
D2000
unkown
page execute and read and write
2301A000
heap
page read and write
FA4000
heap
page read and write
1420000
direct allocation
page read and write
C84000
heap
page read and write
43C0000
direct allocation
page read and write
974000
heap
page read and write
2A9F000
stack
page read and write
321F000
stack
page read and write
3EFE000
stack
page read and write
3FDF000
stack
page read and write
D2E000
stack
page read and write
2301A000
heap
page read and write
1C16E000
stack
page read and write
1CA4F000
stack
page read and write
3FBE000
stack
page read and write
26E0000
direct allocation
page read and write
FBF000
stack
page read and write
3A90000
heap
page read and write
3694000
direct allocation
page execute and read and write
5F2F000
stack
page read and write
4711000
heap
page read and write
2301A000
heap
page read and write
22FE7000
heap
page read and write
343F000
stack
page read and write
FF4000
heap
page read and write
1C5EE000
stack
page read and write
2A30000
direct allocation
page read and write
D6E000
heap
page read and write
4EDB000
stack
page read and write
4B8C000
stack
page read and write
377E000
stack
page read and write
52EE000
stack
page read and write
22FFD000
heap
page read and write
393F000
stack
page read and write
4711000
heap
page read and write
DB000
unkown
page execute and read and write
61ECC000
direct allocation
page read and write
44BE000
stack
page read and write
36A4000
direct allocation
page execute and read and write
2730000
direct allocation
page read and write
FA4000
heap
page read and write
1430000
heap
page read and write
33BE000
stack
page read and write
DFF000
heap
page read and write
401E000
stack
page read and write
4711000
heap
page read and write
392000
unkown
page execute and read and write
451E000
stack
page read and write
385F000
stack
page read and write
44D0000
trusted library allocation
page read and write
2A30000
direct allocation
page read and write
543E000
stack
page read and write
2F9F000
stack
page read and write
4711000
heap
page read and write
C84000
heap
page read and write
1C1FF000
stack
page read and write
49E0000
direct allocation
page execute and read and write
26E0000
direct allocation
page read and write
53D0000
direct allocation
page execute and read and write
475F000
stack
page read and write
287E000
stack
page read and write
2ADE000
stack
page read and write
45BE000
stack
page read and write
439F000
stack
page read and write
C84000
heap
page read and write
383000
unkown
page execute and read and write
3D7F000
stack
page read and write
2730000
direct allocation
page read and write
D2000
unkown
page execute and read and write
4711000
heap
page read and write
602F000
stack
page read and write
39FE000
stack
page read and write
3AE000
stack
page read and write
D74000
heap
page read and write
347E000
stack
page read and write
3994000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2D7E000
stack
page read and write
295F000
stack
page read and write
10F0000
direct allocation
page read and write
49D0000
direct allocation
page execute and read and write
400F000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
62CC000
stack
page read and write
FF4000
heap
page read and write
350E000
stack
page read and write
23015000
heap
page read and write
43D1000
heap
page read and write
48F1000
heap
page read and write
4860000
direct allocation
page read and write
4BEF000
stack
page read and write
6C0000
unkown
page readonly
5310000
direct allocation
page execute and read and write
313E000
stack
page read and write
E25000
heap
page read and write
3EE000
stack
page read and write
71E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
451E000
stack
page read and write
43D1000
heap
page read and write
4711000
heap
page read and write
FA4000
heap
page read and write
43D1000
heap
page read and write
3920000
heap
page read and write
36A4000
direct allocation
page execute and read and write
340F000
stack
page read and write
39BF000
stack
page read and write
766000
unkown
page execute and read and write
4700000
direct allocation
page read and write
360000
heap
page read and write
71000
unkown
page execute and write copy
49F0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2730000
direct allocation
page read and write
B0C000
unkown
page execute and read and write
3C20000
heap
page read and write
1C77000
heap
page read and write
2730000
direct allocation
page read and write
CFE000
stack
page read and write
98A000
unkown
page execute and read and write
297F000
stack
page read and write
7D7E000
stack
page read and write
1B99000
heap
page read and write
2A3C000
stack
page read and write
36A4000
direct allocation
page execute and read and write
43D1000
heap
page read and write
E24000
heap
page read and write
43D1000
heap
page read and write
16D0000
direct allocation
page execute and read and write
108F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
FA4000
heap
page read and write
A6C000
unkown
page execute and read and write
4711000
heap
page read and write
6580000
heap
page read and write
383000
unkown
page execute and read and write
8FC000
unkown
page execute and write copy
374F000
stack
page read and write
26A000
unkown
page execute and read and write
974000
heap
page read and write
4711000
heap
page read and write
4700000
direct allocation
page read and write
1870000
heap
page read and write
656C000
heap
page read and write
974000
heap
page read and write
408F000
stack
page read and write
13B0000
heap
page read and write
1420000
direct allocation
page read and write
39DE000
stack
page read and write
43D1000
heap
page read and write
2A30000
direct allocation
page read and write
1420000
direct allocation
page read and write
29AC000
stack
page read and write
43D1000
heap
page read and write
3A0E000
stack
page read and write
3F4F000
stack
page read and write
43D1000
heap
page read and write
4711000
heap
page read and write
337F000
stack
page read and write
1EA000
stack
page read and write
371F000
stack
page read and write
383000
unkown
page execute and read and write
2E0E000
stack
page read and write
43D1000
heap
page read and write
23019000
heap
page read and write
4711000
heap
page read and write
43D1000
heap
page read and write
388F000
stack
page read and write
5370000
direct allocation
page execute and read and write
8F4000
unkown
page execute and write copy
292BF000
stack
page read and write
2300D000
heap
page read and write
43D1000
heap
page read and write
4711000
heap
page read and write
3810000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2FCF000
stack
page read and write
30F0000
heap
page read and write
505E000
stack
page read and write
23000000
heap
page read and write
2DCF000
stack
page read and write
4700000
direct allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
DA1000
heap
page read and write
43D1000
heap
page read and write
23009000
heap
page read and write
D74000
heap
page read and write
4D10000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2FFE000
stack
page read and write
1C7EF000
stack
page read and write
E2D000
heap
page read and write
36BF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
1420000
direct allocation
page read and write
39A4000
direct allocation
page execute and read and write
8D0000
unkown
page readonly
4700000
direct allocation
page read and write
FA4000
heap
page read and write
29EE000
stack
page read and write
283F000
stack
page read and write
425F000
stack
page read and write
325E000
stack
page read and write
2B00000
direct allocation
page read and write
4711000
heap
page read and write
6C1000
unkown
page execute and write copy
DAF000
heap
page read and write
1CC9C000
stack
page read and write
2301D000
heap
page read and write
2936C000
heap
page read and write
13FE000
stack
page read and write
311E000
stack
page read and write
22FE6000
heap
page read and write
34C000
unkown
page execute and read and write
4D80000
direct allocation
page execute and read and write
4DB0000
direct allocation
page execute and read and write
23000000
heap
page read and write
4860000
trusted library allocation
page read and write
26A000
unkown
page execute and read and write
4711000
heap
page read and write
4D30000
direct allocation
page execute and read and write
43D1000
heap
page read and write
36A4000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
2A30000
direct allocation
page read and write
2A50000
heap
page read and write
2720000
heap
page read and write
4711000
heap
page read and write
E1D000
heap
page read and write
4C70000
direct allocation
page execute and read and write
43D1000
heap
page read and write
D74000
heap
page read and write
49D0000
direct allocation
page execute and read and write
FF4000
heap
page read and write
43D1000
heap
page read and write
49E0000
direct allocation
page execute and read and write
3650000
heap
page read and write
70000
unkown
page read and write
D9000
unkown
page write copy
2301D000
heap
page read and write
960000
heap
page read and write
E2D000
heap
page read and write
383000
unkown
page execute and read and write
23000000
heap
page read and write
2707000
heap
page read and write
4711000
heap
page read and write
1AF8000
heap
page read and write
26FF000
stack
page read and write
1C9B000
heap
page read and write
43BF000
stack
page read and write
7F9000
unkown
page read and write
43D1000
heap
page read and write
23014000
heap
page read and write
3660000
direct allocation
page execute and read and write
53B0000
direct allocation
page execute and read and write
E1D000
heap
page read and write
2A30000
direct allocation
page read and write
4E00000
direct allocation
page execute and read and write
383000
unkown
page execute and read and write
22FFA000
heap
page read and write
43D1000
heap
page read and write
645C000
stack
page read and write
E41000
heap
page read and write
2730000
direct allocation
page read and write
4A00000
direct allocation
page execute and read and write
4711000
heap
page read and write
4D40000
direct allocation
page execute and read and write
49F0000
direct allocation
page execute and read and write
413F000
stack
page read and write
23014000
heap
page read and write
4860000
direct allocation
page read and write
4700000
direct allocation
page read and write
39A4000
direct allocation
page execute and read and write
3DBE000
stack
page read and write
4D20000
direct allocation
page execute and read and write
53B000
unkown
page execute and read and write
CFD000
stack
page read and write
E27000
heap
page read and write
335F000
stack
page read and write
3950000
heap
page read and write
557D000
stack
page read and write
30DF000
stack
page read and write
2E5F000
stack
page read and write
143A000
heap
page read and write
C84000
heap
page read and write
43D1000
heap
page read and write
361E000
stack
page read and write
D9000
unkown
page read and write
12FD000
stack
page read and write
4AFE000
stack
page read and write
43D1000
heap
page read and write
404E000
stack
page read and write
43D1000
heap
page read and write
43C0000
direct allocation
page read and write
DD1000
heap
page read and write
48F1000
heap
page read and write
61ED3000
direct allocation
page read and write
4711000
heap
page read and write
970000
heap
page read and write
3C4F000
stack
page read and write
1420000
direct allocation
page read and write
323F000
stack
page read and write
1420000
direct allocation
page read and write
23018000
heap
page read and write
FF4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
22FF3000
heap
page read and write
2FBF000
stack
page read and write
29FF000
stack
page read and write
8FC000
stack
page read and write
32CF000
stack
page read and write
4711000
heap
page read and write
43D1000
heap
page read and write
4810000
trusted library allocation
page read and write
1BFFF000
stack
page read and write
4A50000
direct allocation
page execute and read and write
4711000
heap
page read and write
FA4000
heap
page read and write
39A4000
direct allocation
page execute and read and write
4C61000
direct allocation
page read and write
23002000
heap
page read and write
DD1000
heap
page read and write
2730000
direct allocation
page read and write
AB0000
heap
page read and write
43D1000
heap
page read and write
53D000
unkown
page execute and write copy
D9D000
heap
page read and write
2B0E000
stack
page read and write
43D1000
heap
page read and write
FF4000
heap
page read and write
C5D000
unkown
page execute and write copy
3E0F000
stack
page read and write
28FE000
stack
page read and write
CCE000
stack
page read and write
429E000
stack
page read and write
43D1000
heap
page read and write
2301A000
heap
page read and write
5C0000
heap
page read and write
61ED0000
direct allocation
page read and write
D9000
unkown
page read and write
4C30000
direct allocation
page execute and read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
6C682000
unkown
page readonly
4C3E000
stack
page read and write
301EB000
stack
page read and write
22FF9000
heap
page read and write
ACB000
heap
page read and write
7FE000
stack
page read and write
35BE000
stack
page read and write
57DD000
stack
page read and write
61E01000
direct allocation
page execute read
36AE000
direct allocation
page execute and read and write
349F000
stack
page read and write
1935000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
4711000
heap
page read and write
4D41000
heap
page read and write
2936F000
heap
page read and write
2A87000
heap
page read and write
1C3FE000
stack
page read and write
8EC000
unkown
page execute and write copy
D74000
heap
page read and write
425F000
stack
page read and write
3B3E000
stack
page read and write
358E000
stack
page read and write
75E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
49BE000
stack
page read and write
49E0000
direct allocation
page execute and read and write
41FF000
stack
page read and write
2730000
direct allocation
page read and write
4711000
heap
page read and write
2D5F000
stack
page read and write
2A30000
direct allocation
page read and write
37B000
unkown
page execute and read and write
4A40000
direct allocation
page execute and read and write
43D1000
heap
page read and write
2E9E000
stack
page read and write
D45000
heap
page read and write
17FC000
stack
page read and write
2A8C000
heap
page read and write
360F000
stack
page read and write
34C000
unkown
page execute and read and write
1937000
heap
page read and write
23000000
heap
page read and write
1CD0000
heap
page read and write
7F7000
stack
page read and write
23017000
heap
page read and write
E1D000
heap
page read and write
43D1000
heap
page read and write
4A40000
direct allocation
page execute and read and write
1EEE000
stack
page read and write
DB000
unkown
page execute and read and write
3480000
direct allocation
page execute and read and write
8E5000
unkown
page execute and read and write
C84000
heap
page read and write
333E000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
4EC0000
direct allocation
page execute and read and write
399F000
stack
page read and write
A2C000
unkown
page execute and read and write
43D1000
heap
page read and write
1C8D000
heap
page read and write
43C0000
direct allocation
page read and write
655C000
stack
page read and write
974000
heap
page read and write
D40000
heap
page read and write
D74000
heap
page read and write
473E000
stack
page read and write
43D1000
heap
page read and write
140E000
stack
page read and write
E24000
heap
page read and write
10F0000
direct allocation
page read and write
26E0000
direct allocation
page read and write
656A000
heap
page read and write
4711000
heap
page read and write
C56000
unkown
page execute and read and write
974000
heap
page read and write
43D1000
heap
page read and write
339E000
stack
page read and write
411F000
stack
page read and write
49F0000
direct allocation
page execute and read and write
4BF0000
direct allocation
page read and write
45FE000
stack
page read and write
DFF000
heap
page read and write
49F0000
direct allocation
page execute and read and write
2301A000
heap
page read and write
335F000
stack
page read and write
4D41000
heap
page read and write
134B000
stack
page read and write
3F0E000
stack
page read and write
2A57000
heap
page read and write
4711000
heap
page read and write
1B65000
heap
page read and write
43D1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
5330000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
D9000
unkown
page write copy
46FF000
stack
page read and write
A64000
unkown
page execute and read and write
43D1000
heap
page read and write
FF4000
heap
page read and write
4DD1000
direct allocation
page read and write
44DF000
stack
page read and write
43D1000
heap
page read and write
4C11000
direct allocation
page read and write
392000
unkown
page execute and read and write
4711000
heap
page read and write
461F000
stack
page read and write
53D000
unkown
page execute and write copy
30FF000
stack
page read and write
4A80000
direct allocation
page execute and read and write
D9000
unkown
page read and write
399F000
stack
page read and write
43D1000
heap
page read and write
43C0000
direct allocation
page read and write
4850000
direct allocation
page read and write
4700000
direct allocation
page read and write
2730000
direct allocation
page read and write
4761000
heap
page read and write
1C98000
heap
page read and write
13A0000
heap
page read and write
3CCF000
stack
page read and write
373F000
stack
page read and write
790000
unkown
page readonly
FE000
unkown
page execute and read and write
7FB000
unkown
page execute and read and write
4DF0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
D40000
heap
page read and write
4711000
heap
page read and write
F3F000
stack
page read and write
129D000
unkown
page execute and read and write
49E0000
direct allocation
page execute and read and write
401E000
stack
page read and write
1C56000
heap
page read and write
4A60000
direct allocation
page execute and read and write
389E000
stack
page read and write
70000
unkown
page readonly
43D1000
heap
page read and write
39A4000
direct allocation
page execute and read and write
4700000
direct allocation
page read and write
5221000
direct allocation
page read and write
70000
unkown
page readonly
2301A000
heap
page read and write
D74000
heap
page read and write
19FE000
stack
page read and write
1D070000
trusted library allocation
page read and write
43D1000
heap
page read and write
349F000
stack
page read and write
43D1000
heap
page read and write
5E25000
heap
page read and write
1C69000
heap
page read and write
43D1000
heap
page read and write
18B7000
heap
page read and write
67A1000
heap
page read and write
2301D000
heap
page read and write
760000
heap
page read and write
E1C000
heap
page read and write
22FE0000
heap
page read and write
3930000
direct allocation
page execute and read and write
43D1000
heap
page read and write
4711000
heap
page read and write
327E000
stack
page read and write
324F000
stack
page read and write
37B000
unkown
page execute and read and write
1C5AF000
stack
page read and write
43D1000
heap
page read and write
4860000
direct allocation
page read and write
43C0000
direct allocation
page read and write
3E7E000
stack
page read and write
4761000
heap
page read and write
DFE000
stack
page read and write
DBF000
heap
page read and write
487E000
stack
page read and write
2A30000
direct allocation
page read and write
4700000
direct allocation
page read and write
C84000
heap
page read and write
5390000
direct allocation
page execute and read and write
1740000
direct allocation
page execute and read and write
22FFD000
heap
page read and write
656A000
heap
page read and write
2D4F000
stack
page read and write
48F1000
heap
page read and write
E14000
heap
page read and write
448F000
stack
page read and write
4A00000
direct allocation
page execute and read and write
DB000
unkown
page execute and read and write
C84000
heap
page read and write
43D1000
heap
page read and write
2A30000
direct allocation
page read and write
39AE000
direct allocation
page execute and read and write
6C86F000
unkown
page write copy
4D80000
direct allocation
page execute and read and write
292C0000
trusted library allocation
page read and write
22FFD000
heap
page read and write
2ECE000
stack
page read and write
DBE000
heap
page read and write
10F0000
direct allocation
page read and write
2301D000
heap
page read and write
39CF000
stack
page read and write
43D1000
heap
page read and write
3D9E000
stack
page read and write
375E000
stack
page read and write
53EF000
stack
page read and write
1BAF000
heap
page read and write
371F000
stack
page read and write
5340000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
1AFE000
heap
page read and write
9D0000
heap
page read and write
6C875000
unkown
page readonly
5D5000
heap
page read and write
392000
unkown
page execute and write copy
2301A000
heap
page read and write
1420000
direct allocation
page read and write
4700000
direct allocation
page read and write
285E000
stack
page read and write
392000
unkown
page execute and write copy
4D70000
direct allocation
page execute and read and write
416F000
stack
page read and write
23015000
heap
page read and write
23000000
heap
page read and write
43E1000
heap
page read and write
43D1000
heap
page read and write
1C87E000
stack
page read and write
4711000
heap
page read and write
393000
unkown
page execute and write copy
4761000
heap
page read and write
D9000
unkown
page write copy
2C0F000
stack
page read and write
E24000
heap
page read and write
23000000
heap
page read and write
43D1000
heap
page read and write
1C63F000
stack
page read and write
45DE000
stack
page read and write
18E9000
heap
page read and write
4730000
heap
page read and write
26E0000
direct allocation
page read and write
2301D000
heap
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
46DF000
stack
page read and write
423E000
stack
page read and write
43C0000
direct allocation
page read and write
392000
unkown
page execute and write copy
4BEB000
stack
page read and write
A46000
unkown
page execute and read and write
4711000
heap
page read and write
3960000
direct allocation
page execute and read and write
10F0000
direct allocation
page read and write
23000000
heap
page read and write
1AFF000
stack
page read and write
70000
unkown
page read and write
4711000
heap
page read and write
D9000
unkown
page read and write
C84000
heap
page read and write
4A60000
direct allocation
page execute and read and write
8D0000
unkown
page readonly
4710000
heap
page read and write
4D60000
direct allocation
page execute and read and write
361E000
stack
page read and write
3B0F000
stack
page read and write
7B40000
heap
page read and write
4711000
heap
page read and write
22FFB000
heap
page read and write
392000
unkown
page execute and read and write
D9000
unkown
page write copy
380E000
stack
page read and write
3D8F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
49F0000
direct allocation
page execute and read and write
2A80000
heap
page read and write
4727000
heap
page read and write
383E000
stack
page read and write
48C1000
direct allocation
page read and write
35FF000
stack
page read and write
D66000
heap
page read and write
4711000
heap
page read and write
1C36F000
stack
page read and write
299B000
stack
page read and write
1420000
direct allocation
page read and write
2301A000
heap
page read and write
22FFF000
heap
page read and write
53D000
unkown
page execute and write copy
2A30000
direct allocation
page read and write
974000
heap
page read and write
108D000
unkown
page execute and read and write
497F000
stack
page read and write
43D1000
heap
page read and write
2E9E000
stack
page read and write
3C5E000
stack
page read and write
308E000
stack
page read and write
53B000
unkown
page execute and read and write
4E10000
direct allocation
page execute and read and write
43D1000
heap
page read and write
52FF000
stack
page read and write
35DF000
stack
page read and write
29366000
heap
page read and write
380C000
heap
page read and write
EAA000
heap
page read and write
3E3F000
stack
page read and write
3DCE000
stack
page read and write
2EBE000
stack
page read and write
3BBF000
stack
page read and write
D6A000
heap
page read and write
961000
unkown
page execute and read and write
71000
unkown
page execute and write copy
40CE000
stack
page read and write
7F940000
direct allocation
page execute and read and write
70000
unkown
page readonly
364E000
stack
page read and write
61ED4000
direct allocation
page readonly
3FFF000
stack
page read and write
22FFD000
heap
page read and write
1BBC000
heap
page read and write
3C1F000
stack
page read and write
4A70000
direct allocation
page execute and read and write
26A000
unkown
page execute and read and write
34BF000
stack
page read and write
3B1E000
stack
page read and write
D60000
heap
page read and write
C5B000
unkown
page execute and read and write
40BF000
stack
page read and write
C74000
unkown
page execute and read and write
6C86E000
unkown
page read and write
428E000
stack
page read and write
3C3F000
stack
page read and write
4E20000
direct allocation
page execute and read and write
435E000
stack
page read and write
363E000
stack
page read and write
CD0000
heap
page read and write
489E000
stack
page read and write
2730000
direct allocation
page read and write
368F000
stack
page read and write
37B000
unkown
page execute and read and write
DE0000
heap
page read and write
43D1000
heap
page read and write
300E000
stack
page read and write
5E26000
heap
page read and write
4D40000
heap
page read and write
43D1000
heap
page read and write
16A5000
heap
page read and write
D74000
heap
page read and write
70000
unkown
page readonly
22FFC000
heap
page read and write
43D1000
heap
page read and write
D74000
heap
page read and write
1730000
heap
page read and write
E14000
heap
page read and write
41D0000
heap
page read and write
25DE000
stack
page read and write
2FDE000
stack
page read and write
26E0000
direct allocation
page read and write
6C5F1000
unkown
page execute read
392000
unkown
page execute and write copy
A9B000
unkown
page execute and read and write
26E0000
direct allocation
page read and write
4ABF000
stack
page read and write
6C691000
unkown
page execute read
3AFF000
stack
page read and write
43D1000
heap
page read and write
AB3000
unkown
page execute and write copy
43D1000
heap
page read and write
43D1000
heap
page read and write
2ABF000
stack
page read and write
43D1000
heap
page read and write
930000
unkown
page execute and read and write
4711000
heap
page read and write
43D1000
heap
page read and write
2301D000
heap
page read and write
4711000
heap
page read and write
5340000
direct allocation
page execute and read and write
AB2000
unkown
page execute and write copy
4711000
heap
page read and write
5D0000
heap
page read and write
4620000
heap
page read and write
37CF000
stack
page read and write
1C6E000
stack
page read and write
3800000
heap
page read and write
D74000
heap
page read and write
3C1F000
stack
page read and write
D9000
unkown
page write copy
A3C000
stack
page read and write
288E000
stack
page read and write
D50000
heap
page read and write
4D00000
direct allocation
page execute and read and write
43D1000
heap
page read and write
10F0000
direct allocation
page read and write
51FE000
stack
page read and write
D4B000
heap
page read and write
4711000
heap
page read and write
E2D000
heap
page read and write
4C40000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
5340000
direct allocation
page execute and read and write
61CB000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
A8E000
stack
page read and write
4711000
heap
page read and write
C60000
heap
page read and write
974000
heap
page read and write
43D1000
heap
page read and write
2730000
direct allocation
page read and write
4B11000
direct allocation
page read and write
9FD000
stack
page read and write
2301D000
heap
page read and write
34DE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
44D0000
trusted library allocation
page read and write
36A4000
direct allocation
page execute and read and write
8F7000
unkown
page execute and write copy
E15000
heap
page read and write
1BAA000
heap
page read and write
18DF000
heap
page read and write
4A10000
direct allocation
page execute and read and write
43D1000
heap
page read and write
445F000
stack
page read and write
49C0000
direct allocation
page execute and read and write
DE2000
heap
page read and write
4711000
heap
page read and write
3EBF000
stack
page read and write
4BA0000
direct allocation
page read and write
2A30000
direct allocation
page read and write
37B000
unkown
page execute and read and write
2F4E000
stack
page read and write
1B38000
heap
page read and write
53B000
unkown
page execute and read and write
4EE0000
direct allocation
page execute and read and write
23002000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
415E000
stack
page read and write
48F1000
heap
page read and write
E2D000
heap
page read and write
4D41000
heap
page read and write
3BCE000
stack
page read and write
4711000
heap
page read and write
6C66D000
unkown
page readonly
2BDF000
stack
page read and write
49F0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
930000
heap
page read and write
5CC000
stack
page read and write
43D1000
heap
page read and write
34C000
unkown
page execute and read and write
4711000
heap
page read and write
2F4E000
stack
page read and write
4711000
heap
page read and write
E2D000
heap
page read and write
321F000
stack
page read and write
18CC000
heap
page read and write
FC0000
heap
page read and write
1D07F000
heap
page read and write
C84000
heap
page read and write
974000
heap
page read and write
DA9000
heap
page read and write
379E000
stack
page read and write
43DE000
stack
page read and write
4D30000
direct allocation
page execute and read and write
656C000
heap
page read and write
4711000
heap
page read and write
There are 1437 hidden memdumps, click here to show them.