IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\amadka[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000006001\7873c16243.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BAFIEGIECG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGDGHJEHJJDAAAKEBGCFCAAAAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CGDBFBGIDHCAAKEBAKFIIIEBAA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGCFHIDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBGDAAKJJDAAKFHJKJKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJJEGIEHIJKKFIDHDGID
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\HJKJEHJKJEBGHJJKEBGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KECBKKEBKEBFCAAAEGDHDGIIJE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFIIJJJDGCBAAKFIIECGCFBAFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\KJEBKJDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\BAFIEGIECG.exe
"C:\Users\user\AppData\Local\Temp\BAFIEGIECG.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000006001\7873c16243.exe
"C:\Users\user\AppData\Local\Temp\1000006001\7873c16243.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\BAFIEGIECG.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\Local\Temp\GDHIIIIEHC.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://77.91.77.81/mine/amadka.exe
77.91.77.81
malicious
http://77.91.77.81/cost/go.exe
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpH
unknown
malicious
http://85.28.47.4/
unknown
malicious
http://77.91.77.81/stealc/random.exeer
unknown
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dllpk
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpmp
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://77.91.77.82/Hun4Ko/index.phpV
unknown
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll:-
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php3
unknown
malicious
http://85.28.47.4/920475a59bac849d.php-
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php/
unknown
malicious
http://85.28.47.4/EM32
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php.
unknown
malicious
http://77.91.77.81/stealc/random.exe506iN
unknown
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll_k
unknown
malicious
http://85.28.47.4/69934896f997d5bb/softokn3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/mozglue.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/nss3.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dlljk
unknown
malicious
http://85.28.47.4/69934896f997d5bb/vcruntime140.dll
85.28.47.4
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll(
unknown
malicious
http://77.91.77.81/mine/amadka.exe00
unknown
malicious
http://77.91.77.82/
unknown
malicious
http://85.28.47.4/69934896f997d5bb/freebl3.dll
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.php
85.28.47.4
malicious
http://85.28.47.4/920475a59bac849d.phpon
unknown
malicious
http://85.28.47.4/69934896f997d5bb/sqlite3.dll
85.28.47.4
malicious
http://77.91.77.81/cost/go.exe00
unknown
malicious
http://77.91.77.81/mine/amadka.exepera
unknown
malicious
http://85.28.47.4/69934896f997d5bb/msvcp140.dll
85.28.47.4
malicious
http://85.28.47.4
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpk
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phplF
unknown
malicious
http://77.91.77.81/cost/go.exeAppData
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpu
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://77.91.77.81/stealc/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://pki-ocsp.symauth.com0
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown
86.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
77.91.77.81
unknown
Russian Federation
malicious
85.28.47.4
unknown
Russian Federation
malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5160000
direct allocation
page read and write
malicious
4910000
direct allocation
page read and write
malicious
3F1000
unkown
page execute and read and write
malicious
4890000
direct allocation
page read and write
malicious
9B1000
unkown
page execute and read and write
malicious
9B1000
unkown
page execute and read and write
malicious
1605000
heap
page read and write
malicious
361000
unkown
page execute and read and write
malicious
DB1000
unkown
page execute and read and write
malicious
1CB5000
heap
page read and write
malicious
9B1000
unkown
page execute and read and write
malicious
4AC0000
direct allocation
page read and write
malicious
2FFE000
stack
page read and write
33C0000
heap
page read and write
42CF000
stack
page read and write
D30000
unkown
page execute and write copy
4FD000
stack
page read and write
1648000
heap
page read and write
4641000
heap
page read and write
3C14000
direct allocation
page execute and read and write
377E000
stack
page read and write
61E00000
direct allocation
page execute and read and write
328F000
stack
page read and write
35CE000
direct allocation
page execute and read and write
CEF000
heap
page read and write
4641000
heap
page read and write
4491000
heap
page read and write
2B1E000
stack
page read and write
4641000
heap
page read and write
22CCE000
heap
page read and write
CD4000
unkown
page execute and write copy
4A80000
direct allocation
page execute and read and write
61ED4000
direct allocation
page readonly
1500000
direct allocation
page read and write
A8B000
stack
page read and write
22CF9000
heap
page read and write
4641000
heap
page read and write
14F0000
heap
page read and write
22CD7000
heap
page read and write
5360000
direct allocation
page execute and read and write
1767000
heap
page read and write
5EB000
unkown
page execute and read and write
339F000
stack
page read and write
C8F000
unkown
page execute and read and write
3B4F000
stack
page read and write
3E4000
heap
page read and write
2AFF000
stack
page read and write
4A90000
direct allocation
page execute and read and write
43F1000
heap
page read and write
164000
heap
page read and write
2BFF000
stack
page read and write
28C0000
direct allocation
page read and write
390E000
stack
page read and write
4491000
heap
page read and write
43BF000
stack
page read and write
6CF000
unkown
page execute and read and write
C87000
stack
page read and write
22CC8000
heap
page read and write
494B000
stack
page read and write
4CCF000
stack
page read and write
22CE6000
heap
page read and write
289E000
stack
page read and write
452000
unkown
page execute and read and write
379E000
stack
page read and write
22CDA000
heap
page read and write
52C0000
direct allocation
page execute and read and write
D4E000
heap
page read and write
4641000
heap
page read and write
52D0000
direct allocation
page execute and read and write
172F000
stack
page read and write
22CF1000
heap
page read and write
33D0000
heap
page read and write
D6F000
heap
page read and write
594000
heap
page read and write
164000
heap
page read and write
3E4000
heap
page read and write
D3E000
stack
page read and write
E7A000
unkown
page execute and read and write
4C10000
heap
page read and write
D33000
unkown
page execute and write copy
22CF1000
heap
page read and write
22CDA000
heap
page read and write
594000
heap
page read and write
28C0000
direct allocation
page read and write
714000
unkown
page execute and write copy
6C9B0000
unkown
page readonly
4A00000
direct allocation
page execute and read and write
CD7000
heap
page read and write
22CEE000
heap
page read and write
15E0000
heap
page read and write
361F000
stack
page read and write
4880000
direct allocation
page read and write
4C7E000
stack
page read and write
A12000
unkown
page execute and read and write
2BCE000
stack
page read and write
61ED0000
direct allocation
page read and write
3E4000
heap
page read and write
2CCF000
stack
page read and write
405E000
stack
page read and write
3BD0000
direct allocation
page execute and read and write
35B3000
direct allocation
page execute and read and write
38BE000
stack
page read and write
28C0000
direct allocation
page read and write
3C7E000
stack
page read and write
594000
heap
page read and write
CD4000
unkown
page execute and write copy
5370000
direct allocation
page execute and read and write
4641000
heap
page read and write
594000
heap
page read and write
9B1000
unkown
page execute and write copy
22CFF000
heap
page read and write
3C14000
direct allocation
page execute and read and write
1CC51000
heap
page read and write
4C50000
direct allocation
page execute and read and write
55BE000
stack
page read and write
3580000
direct allocation
page execute and read and write
4DBD000
stack
page read and write
4641000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
22CFF000
heap
page read and write
2EFB3000
heap
page read and write
3D4E000
stack
page read and write
4830000
trusted library allocation
page read and write
4491000
heap
page read and write
28BE000
stack
page read and write
43E0000
direct allocation
page read and write
4A90000
direct allocation
page execute and read and write
35C4000
direct allocation
page execute and read and write
1CA4F000
stack
page read and write
2D5F000
stack
page read and write
420F000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
4641000
heap
page read and write
DB0000
unkown
page readonly
5340000
direct allocation
page execute and read and write
164A000
heap
page read and write
228F000
stack
page read and write
D33000
unkown
page execute and read and write
62BF000
stack
page read and write
3AFF000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
1344000
heap
page read and write
3E4000
heap
page read and write
164000
heap
page read and write
4AA000
unkown
page execute and read and write
1500000
direct allocation
page read and write
D70000
heap
page read and write
1500000
direct allocation
page read and write
3C03000
direct allocation
page execute and read and write
4EBF000
stack
page read and write
304E000
stack
page read and write
D33000
heap
page read and write
EDC000
stack
page read and write
358F000
stack
page read and write
594000
heap
page read and write
594000
heap
page read and write
3B40000
heap
page read and write
594000
heap
page read and write
3E4000
heap
page read and write
490F000
stack
page read and write
387F000
stack
page read and write
4641000
heap
page read and write
594000
heap
page read and write
3D7F000
stack
page read and write
594000
heap
page read and write
3E4000
heap
page read and write
9A0000
direct allocation
page read and write
22CFE000
heap
page read and write
52E0000
direct allocation
page execute and read and write
340E000
stack
page read and write
4A10000
direct allocation
page execute and read and write
11C5000
unkown
page execute and read and write
3E4000
heap
page read and write
667000
heap
page read and write
2EFC4000
heap
page read and write
348E000
stack
page read and write
8BA000
unkown
page execute and read and write
3E4000
heap
page read and write
463F000
stack
page read and write
4D7F000
stack
page read and write
5150000
direct allocation
page read and write
DB0000
unkown
page readonly
1C1AF000
stack
page read and write
3DDE000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
427F000
stack
page read and write
506E000
stack
page read and write
4491000
heap
page read and write
594000
heap
page read and write
3E3E000
stack
page read and write
3F1E000
stack
page read and write
36CF000
stack
page read and write
35FF000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4C80000
direct allocation
page execute and read and write
3B60000
heap
page read and write
D6E000
heap
page read and write
594000
heap
page read and write
5110000
trusted library allocation
page read and write
3E4000
heap
page read and write
A12000
unkown
page execute and read and write
6CBEF000
unkown
page readonly
D5E000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4491000
heap
page read and write
172D000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4491000
heap
page read and write
37EE000
stack
page read and write
13F3000
stack
page read and write
22CCE000
heap
page read and write
2ADF000
stack
page read and write
315E000
stack
page read and write
4491000
heap
page read and write
FDD000
stack
page read and write
365E000
stack
page read and write
2D3F000
stack
page read and write
2EFBB000
heap
page read and write
BAB000
unkown
page execute and read and write
334E000
stack
page read and write
382E000
stack
page read and write
39FE000
stack
page read and write
350F000
stack
page read and write
22CEE000
heap
page read and write
153E000
heap
page read and write
5150000
direct allocation
page read and write
1344000
heap
page read and write
3C04000
direct allocation
page execute and read and write
705000
unkown
page execute and read and write
4491000
heap
page read and write
4491000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
105E000
stack
page read and write
D5B000
heap
page read and write
9B1000
unkown
page execute and write copy
31CF000
stack
page read and write
775000
unkown
page execute and read and write
1BD0000
heap
page read and write
22CE0000
heap
page read and write
4491000
heap
page read and write
3E4000
heap
page read and write
4641000
heap
page read and write
1500000
direct allocation
page read and write
1500000
direct allocation
page read and write
CBB000
unkown
page execute and read and write
172A000
heap
page read and write
418F000
stack
page read and write
4641000
heap
page read and write
594000
heap
page read and write
164000
heap
page read and write
43E0000
direct allocation
page read and write
CC5000
unkown
page execute and read and write
D70000
heap
page read and write
44A5000
heap
page read and write
22CE0000
heap
page read and write
61EB7000
direct allocation
page readonly
4641000
heap
page read and write
4A90000
direct allocation
page execute and read and write
327C000
heap
page read and write
3390000
heap
page read and write
7EDB000
stack
page read and write
594000
heap
page read and write
35CE000
direct allocation
page execute and read and write
3950000
heap
page read and write
22CD9000
heap
page read and write
22CE4000
heap
page read and write
609E000
stack
page read and write
403E000
stack
page read and write
63E0000
heap
page read and write
4641000
heap
page read and write
22CE0000
heap
page read and write
CD3000
unkown
page execute and read and write
A1B000
unkown
page execute and read and write
4491000
heap
page read and write
2C3E000
stack
page read and write
9A0000
direct allocation
page read and write
1C9E000
heap
page read and write
424E000
stack
page read and write
3F1000
unkown
page execute and write copy
3FCD000
stack
page read and write
2830000
direct allocation
page read and write
1777000
heap
page read and write
594000
heap
page read and write
378F000
stack
page read and write
3E4000
heap
page read and write
DCC000
unkown
page execute and write copy
22CE0000
heap
page read and write
4FFF000
stack
page read and write
9A0000
direct allocation
page read and write
4491000
heap
page read and write
3A4E000
stack
page read and write
838C000
stack
page read and write
28C0000
direct allocation
page read and write
380F000
stack
page read and write
35B4000
direct allocation
page execute and read and write
4491000
heap
page read and write
2E4E000
stack
page read and write
4491000
heap
page read and write
30CE000
stack
page read and write
A19000
unkown
page write copy
3E4000
heap
page read and write
1500000
direct allocation
page read and write
594000
heap
page read and write
4491000
heap
page read and write
1CC50000
heap
page read and write
CC5000
unkown
page execute and read and write
1721000
heap
page read and write
4491000
heap
page read and write
43DF000
stack
page read and write
4491000
heap
page read and write
323F000
stack
page read and write
4641000
heap
page read and write
22CD8000
heap
page read and write
28F0000
heap
page read and write
413F000
stack
page read and write
3A1D000
stack
page read and write
5820000
heap
page read and write
1344000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
E10000
unkown
page execute and read and write
4A90000
direct allocation
page execute and read and write
4641000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
165F000
heap
page read and write
4C40000
direct allocation
page execute and read and write
580000
heap
page read and write
1500000
direct allocation
page read and write
4641000
heap
page read and write
35C0C000
stack
page read and write
2F4F000
stack
page read and write
E7A000
unkown
page execute and read and write
A19000
unkown
page read and write
1344000
heap
page read and write
22CD3000
heap
page read and write
594000
heap
page read and write
22CF1000
heap
page read and write
594000
heap
page read and write
CBB000
unkown
page execute and read and write
4EFE000
stack
page read and write
4491000
heap
page read and write
314F000
stack
page read and write
4641000
heap
page read and write
29DE000
stack
page read and write
22CDA000
heap
page read and write
1CC1D000
stack
page read and write
384000
unkown
page execute and write copy
3A8000
unkown
page execute and read and write
4641000
heap
page read and write
4641000
heap
page read and write
9A0000
direct allocation
page read and write
351E000
stack
page read and write
22CF1000
heap
page read and write
22CE0000
heap
page read and write
22CF1000
heap
page read and write
4641000
heap
page read and write
4491000
heap
page read and write
1310000
heap
page read and write
4491000
heap
page read and write
3A30000
direct allocation
page execute and read and write
22CD3000
heap
page read and write
393D000
stack
page read and write
6CA50000
unkown
page readonly
4B00000
direct allocation
page execute and read and write
1344000
heap
page read and write
1136000
unkown
page execute and read and write
2D9E000
stack
page read and write
4491000
heap
page read and write
22CFA000
heap
page read and write
BAB000
unkown
page execute and read and write
59C000
unkown
page execute and read and write
650000
heap
page read and write
438E000
stack
page read and write
FD5000
unkown
page execute and read and write
41CE000
stack
page read and write
360000
unkown
page readonly
52E0000
direct allocation
page execute and read and write
28C0000
direct allocation
page read and write
4641000
heap
page read and write
3F0000
unkown
page readonly
28E0000
direct allocation
page read and write
4641000
heap
page read and write
3E4000
heap
page read and write
9B0000
unkown
page readonly
4B21000
direct allocation
page read and write
4641000
heap
page read and write
164000
heap
page read and write
C80000
heap
page read and write
594000
heap
page read and write
32CE000
stack
page read and write
3E4000
heap
page read and write
D33000
heap
page read and write
4A4F000
stack
page read and write
3F2E000
stack
page read and write
4661000
heap
page read and write
22CFF000
heap
page read and write
63BF000
stack
page read and write
1CE4D000
stack
page read and write
3E4000
heap
page read and write
4641000
heap
page read and write
2EFC1000
heap
page read and write
C8F000
unkown
page execute and read and write
4A90000
direct allocation
page execute and read and write
4641000
heap
page read and write
7EED0000
direct allocation
page execute and read and write
3E9E000
stack
page read and write
4EB4000
heap
page read and write
4491000
heap
page read and write
4491000
heap
page read and write
28C0000
direct allocation
page read and write
3DCF000
stack
page read and write
4E1F000
stack
page read and write
34BF000
stack
page read and write
2EBE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
1500000
direct allocation
page read and write
2FBF000
stack
page read and write
22CFA000
heap
page read and write
1717000
heap
page read and write
4491000
heap
page read and write
22CEE000
heap
page read and write
35E0D000
stack
page read and write
4491000
heap
page read and write
35C4000
direct allocation
page execute and read and write
1CC40000
heap
page read and write
22CF3000
heap
page read and write
164000
heap
page read and write
440F000
stack
page read and write
3870000
heap
page read and write
4491000
heap
page read and write
22CF9000
heap
page read and write
2C1F000
stack
page read and write
3FCE000
stack
page read and write
22CE2000
heap
page read and write
43E0000
direct allocation
page read and write
22CE0000
heap
page read and write
3E4000
heap
page read and write
60E000
stack
page read and write
3E4000
heap
page read and write
7EC000
heap
page read and write
271F000
stack
page read and write
22CF6000
heap
page read and write
404F000
stack
page read and write
6CA42000
unkown
page readonly
361000
unkown
page execute and write copy
2FDF000
stack
page read and write
40CF000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
17AB000
heap
page read and write
15C7000
heap
page read and write
22CC5000
heap
page read and write
1344000
heap
page read and write
4491000
heap
page read and write
1719000
heap
page read and write
CF0000
heap
page read and write
49E0000
direct allocation
page execute and read and write
594000
heap
page read and write
28E0000
direct allocation
page read and write
849000
heap
page read and write
59C000
unkown
page execute and write copy
1D09000
heap
page read and write
7DA0000
heap
page read and write
164000
heap
page read and write
7FDC000
stack
page read and write
D55000
heap
page read and write
49CF000
stack
page read and write
594000
heap
page read and write
4491000
heap
page read and write
28C0000
direct allocation
page read and write
4491000
heap
page read and write
4880000
direct allocation
page read and write
3D0000
heap
page read and write
325F000
stack
page read and write
22CF1000
heap
page read and write
49F0000
direct allocation
page execute and read and write
1C5AF000
stack
page read and write
4491000
heap
page read and write
13FC000
stack
page read and write
D5E000
heap
page read and write
3C9E000
stack
page read and write
C3D000
stack
page read and write
FDD000
stack
page read and write
4CD1000
heap
page read and write
35C0000
direct allocation
page execute and read and write
28C0000
direct allocation
page read and write
4491000
heap
page read and write
6CC30000
unkown
page read and write
D59000
heap
page read and write
35F4C000
stack
page read and write
22CF1000
heap
page read and write
3FFF000
stack
page read and write
3E8E000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
3E4000
heap
page read and write
4A10000
direct allocation
page execute and read and write
3B8E000
stack
page read and write
FE7000
unkown
page execute and write copy
33BE000
stack
page read and write
368E000
stack
page read and write
79B000
heap
page read and write
163F000
heap
page read and write
308F000
stack
page read and write
43E0000
direct allocation
page read and write
1CD50000
trusted library allocation
page read and write
410E000
stack
page read and write
4641000
heap
page read and write
D0C000
heap
page read and write
45B000
unkown
page execute and read and write
BAB000
unkown
page execute and read and write
344F000
stack
page read and write
D19000
heap
page read and write
A8D000
unkown
page execute and read and write
14CE000
stack
page read and write
3470000
heap
page read and write
22CE0000
heap
page read and write
22CD9000
heap
page read and write
4491000
heap
page read and write
15EA000
heap
page read and write
4EB0000
heap
page read and write
1783000
unkown
page execute and read and write
1340000
heap
page read and write
4491000
heap
page read and write
1344000
heap
page read and write
3E53000
heap
page read and write
594000
heap
page read and write
3E4000
heap
page read and write
4641000
heap
page read and write
4491000
heap
page read and write
61EB4000
direct allocation
page read and write
35B000
stack
page read and write
3E4F000
stack
page read and write
3E4000
heap
page read and write
3E4000
heap
page read and write
594000
heap
page read and write
9A0000
direct allocation
page read and write
6A10000
heap
page read and write
43E0000
direct allocation
page read and write
FE7000
unkown
page execute and read and write
594000
heap
page read and write
4BCE000
stack
page read and write
4641000
heap
page read and write
3C1E000
direct allocation
page execute and read and write
1B90000
heap
page read and write
4491000
heap
page read and write
E41000
unkown
page execute and read and write
594000
heap
page read and write
64E000
stack
page read and write
4641000
heap
page read and write
164000
heap
page read and write
3B50000
heap
page read and write
9BA000
stack
page read and write
3B1F000
stack
page read and write
4A40000
direct allocation
page execute and read and write
4C40000
direct allocation
page execute and read and write
43E0000
direct allocation
page read and write
D33000
heap
page read and write
60B0000
heap
page read and write
4BFF000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
F5E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
9B1000
unkown
page execute and write copy
4641000
heap
page read and write
4A9C000
stack
page read and write
9A0000
direct allocation
page read and write
4641000
heap
page read and write
52BD000
stack
page read and write
D5B000
heap
page read and write
2E9F000
stack
page read and write
318E000
stack
page read and write
22CFD000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
828B000
stack
page read and write
8AF000
stack
page read and write
4490000
heap
page read and write
394F000
stack
page read and write
22CCE000
heap
page read and write
1D0000
heap
page read and write
4641000
heap
page read and write
22CF1000
heap
page read and write
61ED3000
direct allocation
page read and write
3DBE000
stack
page read and write
3C0000
heap
page read and write
22DCD000
heap
page read and write
43E0000
direct allocation
page read and write
594000
heap
page read and write
52F0000
direct allocation
page execute and read and write
594000
heap
page read and write
1344000
heap
page read and write
300F000
stack
page read and write
22CC6000
heap
page read and write
313E000
stack
page read and write
3EBF000
stack
page read and write
735000
unkown
page execute and read and write
3B3E000
stack
page read and write
1C3AE000
stack
page read and write
39DF000
stack
page read and write
16AD000
heap
page read and write
28C0000
direct allocation
page read and write
415F000
stack
page read and write
1C64F000
stack
page read and write
519E000
stack
page read and write
601E000
stack
page read and write
48D0000
trusted library allocation
page read and write
48D0000
heap
page read and write
9A0000
direct allocation
page read and write
A1B000
unkown
page execute and read and write
4641000
heap
page read and write
37AE000
stack
page read and write
15A0000
direct allocation
page execute and read and write
4491000
heap
page read and write
4641000
heap
page read and write
15C0000
heap
page read and write
4491000
heap
page read and write
320000
heap
page read and write
4641000
heap
page read and write
22CEE000
heap
page read and write
3E4000
heap
page read and write
384E000
stack
page read and write
4CD1000
heap
page read and write
1AC000
stack
page read and write
6CC35000
unkown
page readonly
9A0000
direct allocation
page read and write
22CFB000
heap
page read and write
6A01000
heap
page read and write
594000
heap
page read and write
3E50000
heap
page read and write
4640000
heap
page read and write
4491000
heap
page read and write
3E4000
heap
page read and write
4641000
heap
page read and write
48F1000
direct allocation
page read and write
166F000
heap
page read and write
CD3000
unkown
page execute and read and write
FEC000
unkown
page execute and read and write
6A00000
heap
page read and write
801E000
stack
page read and write
2D7E000
stack
page read and write
1344000
heap
page read and write
16A7000
heap
page read and write
FEC000
unkown
page execute and write copy
4A60000
direct allocation
page execute and read and write
43FE000
stack
page read and write
594000
heap
page read and write
240000
heap
page read and write
52E0000
direct allocation
page execute and read and write
1EB000
stack
page read and write
3E4000
heap
page read and write
111C000
unkown
page execute and read and write
3E0E000
stack
page read and write
9B0000
unkown
page read and write
22CEE000
heap
page read and write
6CA3E000
unkown
page read and write
22CFE000
heap
page read and write
9A0000
direct allocation
page read and write
D50000
heap
page read and write
28E0000
direct allocation
page read and write
22CF1000
heap
page read and write
9A0000
direct allocation
page read and write
22CE6000
heap
page read and write
4641000
heap
page read and write
22CF9000
heap
page read and write
4641000
heap
page read and write
1519000
heap
page read and write
594000
heap
page read and write
4641000
heap
page read and write
D33000
heap
page read and write
4641000
heap
page read and write
164000
heap
page read and write
4A30000
direct allocation
page execute and read and write
22CE0000
heap
page read and write
453E000
stack
page read and write
43E0000
direct allocation
page read and write
1D04C000
stack
page read and write
1A0000
heap
page read and write
3E4000
heap
page read and write
4491000
heap
page read and write
22CE2000
heap
page read and write
D1B000
heap
page read and write
43E0000
direct allocation
page read and write
164000
heap
page read and write
1344000
heap
page read and write
153A000
heap
page read and write
46CE000
stack
page read and write
D55000
heap
page read and write
61ECC000
direct allocation
page read and write
494E000
stack
page read and write
4491000
heap
page read and write
164000
heap
page read and write
275E000
stack
page read and write
22CDB000
heap
page read and write
1780000
unkown
page execute and write copy
98E000
stack
page read and write
4641000
heap
page read and write
4C40000
direct allocation
page execute and read and write
3270000
heap
page read and write
37C000
unkown
page execute and write copy
4491000
heap
page read and write
1CEB000
heap
page read and write
454F000
stack
page read and write
A19000
unkown
page write copy
4C90000
direct allocation
page execute and read and write
D55000
heap
page read and write
2B8F000
stack
page read and write
1C8E000
stack
page read and write
83A5000
heap
page read and write
510000
heap
page read and write
294F000
stack
page read and write
4491000
heap
page read and write
363E000
stack
page read and write
3BCF000
stack
page read and write
4491000
heap
page read and write
4641000
heap
page read and write
3DC0000
heap
page read and write
2E0F000
stack
page read and write
1344000
heap
page read and write
42BE000
stack
page read and write
22CEE000
heap
page read and write
9B0000
unkown
page read and write
4491000
heap
page read and write
389F000
stack
page read and write
43E0000
direct allocation
page read and write
3E4000
heap
page read and write
1CC51000
heap
page read and write
4491000
heap
page read and write
2830000
direct allocation
page read and write
529F000
stack
page read and write
53FD000
stack
page read and write
52E0000
direct allocation
page execute and read and write
3C5F000
stack
page read and write
3F8F000
stack
page read and write
43E0000
direct allocation
page read and write
594000
heap
page read and write
4641000
heap
page read and write
4A10000
direct allocation
page execute and read and write
6CC000
unkown
page execute and read and write
84B000
heap
page read and write
284D000
heap
page read and write
5150000
direct allocation
page read and write
33CF000
stack
page read and write
3D9F000
stack
page read and write
3E4000
heap
page read and write
22CD4000
heap
page read and write
9A0000
direct allocation
page read and write
406000
unkown
page execute and read and write
299F000
stack
page read and write
6B0000
heap
page read and write
E7C000
unkown
page execute and write copy
594000
heap
page read and write
4A80000
trusted library allocation
page read and write
459000
unkown
page read and write
44B0000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
22CE0000
heap
page read and write
2ED1E000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4A4F000
stack
page read and write
E7C000
unkown
page execute and write copy
CD3000
unkown
page execute and write copy
1CA1D000
stack
page read and write
4641000
heap
page read and write
3A8F000
stack
page read and write
47CF000
stack
page read and write
C9E000
heap
page read and write
15C7000
heap
page read and write
45BF000
stack
page read and write
52E0000
direct allocation
page execute and read and write
2847000
heap
page read and write
3F1F000
stack
page read and write
7EC00000
direct allocation
page execute and read and write
E7C000
unkown
page execute and write copy
4491000
heap
page read and write
22CE3000
heap
page read and write
22CE6000
heap
page read and write
444E000
stack
page read and write
22CFA000
heap
page read and write
459000
unkown
page write copy
713000
unkown
page execute and read and write
35C4000
direct allocation
page execute and read and write
22CF1000
heap
page read and write
3C14000
direct allocation
page execute and read and write
3C14000
direct allocation
page execute and read and write
3E4000
heap
page read and write
790000
heap
page read and write
4641000
heap
page read and write
1BE0000
direct allocation
page execute and read and write
28C0000
direct allocation
page read and write
354E000
stack
page read and write
1510000
heap
page read and write
4491000
heap
page read and write
4A70000
direct allocation
page execute and read and write
94C000
stack
page read and write
35E10000
heap
page read and write
C8C000
stack
page read and write
164000
heap
page read and write
22CDF000
heap
page read and write
28F7000
heap
page read and write
4641000
heap
page read and write
1185000
unkown
page execute and read and write
22CDE000
heap
page read and write
1C9A000
heap
page read and write
373F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
34FE000
stack
page read and write
43F1000
heap
page read and write
3E4000
heap
page read and write
337F000
stack
page read and write
4641000
heap
page read and write
4CD0000
heap
page read and write
3E4000
heap
page read and write
38DE000
stack
page read and write
138E000
stack
page read and write
448F000
stack
page read and write
4B30000
direct allocation
page execute and read and write
54BD000
stack
page read and write
22CDC000
heap
page read and write
4491000
heap
page read and write
2840000
heap
page read and write
4491000
heap
page read and write
1783000
unkown
page execute and write copy
22CDA000
heap
page read and write
52E0000
direct allocation
page execute and read and write
8391000
heap
page read and write
38BE000
stack
page read and write
370E000
stack
page read and write
6AE000
stack
page read and write
3873000
heap
page read and write
411F000
stack
page read and write
3E4000
heap
page read and write
5310000
direct allocation
page execute and read and write
3F0000
unkown
page read and write
61ECD000
direct allocation
page readonly
3F7E000
stack
page read and write
4491000
heap
page read and write
16B9000
heap
page read and write
408E000
stack
page read and write
4641000
heap
page read and write
594000
heap
page read and write
4491000
heap
page read and write
1D08E000
stack
page read and write
4641000
heap
page read and write
5300000
direct allocation
page execute and read and write
4A10000
direct allocation
page execute and read and write
4641000
heap
page read and write
360000
unkown
page readonly
1517000
heap
page read and write
594000
heap
page read and write
398E000
stack
page read and write
D50000
heap
page read and write
22CE6000
heap
page read and write
4B8F000
stack
page read and write
3EFE000
stack
page read and write
CD3000
unkown
page execute and write copy
4491000
heap
page read and write
90E000
stack
page read and write
2EF20000
trusted library allocation
page read and write
480E000
stack
page read and write
6CA51000
unkown
page execute read
327E000
stack
page read and write
9B0000
unkown
page read and write
4FD000
stack
page read and write
3FF0000
heap
page read and write
4641000
heap
page read and write
1530000
heap
page read and write
6A0E000
heap
page read and write
2EDE000
stack
page read and write
80B000
heap
page read and write
3280000
direct allocation
page execute and read and write
22CFA000
heap
page read and write
3F4E000
stack
page read and write
3E4000
heap
page read and write
3E0000
heap
page read and write
713000
unkown
page execute and write copy
1344000
heap
page read and write
4491000
heap
page read and write
D70000
heap
page read and write
CEC000
heap
page read and write
39BF000
stack
page read and write
43E0000
direct allocation
page read and write
13F8000
stack
page read and write
2EFBC000
heap
page read and write
4C60000
direct allocation
page execute and read and write
434F000
stack
page read and write
A12000
unkown
page execute and read and write
178E000
heap
page read and write
594000
heap
page read and write
594000
heap
page read and write
A19000
unkown
page write copy
4491000
heap
page read and write
4641000
heap
page read and write
D47000
heap
page read and write
33DE000
stack
page read and write
9A0000
direct allocation
page read and write
28C0000
direct allocation
page read and write
3B5E000
stack
page read and write
4641000
heap
page read and write
D5E000
heap
page read and write
22CEE000
heap
page read and write
4A50000
direct allocation
page execute and read and write
1344000
heap
page read and write
4491000
heap
page read and write
4491000
heap
page read and write
4651000
heap
page read and write
47BF000
stack
page read and write
D4E000
heap
page read and write
22CFB000
heap
page read and write
CD3000
unkown
page execute and read and write
4491000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4641000
heap
page read and write
430E000
stack
page read and write
4491000
heap
page read and write
37CE000
stack
page read and write
330F000
stack
page read and write
4971000
direct allocation
page read and write
15C5000
heap
page read and write
22CF1000
heap
page read and write
4A8E000
stack
page read and write
4AFE000
stack
page read and write
3A0F000
stack
page read and write
1C7AC000
stack
page read and write
4A80000
direct allocation
page execute and read and write
1C4E000
stack
page read and write
285F000
stack
page read and write
3D0F000
stack
page read and write
811F000
stack
page read and write
4641000
heap
page read and write
22CDA000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
22CDD000
heap
page read and write
4491000
heap
page read and write
1500000
direct allocation
page read and write
22CF1000
heap
page read and write
660000
heap
page read and write
311F000
stack
page read and write
22CF1000
heap
page read and write
417E000
stack
page read and write
16B4000
heap
page read and write
322E000
stack
page read and write
3CCE000
stack
page read and write
594000
heap
page read and write
CF1000
heap
page read and write
4491000
heap
page read and write
A19000
unkown
page read and write
38CF000
stack
page read and write
6CC2E000
unkown
page read and write
22CF1000
heap
page read and write
7D8000
heap
page read and write
4491000
heap
page read and write
8390000
heap
page read and write
6BB000
heap
page read and write
3E4000
heap
page read and write
3C10000
direct allocation
page execute and read and write
2830000
direct allocation
page read and write
171C000
heap
page read and write
60B5000
heap
page read and write
22CFA000
heap
page read and write
4641000
heap
page read and write
6A10000
heap
page read and write
594000
heap
page read and write
5350000
direct allocation
page execute and read and write
CD4000
unkown
page execute and write copy
1CC51000
heap
page read and write
4491000
heap
page read and write
22CD3000
heap
page read and write
585000
unkown
page execute and read and write
1CC4F000
stack
page read and write
61BF000
stack
page read and write
594000
heap
page read and write
43F0000
heap
page read and write
30FF000
stack
page read and write
1C9AD000
stack
page read and write
3C1E000
direct allocation
page execute and read and write
9AF000
stack
page read and write
81B000
heap
page read and write
52FE000
stack
page read and write
34DF000
stack
page read and write
CE0000
heap
page read and write
4641000
heap
page read and write
3C14000
direct allocation
page execute and read and write
29FF000
stack
page read and write
2A4F000
stack
page read and write
3C8F000
stack
page read and write
4641000
heap
page read and write
326E000
stack
page read and write
594000
heap
page read and write
CF1000
heap
page read and write
429F000
stack
page read and write
281F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
6FB000
unkown
page execute and read and write
2F8E000
stack
page read and write
990000
heap
page read and write
4491000
heap
page read and write
4A60000
direct allocation
page execute and read and write
15EE000
heap
page read and write
D0D000
heap
page read and write
4491000
heap
page read and write
4641000
heap
page read and write
22CE0000
heap
page read and write
1BFAF000
stack
page read and write
D4D000
heap
page read and write
3EDF000
stack
page read and write
3E4000
heap
page read and write
6D6000
heap
page read and write
3E4000
heap
page read and write
2A8E000
stack
page read and write
3E4000
heap
page read and write
1BA5000
heap
page read and write
12C000
stack
page read and write
43F1000
heap
page read and write
D7E000
stack
page read and write
3E4000
heap
page read and write
4641000
heap
page read and write
6C9B1000
unkown
page execute read
1500000
direct allocation
page read and write
D5E000
heap
page read and write
3C14000
direct allocation
page execute and read and write
4641000
heap
page read and write
51C1000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
516F000
stack
page read and write
5330000
direct allocation
page execute and read and write
1A80000
direct allocation
page execute and read and write
4641000
heap
page read and write
35C4000
direct allocation
page execute and read and write
22CDA000
heap
page read and write
3480000
direct allocation
page execute and read and write
C90000
heap
page read and write
4C70000
direct allocation
page execute and read and write
1500000
direct allocation
page read and write
22CC5000
heap
page read and write
597000
unkown
page execute and write copy
594000
heap
page read and write
E7A000
unkown
page execute and read and write
1500000
direct allocation
page read and write
2EF1E000
stack
page read and write
6CC2F000
unkown
page write copy
22CDA000
heap
page read and write
4491000
heap
page read and write
1230000
heap
page read and write
DA0000
heap
page read and write
4641000
heap
page read and write
CD3000
unkown
page execute and write copy
48CE000
stack
page read and write
2E7F000
stack
page read and write
A1B000
unkown
page execute and read and write
60B6000
heap
page read and write
28C0000
direct allocation
page read and write
594000
heap
page read and write
2D0E000
stack
page read and write
208E000
stack
page read and write
4641000
heap
page read and write
6E6000
unkown
page execute and read and write
F9E000
stack
page read and write
3ACE000
stack
page read and write
4491000
heap
page read and write
35C4000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
4491000
heap
page read and write
3E4000
heap
page read and write
22CCE000
heap
page read and write
458E000
stack
page read and write
283E000
stack
page read and write
D5E000
heap
page read and write
3614D000
stack
page read and write
1765000
heap
page read and write
4CD1000
heap
page read and write
4641000
heap
page read and write
22CD1000
heap
page read and write
14DD000
unkown
page execute and read and write
401F000
stack
page read and write
1500000
direct allocation
page read and write
1761000
heap
page read and write
1500000
direct allocation
page read and write
1BA0000
heap
page read and write
1BDE000
stack
page read and write
35C4000
direct allocation
page execute and read and write
22CE6000
heap
page read and write
4B10000
direct allocation
page execute and read and write
4641000
heap
page read and write
164000
heap
page read and write
35C4000
direct allocation
page execute and read and write
3E4000
heap
page read and write
22CE2000
heap
page read and write
2F0E000
stack
page read and write
4491000
heap
page read and write
4641000
heap
page read and write
164000
heap
page read and write
2C5E000
stack
page read and write
468F000
stack
page read and write
22CDF000
heap
page read and write
5380000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
8BC000
unkown
page execute and write copy
375F000
stack
page read and write
42DE000
stack
page read and write
CF1000
heap
page read and write
1D28F000
stack
page read and write
1590000
heap
page read and write
3C3F000
stack
page read and write
594000
heap
page read and write
E1C000
unkown
page execute and read and write
1344000
heap
page read and write
4641000
heap
page read and write
3E4000
heap
page read and write
22CF9000
heap
page read and write
4491000
heap
page read and write
594000
heap
page read and write
38FE000
stack
page read and write
594000
heap
page read and write
4A70000
direct allocation
page execute and read and write
17AB000
heap
page read and write
594000
heap
page read and write
4C3B000
stack
page read and write
465E000
heap
page read and write
D73000
heap
page read and write
43E0000
direct allocation
page read and write
329E000
stack
page read and write
4641000
heap
page read and write
3E4000
heap
page read and write
3C14000
direct allocation
page execute and read and write
164000
heap
page read and write
22CE0000
heap
page read and write
4880000
direct allocation
page read and write
44FF000
stack
page read and write
590000
heap
page read and write
594000
heap
page read and write
4641000
heap
page read and write
28C0000
direct allocation
page read and write
4641000
heap
page read and write
4C40000
direct allocation
page execute and read and write
4641000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
3C0E000
stack
page read and write
1C90000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4641000
heap
page read and write
C9A000
heap
page read and write
16A2000
heap
page read and write
CC5000
unkown
page execute and read and write
9B0000
unkown
page readonly
287B000
stack
page read and write
4641000
heap
page read and write
4491000
heap
page read and write
4491000
heap
page read and write
4491000
heap
page read and write
160000
heap
page read and write
320E000
stack
page read and write
364F000
stack
page read and write
CE2000
heap
page read and write
3F0F000
stack
page read and write
3E4000
heap
page read and write
3EDE000
stack
page read and write
35CE000
stack
page read and write
419E000
stack
page read and write
1733000
heap
page read and write
597000
unkown
page execute and read and write
4A90000
direct allocation
page execute and read and write
22CDA000
heap
page read and write
4491000
heap
page read and write
4D1E000
stack
page read and write
43E0000
direct allocation
page read and write
D33000
heap
page read and write
CBB000
unkown
page execute and read and write
6CA2D000
unkown
page readonly
605E000
stack
page read and write
9A0000
direct allocation
page read and write
C7E000
stack
page read and write
DB1000
unkown
page execute and write copy
19DE000
stack
page read and write
22CD8000
heap
page read and write
4491000
heap
page read and write
1344000
heap
page read and write
C8F000
unkown
page execute and read and write
3E4000
heap
page read and write
3E4000
heap
page read and write
A19000
unkown
page read and write
4AE0000
direct allocation
page execute and read and write
4491000
heap
page read and write
61E01000
direct allocation
page execute read
9A0000
direct allocation
page read and write
4491000
heap
page read and write
28C0000
direct allocation
page read and write
148F000
stack
page read and write
4641000
heap
page read and write
22CD8000
heap
page read and write
4B20000
direct allocation
page execute and read and write
1C84F000
stack
page read and write
DD4000
unkown
page execute and write copy
22CDA000
heap
page read and write
4641000
heap
page read and write
22CEC000
heap
page read and write
3E4000
heap
page read and write
594000
heap
page read and write
9B0000
unkown
page readonly
4491000
heap
page read and write
1CD56000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
4491000
heap
page read and write
594000
heap
page read and write
7DA3000
heap
page read and write
51BD000
stack
page read and write
301E000
stack
page read and write
There are 1203 hidden memdumps, click here to show them.